Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2020, Vol.25, No.3

  • 1.

    Dead Block-Aware Adaptive Write Scheme for MLC STT-MRAM Caches

    HONG, SEOKIN | 2020, 25(3) | pp.1~9 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient adaptive write scheme that improves the performance of write operation in MLC STT-MRAM caches. The key idea of the proposed scheme is to perform the write operation fast if the target MLC STT-MRAM cells contain a dead block. Even if the fast write operation on the MLC STT-MRAM evicts a cache block from the MLC STT-MRAM cells, its performance impact is low if the evicted block is a dead block which is not used in the future. Through experimental evaluation with a memory simulator, we show that the proposed adaptive write scheme improves the performance of the MLC STT-MRAM caches by 17% on average.
  • 2.

    Cache Memory and Replacement Algorithm Implementation and Performance Comparison

    Na-Eun Park | Jongwan Kim | Jeong,Tae-Seog | 2020, 25(3) | pp.11~17 | number of Cited : 0
    Abstract PDF
    In this paper, we propose practical results for cache replacement policy by measuring cache hit and search time for each replacement algorithm through cache simulation. Thus, the structure of each cache memory and the four types of alternative policies of FIFO, LFU, LRU and Random were implemented in software to analyze the characteristics of each technique. The paper experiment showed that the LRU algorithm showed hit rate and search time of 36.044% and 577.936ns in uniform distribution, 45.636% and 504.692ns in deflection distribution, while the FIFO algorithm showed similar performance to the LRU algorithm at 36.078% and 554.772ns in even distribution and 45.662% and 489.574ns in bias distribution. Then LFU followed, Random algorithm was measured at 30.042% and 622.866ns at even distribution, 36.36% at deflection distribution and 553.878ns at lowest performance. The LRU replacement method commonly used in cache memory has the complexity of implementation, but it is the most efficient alternative to conventional alternative algorithms, indicating that it is a reasonable alternative method considering the reference information of data.
  • 3.

    Automatic Metallic Surface Defect Detection using ShuffleDefectNet

    Avlokulov Anvar | Young Im Cho | 2020, 25(3) | pp.19~26 | number of Cited : 0
    Abstract PDF
    Steel production requires high-quality surfaces with minimal defects. Therefore, the detection algorithms for the surface defects of steel strip should have good generalization performance. To meet the growing demand for high-quality products, the use of intelligent visual inspection systems is becoming essential in production lines. In this paper, we proposed a ShuffleDefectNet defect detection system based on deep learning. The proposed defect detection system exceeds state-of-the-art performance for defect detection on the Northeastern University (NEU) dataset obtaining a mean average accuracy of 99.75%. We train the best performing detection with different amounts of training data and observe the performance of detection. We notice that accuracy and speed improve significantly when use the overall architecture of ShuffleDefectNet.
  • 4.

    Deep Learning based Scrapbox Accumulated Status Measuring

    Ye-In Seo | Jeong Eui-han | Dong-Ju Kim | 2020, 25(3) | pp.27~32 | number of Cited : 1
    Abstract PDF
    In this paper, we propose an algorithm to measure the accumulated status of scrap boxes where metal scraps are accumulated. The accumulated status measuring is defined as a multi-class classification problem, and the method with deep learning classify the accumulated status using only the scrap box image. The learning was conducted by the Transfer Learning method, and the deep learning model was NASNet-A. In order to improve the accuracy of the model, we combined the Random Forest classifier with the trained NASNet-A and improved the model through post-processing. Testing with 4,195 data collected in the field showed 55% accuracy when only NASNet-A was applied, and the proposed method, NASNet with Random Forest, improved the accuracy by 88%.
  • 5.

