Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2018, Vol.23, No.10

  • 1.

    Workload Characteristics-based L1 Data Cache Switching-off Mechanism for GPUs

    Do Cong Thuan | Gwang Bok Kim | Cheol Hong Kim | 2018, 23(10) | pp.1~9 | number of Cited : 0
    Abstract PDF
    Modern graphics processing units (GPUs) have become one of the most attractive platforms in exploiting high thread level parallelism with the support of new programming tools such as CUDA and OpenCL. Recent GPUs has applied cache hierarchy to support irregular memory access patterns; however, L1 data cache (L1D) exhibits poor efficiency in the GPU. This paper shows that the L1D does not always positively affect the applications in terms of performance and energy efficiency for the GPU. The performance of the GPU is even harmed by using the L1D for lots of applications. Our proposed technique exploits the characteristics of the currently-executed applications to predict the performance impact of the L1D on the GPU and then decides whether to continuously use the cache for the application or not. Our experimental results show that the proposed technique improves the GPU performance by 9.4% and saves up to 52.1% of the power consumption in the L1D.
  • 2.

    Accurate and Efficient Log Template Discovery Technique

    Byungchul Tak | 2018, 23(10) | pp.11~21 | number of Cited : 0
    Abstract PDF
    In this paper we propose a novel log template discovery algorithm which achieves high quality of discovered log templates through iterative log filtering technique. Log templates are the static string pattern of logs that are used to produce actual logs by inserting variable values during runtime. Identifying individual logs into their template category correctly enables us to conduct automated analysis using state-of-the-art machine learning techniques. Our technique looks at the group of logs column-wise and filters the logs that have the value of the highest proportion. We repeat this process per each column until we are left with highly homogeneous set of logs that most likely belong to the same log template category. Then, we determine which column is the static part and which is the variable part by vertically comparing all the logs in the group. This process repeats until we have discovered all the templates from given logs. Also, during this process we discover the custom patterns such as ID formats that are unique to the application. This information helps us quickly identify such strings in the logs as variable parts thereby further increasing the accuracy of the discovered log templates. Existing solutions suffer from log templates being too general or too specific because of the inability to detect custom patterns. Through extensive evaluations we have learned that our proposed method achieves 2 to 20 times better accuracy.
  • 3.

    Controller Learning Method of Self-driving Bicycle Using State-of-the-art Deep Reinforcement Learning Algorithms

    Seungyoon Choi | Tuyen Le Pham | Tae-Choong Chung | 2018, 23(10) | pp.23~31 | number of Cited : 1
    Abstract PDF
    Recently, there have been many studies on machine learning. Among them, studies on reinforcement learning are actively worked. In this study, we propose a controller to control bicycle using DDPG (Deep Deterministic Policy Gradient) algorithm which is the latest deep reinforcement learning method. In this paper, we redefine the compensation function of bicycle dynamics and neural network to learn agents. When using the proposed method for data learning and control, it is possible to perform the function of not allowing the bicycle to fall over and reach the further given destination unlike the existing method. For the performance evaluation, we have experimented that the proposed algorithm works in various environments such as fixed speed, random, target point, and not determined. Finally, as a result, it is confirmed that the proposed algorithm shows better performance than the conventional neural network algorithms NAF and PPO.
  • 4.

    ShEx Schema Generator for RDF Graphs Created by Direct Mapping

    ji Woong Choi | 2018, 23(10) | pp.33~43 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method to automatically generate the description of an RDF graph structure. The description is expressed in Shape Expression Language (ShEx), which is developed by W3C and provides the syntax for describing the structure of RDF data. The RDF graphs to which this method can be applied are limited to those generated by the direct mapping, which is an algorithm for transforming relational data into RDF by W3C. A relational database consists of its schema including integrity constraints and its instance data. While the instance data can have been published in RDF by some standard methods such as the direct mapping, the translation of the schema has been missing so far. Unlike the users on relational databases, the ones on RDF datasets were forced to write repeated vague SPARQL queries over the datasets to acquire the exact results. This is because the schema for RDF data has not been provided to the users. The ShEx documents generated by our method can be referred as the schema on writing SPARQL queries. They also can validate data on RDF graph update operations with ShEx validators. In other words, they can work as the integrity constraints in relational databases.
  • 5.

