Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2019, Vol.24, No.2

  • 1.

    A Compact Representation of Translation Pages for Flash Translation Layers of Solid State Drives

    Kim Yong Seok | 2019, 24(2) | pp.1~7 | number of Cited : 1
    Abstract PDF
    This paper presents CTP (Compact Translation Page), a compact representation of translation pages, for page mapping-based flash translation layers to improve RAM utilization and reduce the response time of solid state drives. CTP can store translation information twice in a translation page and the total number of translation pages stored in flash is reduced to half. Therefore, CTP halves the RAM size of the directory of translation pages and uses the saved RAM space for translation cache. CTP shows the best response time when compared to existing page mapping-based flash translation layers.
  • 2.

    A Computer-Assisted Pronunciation Training System for Correcting Pronunciation of Adjacent Phonemes

    Jaesung Lee | 2019, 24(2) | pp.9~16 | number of Cited : 0
    Abstract PDF
    Computer-Assisted Pronunciation Training system is considered to be a useful tool for pronunciation learning for students who received elementary level English pronunciation education, especially for students who have difficulty in correcting their pronunciation in front of others or who are not able to receive face-to-face training. The conventional Computer-Assisted Pronunciation Training system shows the word to the user, the user pronounces the word, and then the system provides phoneme or audio feedback according to the pronunciation of the user. In this paper, we propose a Computer-Assisted Pronunciation Training system that can practice on the varying pronunciation according to positions of adjacent phonemes. To achieve this, the proposed system is implemented by recommending a series of words by focusing on adjacent phonemes for simplicity and clarity. Experimental results showed that word recommendation considering adjacent phonemes leads to improvement of pronunciation accuracy.
  • 3.

    A Win/Lose prediction model of Korean professional baseball using machine learning technique

    Yeong-Jin Seo , Hyung-Woo Moon , Woo Yong Tae | 2019, 24(2) | pp.17~24 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a new model for predicting effective Win/Loss in professional baseball game in Korea using machine learning technique. we used basic baseball data and Sabermetrics data, which are highly correlated with score to predict and we used the deep learning technique to learn based on supervised learning. The Drop-Out algorithm and the ReLu activation function In the trained neural network, the expected odds was calculated using the predictions of the team's expected scores and expected loss. The team with the higher expected rate of victory was predicted as the winning team. In order to verify the effectiveness of the proposed model, we compared the actual percentage of win, pythagorean expectation, and win percentage of the proposed model.
  • 4.

    Disaster warning system using Convolutional Neural Network - Focused on intelligent CCTV

    SeungHyeon Choi , Kim, Do Hyun , Kim Hyung Heon and 1 other persons | 2019, 24(2) | pp.25~33 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an intelligent CCTV technology which is applied to a recent attracted attention real-time object detection technology in a disaster alarm system. Natural disasters are rapidly increasing due to climate change (global warming). Various disaster alarm systems have been developed and operated to solve this problem. In this paper, we detect object through Neuron Network algorithm and test the difference from existing SVM classifier. Experimental results show that the proposed algorithm overcomes the limitations of existing object detection techniques and achieves higher detection performance by about 15%.
  • 5.

    A Study on Reconstruction Vulnerability of Daugman’s Iriscode

    Soung-Jo Youn , B.V.S Anusha , Gye-young Kim | 2019, 24(2) | pp.35~40 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a technique to reconstruct the iris image from the iris code by analyzing the process of generating the iris code and calculating it inversely. Iris recognition is an authentication method for authenticating an individual's identity by using iris information of an eye having unique information of an individual. The iris recognition extracts the features of the iris from the iris image, creates the iris code, and determines whether to authenticate using the corresponding code. The iris recognition method using the iris code is a method proposed by Daugman for the first time and is widely used as a representative method of iris recognition technology currently used commercially. In this paper, we restore the iris image with only the iris code, and test whether the reconstructed image and the original image can be recognized, and analyze restoration vulnerability of Daugman's iris code.
  • 6.

    An Iterative CRT Based Image Watermarking on DCT Domain

    Choi Ji Su , Gye-young Kim | 2019, 24(2) | pp.41~48 | number of Cited : 0
    Abstract PDF
    Digital image watermarking techniques have been studied in various fields in order to protect the copyright of multimedia contents mostly composed by images. JPEG compression is a representative copyright attack for image watermarking. The CRT-based watermarking methods in DCT domain have been studied, because these are robust for JPEG compression attack. In this paper, we propose a new method with improved performance compared with the existing CRT based methods in DCT domain. The proposed method selects the DCT block according to the denseness at the watermark insertion phase, and iteratively adjust the CRT Conditional coefficients at the watermark extraction. This paper shows that it is more robust for the JPEG compression attacks through experimental results.
  • 7.