    The Study on The Identification Model of Friend or Foe on Helicopter by using Binary Classification with CNN

    Tae Wan Kim | Jong-Hwan Kim | Hoseok Moon | 2020, 25(3) | pp.33~42 | number of Cited : 3
    Abstract PDF
    There has been difficulties in identifying objects by relying on the naked eye in various surveillance systems. There is a growing need for automated surveillance systems to replace soldiers in the field of military surveillance operations. Even though the object detection technology is developing rapidly in the civilian domain, but the research applied to the military is insufficient due to a lack of data and interest. Thus, in this paper, we applied one of deep learning algorithms, Convolutional Neural Network-based binary classification to develop an autonomous identification model of both friend and foe helicopters (AH-64, Mi-17) among the military weapon systems, and evaluated the model performance by considering accuracy, precision, recall and F-measure. As the result, the identification model demonstrates 97.8%, 97.3%, 98.5%, and 97.8 for accuracy, precision, recall and F-measure, respectively. In addition, we analyzed the feature map on convolution layers of the identification model in order to check which area of imagery is highly weighted. In general, rotary shaft of rotating wing, wheels, and air-intake on both of ally and foe helicopters played a major role in the performance of the identification model. This is the first study to attempt to classify images of helicopters among military weapons systems using CNN, and the model proposed in this study shows higher accuracy than the existing classification model for other weapons systems.
  • 6.

    A Study of The Database System Design for The Ear Reflex Therapy Utilization

    Hye-Myoung Choung | 2020, 25(3) | pp.43~50 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.
  • 7.

    Noise-tolerant Image Restoration with Similarity-learned Fuzzy Association Memory

    Park Choong Shik | 2020, 25(3) | pp.51~55 | number of Cited : 0
    Abstract PDF
    In this paper, an improved FAM is proposed by adopting similarity learning in the existing FAM (Fuzzy Associative Memory) used in image restoration. Image restoration refers to the recovery of the latent clean image from its noise-corrupted version. In serious application like face recognition, this process should be noise-tolerant, robust, fast, and scalable. The existing FAM is a simple single layered neural network that can be applied to this domain with its robust fuzzy control but has low capacity problem in real world applications. That similarity measure is implied to the connection strength of the FAM structure to minimize the root mean square error between the recovered and the original image. The efficacy of the proposed algorithm is verified with significant low error magnitude from random noise in our experiment.
  • 8.

    A Study on the Nurse Scheduling Optimization Model for Nurse Needs-Type Scheduling Automation System

    Song Mi Yeong | 2020, 25(3) | pp.57~64 | number of Cited : 0
    Abstract PDF
    Today, with the development of information technology, hospitals are actively researching hospital information systems that are not limited by time and space to integrate mobile computing technology into the medical field to manage the bulk data of medical information. Nevertheless, most hospitals still spend a lot of time and effort creating manual schedules. In this paper, we studied an optimization model for organizing nurses' shift work and constructed an automated nurse-type job organization system. For nurses working in S hospital, information data, requirements and constraints of nurses were constructed. By applying this, we proposed an optimized scheduling method and built a web-based platform used by head nurses and a mobile app platform used by general nurses to enable real-time interchange and sharing around web servers. Therefore, through the developed nurse needs type automated system, the head nurses will increase the convenience of the nurses to organize the work every month, and general nurses will help them to work more accurately through personal schedule management. It is also expected to increase work efficiency by sharing work schedules among nurses.
  • 9.

    Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

    Yong Goo Kang | YOO JEONG DO | Eunji Park and 2other persons | 2020, 25(3) | pp.65~72 | number of Cited : 1
    Abstract PDF
    With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.
  • 10.

    A robust execution scheme for Ethereum blockchain application services

    Min-Ho Kwon | Lee, Myung Joon | 2020, 25(3) | pp.73~80 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a robust execution scheme for Ethereum blockchain application services which provide continuous services and support recovery even in the case of failures of those services. As of now, blockchain services are rapidly expanding to all industries and being combined with various infrastructure services of public institutions. But if these services fail in disastrous situations such as earthquakes, floods and terrors or various hacking attacks, the aftermath is very serious and its side effects are difficult to assess. To resolve this issue, we develop the service registry as a smart contract of the Ethereum blockchain, which provides useful information on the services to users even in disasters. With the help of the service registry, we also present a method of replicating services on the basis of the ETCD distributed storage system. The proposed scheme is confirmed by the test service developed by the proposed techniques.
  • 11.

