Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2018, Vol.23, No.12

  • 1.

    An Integer Programming-based Local Search for the Multiple-choice Multidimensional Knapsack Problem

    Hwang Junha | 2018, 23(12) | pp.1~9 | number of Cited : 0
    Abstract PDF
    The multiple-choice multidimensional knapsack problem (MMKP) is a variant of the well known 0-1 knapsack problem, which is known as an NP-hard problem. This paper proposes a method for solving the MMKP using the integer programming-based local search (IPbLS). IPbLS is a kind of a local search and uses integer programming to generate a neighbor solution. The most important thing in IPbLS is the way to select items participating in the next integer programming step. In this paper, three ways to select items are introduced and compared on 37 well-known benchmark data instances. Experimental results shows that the method using linear programming is the best for the MMKP. It also shows that the proposed method can find the equal or better solutions than the best known solutions in 23 data instances, and the new better solutions in 13 instances.
  • 2.

    Airborne Antenna Switching Strategy Using Deep Learning on UAV Line-Of-Sight Datalink System

    Se-hyeon Jo | Woo-sin Lee | Hack-joon Kim and 2other persons | 2018, 23(12) | pp.11~19 | number of Cited : 0
    Abstract PDF
    In the Unmanned Aerial Vehicle Line-Of-Sight datalink system, there is a possibility that the communication line is disconnected because line of sight can not be secured by one antenna due to changes in position and posture of the air vehicle. In order to prevent this, both top and bottom of air vehicle are equipped with antennas. At this time, if the signal can be transmitted and received by switching to an antenna advantageous for securing the line of sight, communication disconnection can be minimized. The legacy antenna switching method has disadvantages such that diffraction, fading due to the surface or obstacles, interference and reflection of the air vehicle are not considered, or antenna switching standard is not clear. In this paper, we propose an airborne antenna switching method for improving the performance of UAV LOS datalink system. In the antenna switching method, the performance of each of the upper and lower parts of the mounted antenna according to the position and attitude of the air vehicle is predicted by using the deep learning in an UAV LOS datalink system in which only the antenna except the receiver is duplicated. Simulation using flying test dataset shows that it is possible to switch antennas considering the position and attitude of unmanned aerial vehicle in the datalink system.
  • 3.

    Data Visualization using Linear and Non-linear Dimensionality Reduction Methods

    Junsuk Kim | Youn Joo Sang | 2018, 23(12) | pp.21~26 | number of Cited : 0
    Abstract PDF
    As the large amount of data can be efficiently stored, the methods extracting meaningful features from big data has become important. Especially, the techniques of converting high- to low-dimensional data are crucial for the 'Data visualization'. In this study, principal component analysis (PCA; linear dimensionality reduction technique) and Isomap (non-linear dimensionality reduction technique) are introduced and applied to neural big data obtained by the functional magnetic resonance imaging (fMRI). First, we investigate how much the physical properties of stimuli are maintained after the dimensionality reduction processes. We moreover compared the amount of residual variance to quantitatively compare the amount of information that was not explained. As result, the dimensionality reduction using Isomap contains more information than the principal component analysis. Our results demonstrate that it is necessary to consider not only linear but also nonlinear characteristics in the big data analysis.
  • 4.

    Edge Preserving Smoothing in Infrared Image using Relativity of Guided Filter

    Il-Ho Kim | 2018, 23(12) | pp.27~33 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient edge preserving smoothing filter for Infrared image that can reduce noise while preserving edge information. Infrared images suffer from low signal-to-noise ratio , low edge detail information and low contrast. So, detail enhancement and noise reduction play crucial roles in infrared image processing. We first apply a guided image filter as a local analysis. After the filtering process, we optimization globally using relativity of guided image filter. Our method outperforms the previous methods in removing the noise while preserving edge information and detail enhancement.
  • 5.

