Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2020, Vol.25, No.7

  • 1.

    Implementation of High Speed Image Data Transfer using XDMA

    Hyeok-Jin Gwon | Doo-Hyun Choi | 2020, 25(7) | pp.1~8 | number of Cited : 0
    Abstract PDF
    In this paper, we present an implementation of high speed image data transfer using XDMA for a video signal generation / acquisition device developed as a military test equipment. The technology proposed in this study obtains efficiency by replacing the method of copying data using the system buffer in the kernel area with the transmission and reception through the DMA engine in the FPGA. For this study, the device was developed as a PXIe platform in consideration of life cycle, and performance was maximized by using a low-cost FPGA considering mass productivity. The video I/O board implemented in this paper was tested by changing the AXI interface clock frequency and link speed through the existing memory copy method. In addition, the board was constructed using the DMA engine of the FPGA, and as a result, it was confirmed that the transfer speed was increased from 5~8Hz to 140Hz. The proposed method will contribute to strengthening defense capability by reducing the cost of device development using the PXIe platform and increasing the technology level.
  • 2.

    Implementation of Multiple Sensor Data Fusion Algorithm for Fire Detection System

    Jung Kyu Park | Nam Ki Hun | 2020, 25(7) | pp.9~16 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a prototype design and implementation of a fire detection algorithm using multiple sensors. The proposed topic detection system determines fire by applying rules based on data from multiple sensors. The fire takes about 3 to 5 minutes, which is the optimal time for fire detection. This means that timely identification of potential fires is important for fire management. However, current fire detection devices are very vulnerable to false alarms because they rely on a single sensor to detect smoke or heat. Recently, with the development of IoT technology, it is possible to integrate multiple sensors into a fire detector. In addition, the fire detector has been developed with a smart technology that can communicate with other objects and perform programmed tasks. The prototype was produced with a success rate of 90% and a false alarm rate of 10% based on 10 actual experiments.
  • 3.

    Application of AI based Chatbot Technology in the Industry

    Arum Park | Sae Bom Lee | Jaemin Song | 2020, 25(7) | pp.17~25 | number of Cited : 1
    Abstract PDF
    Based on the successful use of chatbot technology, this study examined what business values each company is creating. The chatbot service contributes to improving the productivity of the company by helping to answer or respond to the questions of employees inside the company or customers. And in the field of education, Instead of instructor, AI technology responds the questions and feedback of the students to reduce the work of the instructor. In the field of commerce, offline stores provide convenient and new purchasing experiences to customers by providing product purchasing services through artificial intelligence speakers and personalization service. Although chatbot service is creating business value in some business cases, it is still limited to the process of a specific company, and the spread rate is still slowing because the service scope, convenience, and usefulness are not greater than expected. Therefore, some chatbot development service providers is providing an integrated development platform to improve usability, Chatbots have the features and advantages of providing convenience instead of answering human questions. However, there is a disadvantage that the level of communication can be lowered by reducing various human subjective views and giving mainly objective answers. Through this study, we will discuss the characteristics, advantages and disadvantages of chatbot services by comparing them
  • 4.

    A Comparative Study on Requirements Analysis Techniques using Natural Language Processing and Machine Learning

    Byung-Sun Cho | Seok-Won Lee | 2020, 25(7) | pp.27~37 | number of Cited : 0
    Abstract PDF
    In this paper, we propose the methodology based on data-driven approach using Natural Language Processing and Machine Learning for classifying requirements into functional requirements and non-functional requirements. Through the analysis of the results of the requirements classification, we have learned that the trained models derived from requirements classification with data-preprocessing and classification algorithm based on the characteristics and information of existing requirements that used term weights based on TF and IDF outperformed the results that used stemming and stop words to classify the requirements into functional and non-functional requirements. This observation also shows that the term weight calculated without removal of the stemming and stop words influenced the results positively. Furthermore, we investigate an optimized method for the study of classifying software requirements into functional and non-functional requirements.
  • 5.