    The data transparency of RPS using blockchain method

    Dae-Ho Kang | Cho Kyucheol | 2020, 25(3) | pp.81~88 | number of Cited : 0
    Abstract PDF
    The Renewable Portfolio Standard(RPS) which is in operated by country for many years is eco-friendly energy business. Although a variety of institute are accessing the RPS, it consists of a centralized system. Also, it shows opacity of data access in user's point of view. And each institutes is possessing their own data collected by themselves. Therefore decentralization and integrated control is demanded. Also, when institutes are attacked, the interruption of RPS can be existed. For resolving this issue, this study proposes the RPS using blockchain. Using the consortium method of blockchain, every institutes has possessing same data inserting REC data in block data, it is resolvable that transparency and security issue as transaction through verification of certain block. Furthermore, in case of one institute is paused by external attack, the role can be replaced by other institutes. This study tried the processing of putting data through ethereum network, therefore it presents the possibility of introducing the blockchain method in RPS.
  • 12.

    Automatic Recovery and Reset Algorithms for System Controller Errors

    Yonsik Lee | 2020, 25(3) | pp.89~96 | number of Cited : 0
    Abstract PDF
    Solar lamp systems may not operate normally in the event of some system or controller failure due to internal or external factors, in which case secondary problems occur, which may cost the system recovery. Thus, when these errors occur, a technology is needed to recover to the state it was in before the failure occurred and to enable re-execution. This paper designs and implements a system that can recover the state of the system to the state prior to the time of the error by using the Watchdog Timer within the controller if a software error has occurred inside the system, and it also proposes a technology to reset and re-execution the system through a separate reset circuit in the event of hardware failure. The proposed system provides stable operation, maintenance cost reduction and reliability of the solar lamp system by enabling the system to operate semi-permanently without external support by utilizing the automatic recovery and automatic reset function for errors that occur in the operation of the solar lamp system. In addition, it can be applied to maintain the system's constancy by utilizing the self-operation, diagnosis and recovery functions required in various high reliability applications.
  • 13.

    A Study on Effects of Service Quality and Technology Acceptance Model in China - The Moderate Effect on Reliability -

    Eun-Ji Lee | Jae-Young Moon | 2020, 25(3) | pp.97~107 | number of Cited : 0
    Abstract PDF
    This paper shows the result of a survey about the users using Didi Chuxing in China to analyze the effect of the service quality and technology acceptance model (TAM) on customer satisfaction. There are 314 valid responsiveness out of the 414 for 9 days, which had been analyzed with SPSS and AMOS. In the analysis result, the academic implications are as follows. First, it was analyzed that the quality of service had a positive(+) effect on the technology acceptance model. Second, it was analyzed that the technology acceptance model had a positive effect on the attitude and customer satisfaction. Third, in the analysis result of the moderate effect, attitude and customer satisfaction vary partially according to whether types of reliability. The practical implications are as follows: First, it is necessary to provide service quality factors to customers. Second, It is necessary to suggest ways that customers can gain reliability. These findings also have limitations and research directions. First, the variety of samples is needed. Second, an analysis is required according to the type of vehicle use. Therefore, future research and analysis will need to be subdivided.
  • 14.

    AI Technology Analysis using Partial Least Square Regression

    Choi.Jun-Hyeog | Sung-Hae Jun | 2020, 25(3) | pp.109~115 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an artificial intelligence(AI) technology analysis using partial least square(PLS) regression model. AI technology is now affecting most areas of our society. So, it is necessary to understand this technology. To analyze the AI technology, we collect the patent documents related to AI from the patent databases in the world. We extract AI technology keywords from the patent documents by text mining techniques. In addition, we analyze the AI keyword data by PLS regression model. This regression model is based on the technique of partial least squares used in the advanced analyses such as bioinformatics, social science, and engineering. To show the performance of our proposed method, we make experiments using AI patent documents, and we illustrate how our research can be applied to real problems. This paper is applicable not only to AI technology but also to other technological fields. This also contributes to understanding other various technologies by PLS regression analysis.
  • 15.

