Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2018, Vol.23, No.8

  • 1.

    Circuit card inspection method through digital circuit design based AITS

    Ji-Hoon Han | 2018, 23(8) | pp.1~7 | number of Cited : 0
    Abstract PDF
    Previous test equipment was bulky, took a long time to check, and was somewhat less economical. Since most of the checks were about analog signals, we preferred to check them using reference equipments. In this paper, a digital circuit design based on AITS is used to implement signals that can not utilize commercial measurement resources, and also designed and manufactured equipment that can inspect SRU. These test equipments were tested and evaluated by development, operation, and field evaluation, and they were installed to the Korean Field Force. This contributed to the improvement of operability by shortening the inspection time from 83.2 minutes to 7.8 minutes on average In addition, it did not utilize the reference equipment, so it could play a big role in lowering the mass production cost.
  • 2.

    A Kidnapping Detection Using Human Pose Estimation in Intelligent Video Surveillance Systems

    Ju Hyun Park | KwangHo Song | YOO SUNG KIM | 2018, 23(8) | pp.9~16 | number of Cited : 0
    Abstract PDF
    In this paper, a kidnapping detection scheme in which human pose estimation is used to classify accurately between kidnapping cases and normal ones is proposed. To estimate human poses from input video, human’s 10 joint information is extracted by OpenPose library. In addition to the features which are used in the previous study to represent the size change rates and the regularities of human activities, the human pose estimation features which are computed from the location of detected human’s joints are used as the features to distinguish kidnapping situations from the normal accompanying ones. A frame-based kidnapping detection scheme is generated according to the selection of J48 decision tree model from the comparison of several representative classification models. When a video has more frames of kidnapping situation than the threshold ratio after two people meet in the video, the proposed scheme detects and notifies the occurrence of kidnapping event. To check the feasibility of the proposed scheme, the detection accuracy of our newly proposed scheme is compared with that of the previous scheme. According to the experiment results, the proposed scheme could detect kidnapping situations more 4.73% correctly than the previous scheme.
  • 3.

    Implementation of Flight Simulator using 6DOF Motion Platform

    Park Myeong Chul | Choi Duk Kyu | 2018, 23(8) | pp.17~23 | number of Cited : 2
    Abstract PDF
    In this paper, we implemented a flight posture simulator that intuitively understands aircraft flight posture and visualizes the principle of motion. The proposed system operates the 6 - axis motion platform according to the change of the navigation information and transmits the flight attitude to the simulator using the gyro sensor. A gyro sensor and an acceleration sensor are used together to analyze the attitude of the aircraft. The reason is that the gyro sensor has a cumulative error in the integration process. And the accelerometer sensor was compensated by using the complementary filter because noise was serious due to short term vibration. Using the compensated sensor information, the motion platform is operated by calculating the angle to be transmitted to the 6-axis motor. And visualization result is implemented using OpenGL. The results of this study can be used as teaching materials for students related to aviation in the future.
  • 4.

    Design of Runner Game using Overlap Circle in Unity3D

    Hyun-Jun Kim | KIM, SOO KYUN | 2018, 23(8) | pp.25~30 | number of Cited : 0
    Abstract PDF
    In this paper, we design a 2D one touch runner game which controls on smart device easily using a Unity3D game engine. Unity is the creator of the world's widely-used 2D and the 3D cross-platform game engine developed by Unity Technologies. Also, Unity builds high-quality 2D and 3D games on a various hardware device. This paper shows the familiar character as a cartoon and feels to enjoy using platformer with various game users. we show that the proposed platformer method improve controlling game path on the smart device.
  • 5.

