Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2019, Vol.24, No.4

  • 1.

    Latency Hiding based Warp Scheduling Policy for High Performance GPUs

    Gwang Bok Kim | Jong Myon Kim | Cheol Hong Kim | 2019, 24(4) | pp.1~9 | number of Cited : 1
    Abstract PDF
    LRR(Loose Round Robin) warp scheduling policy for GPU architecture results in high warp-level parallelism and balanced loads across multiple warps. However, traditional LRR policy makes multiple warps execute long latency operations at the same time. In cases that no more warps to be issued under long latency, the throughput of GPUs may be degraded significantly. In this paper, we propose a new warp scheduling policy which utilizes latency hiding, leading to more utilized memory resources in high performance GPUs. The proposed warp scheduler prioritizes memory instruction based on GTO(Greedy Then Oldest) policy in order to provide reduced memory stalls. When no warps can execute memory instruction any more, the warp scheduler selects a warp for computation instruction by round robin manner. Furthermore, our proposed technique achieves high performance by using additional information about recently committed warps. According to our experimental results, our proposed technique improves GPU performance by 12.7% and 5.6% over LRR and GTO on average, respectively.
  • 2.

    Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

    Wan Yeon Lee | 2019, 24(4) | pp.11~18 | number of Cited : 0
    Abstract PDF
    Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.
  • 3.

    Technology Trends for Motion Synthesis and Control of 3D Character

    Choi Jong In | 2019, 24(4) | pp.19~26 | number of Cited : 1
    Abstract PDF
    In this study, we study the development and control of motion of 3D character animation and discuss the development direction of technology. Character animation has been developed as a data-based method and a physics-based method. The animation generation technique based on the keyframe method has been made possible by the development of the hardware technology, and the motion capture device has been used. Various techniques for effectively editing the motion data have appeared. At the same time, animation techniques based on physics have emerged, which realistically generate the motion of the character by physically optimized numerical computation. Recently, animation techniques using machine learning have shown new possibilities for creating characters that can be controlled by the user in real time and are expected to be developed in the future.
  • 4.

    A Constraint Programming-based Automated Course Timetabling System

    Hwang Junha | 2019, 24(4) | pp.27~34 | number of Cited : 0
    Abstract PDF
    The course timetabling problem is a kind of very complex combinatorial optimization problems, which is known as an NP-complete problem. Sometimes a given course timetabling problem can be accompanied by many constraints. At this time, even if only one constraint is violated, it can be an infeasible timetable. Therefore, it is very difficult to make an automated course timetabling system for a complex real-world course timetabling problem. This paper introduces an automated course timetabling system using constraint programming. The target problem has 26 constraints in total, and they are expressed as 24 constraints and an objective function in constraint programming. Currently, we are making a timetable through this system and applying the result to the actual class. Members’ satisfaction is also much higher than manual results. We expect this paper can be a guide for making an automated course timetabling system.
  • 5.

    A Study on Factors Affecting the Use Intention of Virtual Reality(VR) Devices: Based on UTAUT and VAM Model

    Zhou-Yang Li | YOON SUNG JOON | Zi-Yang Liu | 2019, 24(4) | pp.35~43 | number of Cited : 1
    Abstract PDF
    The purposes of this study is to derive the influence factors of Virtual Reality(VR) technologies acceptance based on the study of unified theory of acceptance and use of technology and value-based acceptance model to test the use and acceptance of VR devices. The survey methods were used for this study, and the data from a total of 400 consumers were used for the analysis. And the structural equation model was used to analyze the data. The results of the study are as follows: First, benefit components perceived enjoyment(EN) and sacrifice components personal innovative(PI) of VR devices were positively related to perceived values and use intention of VR devices, although the benefit components performance expectancy(PE) was positively related to perceived values(PV) but was not positively related to the use intention of VR devices. Second, sacrifice components perceived cost(PC) and anxiety(ANX) of VR devices were negatively related to perceived value(PV), but were not negatively related to the use intention of VR devices. Third, perceived values was not obvious related to the use intention(UI) of VR devices. The results of this study contribute to the literature as a new attempt to examining the effect on consumer use intention in VR technology areas.
  • 6.