    R2RML Based ShEx Schema

    ji Woong Choi | 2018, 23(10) | pp.45~55 | number of Cited : 0
    Abstract PDF
    R2RML is a W3C standard language that defines how to expose the relational data as RDF triples. The output from an R2RML mapping is only an RDF dataset. By definition, the dataset has no schema. The lack of schema makes the dataset in linked data portal impractical for integrating and analyzing data. To address this issue, we propose an approach for generating automatically schemas for RDF graphs populated by R2RML mappings. More precisely, we represent the schema using ShEx, which is a language for validating and describing RDF. Our approach allows to generate ShEx schemas as well as RDF datasets from R2RML mappings. Our ShEx schema can provide benefits for both data providers and ordinary users. Data providers can verify and guarantee the structural integrity of the dataset against the schema. Users can write SPARQL queries efficiently by referring to the schema. In this paper, we describe data structures and algorithms of the system to derive ShEx documents from R2RML documents and presents a brief demonstration regarding its proper use.
  • 6.

    Real-time Optimal Operation Planning of Isolated Microgrid Considering SOC balance of ESS

    Yoon Cheol Lee | Ji Yeon Shim | Jeongmin Kim and 1other persons | 2018, 23(10) | pp.57~63 | number of Cited : 0
    Abstract PDF
    The operating system for an isolated microgrid, which is completely disconnected from the central power system, aims at preventing blackouts and minimizing power generation costs of diesel generators through efficient operation of the energy storage system (ESS) that stores energy produced by renewable energy generators and diesel generators. In this paper, we predict the amount of renewable energy generation using the weather forecast and build an optimal diesel power generation plan using a genetic algorithm. In order to avoid inefficiency due to inaccurate prediction of renewable energy generation, our search algorithm imposes penalty on candidate diesel power generation plans that fail to maintain the SOC (state of charge) of ESS at an appropriate level. Simulation experiments show that our optimization method for maintaining an appropriate SOC balance can prevent the blackout better when compared with the previous method.
  • 7.

    Detects abnormal behavior using motor power consumption

    Ki-Hwan Kim | Su-Mi Tyu | Min-Kyu KIm and 4other persons | 2018, 23(10) | pp.65~72 | number of Cited : 0
    Abstract PDF
    In this paper, we used LSTM as a method to detect abnormal behavior of motors. We fixed the high layout size to 1 and changed the range of the input values and the neural network structure to see what change in power consumption prediction. Now, as the fourth industrial revolution era, smart factories are attracting attention. All the physical actions of smart factories are done using motors. Continuous monitoring of motor malfunctions helps to detect malfunctions and efficient operation. However, it is difficult to acquire the power consumption constantly due to the influence of the noise. We have experimented with a simple experimental environment, a method of predicting similarity to input data by adjusting the range of the input data or by changing the neural network structure.
  • 8.

    A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy - data encryption and modify merkle tree-

    Min Youn-A | BAEK, Yeong Tae | 2018, 23(10) | pp.73~80 | number of Cited : 2
    Abstract PDF
    The shared economy began with the concept of sharing the physical and intellectual assets of individuals with others. Nowadays, the concept of shared economy is becoming one of the industries as an enterprise type. Especially, with the development of the Internet and smart devices, various forms of shared economy have been developed in accordance with the need of sharing of individual income. Digital content is also a shareable commodity and it is seeking to utilize it as an item of shared economy. Accordingly, when digital contents are used as a shared economy, there are various possible threats -security threats that may arise in the course of transactions, potential for theft, alteration and hacking of contents. In this paper, we propose transaction method and content protection method using block chain-ethereum technology to reduce security threats and transparent transactions that can occur in digital contents transactions. Through the proposed method, the trust of the consumer and the supplier can be measured and the encryption can be performed considering the characteristics of the data to be traded. Through this paper, it is possible to increase the transparency of smart transaction of digital contents and to reduce the risk of content distortion, hacking, etc.
  • 9.