    Efficient Congestion Control for Interworking between 5G-System and LTE

    Seog-Gyu Kim | 2019, 24(2) | pp.49~56 | number of Cited : 1
    Abstract PDF
    In this paper, we propose an efficient congestion control scheme for interworking between 5GS(5G system) and LTE(Long-Term Evolution), called ECC(Efficient Congestion Control). The proposed congestion control scheme (ECC) is considered for coexistence of 5GS and legacy LTE systems and provides a prompt service connectivity based on overriding method while the backoff timer is running in the UE. Also, we briefly introduce Rel-15 5GS from a congestion control perspective and the proposed ECC and simulation results for the existing legacy congestion control mechanism and ECC in the 5GS-LTE coexisting environment are presented. Lastly, the improvement direction is considered in future 3GPP 5GS phase 2 standard in this paper.
  • 8.

    Channel Equalization for High-speed applications using MATLAB

    Young-Min Kim , Tae-Jin Park | 2019, 24(2) | pp.57~66 | number of Cited : 0
    Abstract PDF
    This paper compared the performance with an overview of channel equalization techniques used in high-speed serial transceivers, including the homogeneous architecture and associated components for the GHz interconnect of backplane and cable channels. It also used the MATLAB tool to present system analysis and simulation results for continuous time equivalent structures. In the case of conventional continuous equalization, high frequency deficits occur due to the use of a comparator that is difficult to implement as well as the low speed limit. In this paper, the channel equalization technique based on the power spectrum analysis of clocks was used to compensate for the frequency loss, and the application of the TX+Channel and TX+Equalizer filters enabled the measurement of attenuation and equivalence without comparators. The application of blender and band-pass filters at high speeds also showed significant effectiveness.
  • 9.

    A Survey of Cryptocurrencies based on Blockchain

    Kim Junsang | 2019, 24(2) | pp.67~74 | number of Cited : 6
    Abstract PDF
    Since the announcement of bitcoin, new cryptocurrencies have been launched steadily and blockchain technology is also evolving with cryptocurrcies. In particular, security-related technologies such as consensus algorithm and hash algorithm have been improved and transaction processing speed has also been drastically improved to a level that can replace a centralized system. In addition, the advent of smart contract technology and the DApp platform also provides a means for cryptocurrency to decentralize social services beyond just payment. In this paper, we first describe the technologies for implementing cryptocurrency. And the major cryptocurrencies are described with a focus on the technical characteristics. In addition, the development of cryptocurrency technology is expanding the scope of use, so we tried to introduce various cryptocurrencies
  • 10.

    Comparison of pants pattern by adolescent boy's body type using 3D virtual simulation

    Cha Su Joung | 2019, 24(2) | pp.75~84 | number of Cited : 1
    Abstract PDF
    The purpose of this study was to present a good pants pattern for boys aged 13-18 by comparing and analyzing the pants pattern according to lower body shape. And through it, this study was to provide basic data for pants production considering male student body shape. The pattern of this study used the industrial type Lee Hee-chun pattern and DC Suite Program for 3D virtual simulation. As a result of the appearance evaluation, there was a significant difference between the patterns in most items. Type 2 was rated highly, followed by Type 4, Type 3, and Type 1. Type 1 required correction of the length of the pants and the amount of crotch part, while type 3 required adjustment of the pants in the knee area. Type 4 required correction of pattern drawing method of crotch width, thigh circumference, and knee circumference. This pattern method was evaluated as suitable for slender body shape. This study suggests a pants pattern system suitable for adolescent boys by reflecting the body shape characteristics of adolescent boy with a change of body shape. It is expected that this will meet the increasing demand for fitting. In this study, we have examined 3D virtual simulation, not actual wear experiment, so it will be necessary to investigate the difference through actual clothing experiment for adolescent boys.
  • 11.