    Utilization of Simulation and Machine Learning to Analyze and Predict Win Rates of the Characters Battle

    Hyun-Syug Kang | 2020, 25(7) | pp.39~46 | number of Cited : 0
    Abstract PDF
    Recently, for designing virtual characters in the battle game field effectively, some methods are very needed to predicate the win rates of the battle of them efficiently. In this paper, we propose a method to solve this problem by combining simulation and machine learning. Firstly, a simulation is used to analyze the win rates of the battle of virtual characters in the battle game. In addition, we apply a regression model based machine learning scheme to predict win rates of the battle of virtual characters according to their abilities. Our experimental results using suggested method show that it is almost no difference between the win rates of the simulation and the prediction results using the machine learning scheme. And also, we can obtain good performance in the experiment using only simple regression based machine learning model.
  • 6.

    Multi-scale face detector using anchor free method

    Dong-Ryeol Lee | Kim, yoon | 2020, 25(7) | pp.47~55 | number of Cited : 0
    Abstract PDF
    In this paper, we propose one stage multi-scale face detector based Fully Convolution Network using anchor free method. Recently almost all state-of-the-art face detectors which predict location of faces using anchor-based methods rely on pre-defined anchor boxes. However this face detectors need to hyper-parameters and additional computation in training. The key idea of the proposed method is to eliminate hyper-parameters and additional computation using anchor free method. To do this, we apply two ideas. First, by eliminating the pre-defined set of anchor boxes, we avoid the additional computation and hyper-parameters related to anchor boxes. Second, our detector predicts location of faces using multi-feature maps to reduce foreground/background imbalance issue. Through Quantitative evaluation, the performance of the proposed method is evaluated and analyzed. Experimental results on the FDDB dataset demonstrate the effective of our proposed method.
  • 7.

    Scalable Re-detection for Correlation Filter in Visual Tracking

    Ka-Young Park | 2020, 25(7) | pp.57~64 | number of Cited : 0
    Abstract PDF
    In this paper, we propose an scalable re-detection for correlation filter in visual tracking. In real world, there are lots of target disappearances and reappearances during tracking, thus failure detection and re-detection methods are needed. One of the important point for re-detection is that a searching area must be large enough to find the missing target. For robust visual tracking, we adopt kernelized correlation filter as a baseline. Correlation filters have been extensively studied for visual object tracking in recent years. However conventional correlation filters detect the target in the same size area with the trained filter which is only 2 to 3 times larger than the target. When the target is disappeared for a long time, we need to search a wide area to re-detect the target. Proposed algorithm can search the target in a scalable area, hence the searching area is expanded by 2% in every frame from the target loss. Four datasets are used for experiments and both qualitative and quantitative results are shown in this paper. Our algorithm succeed the target re-detection in challenging datasets while conventional correlation filter fails.
  • 8.

    A Study on the Development Direction and Cognition of Viral Video

    Lee,Yong-Hwan | 2020, 25(7) | pp.65~73 | number of Cited : 0
    Abstract PDF
    Viral video advertising is being used in the advertising and film industry for pre-promotion of certain products or pre-release films which has a lot of effect on investment. An analysis of viral video recognition is needed to predict future development directions. In response, the study conducted a survey on viral videos, focusing on college students in their 20s, who are the most exposed to advertisements and movies. Through this, the survey was conducted on recognition of viral videos, memorable viral videos, satisfaction level, message propagation method, positiveness of viral videos, expected future development, and desired viral video type. The survey showed that viral video recognition was 16.7% and the most memorable viral video; the "Let it Go" viral video from the movie "Frozen" was 69.1 %, according to the survey. The satisfaction level was not high at 31.2 %, and 73.5% of people sent messages to others after watching viral videos, which was very high. Negative opinions on viral videos were low at 13.7 %. 64.5% of the surveyors said the future of the viral videos would "develop" and 6.7% said would “not develop."
  • 9.