    A Real-time Motion Adaptation Method using Spatial Relationships between a Virtual Character and Its Surrounding Environment

    Jo, Dongsik | Myung Geol Choi | 2019, 24(4) | pp.45~50 | number of Cited : 0
    Abstract PDF
    Recently, character motion have been used extensively in the entertainment business, and researchers have investigated algorithms of reproducing, editing, and simulating mimic human movements. Also, many recent researches have suggested how a character interacts with its surrounding environment in terms of motion. Specially, spatial relationships of the environment have been introduced for adapting and preserving character motion. In this paper, we propose a motion adaptation technique preserving a spatial property between a virtual character and the configuration of its surrounding space. Additionally, we report on experimental results of smoothly adapted motions in various environmental structures with original motions such as walk, jump, and tumbling.
  • 7.

    Real-Time Generation of City Map for Games in Unity with View-dependent Refinement and Pattern Synthesis Algorithm

    Jong-Hyun Kim | 2019, 24(4) | pp.51~56 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an algorithm that can quickly generate and synthesize city maps in racing games. Racing games are characterized by moving a wide map rather than a fixed map, but designing and developing a wide map requires a lot of production time. This problem can be mitigated by creating a large map in the preprocessing step, but a fixed map makes the game tedious. It is also inefficient to process all the various maps in the preprocessing step. In order to solve this problem, we propose a technique to create a terrain pattern in the preprocessing process, to generate a map in real time, and to synthesize various maps randomly. In addition, we reduced unnecessary rendering computations by integrating view-dependent techniques into the proposed framework. This study was developed in Unity3D and can be used for various contents as well as racing game.
  • 8.

    Controlling Position of Virtual Reality Contents with Mouth-Wind and Acceleration Sensor

    Jong-Hyun Kim | 2019, 24(4) | pp.57~63 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new framework to control VR(Virtual reality) contents in real time using user's mouth-wind and acceleration sensor of mobile device. In VR, user interaction technology is important, but various user interface methods is still lacking. Most of the interaction technologies are hand touch screen touch or motion recognition. We propose a new interface technology that can interact with VR contents in real time using user's mouth-wind method with acceleration sensor. The direction of the mouth-wind is determined using the angle and position between the user and the mobile device, and the control position is adjusted using the acceleration sensor of the mobile device. Noise included in the size of the mouth wind is refined using a simple average filter. In order to demonstrate the superiority of the proposed technology, we show the result of interacting with contents in game and simulation in real time by applying control position and mouth-wind external force to the game.
  • 9.

    A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

    Min Youn-A | 2019, 24(4) | pp.65~71 | number of Cited : 0
    Abstract PDF
    IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.
  • 10.

    3D Content Design & Implementation of VR Horseback Riding Game

    Park HyungSoo | HoonKi Kim | Sio Seo | 2019, 24(4) | pp.73~81 | number of Cited : 4
    Abstract PDF
    Various 3D contents are being developed using Unity 3D game engine. In this paper, the 3D content of horseback riding game, the first VR game in the country, is designed and developed. The existing riding simulator is investigated and compared to the VR riding game developed. We consider various games developed using Unity 3D game engine and serve previously developed tangible games. It is expected that development of VR riding games will prepare a new chapter in VR experience-type games. We propose the content development environment and scenario of VR riding game and present the main algorithms and main modules for real-time synchronization. The developed riding game contents are deployed to the riding system and are operated for commercial use in conjunction with the riding device. Through monitoring VR riding system, problems are derived and improvement measures are proposed. We offer a variety of additional development options to make the game more realistic in the future.
  • 11.