    Development of Mobile Social Network Game by using Web Service

    SYUNGOG AN | ManJe Kang | KIM, SOO KYUN | 2018, 23(10) | pp.81~86 | number of Cited : 0
    Abstract PDF
    In the field of mobile games, social network games are steadily increasing in market scale and public interest every year. This paper proposes a method to design a social network game, which is one of the most successful genres in mobile games. The method uses Unity3D, the most commonly used engine for mobile game development. NGUI, a versatile developmental tool of Unity3D, is used to create shops and battle UIs. This paper particularly focuses on how to use the web hosting service to search and operate the necessary data from the database in the server. In addition, the proposed social network game is easy to implement real-time battle using Animator and Raycast, and is characterized by efficient battle implementation through time delay using Coroutine function.
  • 10.

    A Study on Extracting Car License Plate Numbers Using Image Segmentation Patterns

    EunGyeom Jang | 2018, 23(10) | pp.87~94 | number of Cited : 0
    Abstract PDF
    This paper proposes a method of detecting the license plates of vehicles. The proposed technology applicable to different formats of license plates detects the numbers by standardizing the images at edge points. Specifically, in accordance with the format of each license plate, the technology captures the image in the character segment, and compares it against the sample model to derive their similarity and identify the numbers. Characters with high similarities are used to form a group of candidates and to extract the final characters. Analyzing the experimental results found the similarity of the extracted characters exceeded 90%, whereas that of less identifiable numbers was markedly lower. Still, the accuracy of the extracted characters with the highest similarity was over 80%. The proposed technology is applicable to extracting the character patterns of certain formats in diverse and useful ways.
  • 11.

    Sprite Animation Based Fire Effects Using Spark Textures and Artificial Buoyancy Field

    Jong-Hyun Kim | 2018, 23(10) | pp.95~101 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an image-based synthesis method that can effectively represent the spark effect in fire simulation. We use the real flame image or animated image as inputs and perform the following steps : 1) extract feature vectors from the image, 2) calculate artificial buoyancy, and 3) generate and advect spark textures. We detect the edge from images and then calculate the feature vectors to calculate the buoyancy. In the next step, we compute the high-quality buoyancy vector field by integrating the two-dimensional feature vector and the fluid equation. Finally, the spark texture is advect by buoyancy field. As a result, our method is performed much faster than the previous approach and high-quality results can be obtained easily and stably.
  • 12.

    Dynamic Text Categorizing Method using Text Mining and Association Rule

    Young-Wook Kim | Kim Ki Hyun | LEE, Hong Chul | 2018, 23(10) | pp.103~109 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a dynamic document classification method which breaks away from existing document classification method with artificial categorization rules focusing on suppliers and has changing categorization rules according to users’ needs or social trends. The core of this dynamic document classification method lies in the fact that it creates classification criteria real-time by using topic modeling techniques without standardized category rules, which does not force users to use unnecessary frames. In addition, it can also search the details through the relevance analysis by calculating the relationship between the words that is difficult to grasp by word frequency alone. Rather than for logical and systematic documents, this method proposed can be used more effectively for situation analysis and retrieving information of unstructured data which do not fit the category of existing classification such as VOC (Voice Of Customer), SNS and customer reviews of Internet shopping malls and it can react to users’ needs flexibly. In addition, it has no process of selecting the classification rules by the suppliers and in case there is a misclassification, it requires no manual work, which reduces unnecessary workload.
  • 13.

    Software Implementation of Lightweight Block Cipher CHAM for Fast Encryption

    Taeung Kim | Deukjo Hong | 2018, 23(10) | pp.111~117 | number of Cited : 0
    Abstract PDF
    CHAM is a lightweight block cipher, proposed in ICISC 2017. CHAM-n/k has the n-bit block and the k-bit key, and designers recommend CHAM-64/128, CHAM-128/128, and CHAM-128/256. In this paper, we study how to make optimal software implementation of CHAM such that it has high encryption speed on CPUs with high computing power. The best performances of our CHAM implementations are 1.6 cycles/byte for CHAM-64/128, 2.3 cycles/byte for CHAM-128/128, and 3.8 cycles/byte for CHAM-128/256. The comparison with existing software implementation results for well-known block ciphers shows that our results are competitive.
  • 14.

    Effects of Increase in Physical Activity Using Mobile Health Care on the Body Composition and Metabolic Syndrome Risk Factors in 30-40's Male Office Workers.