    Types of perception on the body shape of male university students

    Cha Su Joung | 2019, 24(2) | pp.85~93 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to provide basic data for the development of clothing which can improve the satisfaction of male university students' body shape by classifying the perception of body shape and examining characteristics by type. The types of recognition of body shape of male college students were classified into five types: developed upper body with protruding under abdomen, normal body with long legs, developed under body with big skeleton, skinny body, and ladder type normal body. The actual body shape was classified into three. The Y type had a long chest length and a shoulder developed, and the lower body silhouette was plain and short. Type H was flat with little protrusion from the chest to the hip. Type X has a larger hip and longer hip length than the waist. Body type was classified based on bust, waist, and hip circumference, but recognition body type was classified based on visual characteristics. It is thought that ergonomic consideration is needed to cover the disadvantages of each body type considering the aesthetic part as well as wearing comfort in accordance with the trend of the fashion market nowadays that the slim fit is generalized. This study was limited to male university students in their early 20s in Chungbuk province. Therefore, we could not grasp attitudes and perceptions of male university students living in other provinces. Therefore, we should pay attention to the generalization of the results of this study.
  • 12.

    Design and Implementation of Data Processing Middleware and Management System for IoT based Services

    Yonsik Lee , Young-Chae Mun | 2019, 24(2) | pp.95~101 | number of Cited : 0
    Abstract PDF
    Sensor application systems for remote monitoring and control are required, such as the establishment of databases and IoT service servers, to process data being transmitted and received through radio communication modules, controllers and gateways. This paper designs and implements database server, IoT service server, data processing middleware and IoT management system for IoT based services based on the controllers, communication modules and gateway middleware platform developed. For this, we firstly define the specification of the data packet and control code for the information classification of the sensor application system, and also design and implement the database as a separate server for data protection and efficient management. In addition, we design and implement the IoT management system so that functions such as status information verification, control and modification of operating environment information of remote sensor application systems are carried out. The implemented system can lead to efficient operation and reduced management costs of sensor application systems through site status analysis, setting operational information, and remote control and management.
  • 13.

    The Design and Implementation of Dog Loss Prevention Device Combining Wireless Communication and GPS Technology

    Ho-Young Kwak , Jin-Wook Chang , Jisoon Hu | 2019, 24(2) | pp.103~109 | number of Cited : 0
    Abstract PDF
    Recently, as the number of families raising dogs has increased, cases of lost dogs have frequently occurred. According to US statistics, 5% of the total dogs are reported to be alive, with only 18% reporting to their owners. Therefore, a device for preventing the loss of dogs is needed, and the demand for the market is rapidly growing. Therefore, it is necessary to develop a lost device for dogs. In this paper, we developed a loss prevention device that combines low-power broadband wireless communication technology, LoRa communication method, and GPS positioning technology. The result of this study is expected to prevent the loss of dogs. It is also expected that social problems will reduce the problem of lost dogs.
  • 14.

    Implementation of OFP initialization function in IMDC for FA-50 aircraft

    Eun-Kyung You , Chan-Gyu Bae , Kim, Hyeock-Jin | 2019, 24(2) | pp.111~118 | number of Cited : 2
    Abstract PDF
    Recent trends in modern warfare are increasing in importance for air warfare, information warfare, and warfare. The technology of the weapon system software is rapidly developing, and the silent information war to hack it is still going on. Currently, the FA-50 aircraft has a function that can be initialized by a simple switch operation to protect the main military information in the event of an emergency. However, there are limitations in the existing Zeroize function, and this study was carried out to supplement this. First, we compare and analyze the memory structure of aircraft operating in our military, and examined the currently implemented Zeroize function. Second, we reviewed various methods to overcome the limitation of existing Zeroize function. Third, we implement the existing Zeroize function without additional manipulation. In this paper, we propose that the implementation of this feature will enable us to protect our military data more securely and suggest that we should continue to look for ways to enhance security for our technology in the future.
  • 15.

    Multi-Marker Augmented Reality System using Marker-Based Tracking with Vuforia

    Yun hyunnoh , KIM GISEONG , Nammee Moon | 2019, 24(2) | pp.119~126 | number of Cited : 1
    Abstract PDF
    As interest in augmented reality has increased recently, attempts have been made to incorporate augmented reality into various fields. In implementing augmented reality, the method by which markers are used is to extract feature points of markers to recognize 3D coordinates and, in some cases, it is necessary to recognize multiple markers simultaneously. Therefore, this paper proposes optimization methods for recognising multiple markers at the same time. Unity 3D and augmented reality library Vuforia are used to implement the experimental environment. The augmented reality program produced was implemented in an application form and tested using a mobile camera. We looked for optimization methods for manufacturing markers directly and for recognizing multiple markers through changes in the experimental environment. The results of the experiment can provide a higher recognition rate in an environment where multiple marker recognition is required later.
  • 16.