    Noisy Image Segmentation via Swarm-based Possibilistic C-means

    Jeong-Min Yu | 2018, 23(12) | pp.35~41 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a swarm-based possibilistic c-means(PCM) algorithm in order to overcome the problems of PCM, which are sensitiveness of clustering performance due to initial cluster center’s values and producing coincident or close clusters. To settle the former problem of PCM, we adopt a swam-based global optimization method which can be provided the optimal initial cluster centers. Furthermore, to settle the latter problem of PCM, we design an adaptive thresholding model based on the optimized cluster centers that yields preliminary clustered and un-clustered dataset. The preliminary clustered dataset plays a role of preventing coincident or close clusters and the un-clustered dataset is lastly clustered by PCM. From the experiment, the proposed method obtains a better performance than other PCM algorithms on a simulated magnetic resonance(MR) brain image dataset which is corrupted by various noises and bias-fields.
  • 6.

    A Implementation of Optimal Multiple Classification System using Data Mining for Genome Analysis

    Jeong, Yu-jeong | Choi Gwang Mi | 2018, 23(12) | pp.43~48 | number of Cited : 0
    Abstract PDF
    In this paper, more efficient classification result could be obtained by applying the combination of the Hidden Markov Model and SVM Model to HMSV algorithm gene expression data which simulated the stochastic flow of gene data and clustering it. In this paper, we verified the HMSV algorithm that combines independently learned algorithms. To prove that this paper is superior to other papers, we tested the sensitivity and specificity of the most commonly used classification criteria. As a result, the K-means is 71% and the SOM is 68%. The proposed HMSV algorithm is 85%. These results are stable and high. It can be seen that this is better classified than using a general classification algorithm. The algorithm proposed in this paper is a stochastic modeling of the generation process of the characteristics included in the signal, and a good recognition rate can be obtained with a small amount of calculation, so it will be useful to study the relationship with diseases by showing fast and effective performance improvement with an algorithm that clusters nodes by simulating the stochastic flow of Gene Data through data mining of BigData.
  • 7.

    Blockchain Technology and Utilization Schemes in Tactical Communication Network

    In-Deok Yoo | Woo-sin Lee | Hack-joon Kim and 2other persons | 2018, 23(12) | pp.49~55 | number of Cited : 1
    Abstract PDF
    In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.
  • 8.

    Measurement of graphs similarity using graph centralities

    Tae-Soo cho | Han Chi-Geun | Sang-Hoon Lee | 2018, 23(12) | pp.57~64 | number of Cited : 1
    Abstract PDF
    In this paper, a method to measure similarity between two graphs is proposed, which is based on centralities of the graphs. The similarity between two graphs G₁ and G₂ is defined by thedifference of distance(G₁, GR1) and distance(G₂, GR2), where GR1 and GR2 are set of random graphs that have the same number of nodes and edges as G₁ and G₂, respectively. Each distance (G*, GR*) is obtained by comparing centralities of G* and GR*. Through the computational experiments, we show that it is possible to compare graphs regardless of the number of vertices or edges of the graphs. Also, it is possible to identify and classify the properties of the graphs by measuring and comparing similarities between two graphs.
  • 9.

    A Study of Software Product Line Engineering application for Data Link Software

    Jin Woo Kim | Woo-sin Lee | Hack-joon Kim and 2other persons | 2018, 23(12) | pp.65~72 | number of Cited : 0
    Abstract PDF
    In this paper, we have studied how to reuse common data link software by applying software product line engineering. Existing common data link software performed different stages of design, implementation, and testing without sharing the accumulated knowledge of different developers. In this situation, developers agreed that sharing the assets of each project and reusing the previously developed software would save human and time costs. Even with the initial difficulties, the common Data Link is a continually proposed project in the defense industry, so we decided to build a product line. The common data link software can be divided into two domains. Among them, the initial feature model for the GUI software was constructed, and the following procedure was studied. Through this, we propose a plan to build a product line for core assets and reuse them in newly developed projects.
  • 10.