    A Study on the Influence of the Attributes of PPL Advertisement on the Consumer Preference, Psychological Repulsion, and Consumer Happiness: Focused on the Moderating Effect of PPL Expression Type

    Guo Wen Jie | 2019, 24(4) | pp.83~90 | number of Cited : 3
    Abstract PDF
    Is this paper, We propose to examined the relationship between advertising attributes and brand preference, consumer psychological repulsion, and consumer happiness. Due to the infinite competition between the companies, they are experiencing significant difficulties in operation. In this situation, effective advertising is obviously a very important means to overcome the difficulties of operation. Therefore, in order to maximize the advertising effect, sufficient awareness of the advertisement property and the production and exposure of the advertisement based on it can be very important. As such, the purpose of this study is to verify the effect of indirect advertising appearing on entertainment programs on consumers' preference for brands and their psychological resistance, and to verify the effect of consumers' preference for brands and psychological backlash on consumer happiness. In addition, the exposure pattern of indirect advertisement is intended to verify whether there is a control effect between the nature of the advertisement and the brand preference and psychological backlash. A total of 209 questionnaires were distributed to consumers who viewed <RUNNING MAN CHINA 2018> program in order to achieve the purpose of this study. For empirical analysis, exploratory factor analysis, confirmatory factor analysis, frequency analysis, reliability analysis, structural equation model, and multimodal simultaneous comparison analysis were performed using SPSS V. 22.0 and AMOS V. 22.0. The results of the empirical analysis of this study are as follows. First, advertising attributes have a significant effect on brand preference. Second, the hypothesis that advertising attributes have a significant effect on psychological repulsiveness of consumers is partially adopted. Third, brand preference and psychological repulsion have a significant effect on consumer happiness. Fourth, we confirmed the moderating effect of PPL expression form in ad property, brand preference, and psychological repulsion. Based on these findings, we presented the implications, limitations and future research directions of the study.
  • 12.

    The Propose of Requirements Based on Safety Assessment for UAV Handover

    Young-Min Seung | Kyeong-Soo An | Woosik Kim | 2019, 24(4) | pp.91~97 | number of Cited : 1
    Abstract PDF
    Recently, UAV manufacturers are developing UAV system in a form that can be controlled by CS regardless of UAV kind and using STANAG 4586 interface standard considering Interoperability. STANAG 4586 is a NATO military standard developed to control various UAVs with standardized equipment. In such a case, UAV handover will inevitably occur and it is one of the most important function for safe UAV flight in platform using STANAG 4586. In the future combat situation where collaboration between AV and UAV is anticipated, seamless handover of UAV is a part of continuous research. In this paper, we propose requirements for UAV handover based on ARP 4761 safety assessment and analyze feasibility of the requirements by comparing UAV handover process in STANAG 4586. As a result of the comparative analysis, the proposed handover requirements based on ARP 4761 includes all the handover procedures of STANAG 4586 and present additional considerations for SOP creation and CS development. Applying the proposed handover requirements in the UAV development process can reduce the probability of loss of UAV control over the handover process and it can be expected to help improve the safety of UAV.
  • 13.

    A Disembarking Notification Application Based on Smart Device using High Frequencies from Built-in Speaker of Public Transportation

    MyoungBeom Chung | 2019, 24(4) | pp.99~105 | number of Cited : 0
    Abstract PDF
    Recently, many people enjoy movies and music content through their smart devices for using public transportation like as bus or subway. However, because their concentration is aimed at content on their smart devices, passengers sometimes forget to disembark and miss their destination stations. Therefore, in this paper, we propose a destination notification system for disembarking public transport using high frequencies based on the smart devices. We tested 1,000 times real-time destination notification to performance evaluate of the proposed application and service system. According to the test results, the proposed system showed 99.4% and 99.6% accuracy and we confirmed that it could be very useful. As such, the proposed system could be a useful technology for notifying smart device users when to get off public transport, capable of global commercialization.
  • 14.