    Design of 2.5D Survival Game using Inventory

    KIM, SOO KYUN | Hong-Rae Kim | Lee, Won Joo | 2018, 23(8) | pp.31~36 | number of Cited : 0
    Abstract PDF
    The survival game is characterized by the ability to survive until the item is collected and the game is completed at the specified time, and the inventory function to store the item is the core of the game. Typical survival games include ‘Don't Starve’, ‘H1Z1’, and ‘Lust’. The purpose of this paper is to design a 2.5D survival game that can be enjoyed by the smart device using Unity 3D engine. Because it is designed as a mobile platform, designing light inventory function using two lists rather than existing inventory function makes it easier to design than existing inventory and light design suitable for mobile. In general, it is characterized by designing a mobile game so that it does not depend on the place of the survival game.
  • 6.

    Mood Suggestion Framework Using Emotional Relaxation Matching Based on Emotion Meshes

    Jong-Hyun Kim | 2018, 23(8) | pp.37~43 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a framework that automatically suggests emotion using emotion analysis method based on facial expression change. We use Microsoft's Emotion API to calculate and analyze emotion values in facial expressions to recognize emotions that change over time. In this step, we use standard deviations based on peak analysis to measure and classify emotional changes. The difference between the classified emotion and the normal emotion is calculated, and the difference is used to recognize the emotion abnormality. We match user's emotions to relatively relaxed emotions using histograms and emotional meshes. As a result, we provide relaxed emotions to users through images. The proposed framework helps users to recognize emotional changes easily and to train their emotions through emotional relaxation.
  • 7.

    Utilizing Fuzzy Logic for Recommender Systems

    Soojung Lee | 2018, 23(8) | pp.45~50 | number of Cited : 0
    Abstract PDF
    Many of the current successful commercial recommender systems utilize collaborative filtering techniques. This technique recommends products to the active user based on product preference history of the neighbor users. Those users with similar preferences to the active user are typically named his/her neighbors. Hence, finding neighbors is critical to performance of the system. Although much effort for developing similarity measures has been devoted in the literature, there leaves a lot to be improved, especially in the aspect of handling subjectivity or vagueness in user preference ratings. This paper addresses this problem and presents a novel similarity measure using fuzzy logic for selecting neighbors. Experimental studies are conducted to reveal that the proposed measure achieved significant performance improvement.
  • 8.

    Power Control for D2D Communication in the Cellular System: The Impact of Channel Estimation Error

    Oh Chang Yoon | 2018, 23(8) | pp.51~57 | number of Cited : 0
    Abstract PDF
    In this paper, we investigate the impact of channel estimation error on the D2D power control algorithm. In the previous work, D2D power control algorithm has been proposed under the assumption that the channel between the transmitter and the corresponding receiver is perfectly estimated. In reality, the channel estimation error is more often the case. The first question is that the power control algorithm designed for perfect channel estimation is still valid under the channel estimation error environment ? The second question is , if it is not valid, what could be the possible remedy for the channel estimation error ? In this paper, to answer the first question, we investigate the impact of the channel estimation error on the power control algorithm. We first review the D2D power control algorithm designed for perfect channel estimation. Then, we model the channel estimation error. Finally, we summarize the main results observed from the analysis of the simulation.
  • 9.

    Research on Use Motivations of Mobile Payment Adopters: A Case Study on Chinese Oversea Students in South Korea

    LIU ZIYANG | Hao Li | Yi Chen | 2018, 23(8) | pp.59~66 | number of Cited : 0
    Abstract PDF
    In this paper we purposes to analyze the motivation of mobile payment adopters. In this study, with unified theory of acceptance and use of technology (UTAUT) model as the basis of research, we set up a structural equation model based on gender, age, experience and voluntary, collected data in the form of a questionnaire survey and analyzed drivers that affected mobile payers. In this study, The necessity of this paper is that the group of Korean students belongs to a special group with nearly 70,000 people. The penetration rate of mobile payment in China is 77%, ranking first in the world, but after the young people came to Korea. There are many obstacles and inconveniences when using mobile payment. We have proposed special subjects for special populations. the survey data were analyzed using SPSS22.0 and AMOS22.0 statistical software and the proposed model was modified. The results show that consumers’ mobile payment is mainly motivated by social influence and performance expectancy. These results are of theoretical value and offer a new direction and implications to mobile payment developers. Besides, they also provide useful information and guidance for enterprises to aim at the market of Chinese oversea students in South Korea.
  • 10.