    A CRL Distribution Scheme Minimizing the Time for CRL Processing of Vehicles on Vehicular Communications

    HYUNGON KIM | 2018, 23(12) | pp.73~80 | number of Cited : 0
    Abstract PDF
    Certification revocation list(CRL) is needed for excluding compromised, faulty, illegitimate vehicle nodes and preventing the use of compromised cryptographic materials in vehicular communications. It should be distributed to vehicles resource-efficiently and CRL computational load of vehicles should not impact on life-critical applications with delay sensitive nature such as the pre-crash sensing that affords under 50msec latency. However, in the existing scheme, when a vehicle receives CRL, the vehicle calculates linkage values from linkage seeds, which results in heavy computational load. This paper proposes, a new CRL distribution scheme is proposed, which minimizes the time for CRL processing of vehicles. In the proposed scheme, the linkage value calculation procedure is performed by road-side unit(RSU) instead of the vehicle, and then the extracted linkage values are relayed to the vehicle transparently. The simulation results show that the proposed scheme reduces the CRL computational load dramatically, which would minimize impact on life-critical applications’ operations with low latency.
  • 11.

    The Security Architecture for Secure Cloud Computing Environment

    Choi Sang Yong | Kimoon Jeong | 2018, 23(12) | pp.81~87 | number of Cited : 2
    Abstract PDF
    Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.
  • 12.

    Implement Static Analysis Tool using JavaCC

    KIMBYEONGCHEOL | Changjin Kim | Seongcheol Yun and 1other persons | 2018, 23(12) | pp.89~94 | number of Cited : 1
    Abstract PDF
    In this paper, we implemented a static analysis tool for weakness. We implemented on JavaCC using syntax information and control flow information among various information. We also tested the performance of the tool using Juliet-test suite on Eclipse. We were classified using information necessary for diagnosis and diagnostic methods were studied and implemented. By mapping the information obtained at each compiler phase the security weakness, we expected to link the diagnostic method with the program analysis information to the security weakness. In the future, we will extend to implement diagnostic tools using other analysis information.
  • 13.

    Survey on the use of security metrics on attack graph

    Lee Gyung Min | Kim, Huy Kang | 2018, 23(12) | pp.95~105 | number of Cited : 0
    Abstract PDF
    As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.
  • 14.

    EPD File Generation System Based on Template for Choosing E-paper Contents Layout

    son | 2018, 23(12) | pp.107~114 | number of Cited : 0
    Abstract PDF
    We propose EPD(Electrophoretic Display) file generation system based on template that enable users to choose contents layout for E-paper display. And also we show implementation results that apply the proposed system in digital doorsign management field adopting E-paper display. Template includes information for contents layout which is composed of standard form image to be used as background image, coordinates of area for dynamic data to be inserted, data source about dynamic data, and characteristic data of EPD panel for displaying contents. System administrator registers templates in Forms Server. When user chooses a contents layout, Forms Server automatically generates EPD file for displaying contents in E-paper by using information of the template and sends EPD file into doorsign. Strength of the proposed system lies in reflecting user preference about contents design and adding personal data into E-paper contents by smartphone application.
  • 15.

    Process Improvement for Quality Increase of Weapon System Software Based on ISO/IEC/IEEE 29119 Test Method

    Byung Hoon Park | Yeong-Geon Seo | 2018, 23(12) | pp.115~122 | number of Cited : 0
    Abstract PDF
    As the proportion of software in weapon systems increases, the impact of software on the overall system is growing. As a result, software quality management becomes important, and related regulations and work manuals for quality assurance activities at each stage in the R & D process are becoming more sophisticated. However, due to the characteristics of the weapon system software that is developed as a customized form for the purpose of a specific mission, there are limits to specifying and definitizing the detailed requirements (upper and lower level) according to various operational concepts during the development process. Due to this, software modification (patch change, shape change due to upgrade, etc.) occurs on account of many defects and performance improvement in the mass production and operation stage after the development is completed. In this study, we analyze the characteristics of these weapon system softwares and propose quality improvement methods based on ISO / IEC / IEEE 29119 test method.
  • 16.