    The Video on Demand System Failure Evaluation of Software Development Step

    Jang, Jin-wook | 2019, 24(4) | pp.107~112 | number of Cited : 0
    Abstract PDF
    Failure testing is a test that verifies that the system is operating in accordance with failure response requirements. A typical failure test approaches the operating system by identifying and testing system problems caused by unexpected errors during the operational phase. In this paper, we study how to evaluate these Failure at the software development stage. Evaluate the probability of failure due to code changes through the complexity and duplication of the code, and evaluate the probability of failure due to exceptional situations with bugs and test coverage extracted from static analysis. This paper studies the possibility of failure based on the code quality of software development stage.
  • 15.

    A Study on Relationship between Learning participation and Learning Outcomes in Programming Courses

    KIM JI SIM | Kim Kyung-Ah | Ahn You-Jung and 2other persons | 2019, 24(4) | pp.113~121 | number of Cited : 2
    Abstract PDF
    The purpose of the study is to identify the influence of learning participation on learning outcomes in programming courses. Based on the literature review, learning participation is composed of three sub components: participation in preview, class, and review. Learning outcomes are categorized by academic achievement, learning satisfaction, and learning motivation. A survey was conducted with 267 students enrolled in programming courses from three IT departments at Myongji College. Findings revealed that participation in review and participation in class predicted all sub components of learning outcomes. Participation in review was found to have a greater effect on learners’ achievement and participation in class was found to have a greater impact on learning satisfaction and motivation. However, the results showed that participation in class was not an influential factor for learning outcomes. Implications for enhancing learning participation and suggestions for future research are also discussed.
  • 16.

    Implementation of web server monitoring system using crawling technology

    Young-Geun Yu | Ki-Bok Nam | Park Koo Rack | 2019, 24(4) | pp.123~128 | number of Cited : 1
    Abstract PDF
    In modern society, there are WEB sites that provides information in various fields by many advances in IT technology. As the number of users accessing the Web increases, one server becomes unavailable, and multiple servers are deployed to provide the service. In addition, systems that control servers are required to manage multiple servers. However, server control systems in the existing market are mostly those that notify managers through SMS and apps when a server's down or a controlled port is closed. However, in case of servers that generate a lot of traffic, the Web server and the WAS are operated and managed each independently. The WEB and WAS provide service by connecting to each other. However, the connection between WEB and WAS may be disconnected due to various environmental factors. In this case, the existing control system can not determine whether the service is working properly. Even in the case of WEB and WAS of a server that is operated independently, there is a phenomenon that the existing control system does not know the problem even when the normal service is not provided due to environmental factors such as disconnection to DB. In this paper, we implemented a system to check the normal state of Web service using Web crawling to solve this problem.
  • 17.

    Types of perception on the body shape of the elderly men

    Cha Su Joung | 2019, 24(4) | pp.129~136 | number of Cited : 1
    Abstract PDF
    The purpose of this study was to provide basic data necessary for the development of clothing that can improve the satisfaction of body shape of elderly men by examining subjective characteristics and characteristics of perception type of older men 's body shape. Using the Q methodology, I investigated and analyzed the process of formation and main characteristics of subjectivity of various types of recognition that elderly men express about their body shape. There were four types of perception of body shape in elderly men: flat hip and bird legs skinny body, back bent and abdominal obese body, thick neck and upper body development body, forward cervical neck and protruding abdomen obese body. The actual body shape of elderly men was classified according to the bust, waist circumference, hip circumference, and body part angle. But recognition body shape of elderly men was classified by visual factors like the abdomen, the angle of the neck, the inclination of the back, the slope of the waist, and the degree of obesity. It is necessary to consider the trend of silver fashion which is increasing in demand. In addition, it is necessary to develop clothing patterns of comfortable fit through ergonomic study on the physical characteristics of older men. Consideration should be given to the design and pattern that can reduce the difference between the ideal body shape and the body shape recognized by older men.
  • 18.

