Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2019, Vol.24, No.10

  • 1.

    Implementation of Vertigo Warning function for FA-50 aircraft

    Eun-Kyung You | Kim, Hyeock-Jin | 2019, 24(10) | pp.1~9 | number of Cited : 1
    Abstract PDF
    Fighter pilots are taking ‘Advanced Pilot Training’ courses to perform their missions perfectly even under adverse conditions. However, there are accidents that fall due to problems with the human body’s equilibrium in the acceleration of flight, falling into the ‘Vertigo, Spatial disorientation’ phenomenon. As such, accidents that fighters fall due to spatial disorientation frequently occur not only in Korea but also abroad. In this study, we implemented the ‘Vertigo’ warning function in the fighter. First, we analyzed the aircraft’s mission computer and the currently implemented warning functions. And we studied the coordinate system to utilize the aircraft attitude information. Based on this, we wanted to provide a visual warning to the HUD when the fighter flies over a certain time in the inverted flight position. Implementing this feature is expected to improve pilot flight safety. In addition, based on the results of this study, we propose a method to implement warning functions through linkage with other subsystems.
  • 2.

    A Conversion Process to IFC Files for Integrated Use of Open and Web-based BIM Quantities, Process, and Construction Costs in Civil Engineering

    Jae-Hong Lee | Hee-Suk Hwang | 2019, 24(10) | pp.11~23 | number of Cited : 2
    Abstract PDF
    This paper designs and proposes a file conversion process to IFC file, the international standard file format for BIM, in order to ensure mutual compatability and manageability among users of commercial BIM modeling and design softwares in the civil engineering area. The proposed process insert additional properties consisting of the properties of quantity calculation codes and properties of CBS/OBS/WBS standard classification scheme, to the three dimensional object shape information of the converted IFC files, using add-in converters for commercial BIM modeling softwares. In addition, a process of integrated use of IFC files for open web-based quantity, process(4D), and construction cost(5D) management is additionally designed and implemented. Based on these works, the ultimate goal of this study is to propose a novel process for integrated use of open web-based quantity, process(4D), and construction cost(5D), from the design stage of BIM modeling to the final construction stage in the civil engineering area.
  • 3.

    Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense

    Park Taekeun | Kyung-Min Park | Daesung Moon | 2019, 24(10) | pp.25~32 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method to apply the attack surface expansion through decoy traps to a protected server network. The network consists of a large number of decoys and protected servers. In the network, each protected server dynamically mutates its IP address and port numbers based on Hidden Tunnel Networking that is a network-based moving target defense scheme. The moving target defense is a new approach to cyber security and continuously changes system’s attack surface to prevent attacks. And, the attack surface expansion is an approach that uses decoys and decoy groups to protect attacks. The proposed method modifies the NAT table of the protected server with a custom chain and a RETURN target in order to make attackers waste all their time and effort in the decoy traps. We theoretically analyze the attacker success rate for the protected server network before and after applying the proposed method. The proposed method is expected to significantly reduce the probability that a protected server will be identified and compromised by attackers.
  • 4.

    Extraction of Motion Parameters using Acceleration Sensors

    Yong Hee Lee | Kang-Woo Lee | 2019, 24(10) | pp.33~39 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a parametric model for analyzing the motion information obtained from the acceleration sensors to measure the activity of the human body. The motion of the upper body and the lower body does not occur at the same time, and the motion analysis method using a single motion sensor involves a lot of errors. In this study, the 3-axis accelerometer is attached to the arms and legs, the body's activity data are measured, the momentum of the arms and legs are calculated for each channel, and the linear predictive coefficient is obtained for each channel. The periodicity of the upper body and the lower body is determined by analyzing the correlation between the channels. The linear predictive coefficient and the periodic value are used as data to measure the type of exercise and the amount of exercise. In the proposed method, we measured four types of movements such as walking, stair climbing, slow hill climbing, and fast hill descending. In order to verify the usefulness of the parameters, the recognition results are presented using the linear predictive coefficient and the periodic value for each motion as the neural network input.
  • 5.