    A Study on Conspired Insurance Fraud Detection Modeling Using Social Network Analysis

    Tae-Ho Kim | Lim Jong In | 2020, 25(3) | pp.117~127 | number of Cited : 0
    Abstract PDF
    Recently, proving insurance fraud has become increasingly difficult because it occurs intentionally and secretly via organized and intelligent conspiracy by specialists such as medical personnel, maintenance companies, insurance planners, and insurance subscribers. In the case of car accidents, it is difficult to prove intentions; in particular, an insurance company with no investigation rights has practical limitations in proving the suspicions. This paper aims reveal that the detection of organized and conspired insurance fraud, which had previously been difficult, could be dramatically improved through conspiring insurance fraud detection modeling using social network analysis and visualization of the relation between suspected group entities and by seeking developmental research possibilities of data analysis techniques.
  • 16.

    A Study on the Effect of Individual Characteristics on Acceptance Intention of Wearable Healthcare Devices: Focusing on the UTAUT2 and Innovativeness

    Seok Jin | 2020, 25(3) | pp.129~143 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to explain users’ wearable healthcare device adoption using performance expectancy, effort expectancy, facilitating condition, hedonic motivation and price value of UTAUT2, and to identify the causal relationship between intention to use wearable healthcare device and innovativeness. The research model proposed in this study is based on UTAUT2(Extended Unified Theory of Acceptance and Use of Technology). In specific, performance expectancy, effort expectancy, facilitating condition, hedonic motivation and price value of UTAUT2 and innovativeness are adopted in our research model. To validate the research model, we carry out the analysis of the survey data using Smart PLS 3.0 to test the hypotheses. According to the empirical analysis results, this study confirms that Innovativeness have significant effects on the performance expectancy, effort expectancy, Facilitating condition, Hedonic motivation, and price Value of wearable healthcare devices. It also finds that the performance expectancy, effort expectancy, Facilitating condition, hedonic motivation, and price value affects the intention to use wearable healthcare devices.
  • 17.

    A Study on the Effective Bicycle Fitting Method for Injury Prevention (For the Development of Bicycle Fitting System)

    Son Gyeong Hwan | 2020, 25(3) | pp.145~154 | number of Cited : 0
    Abstract PDF
    This paper proposes a corresponding bicycle fitting method through a number of clinical results and experiments, with the aim of standardizing the comprehensive bicycle fitting method with the aim of developing a system that incorporates bicycle fitting software and hardware to proceed more precisely and quickly. This bicycle fitting method can determine the value of bicycle setting for the rider through in-depth counseling, bicycle check, sophisticated body sizing and analysis, and from the bicycle adjusted to this setting, the posture and pedaling torque can be analyzed through fixed lading, which can be followed to find the most efficient setting value and optimize the bicycle to meet the needs of the rider. Such a fitting method can increase the satisfaction of bicycle riders and also be expected to prevent injury through accurate bicycle setting values. This paper can be established as a bicycle fitting technology that can be recognized even in the global market if the final bicycle fitting system is implemented as the result presented in the most concrete domestic and foreign countries.
  • 18.

    Design and Implementation of User Standing Posture Recognition-Based Interaction System Using Multi-Channel Large Area Pressure Sensors

    Park HyungSoo | HoonKi Kim | Jaehyung Kwak | 2020, 25(3) | pp.155~162 | number of Cited : 0
    Abstract PDF
    Among the fourth industrial revolution technologies, products related to healthcare using IoT and sensors are currently being developed. We design and develop an interaction system based on user standing posture recognition using multi-channel large area pressure sensors in this paper. To this end, first of all we investigate major sensor markets of the sensor industry and review technology trends and the current and future of smart healthcare. Based on this survey, we examine and compare cases developed at home and abroad for multi-channel large-area pressure sensors, which are key components of the system that we want to develop. We recognize the standing posture status of the user through the developed system and experiment with how effective it is actually in user posture calibration and apply the research results to various healthcare devices' medical fields based on this.
  • 19.