    A Study of Attendance Management System using Beacon and BLE Advertisement Function

    Bong-Soo Jang | LEE SANG JOON | Ho Young Kwak | 2018, 23(8) | pp.67~73 | number of Cited : 4
    Abstract PDF
    In this paper, we propose an electronic attendance management system using the bluetooth function of the beacon and BLE advertising function of the smart phone. In the beacon-only bluetooth attendance confirmation system, it is needed more than one beacons according to the class room sizes. A BLE advertising function based attendance confirmation system can not provide the information about the location of the attendances. In the proposed system, we can identify the location of the instructor using the beacon of the class room, and confirm the attendances by checking the position of the attendances's smart phone. In this system, we can achieves the goals of electronic attendance management system using only one beacon per a class room.
  • 11.

    A Steganographic Data Hiding Method in Timestamps by Bit Correction Technique for Anti-Forensics

    Cho Gyu Sang | 2018, 23(8) | pp.75~84 | number of Cited : 1
    Abstract PDF
    In this research, a bit correction technique of data hiding method in timestamp of MFT entry in NTFS file system is proposed. This method is proposed in two ways, depending on the number of bytes of data to hide. A basic data hiding method using a bit correction technique to solve the problems of the conventional 2-byte technique is proposed. In order to increase the capacity of the data, a 3-byte data hiding method using an extended bit correction technique is proposed. The data hiding method in the timestamps is based on the fact that is not revealed in the Windows explorer window and the command prompt window even if any data is hidden in the timestamp area of less than one second. It is shown that the validity of the proposed method through the experimental two cases of the basic data hiding method by the bit correction method and the 3-byte data hiding method by the extended bit correction method.
  • 12.

    A Method of Data Hiding in a File System by Modifying Directory Information

    Cho Gyu Sang | 2018, 23(8) | pp.85~93 | number of Cited : 0
    Abstract PDF
    In this research, it is proposed that a method to hide data by modifying directory index entry information. It consists of two methods: a directory list hiding and a file contents hiding. The directory list hiding method is to avoid the list of files from appearing in the file explorer window or the command prompt window. By modifying the file names of several index entries to make them duplicated, if the duplicated files are deleted, then the only the original file is deleted, but the modified files are retained in the MFT entry intact. So, the fact that these files are hidden is not exposed. The file contents hiding is to allocate data to be hidden on an empty index record page that is not used. If many files are made in the directory, several 4KB index records are allocated. NTFS leaves the empty index records unchanged after deleting the files. By modifying the run-list of the index record with the cluster number of the file-to-hide, the contents of the file-to-hide are hidden in the index record. By applying the proposed method to the case of hiding two files, the file lists are not exposed in the file explorer and the command prompt window, and the contents of the file-to-hide are hidden in the empty index record. It is proved that the proposed method has effectiveness and validity.
  • 13.

    A Study on Development of Video Navigation System with real-time GPS Information

    Jang, Jin-wook | 2018, 23(8) | pp.95~99 | number of Cited : 1
    Abstract PDF
    This research is related to GPS(global positioning system) enabled device navigation service and consists of two parts. The first is the logic that records the route guidance video and records GPS information in time, and the second is the logic that outputs the created video data based on real time GPS. The recording logic first determines the origin and destination, records the video from the origin to the destination and it adjusts the speed of the image in a specific area so that the user can see it easily. And insert ancillary information and advertisements that can help guide the route. In the output logic, we provide navigation services using the video and GPS data tables we created, and it receives user 's GPS information in real time and corrects it based on the recent user location to reduce errors. This provides local guidance services to people who lack language skills like foreigners.
  • 14.