    Lee JinWook | Park Sung Soo | 2018, 23(10) | pp.119~125 | number of Cited : 0
    Abstract PDF
    The purpose of this study was to investigate the effect of health care on the body composition and metabolic Syndrome risk factors in male office workers. The subjects of this study were 30~40’s male office workers and their physical activities were increased by mobile healthcare. The date analysis in this study was carried out paired ttest using SPSS 20.0 version(α=.05). The result of study were as follow: First. body composition kg(p<.015), BMI(p<.041), WC(p<.026) were significantly decreased after Increase in Physical Activity Using Mobile Health Care, although these did not reach statistical significance, SMM(p<.123), BF(p<.059) was slightly increased and decreased trend. Second, SBP(p<.300), DBP(p<.384) was slightly decreased trend and BS(p<.034) were significantly decreased after Increase in Physical Activity Using Mobile Health Care, Third, plasma TC(p<.015), TG(p<.003), LDL-C)(p<.000) were significantly decreased after Increase in Physical Activity Using Mobile Health Care and plasma HDL-C (p<.003) were significantly increased. These results suggest that increased physical activity using mobile health care has a positive effect on the body composition and metabolic syndrome index in male office workers. Sedentary lifestyles could be changed by Continuous feedback using mobile healthcare
  • 15.

    Elbow Healthcare System for Flexion and Extension Abnormality of Elbow

    SeongYoon Shin | 2018, 23(10) | pp.127~132 | number of Cited : 0
    Abstract PDF
    In a broad sense, the healthcare system refers to the conventional medical service for the field of treatment. From head to toe, our whole body corresponds to the subject of the medical service. In this paper, we discuss the abnormality of flexion and extension in general elbow disease. Flexion and extension refer to flexing and extending of the arm while it is set to be at 90 degrees. In this case, if the angle of the arm is remarkably small or is accompanied with pain, there is an abnormality that occurs in the elbow. We tested the flexion and extension of the elbow for 100 people in their 50s and calculated the number of people for each case. Afterwards, we classified people with abnormalities in flexion and extension and presented the respective treatment methods. In this paper, a system was constructed for the treatment of musculoskeletal disorders
  • 16.

    Attenuation of Anemia by Relmα in LPS-Induced Inflammatory Response

    Lee Mi Ran | 2018, 23(10) | pp.135~141 | number of Cited : 0
    Abstract PDF
    In this paper, we propose to evaluate the effect of resistin-like molecule alpha (Relmα) on the progression of anemia of inflammation. Anemia of inflammation is a common feature of inflammatory disorders, including chronic kidney disease, infections, and rheumatoid arthritis. Relmα is highly up-regulated in various inflammatory states, especially those involving asthma, intestinal inflammation, and parasitic diseases, and regulates the pathogenesis of those diseases. However, the role of Relmα in anemia of inflammation is unknown. To explore the roles of Relmα in anemia of inflammation in vivo, we generated mouse model of the disease by injecting 0.25 mg/kg lipopolysaccharides (LPS) intraperitoneally into Relmα-deficient and wild-type (WT) mice daily for 10 days. Research data was expressed as differences between LPS-treated Relmα-deficient and WT mice by a two-tailed non-parametric Mann–Whitney U-test using GraphPad Instat program. The results of the study are as follows: LPS-treated Relmα-deficient mice had significantly (p<0.05) lower hemoglobin contents, hematocrit levels and red blood cell indices including mean corpuscular volume, mean corpuscular hemoglobin than WT controls. This decrease was accompanied by significant (p<0.05) increase in total white blood cell and monocyte counts in the blood. However, there was no significant difference in mRNA levels of hepatic hepcidin and renal erythropoietin between the two animal groups. Taken together, these results indicates that Relmα deficiency exacerbates the anemia by increasing inflammation, suggesting therapeutic value of Relmα in the treatment of anemia of inflammation.
  • 17.