    Differences in self-regulation motivation between social network service and gaming groups in the use of youth mobile phones

    Kang-Hun Seo | 2020, 25(3) | pp.163~168 | number of Cited : 0
    Abstract PDF
    In this paper we propose a The purpose of this study was to examine the psychological characteristics of youth mobile phone use. Internally, we want to find out about self-regulation, interpersonal relationship, pleasure, and desire to achieve reality. For the research, the Korea Information Society Agency utilized 568 data based on self-control and user motivation among long-term tracking data of Internet and mobile phone addiction in 2018. The SPSS window 23 version was used for data analysis, and the data collected were analyses to identify the subject's demographic characteristics. In addition, the correlation of variables between groups was investigated by analyzing dummy variables, and the results of the study were as follows. First, the addiction was slightly higher in mobile phone game groups than in social network service (SNS) groups, but in the same period of use, social network service (SNS) groups showed a higher desire for interpersonal relationships. In the desire to avoid reality, mobile phone game groups showed a higher gap than social network service (SNS) However, there was no difference between groups in terms of pleasure and desire to achieve. The results of this study indicated that the content of mobile phone use differed in factors affecting mobile phone overuse, and suggestions for follow-up research were discussed.
  • 20.

    Study on the effect of 3 point belt on chest compression

    KIM GYOUNG YONG | Yang Hyun mo | 2020, 25(3) | pp.169~176 | number of Cited : 0
    Abstract PDF
    This study suggested a method to increase the quality of chest compressions in patients with cardiac arrest during transport. When providing cardiopulmonary resuscitation to a cardiac arrest patient in the pre-hospital phase, the quality of chest compressions should be improved by using a three-point fixed belt to the ambulance. Because the quality of the chest compression was increased when the 119 paramedic wears a 3-point fixed belt in addition to the chest compression method. Also, paramedics are less likely to be at risk. Therefore, if a 3-point fixed belt is worn in an ambulance during transport, 119 paramedics will be able to secure safety and provide high-quality chest compressions to cardiac arrest patients.
  • 21.

    Female College Students’ Perception of Work Scope of Dental Hygienist and Boundaries of Medical Personnel according to the Major

    Hong Yang Hee | Lee Jung mi | Woo Hee Sun | 2020, 25(3) | pp.177~183 | number of Cited : 0
    Abstract PDF
    The purpose of the study is to investigate the women’s college students’ perceptions on work scope of dental hygienists and the inclusion of dental hygienists in the category of medical personnel. A self-reported questionnaire was completed by 180 Suwon women’s college students from August 26, to September 11, 2019. The questionnaire consisted of oral health condition of the subjects, perception of both legal and illegal work scope of dental hygienist, the degree of recognition of medical personnel occupations by subject, and the reason why they thought dental hygienists are medical personnel. The collected data were analyzed based on frequency, percentage, and descriptive statistics using IBM SPSS VER 22.0. It showed significantly different perception of work scope of dental hygienists according to the major. Percent of 70 of the subjects perceived dental hygienist as a medical personnel, the opinions on the necessity were as follows: The Ministry of Health and Welfare issues a license through the national examination role and dental hygienists assist the care of dentist. Therefore, clinical dental hygienists should be promoted to medical personnel through the amendment of the medical law so that the duties practiced by the dental hygienist can be matched with the legal practice.
  • 22.

    What is the meaning of hs-CRP and HbA1c in patients with dry eye syndrome in diabetes?

    Ji-Hun Kang | shin sang yol | 2020, 25(3) | pp.185~190 | number of Cited : 0
    Abstract PDF
    The purpose of this study was to investigate the effects of systemic chronic inflammatory state on dry eye syndrome as a local chronic inflammatory condition. From June 16, 2016 to December 31, 2016, 726 patients who visited the general health examination center were screened using the Schirmer’s test and the metabolic syndrome screening test. A total of 214 patients who were studied for hs-CRP and HbA1c were simultaneously selected for the study as well. Dry eye syndrome significantly increased in higher age groups (p<0.001) and women (p=0.020); there was no significant relationship with fasting plasma glucose, hs-CRP. In addition, as HbA1c increased the risk for dry eye syndrome also increased (β=1.960, p=0.025). Therefore, dry eye syndrome may not caused by microvascular changes in the lacrimal gland due to chronic inflammatory conditions. In diabetic patients, long-term blood glucose control may be more important than short-term blood glucose control. The high prevalence of dry eye syndrome in diabetic patients is thought to be due to autonomic dysfunction rather than microvascular changes caused by chronic inflammation.
  • 23.