    The Impact of the Competitiveness of Intermediate Software on Enterprise Results : a Case Study of Chinese Intermediate Software

    LIU ZIYANG | 2018, 23(12) | pp.123~129 | number of Cited : 0
    Abstract PDF
    The purpose of this paper is to draw a conclusion on the impact of intermediate software on enterprise results. In this paper, product innovation and product reliability are especially used as analytical factors. An exploratory analytical study is conducted on the competitiveness of intermediate software, in the hope of gaining a new understanding of the competitiveness of intermediate software. Data are analyzed using such quantitative analytical tools as SPSS and AMOS. Using reliability analysis, validity analysis and structural equation model analysis, the final results are achieved. According to the analysis results, we can draw the following conclusions: the competitiveness of intermediate software has a positive impact on the innovation of software products. The competitiveness of intermediate software doesn’t have a positive impact on the reliability of software products. Product innovation has a positive impact on enterprise results. Product reliability also has a positive impact on enterprise results. By analyzing the conclusions, we can make certain suggestions and draw implications on the competitiveness of China’s software industry.
  • 17.

    A Study on Jaundice Computer-aided Diagnosis Algorithm using Scleral Color based Machine Learning

    Jin-Gyo Jeong | Lee Myungsuk | 2018, 23(12) | pp.131~136 | number of Cited : 0
    Abstract PDF
    This paper proposes a computer-aided diagnostic algorithm in a non-invasive way. Currently, clinical diagnosis of jaundice is performed through blood sampling. Unlike the old methods, the non-invasive method will enable parents to measure newborns' jaundice by only using their mobile phones. The proposed algorithm enables high accuracy and quick diagnosis through machine learning. In here, we used the SVM model of machine learning that learned the feature extracted through image preprocessing and we used the international jaundice research data as the test data set. As a result of applying our developed algorithm, it took about 5 seconds to diagnose jaundice and it showed a 93.4% prediction accuracy. The software is real-time diagnosed and it minimizes the infant's pain by non-invasive method and parents can easily and temporarily diagnose newborns' jaundice. In the future, we aim to use the jaundice photograph of the newborn babies' data as our test data set for more accurate results.
  • 18.

    Understanding the Internet of Things: Education and Experience

    Jaeseok Yun | 2018, 23(12) | pp.137~144 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an well-organized lecture note for giving a better understanding on the Internet of Things (IoT) to people including non-computer majors without computing and communication knowledge. In recent years, the term ‘IoT’ has been popularized, and IoT will make a huge impact on our industries, societies, and environments. Although there are large amount of literature on presenting IoT from technological perspectives, few are published that are organized for teaching students having non-computer-related majors. Based on research and education experiences on IoT, we tried to make a lecture note focusing on the process of collecting data from everyday objects, transmitting and sharing data, and utilizing data to create new values for us. The proposed lecture note was employed in teaching a liberal arts class, and it was shown that students could have an understanding of what IoT really means and how IoT could change our world.
  • 19.

    Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

    Seung-Soo Lee | Yun-Cheol Kim | Sunghyun Jee | 2018, 23(12) | pp.145~151 | number of Cited : 1
    Abstract PDF
    While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.
  • 20.

    Trend Analysis of Thyroid Cancer Research in Korea with Text Mining Techniques

    Tae-Gyeong Lee | Seong-Min Heo | Shin,Seung-Hyeok and 1other persons | 2018, 23(12) | pp.153~161 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a text-centered approach to identify the research trend of thyroid cancer in Korea. We incorporate statistical analysis, text mining and machine learning techniques with our clinical insights to find connective associations between terminologies and to discover informative clusters of literatures. The incidence of thyroid cancer in Korea increased rapidly in the 2000s, which fueled the debate regarding overdiagnosis, but recently the number of patients undergoing surgery has decreased significantly due to conscious reform efforts from various circles. We analyzed the abstracts and keywords of related research papers from DBpia. It was found that most were case reports in the 1980s, and some papers in the 1990s discussed the early detection of thyroid cancer by mass screening. While many papers focused on different diagnostic techniques and the detection of small cancers in the 2000s, many emphasized more on the quality of life of patients in the 2010s. There was an apparent change in the topics of thyroid cancer research over past decades. The results of this study would serve as a reference guide for current and future research directions.
  • 21.