    Implementation of Smart Gloves for the Blind and Visually Impaired

    Park Myeong Chul | Taesun Kim | 2018, 23(8) | pp.101~106 | number of Cited : 0
    Abstract PDF
    Most people with visual impairments can not use both hands freely because they carry a cane. And unnecessary contact with people around you during walking can occur. Other guides include guide dogs, but the price and maintenance cost are expensive and difficult to manage. In this paper, we propose a smart glove, which prevents unnecessary contact when blind people use the cane, detects the obstacle ahead by using the ultrasonic sensor, and informs the presence of the obstacle by using the servo motor. In addition, the electrostatic proximity touch module on the fingers executes a specific application of the smart phone connected by Bluetooth when the finger touches each other. It is designed to allow you to use text or phone calls when you are lost or in an emergency. The results of this study will be used as a tool to provide a more convenient life for the visually impaired.
  • 15.

    Effects of the Team Trust Element of Rugby Players on Self-Determination Motive and Team Performance

    Lee JinWook | Park Sung Soo | 2018, 23(8) | pp.107~114 | number of Cited : 0
    Abstract PDF
    This study was conducted for the purpose of examining the effects of team trust element of rugby players on self-determination motive and team performance. As for the study subjects, rugby players participated in the 97th national athletic meet in 2016 were selected. As for data collection, in the total of 221 copies of samples were collected through convenience sampling method and 182 copies were used for the final analysis. Using SPSS 18.0, the collected data were analyzed through frequency analysis, exploratory factor analysis, Cronbach's α test, correlation analysis and multiple regression analysis and the following conclusions have been obtained. First, as for the effects of rugby players' team trust element on self-determination motive, it was found that team trust influenced external moderation, internal moderation, integrated moderation and identification moderation, and teammate trust influenced internal moderation, integrated moderation and identification moderation. Second, as for the effects of rugby players' team trust element on team performance, it was found that team trust and teammate trust influenced team performance. Third, as for the effects of rugby players' self-determination motive on team performance, it was found that integrated moderation and internal moderation influenced team performance.
  • 16.

    Impact of Leadership, Empowerment, and Organizational Effectiveness on Turnover Intention for Employees of Korean Dental Clinics

    Kim, Yong-Tae | Jee Hyung Lee | Jae-Young Moon | 2018, 23(8) | pp.115~121 | number of Cited : 1
    Abstract PDF
    This study inquires into employee’s intent to leave in South Korean dental clinics. A systematic research was undertaken on theories of leadership types, job satisfaction, organizational commitment and empowerment, and then interaction between these variables was verified based on quantitative data by using Structural Equation Model (SEM). The findings suggest that making improvements of empowerment, job satisfaction, and organizational commitment demand individualized consideration and charisma, the components of transformational leadership. As a way to reduce turnover intention, the role of job satisfaction and organizational commitment was more influential than that of empowerment. Also, a combination of charisma of transformational leadership and contingent reward of transactional leadership turned out to be the ideal leadership type to reduce turnover intention. Lastly, the harmony of individual goal with that of organization, apparent documentation of reward system, and stress control were recommended as practical solutions to improve organizational profitability and effectiveness and to reduce turnover rate in dental clinics.
  • 17.

    Statistical Analysis of Clinical Nursing Competency and Self-Efficacy in Nursing Students

    Hong, Jeongju | 2018, 23(8) | pp.123~131 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to investigate the clinical nursing competence and self-efficacy of 4th and 2nd semester nursing college students who completed most of the performance-based nursing education curriculum. It was attempted to develop competency evaluation and competency-based curriculum. The collected data were analyzed using descriptive statistics, t-test, one-way ANOVA, scheffē test, Pearson's correlation coefficients and Stepwise multiple regression in SPSS WIN 24.0 program. The findings of this study were as follows. 1) The knowledge level of essential basic nursing skills received a score of 88.95. The overall average score of clinical performance was 3.15 out of 5. The mean score of self-efficacy was 4.14 ± 0.57 points on 6 points 2) Among the general characteristics of subjects, 'motivation of major selection' and 'satisfaction of practice time' differed in the knowledge of essential basic nursing skills, 'religion' and 'health status' differed in clinical performance ability and 'interpersonal relationship', 'motivation of major selection', 'major satisfaction', 'satisfaction of practice time', 'nursing satisfaction', 'desired working period' and 'average rating' differed in self-efficacy. 3) The self-efficacy showed a significant positive correlation with the clinical nursing competency including the knowledge of essential basic nursing skills and clinical performance ability. The nursing satisfaction, clinical performance ability, the knowledge of essential basic nursing skills, interpersonal relationship and average rating influenced significantly and explained 23.7% of the subjects' self-efficacy.
  • 18.

