Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2018, Vol.23, No.9

  • 1.

    Division of the Hand and Fingers In Realtime Imaging Using Webcam

    Kim, ho-yong | PARK JAE HEUNG | Yeong Geon Seo | 2018, 23(9) | pp.1~6 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method dividing effectively the hand and fingers using general webcam. The method executes 4 times empirically preprocessing one to erase noise. First, it erases the overall noise of the image using Gaussian smoothing. Second, it changes from RGB image to HSV color model and YCbCr color model, executes a global static binarization based on the statistical value for each color model, and erase the noise through bitwise-OR operation. Third, it executes outline approximation and inner region filling algorithm using RDP algorithm and Flood fill algorithm and erase noise. Lastly, it erases noise through morphological operation and determines the threshold propositional to the image size and selects the hand and fingers area. This paper compares to existing one color based hand area division method and focuses the noise deduction and can be used to a gesture recognition application.
  • 2.

    Effective Multi-label Feature Selection based on Large Offspring Set created by Enhanced Evolutionary Search Process

    HyunKi Lim | Seo Wangduk | Jaesung Lee | 2018, 23(9) | pp.7~13 | number of Cited : 0
    Abstract PDF
    Recent advancement in data gathering technique improves the capability of information collecting, thus allowing the learning process between gathered data patterns and application sub-tasks. A pattern can be associated with multiple labels, demanding multi-label learning capability, resulting in significant attention to multi-label feature selection since it can improve multi-label learning accuracy. However, existing evolutionary multi-label feature selection methods suffer from ineffective search process. In this study, we propose a evolutionary search process for the task of multi-label feature selection problem. The proposed method creates large set of offspring or new feature subsets and then retains the most promising feature subset. Experimental results demonstrate that the proposed method can identify feature subsets giving good multi-label classification accuracy much faster than conventional methods.
  • 3.

    Game Design of Augmented Reality RPG using Artificial Intelligence

    SYUNGOG AN | Juengbean Bae | Soo Kyun Kim | 2018, 23(9) | pp.15~20 | number of Cited : 1
    Abstract PDF
    Currently the mobile augmented reality does not require supplemental hardware, such as markers like specific images or depth cameras, in order to acquire 3D environment information. This allows for increased accessibility and usability for the general user, and also broadened scope of development. The market research enterprise Counterpoint Research predicted that the growth of the augmented reality market will reach 70 trillion Korean Won by 2021. Application developments are also progressing. Wargaming, the developer of the global game World of Tanks, has launched an application that uses AR core at the GDC 2018. Thus, we must prepare for the impending augmented reality market and acquire top class augmented reality technology using 3D environment. This paper outlines the development of a game using AR CORE SDK to acquire 3D environment and Unity 3D game engine to combine camera images and 3D graphics, which all comes together to construct a natural augmented reality.
  • 4.

    Design of Boat Racing Game using Buoyant Force

    SYUNGOG AN | Jae-Hyun Kang | Soo Kyun Kim | 2018, 23(9) | pp.21~26 | number of Cited : 0
    Abstract PDF
    A variety of game algorithms have been proposed in recent years. Racing games using these new algorithms have greatly improved compared to those in the past. According to the analysis of racing games done by wheelgamer.com, a website that specializes in racing games, cars are the most common subject in mainstream racing games. These results show there are very few racing games using special subjects such as boats. This paper proposes a method to develop a realistic boat racing game using the Buoyont Force, beyond the limitation of typical racing games that are restricted to cars. A Material Editor based on Unreal Engine 4.12 is used to manifest the Dynamic Material of realistic ocean water. Blueprint, a visual scripting function, is used to materialize buoyancy which allows the boat to move freely along the waves.
  • 5.