    Design Flaws and Cryptanalysis of Cui et al’s User Authentication Scheme

    Mi Og Park | 2019, 24(10) | pp.41~48 | number of Cited : 0
    Abstract PDF
    In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al’s authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al’s authentication scheme as well.
  • 6.

    Ontology-based Recommendation System for Maintenance of Korean Architectural Heritage

    LEE JONGWOOK | 2019, 24(10) | pp.49~55 | number of Cited : 0
    Abstract PDF
    In this paper, we propose ontology-based recommendation system for supporting maintenance of Korean architectural heritage. This study includes the following: 1) design of ontology expressing repair information of architectural heritage, 2) creation of repair case DB, 3) creation of a recommendation system of repair method. For this study, we designed the ontology that expresses the information of Korean wooden building cultural heritage by referring to the existing heritage ontologies. Second, we created the repair information database based on the repair contents and the expert interview data provided by the National Institute of Cultural Heritage and the Cultural Heritage Administration. Third, we developed a system that recommends the repair method of Korean wooden architectural heritage with the most similar phenomena and causes. This study contributes to sharing repair knowledge and determining repair methods for architectural heritage repair.
  • 7.

    Notes On Inverse Interval Graph Coloring Problems

    Chung Yerim | Hak-Jin Kim | 2019, 24(10) | pp.57~64 | number of Cited : 0
    Abstract PDF
    In this paper, we study a polynomially solvable case of the inverse interval graph coloring problem. Given an interval graph associated with a specific interval system, the inverse interval graph coloring problem is defined with the assumption that there is no proper K-coloring for the given interval graph, where K is a fixed integer. The problem is to modify the system of intervals associated with the given interval graph by shifting some of the intervals in such a way that the resulting interval graph becomes K-colorable and the total modification is minimum with respect to a certain norm. In this paper, we focus on the case K=1 where all intervals associated with the interval graph have length 1 or 2, and interval displacement is only allowed to the righthand side with respect to its original position. To solve this problem in polynomial time, we propose a two-phase algorithm which consists of the sorting and First Fit procedure.
  • 8.

    Big Data Processing and Performance Improvement for Ship Trajectory using MapReduce Technique

    Kim Kwang-il | Joo-sung, Kim | 2019, 24(10) | pp.65~70 | number of Cited : 0
    Abstract PDF
    In recently, ship trajectory data consisting of ship position, speed, course, and so on can be obtained from the Automatic Identification System device with which all ships should be equipped. These data are gathered more than 2GB every day at a crowed sea port and used for analysis of ship traffic statistic and patterns. In this study, we propose a method to process ship trajectory data efficiently with distributed computing resources using MapReduce algorithm. In data preprocessing phase, ship dynamic and static data are integrated into target dataset and filtered out ship trajectory that is not of interest. In mapping phase, we convert ship's position to Geohash code, and assign Geohash and ship MMSI to key and value. In reducing phase, key-value pairs are sorted according to the same key value and counted the ship traffic number in a grid cell. To evaluate the proposed method, we implemented it and compared it with IALA waterway risk assessment program(IWRAP) in their performance. The data processing performance improve 1 to 4 times that of the existing ship trajectory analysis program.
  • 9.