    A Development of Unified and Consistent BIM Database for Integrated Use of BIM-based Quantities, Process, and Construction Costs in Civil Engineering

    Jae Hong Lee , Sung-Woo Lee , Tae-Young Kim | 2019, 24(2) | pp.127~137 | number of Cited : 3
    Abstract PDF
    In this study, we have developed a calculation system for BIM-based quantities, 4D process, and 5D construction costs, by integrating object shape attributes and the standard classification system which consist of Cost Breakdown System(CBS), Object Breakdown System(OBS) and Work Breakdown System(WBS) in order to use for the 4 dimensional process control of roads and rivers. First, a new BIM library database connected with the BIM library shape objects was built according to the CBS/OBS/WBS standard classification system of the civil engineering field, and a integrated database system of BIM-based quantities, process(4D), and construction costs(5D) for roads and rivers was constructed. Nextly, the process classification system and the cost classification system were automatically disassembled to the BIM objects consisting of the Revit-family style elements. Finally, we added functions for automatically generating four dimensional activities and generating a automatic cost statement according to the combination of WBS and CBS classification system The ultimate goal of this study was to extend the integrated quantities, process(4D), and construction costs(5D) system for new roads and rivers, enabling the integrated use of process(4D) and construction costs(5D) in the design and construction stage, based on the tasks described above.
  • 17.

    Automatic False-Alarm Labeling for Sensor Data

    Taufik Nur Adi , BAE HYE RIM , Nur Ahmad Wahid | 2019, 24(2) | pp.139~147 | number of Cited : 0
    Abstract PDF
    A false alarm, which is an incorrect report of an emergency, could trigger an unnecessary action. The predictive maintenance framework developed in our previous work has a feature whereby a machine alarm is triggered based on sensor data evaluation. The sensor data evaluator performs three essential evaluation steps. First, it evaluates each sensor data value based on its threshold (lower and upper bound) and labels the data value as “alarm” when the threshold is exceeded. Second, it calculates the duration of the occurrence of the alarm. Finally, in the third step, a domain expert is required to assess the results from the previous two steps and to determine, thereby, whether the alarm is true or false. There are drawbacks of the current evaluation method. It suffers from a high false-alarm ratio, and moreover, given the vast amount of sensor data to be assessed by the domain expert, the process of evaluation is prolonged and inefficient. In this paper, we propose a method for automatic false-alarm labeling that mimics how the domain expert determines false alarms. The domain expert determines false alarms by evaluating two critical factors, specifically the duration of alarm occurrence and identification of anomalies before or while the alarm occurs. In our proposed method, Hierarchical Temporal Memory (HTM) is utilized to detect anomalies. It is an unsupervised approach that is suitable to our main data characteristic, which is the lack of an example of the normal form of sensor data. The result shows that the technique is effective for automatic labeling of false alarms in sensor data.
  • 18.

    Research on Impact of Airport Service Quality on Passenger Satisfaction: A Comparison of Incheon Airport and Beijing Capital Airport

    LIU ZIYANG , HanWen Guo | 2019, 24(2) | pp.149~155 | number of Cited : 0
    Abstract PDF
    The purpose of this paper is to design a survey of passenger satisfaction by using the Likert five-scale for the passengers of Incheon International Airport and Beijing Capital International Airport in China, and to combine the actual service situation of the airports in the two countries, using SPSS statistical software. Analyze and process statistics. Using the questionnaire survey method and exploratory factor analysis method, the airport service quality is analyzed to analyze the impact model of customer satisfaction. We will sort out the customer satisfaction with the two airports, compare and analyze the gaps in airport services between the two countries, and identify problems to formulate optimization and improvement plans.
  • 19.