    A Study on the Noise Characteristics of noise occurred when medical examination in dental clinic

    Ji dong Ha | Lee Yong Groo | 2018, 23(12) | pp.163~170 | number of Cited : 0
    Abstract PDF
    This study was conducted to investigate the effects of noise from dental clinics on workers and to establish a reduction plan. The noise generated by the treatment instrument(Ultrasonic scaler, Hand piece, 3-way syringe, Suction, Compressor) was measured in order to determine the characteristics(level, frequency) of the noise during medical treatment(Oral prophylaxis, Conservation treatment, Prosthesis treatment, Implant Scaling, Tooth eliminating). We also assessed the noise levels in dental clinic using evaluation indicators such as NR-curves and NRN. The results of the analysis showed that the noise generated during the treatment was 85dB(A) ~ 70dB(A) and that the high frequency component was dominant, which would affect the workers working at the dental clinic. The NR-curve analysis showed NR-67 to NR-83 and the high frequency components of 4kHz to 8kHz were predominant and far exceeded noise levels in the workplace. To minimize the noise damage of workers and to provide high quality medical service, it is necessary to establish countermeasures such as wearing a soundproof and periodic hearing tests.
  • 22.

    Attitude of Social workers toward Withdrawal 0f Life Sustaining Treatment

    Lee | Lee Hyen Joo | 2018, 23(12) | pp.171~177 | number of Cited : 1
    Abstract PDF
    Purpose : This study is conducted to research the attitude of social workers toward withdrawing life sustaining treatment and compare and analyze the different types of their attitudes. Methods : Research design of this study is Q methodology approach. The study population is 23 social workers. Q sample to investigate the attitude of social workers toward withdrawing life sustaining treatment included 30 statements. After listening to the purpose and method of the study, the 23 social workers agreed to fill out a survey asking sociodemographic information and have been forced to be distributed in 9 scale Q-sample. Results : The collected data was processed through QUANL PC program, sorted into 3 types as followings. The first type was ’the pursuit of quality of life’ that the quality of life is more important than the length of life , the second ‘choosing to withdraw life sustaining treatment’ that they want to write or encourage family to write advanced directive, the third ‘withholding life sustaining treatment’ regardless of the cost, Conclusion : In conclusion, the social workers attitudes toward withdrawing life sustaining treatment were grouped as three different types, the first type was ’the pursuit of quality of life’, the second ‘choosing to withdraw life sustaining treatment’, the third ‘withholding life sustaining treatment’
  • 23.

    A Study on DC-DC Converter Development for LRT Wireless Power Supply

    Youngjae Han | Su-Gil Lee | Young-Ho Lee | 2018, 23(12) | pp.179~184 | number of Cited : 0
    Abstract PDF
    In this paper, we have proposed the development of DC-DC converter for LRT power supply. First of all, we have studied converter technology, main functions and characteristics were determined. In also, the converter design was carried out to meet the system design conditions. Based on this design, converter simulation is performed to enable stable charging and discharging of the vehicle system. We have performed the Light-load test according to charge mode, discharge mode. As a result, the manufactured converter performance was verified through the load test, and it’s stability was confirmed.
  • 24.