    A Study on Cognition about Personal Broadcasting

    Lee,Yong-Hwan | 2018, 23(9) | pp.27~34 | number of Cited : 3
    Abstract PDF
    Personal media centered on blogs, Twitter, and Facebook has opened up a personal broadcasting area while meeting platforms such as YouTube and Africa TV. Due to the many advantages and disadvantages of personal broadcasting, a study on it was necessary and statistical survey was conducted. The study conducted opinion survey of 118 university students on personal broadcasting. As a result, we are getting news using smartphones and mainly watching videos through YouTube, and watching videos type in the order of games, music videos and sports. Satisfaction rate of video was 72.4%, 80.2% of survey did not use paid services, experiences about personal broadcasting was 96.6% and 90.5% of survey the prospect of person broadcasting of the opinion that “it will be expanded”. The first thing we want to be improved in personal broadcasting is the prevention of abusive language and hate speech. Second, we were reluctant to sensational content. Third, the survey results are the improvement of excessive advertising.
  • 6.

    Optimal Video Streaming Based on Delivery Information Sharing in Hybrid CDN/P2P Architecture

    Junpyo Lee | Lee, Won Joo | KangHo-Lee | 2018, 23(9) | pp.35~42 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an optimal streaming service method based on Hybrid CDN/P2P architecture. Recently, video streaming utilizes a CDN (Content Delivery Network) operation technique based on a Proxy Server, which is an end node located close to a user. However, since CDN has a fixed network traffic bandwidth and data information exchange among CDNs in the network is not smooth, it is difficult to guarantee traffic congestion and quality of image service. In the hybrid CDN/P2P network, a data selection technique is used to select only the data that is expected to be continuously requested among all the data in order to guarantee the QoS of the user who utilizes the limited bandwidth efficiently. In order to search user requested data, this technique effectively retrieves the storage information of the constituent nodes of CDN and P2P, and stores the new image information and calculates the deletion priority based on the request possibility as needed. Therefore, the streaming service scheme proposed in this paper can effectively improve the quality of the video streaming service on the network.
  • 7.

    A Hexagon Model-based Efficient Beacon Scheduling Approach for Wireless Sensor Networks

    Lee, Taekkyeun | 2018, 23(9) | pp.43~50 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a hexagon model-based efficient beacon frame scheduling approach for wireless sensor networks. The existing beacon frame scheduling approaches use a lot of slots and subslots for the beacon frame scheduling. Thus, the data from source nodes are not efficiently delivered to a sink node. Also in case a sink node needs to broadcast a beacon frame to the nodes in the network, delivering the beacon frame to the network nodes is not efficient as well. Thus, to solve the problem, we use a hexagon model to find the number of slots and subslots for the beacon frame scheduling. By using them for the beacon frame scheduling, the proposed approach performs better than other approaches in terms of the data transmission delay, the number of received data, the beacon transmission delay and the number of relaying the beacon frames.
  • 8.

    The Development of Bluetooth Router Capable of Communication between Broadband Network and Slave Devices for Companion Animals

    Ho-Young Kwak | Woo-Chan Kim | Jin-Wook Chang | 2018, 23(9) | pp.51~56 | number of Cited : 0
    Abstract PDF
    Currently, many households raise their companion animals for personal reasons. In this environment, the companion animal is left alone in the home, the owner of the companion animal is increasingly curious about the behavior pattern of the companion animal left alone, and there are many devices that can solve this question. In this paper, we have designed and implemented a Bluetooth-based slave device (beacon in this paper) and a router capable of connecting to a broadband network that can observe behavior patterns of companion animals by using advanced ICT technology. The Bluetooth router designed and implemented in this paper installs a beacon in the home, receives the beacon signal from the device and the beacon installed by the companion animal, and transmits the moving line of the companion animal to the owner of the companion animal through the broadband network, so that it can be confirmed in real time through the app for the provided smart phone.
  • 9.