    Analysis and Suggestions of Digital Heritage Policy

    LEE JONGWOOK | 2019, 24(10) | pp.71~78 | number of Cited : 0
    Abstract PDF
    In this paper, we divided domestic and foreign digital cultural activation policies into four types. We also described projects of each policy and analyzed the limitations of the policy. Finally, we suggested solutions to overcome these limitations. Changes in daily life caused by the recent development of 5G network technology, augmented reality, and virtual reality technology have brought many changes in the way of preservation and utilization of cultural heritage. In particular, digital technology is used for digitization of cultural heritage, storing, and managing digital data, digitally restoring cultural heritage, and enabling time, space, multi-sensory experiences. For this purpose, new policies was required to utilize this. This study divides domestic and international digital heritage policies into digital infrastructure construction, sharing and communication platform construction, public relations, and demonstration contents production support policies. This study is meaningful in classifying the fields of digital heritage policy and introducing digital heritage policy trends. It is also meaningful to suggest ways to improve digital heritage policies through analysis of domestic and foreign cases.
  • 10.

    Efficient Processing of k-Farthest Neighbor Queries for Road Networks

    Taelee, Kim | Hyung-Ju Cho | Hee Ju Hong and 4other persons | 2019, 24(10) | pp.79~89 | number of Cited : 0
    Abstract PDF
    While most research focuses on the k-nearest neighbors (kNN) queries in the database community, an important type of proximity queries called k-farthest neighbors (kFN) queries has not received much attention. This paper addresses the problem of finding the k-farthest neighbors in road networks. Given a positive integer k, a query object q, and a set of data points P, a kFN query returns k data objects farthest from the query object q. Little attention has been paid to processing kFN queries in road networks. The challenge of processing kFN queries in road networks is reducing the number of network distance computations, which is the most prominent difference between a road network and a Euclidean space. In this study, we propose an efficient algorithm called FANS for k-FArthest Neighbor Search in road networks. We present a shared computation strategy to avoid redundant computation of the distances between a query object and data objects. We also present effective pruning techniques based on the maximum distance from a query object to data segments. Finally, we demonstrate the efficiency and scalability of our proposed solution with extensive experiments using real-world roadmaps.
  • 11.

    Index-based Boundary Matching Supporting Partial Denoising for Large Image Databases

    Bum-Soo Kim | 2019, 24(10) | pp.91~99 | number of Cited : 0
    Abstract PDF
    In this paper, we propose partial denoising boundary matching based on an index for faster matching in very large image databases. Attempts have recently been made to convert boundary images to time-series with the objective of solving the partial denoising problem in boundary matching. In this paper, we deal with the disk I/O overhead problem of boundary matching to support partial denoising in a large image database. Although the solution to the problem superficially appears trivial as it only applies indexing techniques to boundary matching, it is not trivial since multiple indexes are required for every possible denoising parameters. Our solution is an efficient index-based approach to partial denoising using R*-tree in boundary matching. The results of experiments conducted show that our index-based matching methods improve search performance by orders of magnitude.
  • 12.

    A Study on the Factors Affecting the Use of the Military Battlefield Management System in the Non-voluntary Use Environment

    Jungik Cho | Ahn Hyunchul | 2019, 24(10) | pp.101~116 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a novel behavioral model that explains the use of the military battlefield management system more effectively in the non-voluntary use environment. This study intends to suggest a model based on the Unified Theory of Acceptance and Use of Technology(UTAUT), an extended TAM. Also, it introduces the concept of 'Conative IS use' as a dependent variable that can explain user's behavior more effectively in non-voluntary technology acceptance environment. In addition, we propose the major factors affecting the UTAUT components from the TOE(Technology-Organization- Environment) perspectives, and analyze their effects. In order to validate the proposed model, this study applies PLS(Partial Least Squares) to the survey collected from military personnel. The findings of our study may shed a light on improving the effectiveness of battlefield management information system.
  • 13.