    The Influence of Sexual Violence on the Relationship Between Internet Pornography Experience and Self-Control

    Kang-Hun Seo | 2020, 25(3) | pp.191~198 | number of Cited : 0
    Abstract PDF
    In this paper we propose a for high school students who are attending a nationwide city with experience in Internet pornography, we would like to find out the impact of Internet pornography experience and self-regulation on sex crime harmful behavior. For this study, an Internet panel survey was conducted using a purposeful method of significant allocation inference. During the period, 246 copies of the questionnaire were distributed for about a month from May to June 2018 and 210 parts were analyzed except for 36 parts with no experience of pornographic material, and further analysis was conducted on 85 respondents with experience in harmful behavior of sexual violence. To this end, analysis tools used the SPS WIN 20.0 program version. The research results are as follows. First, we could find that Internet pornography has a negative effect on teenagers. This shows the probability of developing sexual violence into behavior as people can experience pornographic material regardless of their will due to the high Internet access. Second, the self-regulation of sexual violence behavior is found to have no direct impact. This is not just the adolescent's will to do so, but it is affected by the external environment. Third, self-regulation has proven its role as a modulator to mitigate negative perceptions of Internet pornography. Based on this, the proposal for limiting current prices was discussed.
  • 24.

    The Effect of Digital Cultural Capital and Social Connectedness on the Intention to Participate in Sharing Economy

    Bok Mi Jung | 2020, 25(3) | pp.199~206 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to examine the relationship between intention to participation in sharing economy, digital cultural capital, and social connectedness and then analyze the variables affecting the intention to participate in sharing economy. This subjects were university students. Collected data were statistically processed by PASW 18.0 program using reliability, frequency analysis, T-test, one-way ANOVA, correlation and multiple regression analysis. The results were as follows. First, redistribution participation and cooperative lifestyle participation were relatively high. Second, intention to participate in sharing economy activities differs according to gender, age, monthly allowance, and SNS usage time. Third, intention to redistribution participation increases as the recognition of objectified digital culture capital, embodied digital culture capital, and social connectedness increases. And the intention to cooperative lifestyles participation and information sharing participation increased as digital culture capital increased. Forth, the most significant variable affecting the intention to participate in sharing economic activities was digital cultural capital.
  • 25.

    Methodology for Identifying Key Factors in Sentiment Analysis by Customer Characteristics Using Attention Mechanism

    LEE Kwang HO | Namgyu Kim | 2020, 25(3) | pp.207~218 | number of Cited : 0
    Abstract PDF
    Recently, due to the increase of online reviews and the development of analysis technology, the interest and demand for online review analysis continues to increase. However, previous studies have not considered the emotions contained in each vocabulary may differ from one reviewer to another. Therefore, this study first classifies the customer group according to the customer's grade, and presents the result of analyzing the difference by performing review analysis for each customer group. We found that the price factor had a significant influence on the evaluation of products for customers with high ratings. On the contrary, in the case of low-grade customers, the degree of correspondence between the contents introduced in the mall and the actual product significantly influenced the evaluation of the product. We expect that the proposed methodology can be effectively used to establish differentiated marketing strategies by identifying factors that affect product evaluation by customer group.
  • 26.

    Study on improvement of legislation for elderly welfare

    park | Sang-Ouk Noe | 2020, 25(3) | pp.219~227 | number of Cited : 0
    Abstract PDF
    It is expected that Korea will be entering with super aged society with its rapid changing to aging society compare to other developed countries. Such phenomenon is recognized from a long time ago and government has enacted Elderly Long Term Convalescence Insurance Regulation back in 1999. However, different from its actual purpose, there are many problems and improvements to be made, leading to legislative revision for several times. Still, it is left with many issues. This is one example showing there has been a continuous problem with elderly long term convalescence insurance system. Even this system in Germany which have started 4 years before us is to continuously revising regulation by raising issues to make strong structure for elderly welfare and long term convalescence, aiming to enhance life of elderly people by providing detailed standard for convalescence. Elderly related legal systematization may not enhance their welfare service or daily life right away. However, if details in regulation and its theory is systematically arranged, this will greatly reduce administrative confusion as well as increasing understanding and use of this system for the nation.
  • 27.