    Types of perception on the body shape of the middle aged men

    Cha Su Joung | 2019, 24(4) | pp.137~144 | number of Cited : 3
    Abstract PDF
    The purpose of this study was to provide basic data for the development of a prototype of a garment that allows middle aged men to look idealized by examining the type of perception of middle aged men based on their subjective evaluation and their characteristics. This study used the Q methodology, which is a subjective research method that finds correlations among middle aged men across subjective attributes. The types of perception of body shape of middle aged men were analyzed as three types: leaning forward shape with bird legs, developed upper body shape with thick legs, protruding abdomen obesity body shape. The leaning forward shape with bird legs was recognized as the lowest in the BMI index, and the shoulder and chest were sagging, legs were thinner than the body and leaned forward. And that the hip were protruding and had a flat rectangular shape. Developed upper body shape with thick legs was the second overweight type of BMI index. It was recognized that the ankle and calf thighs were thick and the upper abdomen protruded upper body development body. Protruding abdomen obesity body shape was the most obese type with BMI index. In this type, the height was the smallest, and the upper abdomen came out and the abdomen protruded, and the abdomen was more exuded than the chest, and the neck was thick and the hips were recognized as the big body. The middle aged men's recognitive body shape was classified as a similar to actual body shape. However, in the recognition type, the frontal and side body types were mixed and classified. It is necessary to study the ergonomic pattern considering the features of each body type. This suggests that psychological effects can be obtained that allow the body shape that changes with age to be accepted more positively.
  • 19.

    Differences in the relationship, learning perception and satisfaction of nursing students before and after clinical practice

    Mi-Ok Lee | 2019, 24(4) | pp.145~151 | number of Cited : 0
    Abstract PDF
    The purpose of this study was to find out whether there was a meaningful change in the learning perception and interpersonal relations of nursing students after completing clinical practice. Participants were 32 nursing students in the third grade. The research data were collected by questionnaire consisting of interpersonal relations and learning perception. The analysis of data was analyzed by SPSS 21 Version. General characteristics were analyzed by descriptive statistics, correlation between variables was analyzed by Pearson's relation, and differences of variables before and after clinical practice were analyzed by paired t-test. The results of the study are as follows. In clinical practice, interpersonal abilities showed a significant correlation with learning outcomes (R =.351, p =.049). The interpersonal abilities of nursing students improved significantly(t =2.264, p =.13) after completion of clinical practice. Nursing college students recognized that their interpersonal abilities had improved after completion of clinical practice, and the improvement of interpersonal abilities was statistically supported. Considering that the interpersonal relationship was an important factor in the clinical practice related stress of the nursing college students, it was meaningful that the interpersonal ability improved after the clinical practice. The positive correlation between interpersonal abilities and learning perceptions in clinical practice of nursing college students suggests future directions for future research. The results of this study will provide basic data on education that will enhance the satisfaction of students' clinical practice and improve their learning outcomes.
  • 20.

    Comparison of New Infant Chest Compression Methods: Simulation Study on Randomization Using Manikin

    Seong-Woo Yun | 2019, 24(4) | pp.153~159 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a the effects of new chest compressions in the implementation of chest compressions during infant cardiopulmonary resuscitation, and to provide basic data for high-quality CPR. On March 12, 2019, the research target used the SPSS 22.0 Version as an experimental study using randomized cross-design of 30 emergency medical services students who completed BLS Health Care-provider. The study also showed significant differences in chest depth and average rate of pressure(34.61±1.29, 39.40±1.08, <0.001, 105.46±4.23, 107±3.84, <0.001) depending on chest compressions. There was also a significant difference in the convenience and degree of pain of chest compressions(<0.001). In addition, new chest compressions appeared close to vertical and showed statistically significant differences(p<.001). Based on the results of this study, we can see that the accuracy of the new chest compressions during infant cardiopulmonary resuscitation is increased, and the depth of chest compressions is improved, improving the quality index of chest compressions. However, it will be necessary to further study the use of the new chest compressions to identify the potential for clinical use.
  • 21.