    Whole body shape of middle-aged males for development of men's wear

    Cha Su Joung | 2019, 24(10) | pp.117~127 | number of Cited : 1
    Abstract PDF
    The purpose of this study was to analyze the direct measurement data of 40-59 year old middle-aged men from Size Korea's 7th anthropometric survey, and to identify the body shape characteristics and to type the body shape of middle-aged men. Through this, this study aimed to provide basic data necessary for the clothing patterns of middle-aged men with excellent fit. The data was SPSS Ver. 24.0 program analysis. Factors extracted six including body horizontal, vertical, shoulder, waist front length, leg thickness, and shoulder deflections. The body shape of middle-aged men was classified into three types. Type 1 had a thin body circumference, a narrow width, a low height, a short waist front length, and a thin ankle and calf. Type 2 had a high body height, a long waist front length, a normal circumference and width, a thick ankle, a calf, and a sagging shoulder. Type 3 had a large body circumference, a wide body, a wide shoulder, and a long waist front length. A prominent feature of the changes in body shape of middle-aged men is the increase in the circumference and thickness items due to abdominal protrusion and fat accumulation. Therefore, pattern design according to these physical characteristics is considered to be necessary.
  • 14.

    A Comparative Study on the Influence of Creation Shared Value Activities on Continuous Use Intention in Korean-Chinese Library Big Data Service: Focusing on Brand Quality and Social Resistance

    JingWen Dong | 2019, 24(10) | pp.129~137 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the purpose of this study is to examine whether the library's creation shared value activities in China and Korea affect brand quality, social status, and the influence of each variable according to the Chinese and Korean groups. To achieve the purpose of this study, the survey was conducted using questionnaires to users who have used the Big Data Sharing Service in Korean and Chinese libraries. A total of 500 questionnaires were distributed to participants in the study, and 460 of the recovered questionnaire were used in the final analysis, which eliminated unfaithful responses. The data collected through the survey were analyzed as frequency analysis, reliability analysis, confirmed factor analysis, and structured model using statistical programs SPSS22 and AMOS22. The results of the research identified through the empirical analysis of this study are as follows. First, the CSV activities of the library's big data have a significant influence on the brand quality and social status. Second, brand quality and social resistance has a significant positive effect on continuous use intention. Third, the influence of the CSV activities in Korean and Chinese libraries has been found to be partly different. Through the conclusion and discussion section, the theoretical implications of this study, practical implications and in-depth discussions on the limitations of the study and its future direction were presented.
  • 15.

    The Effect of Perceived Organizational Supports, Perceived Supervisory Supports and Perceived Peer Supports on Innovative Behavior: Focused on the Job Embeddedness of Automotive Industry Research Institute Using VR Technology

    Hao Dai | Hao Zhang | 2019, 24(10) | pp.139~147 | number of Cited : 0
    Abstract PDF
    In this paper, we propose to explore ways to create internal motivation to enhance the job disposition of Korean and Chinese employees. In order to achieve this goal, we would like to select parameters that may trigger an increasing number of internal motivations for interest in recent years: perceived organisational support, perceived provider support, and perceived peer support, and to explore the impact on job embeddedness. I would like to find out the effect of job embodiedness on involved beauty. The process also seeks to verify that China and South Korea are different. To verify the research theory of this research, we will use a questionnaire to researchers of automotive companies using VR technology in Gyeonggi-do, Korea and Hadong-seong, China, and conducted a survey. A total of 200 pairs of questionnaires were distributed to the study subjects, 195 of which were retrieved, 191 of which eliminated unfaithful responses were used for the final analysis. The collected data were used for frequency analysis, exploratory factor analysis, reliability analysis, confirmatory factor analysis, correlation analysis, structural equation analysis. The results of this study, identified through empirical analysis, can be summarized as follows: First, Perceived Organizational Support, Perceived Supervisor Support will have a positive impact on Job Embeddedness. Second, Job Embeddedness will have a positive influence on the Innovative Beehivior. Third, Perceived Organizational Support, Perceived Supervisor Support will have a partial positive effect on Innovative Behavior. Fourth, the formation process and influence of Job Embeddedness of corporate employees in Korea and China are partly different, the report showed.
  • 16.