    The Mediating Effects of Social Support in Relationship Between Parental rearing Attitude and Teenagers' Mobile Phone Dependency

    Kyung-Suk Kim | 2020, 25(3) | pp.229~234 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to empirically analyze the structural relationship between parental rearing attitude, social support for teenagers and the mobile phone dependency. In this paper, we survey for teenagers in Gmetropolitan city and the collected data were analyzed using Amos 18.0. The results showed that the parental rearing attitude had a significant influence on social support for teenagers and also the parenting attitude and social support had a important effect on teenagers' mobile phone dependency. In addition, social support was found to have a mediating effect on the relationship between parental rearing attitude and teenagers' mobile phone dependency. Therefore, we resulted that parental rearing attitude and social supports were important variable factors to lower the teenagers' mobile phone dependency.
  • 28.

    A Moderating Effect of Use of Interaction Privacy Controls on the Relationship between Privacy Concerns and Self-disclosure

    Gimun Kim | 2020, 25(3) | pp.235~241 | number of Cited : 0
    Abstract PDF
    Many studies have tried to explain the privacy paradox but reported conflicting results; Some of them found connection between privacy concerns and information disclosure, while others did not. This study examines the role of interaction privacy controls (mainly friend lists and privacy settings) as a moderating variable that has the potential to affect the relationship in the SNS context. The reason for this is that most users use interactive privacy controls to create their own social environment before conducting SNS activities, so the relationship between privacy concerns and information disclosure may vary depending on the degree of use of interactive privacy controls. The study collected data using survey method, analyzed the moderating effect of use of interaction privacy controls using hierarchical multiple regression analysis, and as a result, found that effect. Therefore, the degree of use of interactive privacy controls may be an important contingent variable that needs to be considered in a study examining the privacy paradox in SNS context.
  • 29.

    A Study on the Improvement Scheme of University's Software Education

    Lee, Won Joo | 2020, 25(3) | pp.243~250 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an effective software education scheme for universities. The key idea of this software education scheme is to analyze software curriculum of QS world university rankings Top 10, SW-oriented university, and regional main national university. And based on the results, we propose five improvements for the effective SW education method of universities. The first is to enhance the adaptability of the industry by developing courses based on the SW developer's job analysis in the curriculum development process. Second, it is necessary to strengthen the curriculum of the 4th industrial revolution core technologies(cloud computing, big data, virtual/augmented reality, Internet of things, etc.) and integrate them with various fields such as medical, bio, sensor, human, and cognitive science. Third, programming language education should be included in software convergence course after basic syntax education to implement projects in various fields. In addition, the curriculum for developing system programming developers and back-end developers should be strengthened rather than application program developers. Fourth, it offers opportunities to participate in industrial projects by reinforcing courses such as capstone design and comprehensive design, which enables product-based self-directed learning. Fifth, it is necessary to develop university-specific curriculum based on local industry by reinforcing internship or industry-academic program that can acquire skills in local industry field.
  • 30.

    Understanding about Novice Learner’s Programming Conception by Prototype Theory

    Dong-Man Kim | Lee Taewuk | 2020, 25(3) | pp.251~260 | number of Cited : 1
    Abstract PDF
    In this paper, we propose to understand the conceptual structure of programming elements that learners form during the prototyping theory. To do this, we reviewed previous studies on the meaning of conception and prototype theory and conducted a course of problem-solving programming for 33 university students who had no prior experience in programming, and collected transcription materials through conceptual metaphorical writing. The conclusions of this study are as follows: 1) Identifying the conceptual structure of learners as a conceptual metaphor can enhance the effectiveness of programming education. 2) Learners need to reinforce the experience of forming abstract attributes to form mature programming concepts. 3) The concept of programming differs in the structure of multi-level concepts that students, teachers, and professional programmers have in each group. 4) Programming elements should intentionally block misconception risks in the meaning of symbols. 5) Concept evaluation tools should be developed to check whether various attributes can be applied.