    Non-periodic Subway Scheduling that Minimizes Operational Cost and Passenger Waiting Time

    YunWoo Hong | Chung Yerim | Yunhong Min | 2018, 23(8) | pp.133~142 | number of Cited : 0
    Abstract PDF
    Subway metro scheduling is one of the most important problems impacting passenger convenience today. To operate efficiently, the Seoul metro uses regular, periodic schedules for all lanes, both north and southbound. However, many past studies suggest that non-periodic scheduling would better optimize costs. Since the Seoul metro is continuously facing a deficit, adopting a non-periodic schedule may be necessary. Two objectives are presented; the first, to minimize the average passengers’ waiting time, and the second, to minimize total costs, the sum of the passenger waiting time, and the operational costs. In this paper, we use passenger smart card data and a precise estimation of transfer times. To find the optimal time-table, a genetic algorithm is used to find the best solution for both objectives. Using Python 3.5 for the analysis, for the first objective, we are able to reduce the average waiting time, even when there are fewer trains. For the second objective, we are able to save about 4.5 thousand USD with six fewer trains
  • 19.

    Research on John School as a policy to prevent recidivism of online sex trafficking

    park | Sang-Ouk Noe | 2018, 23(8) | pp.143~149 | number of Cited : 0
    Abstract PDF
    Recently, President Donald Trump signed FOSTA (Fight Online Sex Trafficking Act) in April 11, 2018, which makes online service no more immune from civil liability for the action of third party facilitating sex trafficking content. Although it is also important to enhance security regulations and cognition on law, but it will be economically more effective to put more energy on preventing recidivism. For John School in Korea, it should increase implementation rate by putting core manpower and budget for preventing needs of sex purchase and then, check operation method and efficacy to improve the actual program. One way is first, empirical analysis and data is required on efficacy of John School program. Second, should have clear definition in Special Sex Trade Law. Third, more strick regulation for selecting participant is required. Fourth, more manpower and budget is required. Fifth, charging the participant for educational fee shall be reviewed. Sixth, educational program should be reviewed. The most important point of education is to make those criminals feel guilty about financially purchasing the sex, basically making them to recognize that it is ethically wrong. However, the current education system contains no clear explanation about the ethical issue of such problem but focusing more on other factors such as sexual disease and structural problem of sexual business. Therefore, this failed to deliver the right psychological training to those criminals without any ethical control. Knowing why women feel hurt when having unwanted sexual relationship by being paid is required part in terms of education for preventing sex trafficking.
  • 20.

    A Study on the Effect of Knowledge Sharing and Utilization on Field Project Performance

    lee won hee | Jae-Young Moon | 2018, 23(8) | pp.151~156 | number of Cited : 3
    Abstract PDF
    As the globalization of the global economy accelerates, entrepreneurs are increasingly interested in knowledge management processes such as sharing, utilizing, and learning within organizations to create and scale new knowledge to achieve sustainable growth and differentiated competitive advantage. Recently, domestic construction companies have been facing difficulties due to many unstable factors including domestic and foreign factors due to technological power enhancement and the decline of the construction industry due to the government's real estate regulation policy and the ongoing recession. The purpose of this paper is to investigate the effect of knowledge sharing and utilization on the performance of knowledge sharing and utilization in the field organization of domestic construction companies in this market situation. In this study, the structural equation model was used for empirical analysis. As a result of this study, it was confirmed that all variables except for the relationship between organizational culture and knowledge sharing and utilization had a positive effect.