    The analysis on general characteristics and awareness of first aid of scuba diver

    Ko jang sik | CHO,BYUNGJUN | Gyoung-Yong Kim | 2019, 24(4) | pp.161~167 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a study on awareness of first aid of scuba diver. In order to achieve this purpose, a total of 310 customers over the age of 20 were selected as study participants form diving pools and dive resort in Seoul, Gyeonggi, Gangwon, Gyeongsang province area using the convenience sampling method However, only data from 295 customers were used after screening the data for reliability. The instrument for data collection was a questionnaire, and descriptive statistics, inter-item consistency reliability, pearson chi-square test were conducted on the data using the SPSS 21.0 version statistical package program. The followings are the results: The level differ significantly according hemorrhage, abrasion, sprain, fracture, fever, arrest, airway obstruction. As a result of analyzing the difference of first aid recognition according to the level of scuba diver, we found bleeding patients, abrasions, sprains, fractures, high heat exposure patients, cardiac arrest patients. There was a statistically significant difference in the level of airway obstruction due to food.
  • 22.

    Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

    mary wu | 2019, 24(4) | pp.169~176 | number of Cited : 0
    Abstract PDF
    Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.
  • 23.

    The Effect of Behavior Attitude and Subjective Norms on Behavior Intention in Food Festival

    Bok Mi Jung | Park Na Eun | 2019, 24(4) | pp.177~183 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to analyze the effect of behavior attitude and subjective norm on food festival behavior intention of married women living in Ulsan area. The data were analyed with PASW 18.0 using reliability analysis, frequency analysis, paired T-test, T-test, correlation analysis, one-way ANOVA and multiple regression analysis. The results were as follows. First, First, married women had a slightly higher passive behavior intention than aggressive behavior intentions on food festivals. Second, the more the experience of past food festivals, the higher the economic level, the higher the housewife 's housewives, the higher the food festival behavior intention. Third, the behavioral intention of food festival increased with higher behavioral attitude and subjective norms. Fourth, subjective norms were the most influential variable for the behavioral intention of married women. Next, the behavior attitude for food festival was found.
  • 24.

    The Changes of Self-efficacy Beliefs of Pre-service Teachers for Technology Integration through Programming-based TPACK Educational Program

    Seong-Won Kim | Lee Youngjun | 2019, 24(4) | pp.185~193 | number of Cited : 5
    Abstract PDF
    In this paper, we propose the effects of programming-based TPACK educational program on the pre-service teacher‘s self-efficacy beliefs for technology integration. For this study, pre-service teachers who received programming education and TPACK education based on ICT were set as control group and pre-service teachers who received programming-based TPACK education as experimental group. In order to observe the change, the pre-service teachers conducted the test tool to measure the self-efficacy beliefs for technology integration before and after applying the educational program. As a result of the study, only the pre-service teachers who received the programming-based TPACK education showed significant improvement in the self-efficacy beliefs for technology integration. Furthermore, in the post-test, the experimental group showed a significantly higher difference than the control group. Through this study, it was concluded that programming-based TPACK educational program is effective in enhancing pre-service teacher 's self-efficacy beliefs for technology integration.
  • 25.

    A Case Study on the Changing of Awareness of Informatics Teacher’s Qualification by Introduction of Capstone Design at College of Education at University

    Dong-Man Kim | Lee Taewuk | 2019, 24(4) | pp.195~204 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the way to solve the problems of current college of education at university that they are running a curriculum that is insufficient for immediate application to the school. So, we analyzed the application of capstone design which is proven to be effective in various fields, and constructed a curriculum for the development of educational materials to improve the teacher 's qualification in the college of education and applied them to the preliminary informatics teachers. As a result, we confirmed that the development class of educational materials based on capstone design is positive for the change of awareness about informatics teacher’s qualification, and also confirmed that the students' satisfaction level about class is higher. Based on the results, we discussed the effects of applying capstone design to the college of education. The conclusions are as follows: First, it helps students to improve the teacher 's qualification. Second, it is a curriculum that can fill the shortage of student teaching. Third, the curriculum is an effective curriculum for the recognition of the student who is in charge of evaluation, and the teacher who is in charge of the evaluation. Fourth, Capstone design information textbook study class is a method of greatly improving class satisfaction compared to lecture class.