    Exercise Adherence Model of Middle-Aged based on Theory of Self-determination

    Mi-Ok Lee | 2018, 23(10) | pp.143~149 | number of Cited : 0
    Abstract PDF
    The purpose of this study was to construct and validate a middle - aged exercise adherence model. The model was designed based on self - determination theory. Participants were 215 middle-aged men and women aged 40-60 who had been exercising for more than six months. Data was collected from four big cities of Seoul, Busan, Gwangju and Daejeon in Korea, using a questionnaire consisting of basic psychological needs, intrinsic motivation, social support, and exercise adherence. Data were analyzed with SPSS 19.0 and AMOS 20.0. Social support and exercise adherence of the questionnaire were partially revised and verified by confirmatory factor analysis. The results of the study were as follows. The model's fit indices: GFI = .938, AGFI) = .915, NFI = .912, CFI = .941, and RMSEA = 0.041. The model satisfied the model fit of the structural model equation. This study model based on self - determination theory was confirmed that basic psychological needs, intrinsic motivation, and social support were important factors for the middle - aged's exercise adherence. Basic psychological need and intrinsic motivation had a direct influence on the adherence of exercise, and social support indirectly influenced the exercise adherence through intrinsic motivation. Both basic psychological needs and social support directly affected internal motivation. The most influential factor in the middle - aged's exercise adherence was intrinsic motivation. In conclusion, it was found that intrinsic motivation such as interest and fun is important for the middle - aged to continue the exercise. Also, the basic psychological needs were important for middle aged's exercise adherence. The results of this study will provide basic data for restoring or maintaining health by continuing exercise. Strategies that enhance intrinsic motivation are needed when a chronic ill person needs to continue long-term exercising.
  • 18.

    Comparison of Manual Chest Compression and Chest Compression Using AutoPulseTM Device in Pre-Hospital Simulation Cardiac arrest

    Ko jang sik | Yong-Seok Kim | Se-Young Lim and 4other persons | 2018, 23(10) | pp.151~156 | number of Cited : 1
    Abstract PDF
    The purpose of this study was to find more effective method through comparison of manual chest compression and chest compression using AutoPulseTM device in pre-hospital simulation cardiac arrest. In order to achieve the purpose of the study, ambulance workers did two different style CPR in pre-hospital simulation cardiac arrest. Data analyzed by T test and ANOVA. Findings of this study are as follows. Firstly, manual chest compression is more effective than chest compression using AutoPulseTM device on scene. Secondly, chest compression using AutoPulseTM device is more effective manual chest compression in ambulance and in elevator. In conclusion, these findings provide strong evidence for the importance of hands off time and stable CPR before hospital arrival in explaining patient’s prognosis. Therefore, strategies to conduct precise hands off time and stable CPR are needed to improve patient’s prognosis,
  • 19.

    Meta-Analysis of the Correlation Effects between Empowerment and Related Factors among Nurses

    Myoung, Sungmin | 2018, 23(10) | pp.157~164 | number of Cited : 2
    Abstract PDF
    The purpose of this study was to investigate the effect of empowerment in nurses through a systematic literature review and meta-analysis. 23 studies were collected through a systematic process of using several databases such as NDSL, DBPIA, and KISS. Keywords included ‘nurse’, ‘empowerment’, and ‘correlation’ and the reviewed articles were published from 2002 to 2017. In order to estimate the effect size of correlation between empowerment, 3 variables (job satisfaction, organizational commitment, and nursing performance) were considered. Using the R program, meta-analysis was calculated by using random effects model, and effect sizes on three types were estimated. As the result, it was found, first, the effect size of correlation between job satisfaction and empowerment is .50. Second, the effect size of correlation between organizational commitment and empowerment is .45. Third, for the nursing performance and empowerment relationship, the effect of correlation is 0.50. Also, Egger’s regression test, fail-safe N, trim-and-fill test, and funnel plot were showed to evaluate the results. These results highlights the need for appropriate policies of the relationship between empowerment and job satisfaction, organizational commitment and nursing performance in nurses.
  • 20.

    Relations between The Elderly‘s Transfer Incomes and Life Satisfaction

    Lee Hyoung Ha | 2018, 23(10) | pp.165~172 | number of Cited : 2
    Abstract PDF
    This study was conducted to investigate the relationship between life satisfaction of the elderly and their transfer income (public transfer and private transfer income) using the 11th data of the Korea welfare panel study. In the analysis results, the public transfer income was analyzed to have a significantly positive (+) effect on the life satisfaction in the case of the elderly in general households while in the case of the elderly in low income households, private transfer income was analyzed to have a significantly positive (+) effect on life satisfaction. These results suggest that the public transfer income is 1,019,200 won (monthly average 849,000 won) in the case of the elderly in general households, and the public transfer income is found to have an effect to stabilize the income, which can be expected to increase the life satisfaction. However, in the case of the elderly in low income households, it was found to be 5,080,500 won (monthly average 424,000 won), half of the public transfer income of the elderly in general households. In the case of the elderly of low income households, it can be assumed that the private transfer income, which is the "uncomfortable" income source, fills up the unstable income stabilization gap and raises the life satisfaction. As a policy suggestion, first, by supplementing the basic pension system, which is an irrational part of public transfer income for the elderly with low income, it is necessary to design policy alternatives to enable economic stabilization of the elderly in low income households. Second, it is also necessary to actively review the introduction of income deduction plans for the transfer income of family members for the low income elderly households.
  • 21.