    Design of a Protected Server Network with Decoys for Network-based Moving Target Defense

    Park Taekeun | Kyung Min Park | Daesung Moon | 2018, 23(9) | pp.57~64 | number of Cited : 2
    Abstract PDF
    In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. In this paper, we design a protected server network with a large number of decoys to anonymize the protected servers that dynamically mutate their IP address and port numbers according to Hidden Tunnel Networking, which is a network-based moving target defense scheme. In the network, a protected server is one-to-one mapped to a decoy-bed that generates a number of decoys, and the decoys share the same IP address pool with the protected server. First, the protected server network supports mutating the IP address and port numbers of the protected server very frequently regardless of the number of decoys. Second, it provides independence of the decoy-bed configuration. Third, it allows the protected servers to freely change their IP address pool. Lastly, it can reduce the possibility that an attacker will reuse the discovered attributes of a protected server in previous scanning. We believe that applying Hidden Tunnel Networking to protected servers in the proposed network can significantly reduce the probability of the protected servers being identified and compromised by attackers through deploying a large number of decoys.
  • 10.

    On Mobile Assisted Language Learning (MALL) on English Grammar

    Sung, Tae Soo | 2018, 23(9) | pp.65~71 | number of Cited : 3
    Abstract PDF
    Using mobile technology in educational and learning environments has attracted a lot of attention in recent years. In this mobile environment, mobile phones have been used to enhance the effectiveness of education in the field, which has been recognized through numerous experimental studies so far. The study was proposed and conducted to find out how much the use of mobile phones can have to improve the grammatical knowledge of EFL students. Introduction of 95 intermediate courses to Chungnam area The second grade students of 4-year college participated in this study. Everyone in the experimental and control groups was given the opportunity to review and recur to use the six grammar formats, including the current complete tense, simple past tense, direct and indirect question sentences, and comparative and superative-based methods. During the class discussion, the participants of the group record their voice on their cell phones, analyze the mistakes in the expressions recorded as a task after the class, and explain the results in the next session. However, in the class of the control group participants, this recording process is omitted. Participants benefited from mobile learning were much more positive in multidimensional grammar tests than those in control groups.
  • 11.

    A Design of Client BBS System for Secure HVA

    Jae-Kyung Park | Young-Ja Kim | 2018, 23(9) | pp.73~80 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.
  • 12.

    Defect Severity-based Defect Prediction Model using CL

    Na-Young Lee | Kwon, Ki Tae | 2018, 23(9) | pp.81~86 | number of Cited : 0
    Abstract PDF
    Software defect severity is very important in projects with limited historical data or new projects. But general software defect prediction is very difficult to collect the label information of the training set and cross-project defect prediction must have a lot of data. In this paper, an unclassified data set with defect severity is clustered according to the distribution ratio. And defect severity-based prediction model is proposed by way of labeling. Proposed model is applied CLAMI in JM1, PC4 with the least ambiguity of defect severity-based NASA dataset. And it is evaluated the value of ACC compared to original data. In this study experiment result, proposed model is improved JM1 0.15 (15%), PC4 0.12(12%) than existing defect severity-based prediction models.
  • 13.

    Precedent survey for development of nursing home clothes according to aged society

    Cha Su Joung | 2018, 23(9) | pp.87~96 | number of Cited : 0
    Abstract PDF
    The purpose of this study was to identify the preferred materials and design characteristics of nursing home clothes in order to collect the basic data necessary for the elderly nursing home clothes. It was to utilize the elderly nursing home clothes considering elderly body shape, hand function, illness. This study was conducted by questionnaire method and SPSS ver. 20.0 program was used. The preference for nursing home clothes material was high for cotton, and it was found that they prefer soft, stretch material, warm feeling material, and lightweight material. In the hygienic aspect, they favored sweat-absorbent materials, and preferred laundry- care-resistant materials with poor wrinkles and dirtiness. The nursing home clothes preferred a two piece form consisting of a round neckline, two pockets on both sides, a waistband of rubber band, long lengths, and a waistline pants. The most important function in the nursing home clothes was recognized as wearing comfort. Aesthetics, symbolism, color and print pattern were recognized as not important functions. Therefore, it is necessary to focus on the functional part such as wearing comfort in the design of the nursing home clothes. The material is also hygienic and comfortable to wear. In the case of the elderly, it is necessary to provide convenience for the wear of clothes through the development of stretchable material and detachment device since the movement range of muscles, arms, and legs is reduced. Based on this study, we will utilize it for the development of nursing home suit considering the characteristics of elderly person in the elderly society. It is to develop functional materials for the elderly in need of nursing home, to develop the pattern considering the elderly body shape, and to develop the desorption device considering the movement of the hand.
  • 14.