    The Effect of back muscle strengthening on the quality of chest compressions during cardiopulmonary resuscitation

    Yun, Seong-Woo | 2019, 24(2) | pp.157~161 | number of Cited : 0
    Abstract PDF
    In this paper, the researcher investigated whether strengthening the back muscles affects the quality of chest compressions during cardiopulmonary resuscitation by university students. A total of 50 students majoring in healthcare were included from September 2018 to November. The participants performed chest compressions during cardiopulmonary resuscitation (CPR) for 2 min after back muscle strength was measured. Then, after adequate rest, the participants repeated the back muscle strength measurements and chest compressions after taping the erector spinae muscle. The paired t-test was performed to analyze changes in chest compression quality after taping. As results, taping enhanced back muscle strength and positively affected the depth of chest compressions and the compression to recoil ratio. Taping also increased confidence and lowered fatigability during chest compressions, so the participants preferred being taped while performing chest compressions. Based on these results, taping could help emergency room medical personnel specialized in CPR to enhance the quality of CPR and relieve back pain and fatigability by strengthening the back muscles.
  • 20.

    A Study on the Systematization of the Technology Act for Platforming the Fourth Industrial Revolution

    Moon hyun cheol | 2019, 24(2) | pp.163~169 | number of Cited : 0
    Abstract PDF
    Korea has the potential to lead the era of the Fourth Industrial Revolution, which succeeded in the information and communication revolution, including the establishment of an e-government.The Go match between humans and computers has led to the realization that humans are starting to live in a new era that they have never experienced before. In 2018, the Federation of Science and Technology Organizations conducted a recognition survey on "what is the most urgent thing?" in the era of the Fourth Industrial Revolution.As a result, it has been shown that the readjustment of the laws of science and technology is most urgent, so it is necessary to analyze the laws of science and technology. According to the research, more than 400 laws are diagnosed, and laws that serve as basic laws cannot lead the Fourth Industrial Revolution.The Framework Act on Science and Technology provides an emphasis on the promotion and management of R&D projects. When analyzing the regulations on 'Development of Science and Technology Innovation System', 'Basic Plan of Science and Technology', and 'Comprehensive Plan for Promotion of Local Science and Technology', there is no suggestion of the Fourth Industrial Revolution. After all, a comprehensive analysis of the current Framework Act on Science and Technology indicates that it is in effect the R&D and Management Act. The "Regulations on the Establishment and Operation of the Fourth Industrial Revolution Committee" poses the problem of defining parliamentary legislation as administrative legislation.‘In addition, if we analyze the Smart City Act, the lack of logical links with the Framework Act on Science and Technology and the Regulations on the Establishment and Operation of the Fourth Industrial Revolution Committee is a major problem. In conclusion, in order to platform the Fourth Industrial Revolution, two improvements can be put forward. First, the Framework Act on Science and Technology shall be abolished to enact the National Research and Development Administration Act, and secondly, the Framework Act on the Fourth Industrial Revolution shall be enacted to absorb the contents of the Regulations on the Establishment and Operation of the Fourth Industrial Revolution Committee.
  • 21.

    Exploring an Optimal Feature Selection Method for Effective Opinion Mining Tasks

    Kyun Sun Eo , LEE, KUN CHANG | 2019, 24(2) | pp.171~177 | number of Cited : 2
    Abstract PDF
    This paper aims to find the most effective feature selection method for the sake of opinion mining tasks. Basically, opinion mining tasks belong to sentiment analysis, which is to categorize opinions of the online texts into positive and negative from a text mining point of view. By using the five product groups dataset such as apparel, books, DVDs, electronics, and kitchen, TF-IDF and Bag-of-Words(BOW) fare calculated to form the product review feature sets. Next, we applied the feature selection methods to see which method reveals most robust results. The results show that the stacking classifier based on those features out of applying Information Gain feature selection method yields best result.
  • 22.

    A Study on the Actual Condition of Smartphone Usage and the Influential Variables of 3 to 5 Years Old Children

    choideahun | 2019, 24(2) | pp.179~184 | number of Cited : 3
    Abstract PDF
    As the tendency of children's overdependence on smart phones increased, it was obligatory to carry out preventive education more than once a year in kindergarten and day care center, but there is no specific guidance on contents and method of preventive education. This is due to the lack of prior studies on the actual use of smartphones and the influence variables of infants and young children. The purpose of this study was to investigate the effects of use time, frequency of use, and sociological background variables on the actual situation of smartphone usage and overdependency on smartphone among 3-5 year old children nationwide. For the analysis, the frequency of the use of smartphone for 3-5 year old children was analyzed by frequency analysis, and the influence variables were correlated and multiple regression analysis. Research shows that smartphone overdependence of 3-5 year old children have an influence on the use time and frequency of use. The results should include content that restricts the use time and frequency of use of smartphones and prevention education programs for 3-5 year olds and young children. Suggesting a need for a transition to the educational method used.
  • 23.