    Location Trigger System for the Application of Context-Awareness based Location services

    Yonsik Lee | Jang Minseok | 2019, 24(10) | pp.149~157 | number of Cited : 2
    Abstract PDF
    Recent research has been actively carried out on systems that want to optimize resource utilization by analyzing the intended behavior and pattern of behavior of objects (users, consumers). A service system that applies information about an object's location or behavior must include a location trigger processing system for tracking an object's real-time location. In this paper, we analyze design problems for the implementation of a context-awareness based location trigger system, and present system models based on analysis details. For this purpose, this paper introduces the concept of location trigger for intelligent location tracking techniques about moving situations of objects, and suggests a mobile agent system with active rules that can perform monitoring and appropriate actions based on sensing information and location context information, and uses them to design and implement the location trigger system for context-awareness based location services. The proposed system is verified by implementing location trigger processing scenarios and trigger service and action service protocols. In addition, through experiments on mobile agents with active rules, it is suggested that the proposed system can optimize the role and function of the application system by using rules appropriate to the service characteristics and that it is scalable and effective for location-based service systems. This paper is a preliminary study for the establishment of an optimization system for utilizing resources (equipment, power, manpower, etc.) through the active characteristics of systems such as real-time remote autonomous control and exception handling over consumption patterns and behavior changes of power users. The proposed system can be used in system configurations that induce optimization of resource utilization through intelligent warning and action based on location of objects, and can be effectively applied to the development of various location service systems.
  • 17.

    Integrated Safety System based on IoT

    shin jin seob | 2019, 24(10) | pp.159~165 | number of Cited : 0
    Abstract PDF
    About 58% of fires are electric fires. In this study, we analyzed the factors of fire caused by electricity and studied the system that can prevent fire in advance. In order to prevent disasters, basically, various electrical IoT sensors are needed to detect fire signs. Each of these sensors continuously receives a lot of situation information and sends it to the main system. The collected big data continuously checks whether the disaster is over the threshold that can cause disaster through pattern analysis, and can check whether there is any problem by comparing the data. In the event of a threshold, alarms are signaled and problems are reported. This prevents fire by preventing electrical problems such as overcurrent and leakage current.
  • 18.

    Physical Factors Affecting Success Rate During Endotracheal Intubation

    Song-yi Han | Seong-Woo Yun | 2019, 24(10) | pp.167~174 | number of Cited : 0
    Abstract PDF
    In this paper, We propose the purpose the examine the physical factors that influence the success rate during the endotracheal intubation and to provide the basic data for effective intubation success. The subject of this study was 42 students in emergency rescue department who had completed the BLS Health Care-provider and a specialized airway maintenance course dealing with endotracheal intubation and it is a similar experimental study after the non-equivalence single group. For data analysis, SPSS 23.0 Version was used. The study methods were measuring the grip fotce of subjects, the angle of arm during intubation tube, distance from manikin, palm length, etc. The results showed that there was a correlation between the time of successful endotracheal intubation and the physical characteristics. In particular, when performing endotracheal intubation, it was related to the angle of the arm and the execution time of the performer, and the narrower the angle of the arm, the shorter the execution time. The results of this study suggest that successful endotracheal intubation could be implemented if the operator tried to reduce the angle of the arm when performing endotracheal intubation, and through further research on various job groups, identify the possibility of clinical use will be necessary.
  • 19.

    A Study on the Effect of Basic Life Support Training on the First Responsive Police Officers

    Byung-Tae Jo | kim seon-rye | 2019, 24(10) | pp.175~182 | number of Cited : 0
    Abstract PDF
    The study was conducted to verify the effect of basic life support training on the skill ability of police officers. The subjects of this study were 10 experimental group and 10 comparative group with voluntary consent after explaining the theory and significance of the training experiment at the police station located in K. The education program used in this study consists of theoretical education and practical training, and the theoretical education is 60 minutes and the practical training is 30 minutes. The measurement tool for basic resuscitation performance was measured based on the ‘CPR and ECG Guidelines for Cardiopulmonary Resuscitation and Emergency Cardiovascular Care’ presented by the American Heart Association. The results are as follows. The experimental group showed higher performance skills than the traditional control group in field confirmation performance skills, primary evaluation performance skills (A, B, C, medical evaluation), and BLS performance skills (heart compression, artificial respiration, medical evaluation) which are the basic resuscitation performance skills. In conclusion, this study confirmed that the theory and practice education program is more effective in improving the clinical performance of police officers than the traditional lectures and practice education, so it is possible to apply this simulation education program to the cardiac arrest patient emergency treatment.
  • 20.