    Lower body shape classification of adolescent men's students

    Cha Su Joung | 2018, 23(9) | pp.97~105 | number of Cited : 5
    Abstract PDF
    The purpose of this study was to analyze the measurement data of 13 ~ 18 year old male students and to characterize the body shape of the lower body, Through this, I tried to provide basic data for the production of pants for adolescent men's students. As a result of analyzing the body shape factor of the lower half, two factors were classified. 'Vertical factor' of the lower body composed of the circumference, thickness, and width, and the 'horizontal factor' of the lower body composed of the length and height. The body shape of the lower half was classified into four categories according to the circumference and length of the lower half of the male students, such as 'short bird legs', 'long crane legs', 'short pillar' and 'long pillar'. In the study of Hong Eun-hee (2005), body type was classified according to horizontal factor and vertical factor like this study. By age, boys aged 13 to 14 can see that the lower body is thin and short, the lower body is thin and long body is 15-16 years old, and the lower body is relatively thick and long body is 17-18 years old. As the age increases, the growth in the vertical direction occurs first and the growth in the horizontal direction occurs. It is thought that it is necessary to set a different amount of allowance for setting the length and the circumference according to the age of the youth. When the age is young, the amount of allowance in the circumferential direction should be increased, and the amount of allowance in the longitudinal direction after 15 years of age should be increased more than other age groups.
  • 15.

    Standardization Plan of Smart livestock Cattle Breeding Management device and Collected Information

    Si-Young Rho | Jae-Su Lee | Pyoung-Woo Yang and 2other persons | 2018, 23(9) | pp.107~112 | number of Cited : 3
    Abstract PDF
    Smart livestock has been proposed as a solution to increase farmers' income and new recruitment of livestock farmers. In this paper, a standardization Plan of breeding management device and collected information for smart livestock cattle was proposed. l Sophisticatedly, basic information will be established for all six types of livestock breeding management device: military automatic feeder, calf automatic feeder, smart milk cooler, feed bin to be able to measure feed residue, smart scale, and biometric information collection device. The standardization, common use, and stabilization of major livestock management device and collected information were suggested to solve the problems caused by in existing breeding management device.
  • 16.

    Implementation of automatic detection system of IoT based sensor device (Considering the application service of reduction of consumption current)

    Myung-Kyu Kwon | 2018, 23(9) | pp.113~122 | number of Cited : 1
    Abstract PDF
    In this paper, IoT(Internet of things) technology, which is the core of the 4th industrial revolution, was applied to the study of reduction of consumption current. The IoT is a sensor that collects data, a sensor communication, a gateway that processes and stores the collected data. Data application of IoT technology is applied to smart home, smart city, healthcare, smart factory, etc. and it needs to be applied to various industrial fields. By sensing the location of the sensor device, the specific functions of the gateway and the platform are turned ON and OFF to reduce the consumption current of the equipment during the OFF period. When the sensor device accesses the gateway, the specific function of the gateway is turned ON and When the device is separated from the gateway, it senses the sensitivity of the wireless signal and automatically turns off the certain functions. As a resurt, it has reduced the consumption of current. In this paper, we propose a novel system for detecting the location of sensor devices by applying IoT technology. The system implementation is realized by software based, and defines the requirements for the implementation of the sensor device gateway. The gateway automatically detects the location, movement of the device and performs necessary functions. Finally verifies the automatic detection performance of the gateway according to the location of the device. It will contribute greatly to the development of the smart city and office.
  • 17.