    Application of Artificial Neural Network For Sign Language Translation

    Jeong-Ran Cho , Hyung-Hoon Kim | 2019, 24(2) | pp.185~192 | number of Cited : 1
    Abstract PDF
    In the case of a hearing impaired person using sign language, there are many difficulties in communicating with a normal person who does not understand sign language. The sign language translation system is a system that enables communication between the hearing impaired person using sign language and the normal person who does not understand sign language in this situation. Previous studies on sign language translation systems for communication between normal people and hearing impaired people using sign language are classified into two types using video image system and shape input device. However, the existing sign language translation system does not solve such difficulties due to some problems. Existing sign language translation systems have some problems that they do not recognize various sign language expressions of sign language users and require special devices. Therefore, in this paper, a sign language translation system using an artificial neural network is devised to overcome the problems of the existing system.
  • 24.

    Sign Language Image Recognition System Using Artificial Neural Network

    Hyung-Hoon Kim , Jeong-Ran Cho | 2019, 24(2) | pp.193~200 | number of Cited : 0
    Abstract PDF
    Hearing impaired people are living in a voice culture area, but due to the difficulty of communicating with normal people using sign language, many people experience discomfort in daily life and social life and various disadvantages unlike their desires. Therefore, in this paper, we study a sign language translation system for communication between a normal person and a hearing impaired person using sign language and implement a prototype system for this. Previous studies on sign language translation systems for communication between normal people and hearing impaired people using sign language are classified into two types using video image system and shape input device. However, existing sign language translation systems have some problems that they do not recognize various sign language expressions of sign language users and require special devices. In this paper, we use machine learning method of artificial neural network to recognize various sign language expressions of sign language users. By using generalized smart phone and various video equipment for sign language image recognition, we intend to improve the usability of sign language translation system.
  • 25.

    The Effects of Children’s Self-perception and Human Rights Recognition in Local Children Center –Focusing on moderation effects of right guarantee and use satisfaction -

    Seon-duk Rho , Mi-young Sim | 2019, 24(2) | pp.201~207 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to suggest some implications by empirical testing the relationships between children’s self-perception and human rights recognition in local children’s center. For this study, Total 438 children were sampled and surveyed. The analytical results are the followings. First, personal characteristics was shown to have a significant effect to human right recognition. Second, self-perception was shown to have a significant effect to human right recognition. Third, right guarantee of center was shown to moderate the relationship between self-perception and human right recognition. This study provides some theoretical and polcy implications basing on these analytical results.
  • 26.

    The Influence of the Digital Divide in Elderly’s Traits

    Jang Young Eun | 2019, 24(2) | pp.209~215 | number of Cited : 10
    Abstract PDF
    The objective of this study was to identify the determinants of digital divide according to the characteristics of the elderly. In order to achieve this objective, this study selected elderly people (≥ 65 years old) who used a senior welfare center in Chungcheongbuk-do. The survey was conducted using a self-filling survey method for 12 days. Total 289 copies of questionnaires were used for the analysis. The results of this study are as follows. First, gender and age among the demographic characteristics were the factors causing the digital divide of the elderly. Second, education level, economic level, Secondly, education level, economic level, health level, and occupation were factors creating the digital divide of the elderly. This study suggested practical and policy implications based on these results.
  • 27.

    A Comparative Analysis on Software Education Unit in Practical Arts Textbooks based on 2015 Revised National Curriculum

    Kim Ji-Yun , Lee Taewuk | 2019, 24(2) | pp.217~225 | number of Cited : 4
    Abstract PDF
    In this paper, we proposed comparison of software education units according to 2015 Revised National Curriculum. Comparative analysis of 6 Practical Arts textbooks was conducted especially on the software education units. The analysis criteria were decided to be unit system, unit structure, learning objectives, the way of placing contents, activities, supporting materials, providing resources, and evaluation. As a result, the software education units have secured a lot of quantity compared to the total number of units. And the affective domain of the learning objectives is shown to be lacking. All the textbooks were uniformly arranged the component of contents described in 2015 revised national curriculum. Cooperative activities are strengthened compared to the previouse curriculum. On the other hand, evaluations have a large variation among textbooks and some have fewer types.