    Analyzing Knowledge Structure of Defense Area using Keyword Network Analysis

    Yong-Kyu Lee | SoungWoong Yoon | Lee Sang Hoon | 2018, 23(10) | pp.173~180 | number of Cited : 1
    Abstract PDF
    In this paper, we analyzed key keywords and research themes in the field of defense research using keyword network analysis and tried to grasp the whole knowledge structure. To do this, we extracted data from 2,165 research data from defense related research institutes from 2010 to 2017 and applied the Pareto rule to the number of abstracts of words and the number of links between words, We extracted a total of 2,303 words based on the criterion and extracted 204 final key words through component analysis. By analyzing the centrality and cohesiveness through these key words, we confirmed the concept of core research in the defense field and derived a total of 7 large groups and 16 small groups of each group in the knowledge structure of the defense area.
  • 22.

    Influence Assessment Model of a Person within Heterogeneous Networks Based on Networked Community

    Tae-Geon Kim | Soungwoong Yoon | Lee Sang Hoon | 2018, 23(10) | pp.181~188 | number of Cited : 0
    Abstract PDF
    In this paper, we tried to investigate whether the influence of 'I' in a heterogeneous network of physical network and virtual network can be quantitatively measurable. To do this, we used Networked Community(NC) methodology to devise a concrete model of influence assessment in heterogeneous network. In order to test the model, we conducted an experiment with Donald J. Trump and his surroundings to evaluate the effectiveness of this influence assessment model. Experimentation included the measurement of impacts on the physical and virtual networks, and the impact on the networked community. Using Trump's case, we found that analyzing only one of the two networks can not accurately analyze the impact on others.
  • 23.

    A Study on the Effect of Core Competence of Supervisor on the Business Performance of Franchisees and Franchisor

    Ji-Hyun Song | Jo Gye Beom | 2018, 23(10) | pp.189~201 | number of Cited : 3
    Abstract PDF
    This study analyzed the effect of core competence of supervisor on the satisfaction, loyalty, business performance of franchisees and business performance of franchisor. And the purpose of this study is to solve the most problematic issues in franchise business such as poor sales of franchisee, inadequate measures for activating sluggish stores, closing rate increase of franchisee, dispute between a franchisee and franchisor. The results of this study will be used as data for the success of Franchisor's business operation and for the change and development of the franchise industry. In this study, 168 CEOs and employees in the franchise industry were surveyed. Through previous research and expert interviews, we designed the core competency factors of franchise supervisors into seven areas: check, consulting, coordination, promotion, counseling, communication, and control. In order to verify the hypothesis of the research, the relationship between variables was verified by simple regression analysis and multiple regression analysis. Key result of the study are as follows. First, the core competency of the supervisor has a positive relationship with the franchisee’s satisfaction. Second, the core competence of the supervisor has a positive relationship with the franchisee’s loyalty. Third, franchisee’s satisfaction has a positive effect on loyalty. Fourth, franchisee’s satisfaction positively affects the business performance of franchisee and franchisor. Fifth, franchisee’s loyalty positively affects the business performance of franchisee and franchisor.
  • 24.

    A Study on the SMART Tourism Information Utilization in Korea - Focus on Hotel and Residence industries -

    김효경 | Jae-Young Moon | 2018, 23(10) | pp.203~207 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to investigate how smart tourism is applied to hotels and residences using ICT in Korea. Smart tourism is similar often used as a concept such as u-tourism, e-tourism, and digital tourism but the most similar of ubiquitous. This is reflecting to the fact that the recent trend of tourism has been decreasing from the large scale to the individual but the customers demand has been increasing, so we have examined how the hotel and the residence are adapting this situation. As a results, hotels and residences in Korea are reflecting to improve work process and remodeling of customer service.