    A Study on the Relationship among the MBTI Personality Types, Self-Efficacy, Major Satisfaction and Freshmen’s Academic Achievements in Airline Service department

    KIM MUN KYUNG | 2018, 23(12) | pp.185~193 | number of Cited : 0
    Abstract PDF
    The purpose of this paper was to identify the relationship among the MBTI personality types, self-efficacy, major satisfaction and freshmen’s academic achievements in airline service department. To this end, a survey was conducted in 113 university freshmen of airline service department from June 18 to 29, 2018. And the data were collected their MBTI results and GPA scores. MBTI results used to analyze student’s personality type. The collected data were analyzed using 'SPSS Statistics 21.0'. Analysis methods such as frequency analysis, cross-tabulation analysis, factor analysis, reliability analysis, t-test, ANOVA, and multiple regression analysis were used. The findings of this study are as follows. The type of personality in the airline service department affects the self – efficacy such as self - control efficacy, confidence, preference of the task difficulty, and also affects the major satisfaction and the academic achievement. The self - efficacy affects the major satisfaction and the academic achievement, and also the major satisfaction can affect academic achievement. Therefore, by developing an effective teaching strategies that fits students’ personality type characteristics, and by inducing motivation to learn, raising self-efficacy naturally will lead to higher major satisfaction and academic achievements.
  • 25.

    The Structure Model of Service Performance Influence in Knowledge Based Service Business

    Yeon S. Ahn | 2018, 23(12) | pp.195~201 | number of Cited : 0
    Abstract PDF
    This study is attempted to demonstrate the structure of the influencing factors on the performance of services of knowledge based service firms. In the model presented, the structure is that service performance in knowledge-based services are affected by the strategic utilization of knowledge resources and service orientation factors of the service organization. And the service performance are also affected in which the systemization of service processes and customer satisfaction play a mediating role. As an analysis result of examining 148 practitioners engaged in the knowledge service industry, it is necessary to increase the satisfaction of external customers in order to improve service performance in a knowledge-based service organizations. This can be achieved by increasing the satisfaction of internal customers. In addition, for this structure to be successful, the service production process to be provided to the customer must be enhanced. The service production process has been found to be an important factor influencing the internal customer satisfaction and service delivery process, especially in the use of knowledge resource, and customer oriented service among service orientation factors.
  • 26.

    Comparing the efficiency of college and university employment using DEA analysis program

    JEONG SEONG BAE | Ji-woo Lee | 2018, 23(12) | pp.203~209 | number of Cited : 1
    Abstract PDF
    This study analyzed the employment efficiency of Korean colleges and universities using DEA(2015 GOMS), which was surveyed by the Ministry of Employment and Labor and the Korea Employment Information Service. The input variables were employment program participants, language educators, family economic applicants, and employment targets. As a result, the college was more efficient than the college and the college was relatively ineffective. The contribution of input and output contributed the highest efficiency with 99.9% of the participants in the employment program, and the possibility of improving the efficiency of the language educator was the highest at 70.04. Based on the results of the above research, it suggests the necessity of activation of employment programs and activation of language training in each university. Future studies will need to study the efficiency of universities nationwide.
  • 27.

    A Study on the relationship between dynamic capability & technology innovation performance

    Heon-Jin Lim | Park, Hyun-yong | 2018, 23(12) | pp.211~218 | number of Cited : 0
    Abstract PDF
    In this paper, we propose that investigating the relationship between the dynamic capacity and the technological innovation performance of firms. Based on the previous research, we divide the dynamic capacity into the adaptive capacity, absorption capacity, and productive capacity. Among the 3,400 companies responding to the technical statistics of SMEs in 2011, we performed multiple regression analysis with 2,807 except service industries. As a result, the absorptive capacity and productive capacity have a positive effect on the technological innovation performance at the 99% level, whereas the adaptive capacity has a negative effect on the technological innovation performance at the 95% level. The implications of this study are as follows. First, in order to improve the performance of technological innovation, it is important to strengthen the absorption capacity and productive capacity of companies. Absorption capacity shows that it is important to secure sufficient R & D manpower and R & D cost to utilize internal knowledge as well as to bring outside knowledge into the capacity to assimilate and utilize external knowledge. Second, the ability to commercialize a product is a capability to commercialize a technology that has succeeded in development, showing that the technology development organization must have the capability of post-development commercialization as well as technology development. Finally it shows the negative effect on adaptation capacity and innovation performance. Companies actively utilize external sources of information in order to respond to and adapt to the rapidly changing business environment. However, the results of this study show that a strategic approach is needed to use external sources of information and technology development resources. Especially as the use of external information resources and technology development resources increases.
  • 28.