    A Comparative Analysis of Disaster-Related Curriculum between Emergency Department and Nursing Department

    Jung, JiYeon | 2019, 24(10) | pp.183~188 | number of Cited : 0
    Abstract PDF
    This study is a descriptive research to compare and analyze the current status of disaster-related curriculum between emergency department and nursing department Research and analysis targets were 41 universities which include the emergency department in South Korean by using the universities’ internet homepage, finally 30 universities were researched by removing the universities which doesn’t upload the curriculum on their homepage, have emergency department or have nursing department. The research data were collected and analyzed by using the universities’ internet homepage. The Keyword is ‘Disaster’, ‘Catastrophe’, and ‘Emergency’ to search the name of the subjects. The curriculum calculated as a percentage of frequency by using the status of disaster-related subjects opening, classification of major education, grade, credit, number of class, practical hours, and the total number of subjects. According to the study, 29 universities (96.7%) of emergency department and 19 universities (63.3%) of nursing department has the disaster-related subjects in their curriculum. The current status of the class opening is emergency department at second grade and nursing department as fourth grade. As a subject of major, two credits are the common class credits. Based on the results of the study, knowledge and skills and training courses are necessary to develop the ability to cope with disasters in the disaster field. The curriculum that matches the role of health care resources will be required.
  • 21.

    Treatment and Prevention of Abnormality with Lateral Flexion and Rotation in Cervical Spine

    Lee Hyun Chang | SeongYoon Shin | Kihong Park | 2019, 24(10) | pp.189~194 | number of Cited : 0
    Abstract PDF
    In the healthcare system, the human neck(cervical spine) is one of the most important organs. The area that supports the human head is the cervical spine. Nowadays, we are often overworked our neck to calls with the smart phone or see the monitors. In this paper, we investigate the abnormalities of lateral flexion and rotation of the cervical spine. The normal angle of lateral flexion is 20 ° to 45 ° and the normal angle of rotation is 50 ° to 90 °. If this angle is below normal and we feel pain, there is something wrong with the cervical spine. In addition, learn how to measure the lateral flexion and rotation of the neck or cervical spine, and also to find out how to treat an abnormality. We also look at how to prevent more than lateral flexion and rotation of the cervical spine. The experiment was carried out with 100 people in their 50s, men and women, to find out whether the neck is abnormal.
  • 22.

    Design and Implementation of Ontology for Identifying of Maladjustment Soldiers

    Jihee Nam | Dongsu Kang | 2019, 24(10) | pp.195~203 | number of Cited : 0
    Abstract PDF
    Inadequate military soldiers cause military fatigue and rejection such as reduced confidence in the military and combat power. The military developed and applied a self-adopting test as a psychological test system to identify soldiers who are not fit to serve in the military in advance and prevent accidents. In this paper, we propose the ontology design process to be used for identifying accident concerns and implement the behavioral patterns and symptoms of maladjustment soldiers as ontology. The ontology design process is validated consistency and suitability as a result of the performance evaluation of ontology implemented. Through ontology design for identifying maladjustment soldiers, it is expected to play an effective role in preventing accidents by providing objective criteria and sharing of information on accident concerns.
  • 23.