    A Study on the effect of perceived online shopping mall attribute on trust, commitment, purchasing intention

    Hyun-chul Kim | 2018, 23(9) | pp.123~132 | number of Cited : 7
    Abstract PDF
    This study presents perceived reputation, perceived quality, perceived assurance of online shopping malls as the attributes factors of online shopping malls and identifies the impact of perceived online shopping mall attributes on trust, involvement and purchasing intention. Also we analyzed whether trust on online shopping mall affect involvement and purchasing intention, and whether involvement on online shopping mall affect purchasing intention. The results show that perceived quality, perceived assurance of online shopping malls influence positively on trust, but perceived reputation does not. Second, perceived reputation, perceived quality, perceived assurance of online shopping malls doesn’t influence positively on involvement. Third, perceived quality, perceived assurance of online shopping malls influence positively on purchasing intention, but perceived reputation does not. Forth, trust on online shopping mall influence positively on involvement and purchasing intention. Fifth, involvement on online shopping mall influence positively on purchasing intention.
  • 18.

    Study on Learning Model for Improving Computational Thinking of Early Childhood Education in Domestic Setting

    Yan Ha | 2018, 23(9) | pp.133~139 | number of Cited : 1
    Abstract PDF
    This paper draws attention on the importance of computational thinking, which is being utilized more and more in recent educational environment. Also, it suggests a teaching and learning model for improving computational thinking within early childhood education. With the advent of the Fourth Industrial Revolution, this era demands people to possess integrative thinking and problem-solving skills. As a result, education on computational thinking is done beginning from the early childhood, enabling children to take the leading part in the future digital generation. However, despite the appearance of many education services and products regarding computational thinking, the field lacks evaluation and academic verification. Thus, this study will complement the methodological aspect of computational thinking.
  • 19.

    Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

    Kim, Jeong Wook | Chul-Yong Choi | 2018, 23(9) | pp.141~156 | number of Cited : 1
    Abstract PDF
    The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.
  • 20.

    The Influence of the Resilience on Burnout of Public Social Worker : Focusing on the Moderating effects of Self-efficacy

    Jung-Seo Lee | Young-Hwan Kim | 2018, 23(9) | pp.157~162 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to investigate the relationship between resilience, burnout, and self-efficacy of Public Social Workers and to draw implications for effective management of Public Social Workers. In order to accomplish this study purpose, the resilience of Public Social Workers as an independent variable, burnout as a dependent variable of occupational identity, and self-efficacy as a moderating variable were selected. The causal relationship between resilience and burnout and the moderating effect of self-efficacy were analyzed. As a result of the analysis, the resilience of Public Social Workers showed a significant effect on burnout, and the effect of resilience on burnout varied according to self–efficacy, so there was a moderating effect of self-efficacy. Based on the results of this analysis, the theoretical implications and policy implications of this study are suggested.
  • 21.

    Effect of Cognitive Style on Collaborative Problem Solving Ability in Programming Learning

    Bo-Seop Kwon | 2018, 23(9) | pp.163~169 | number of Cited : 1
    Abstract PDF
    Problem solving by programming has a lot of influence on computational thinking improvement. Programming learning has been self-directed based on the individual's thoughts and principles. However, the revised informatics curriculum in 2015 puts importance on collaborative learning. Collaborative learning emphasizes results differently from cooperative learning, which emphasizes problem-solving processes. And cooperative learning leads to structured learning, such as role sharing and activity stages, within a small group, while collaborative learning leads to unstructured learning. Therefore, it is becoming more in collaborative learning that peer interaction can be affected by learners’ cognitive style. In this paper, we propose the effect of cognitive style on problem solving ability in collaborative learning for problem solving by programming. As a result, collaborative learning was effective in improving problem solving ability and there was no significant difference in cognitive style.