    Development of a Personalized Similarity Measure using Genetic Algorithms for Collaborative Filtering

    Soojung Lee | 2018, 23(12) | pp.219~226 | number of Cited : 0
    Abstract PDF
    Collaborative filtering has been most popular approach to recommend items in online recommender systems. However, collaborative filtering is known to suffer from data sparsity problem. As a simple way to overcome this problem in literature, Jaccard index has been adopted to combine with the existing similarity measures. We analyze performance of such combination in various data environments. We also find optimal weights of factors in the combination using a genetic algorithm to formulate a similarity measure. Furthermore, optimal weights are searched for each user independently, in order to reflect each user's different rating behavior. Performance of the resulting personalized similarity measure is examined using two datasets with different data characteristics. It presents overall superiority to previous measures in terms of recommendation and prediction qualities regardless of the characteristics of the data environment.
  • 29.

    A Study on the Difference of Price Response in China: Focus on Tier 4 Cities

    Youngsik Kwak | Hong Jaewon | Yongsik Nam | 2018, 23(12) | pp.227~232 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to empirically measure the consumer response to mobile phone price changes in small and medium cities that have been alienated from Chinese marketing research. To do this, we measured price response through consumer survey based on conjoint analysis. The results of this study are as follows. First, it show a typical pattern in which the part-worth decreases as the price increases. This suggests that there is room for improvement in profitability through pricing strategy for small and medium cities. Second, the decrease of the utility value according to the price increase was different for each city. This implies that difference of price response by city should be used strategically when planning price tactics. This study has contributed to understanding the expansion of research subjects from large cities to small cities and the price response phenomenon of small cities. And it will provide basic data on price response to mobile phone marketers of small and medium cities.
  • 30.

    The Effect of Information System Quality on Customer Value and Satisfaction in Hotel Comparison Sites

    Choon-Moo Kong | JUNG JI HEE | 2018, 23(12) | pp.233~240 | number of Cited : 2
    Abstract PDF
    In this study, variables were constructed based on prior research to examine the impact of information system quality (information quality, system quality, service quality), customer value and satisfaction in hotel comparison site. The samples consist of 205 survey data drawn from hotel comparison site users. The collected data were analyzed by SPSS 24.0 and AMOS 21.0. According to results of the reliability and validity test, all were found reliable, and all items were included. The results are as follows: first, Among the information system quality (information quality, system quality, and service quality) of the hotel comparison site, the information quality and service quality have positive effects on customer value. Second, the information system quality(information quality, system quality, and service quality) of the hotel comparison site has a positive effect on customer satisfaction. Third, the customer value of the hotel comparison site has a positive effect on customer satisfaction.
  • 31.

    Testing an Irrational Model of Information Privacy Based on Competence Needs Satisfaction

    Gimun Kim | Jongsoo Yoon | 2018, 23(12) | pp.241~248 | number of Cited : 0
    Abstract PDF
    Recently, there have been calls for approaching from the irrationality point of view to better explain the privacy paradox phenomenon. This study is a kind of response to them. The aim of the study is to investigate how satisfying competence needs, one of basic psychological needs suggested in self-determination theory, affects irrational information disclosure decision (i.e., risk-benefit assessment). To do this, the study builds an irrationality-based model in which competence needs satisfaction affects both perceived risks negatively and perceived benefits (i.e., relationship building and maintenance), which in turn determine a level of self-disclosure. Based on the data from Facebook users which is collected by a large sample survey (N=1050), the study analyzes it using Mplus, a powerful structure equation modeling tool. The study results reveal that while the relationship between competence needs satisfaction and perceived relationship building and maintenance is statistically significant, the relationship between competence needs satisfaction and perceived risks insignificant. These findings imply that people who is in a high level of competence needs satisfaction is more likely to respond to some opportunities for social benefits and in turn disclose more information about self.