    Robustness Evaluation of Tactical Network based on SNA

    Ji-Hye Park | SoungWoong Yoon | Lee Sang Hoon | 2019, 24(10) | pp.205~213 | number of Cited : 0
    Abstract PDF
    Network robustness is one of the most important characteristics needed as the network. Over the military tactical communication network, robustness is a key function for maintaining attack phase constantly. Tactical Information Communication Network, called TICN, has mixed characteristics of lattice- and tree-type network topology, which looks somewhat weak in the viewpoint of network robustness. In this paper, we search articulation points and bridges in a current Tactical Information Communication Network using graph theory. To improve the weak points empirically searched, we try to add links to create the concrete network and then observe the change of network-based verification values through diminishing nodes. With these themes, we evaluate the generated networks through SNA techniques. Experimental results show that the generated networks' robustness is improved compared with current network structure.
  • 24.

    A Study on the Effectiveness of DUI(driving under the influence) Alcohol Treatment Program

    Hyun-Sun Park | Hyun-Joo Kim | Chang-Suek Choi | 2019, 24(10) | pp.215~223 | number of Cited : 0
    Abstract PDF
    Driving after drinking is highly likely to cause accidents due to lack of responsibility and poor judgment. South Korea is seeking a sentence for accidental drinking accidents. The suspended jail term for drunk drivers accounts for more than 70 percent of the total. However, those who come to the probation office during the probation period are involuntary, subject to little motivation for change, and the large-scale, collective, and short-term education offered to them is limited in preventing re-off. In addition to small group and long-term education, we conducted intensive short-term interventions to see changes in drinking habits in three months. In the long run, the effectiveness of drinking control will be demonsstrated, making a difference in improving the programs offered to drunk drivers in the future. Drunk driving accouts for a very high percentage of the causes of traffic accidents, which, like many countries around the world, should make efforts to prevent and punish drunk driving.
  • 25.

    A Study on the Judgment Criteria for the Trademark Dilution of Famous Marks

    park | Sang-Ouk Noe | 2019, 24(10) | pp.225~232 | number of Cited : 0
    Abstract PDF
    The trademark dilution of famous marks as a kind of unfair competition practice is defined and regulated in Article 2 (1) (c) of the Unfair Competition Prevention and Trade Secret Protection Act (hereinafter referred to as the Unfair Competition Prevention Act), which was newly established according to the amendment of the Act on February 3, 2001. Famous trademarks are universally protected in all around the world, which are likewise protected in the Republic of Korea by the Unfair Competition Prevention Actin line with such international trends. In order to establish the trademark dilution of famous marks, it is necessary to have the following characteristics: (1) high reputation of the original mark, (2) use of identical or similar markscompared to the original mark, (3) occurrence of blurring of discrimination or tarnishment of reputation; in particular, with respect to the degree of proof of 'blurring of discrimination or tarnishment of reputation', which is a constituent requirement of the trademark dilution of famous marks, it is reasonable to interpret the trademark dilution as concrete endangerment offense, neither harm-based offense nor abstract endangerment offense, and thus it should be considered that the crime is established if a specific realistic risk of blurring of discrimination or tarnishment of reputation occurs. Furthermore, in relation to the specific criteria of 'blurring of discrimination or tarnishment of reputation', it is necessary to comprehensively judge the degree of individual behavior in specific matters as a normative factor as well as the psychosocial viewpoint of the general public.
  • 26.

    Finding Ways to Improve the Bilingual Teaching and Learning Method of Children of Multicultural Families Applying Waldorf Education

    Jae Nam Kim | Moon Kyung Im | 2019, 24(10) | pp.233~242 | number of Cited : 0
    Abstract PDF
    At present, our society is reducing the birth rate, and the school population is decreasing, but multicultural students are facing the increasing social phenomenon. We all need to make sure that bilingual teaching and learning is effective for children of multicultural families who need to live in the days of Phono Sapiens so that they can live confidently as members of our society. To this end, there is a great need for a bilingual teaching and learning method that enables children from multicultural families to be free from language and cultural prejudice and to actively communicate and interact. In this paper, we propose a customized bilingual education method that applies various teaching and learning methods according to the development cycle, school age, and Korean language ability of children of multicultural families. The proposed bilingual teaching method for children of multicultural families is a teaching and learning method that applies the Waldorf teaching principle.
  • 27.

    Implementation Strategy of Integrated Information Management System of University Financial Support Project

    Haegun Lee | SeongYoon Shin | 2019, 24(10) | pp.243~249 | number of Cited : 0
    Abstract PDF
    In this paper, we proposes a comprehensive analysis of the characteristics, selection procedures, and management perspectives of each university's financial support project, and derivation of a plan to integrate the information system of the university's financial support project. To this end, we analyze the current status of business operations before and after restructuring university financial support projects, and identified the characteristics, commonalities, and differences of each project. Individual projects are promoted segmentally, evaluation indicators and evaluation methods are different for each business, standardization is difficult, and in the absence of integrated governance, sympathy and will of the system integration of the government and the managing agency cannot be found. In order to integrate the system, the business management process must be integrated and standardized, and the system equipment such as budget category adjustment must be complemented, and a stable budget for system integration must be secured.
  • 28.

    Defining Functions for Integrated Information Management System of University Financial Support Project

    Haegun Lee | SeongYoon Shin | 2019, 24(10) | pp.251~256 | number of Cited : 0
    Abstract PDF
    In this paper, we analyzed the business process and management characteristics of the university financial support project to define the function for the integrated information management system of the university financial support project. To this end, we reviewed the characteristic and business process of university financial support project and defined six common functions. In order to establish an integrated system applying the derived functions, the first things to be done need to standardize the business management system considering integration and to arrange the accounting regulations. Based on the functions and implications defined from this paper, we think that it will be helpful to design an integrated information management system for university financial support project.
  • 29.

    Impact of Aggression on Mobile Phone Dependency Among High School Students: Testing the Mediating Effect of Self-esteem

    Cha Eun Jin | 2019, 24(10) | pp.257~265 | number of Cited : 1
    Abstract PDF
    The purpose of the present study was to examine the causal relationship between aggression and mobile phone dependency among high school students and to test the mediating effect of self-esteem, and to draw out implications in order to encourage proper use of mobile phone. In this paper, we proposed a research model between aggression, self-esteem and mobile phone dependency. The present study analyzed the fourth, fifth, and sixth wave data from KCYPS 2010, using the structural equation modeling. The primary results were as follows. First, the effect of high school students’ aggression on mobile phone dependency was not significant. Second, high school students’ aggression had a significantly negative effect on self-esteem. Third, high school students’ self-esteem had a significantly positive effect on mobile phone dependency. Fourth, high school students’ self-esteem could be a significant mediator between aggression and mobile phone dependency. In conclusion, theoretical and practical suggestions were discussed in order to solve the problem of adolescents’ mobile phone dependency.
  • 30.

    Development of Programming-based TPACK Education Program through Design-based Research

    Seong-Won Kim | Youngjun Lee | 2019, 24(10) | pp.267~278 | number of Cited : 4
    Abstract PDF
    As the importance of technology in education has increased, TPACK research has been actively conducted to promote the use of technology in class. However, due to the functional limitations of technology, the pre-service teacher had difficulty in using technology in class. Therefore, in this study, we have been studying the introduction of the programming language as a technology tool of TPACK. Using design-based research as a research method, we repeatedly developed an educational program, applied to pre-service teachers, and evaluated the effectiveness of the program. In the first study, pre-service teachers had difficulties in programming learning. To solve this problem, programming-based instruction and curriculum analysis were supplemented by educational programs. In the second study, pre-service teachers felt difficulty in using programming in teaching-learning, thus improving instruction design and reflection. The third study enhanced the programming development environment search to supplement programming learning and utilization.