    Analysis of D2D Utility Function with the Interference Majorization

    Oh Chang Yoon | 2020, 25(7) | pp.75~83 | number of Cited : 0
    Abstract PDF
    We consider the D2D utility optimization problem in the cellular system. More specifically, we develop a concave function decision rule which reduces the complexity of non-convex optimization problem. Typically, utility function, which is a function of the signal and the interference, is non-convex. In this paper, we analyze the utility function from the interference perspective. We introduce the ‘relative interference’ and the ‘interference majorization’. The relative interference captures the level of interference at D2D receiver’s perspective. The interference majorization approximates the interference by applying the major interference. Accordingly, we propose a concave function decision rule, and the corresponding convex optimization solution. Simulation results show that the utility function is concave when the relative interference is less than 0.1, which is a typical D2D usage scenario. We also show that the proposed convex optimization solution can be applied for such relative interference cases.
  • 10.

    An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

    Sunghyun Jee | 2020, 25(7) | pp.85~92 | number of Cited : 0
    Abstract PDF
    Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability
  • 11.

    Certificate Revocation Scheme based on the Blockchain for Vehicular Communications

    HYUNGON KIM | 2020, 25(7) | pp.93~101 | number of Cited : 0
    Abstract PDF
    Regional CRL(certificate revocation list) in vehicular communications is to partition Full CRL into several small CRLs according to geographic location to keep the size of individual CRLs with smaller. However, since a Regional CRL includes vehicle’s revoked certificates within its administrative region, it has to know vehicle’ location. For this, how to know vehicle’ location effectively corresponding to every region represents a major challenge. This paper proposes a Regional CRL scheme which is envisioned to achieve vehicle’s location and to make regional CRLs according to vehicles current location efficiently. The scheme is based on the short-lived pseudonyms defined by WAVE standard. It also acquires issued pseudonyms, vehicle’s id and region information whenever a vehicle initiates pseudonyms refill after that, utilizes them to create and distribute the Regional CRL. To keep location privacy-preserving for vehicles, the scheme uses the blockchain technology in the network. The analysis results show that it reduces CRL size and database query time for finding revoked certificates sharply in the vehicle’s on-board unit.
  • 12.

    The identification of optimal data range for the discrimination between won and lost

    Doryung Han | Hyongjun Choi | 2020, 25(7) | pp.103~111 | number of Cited : 0
    Abstract PDF
    Performance indicators have often investigated and developed in order to identify foundational elements and factors for an enhancement of performance in sports. In order to identify the valid performance indicators it is important that the indicators used within a performance analysis system discriminate between the winning and losing performances within a match (Hughes and Bartlett, 2002). However, the performance indicators proposed in research studies on basketball performance have not been used for real-time analysis and feedback within a coaching context. Such real-time support for the coach and players has been described within research on other sports (Choi et al., 2004; O'Donoghue, 2001; Palmer et al., 1997). Within the process of real-time feedback, the identification of relevant performance indicators that distinguish winning and losing performances should be the first stage of the development of a real-time analysis system. Therefore, this study investigated the differences between winning and losing teams in terms of a set of performance indicators gathered during the analysis of 10 English National Basketball League matches. Winning and losing teams were compared using whole match data (N=10) as well as individual quarters (N=40). A series of Wilcoxon Signed Ranks tests was used to identify the relevant performance indicators that discriminate between winning and losing performers within whole matches and individual quarters. The tests found that 3 point shots made (p<0.05) and Assists (p<0.05) were significantly different between winning and losing teams within matches. However, 2 point shots made (p<0.05), 2 point shots attempted (P<0.05), percentages of 2 point shots scored (p<0.05), 3 point shots made (p<0.05), Defensive Rebounds (p<0.05) and Assists (p<0.05) were significantly different between winning and losing performance within quarters. The analysis task should be based on relevant performance indicators which explain the current performances to performance analysts and coaches. Within a real-time analysis and feedback scenario, this will have the additional benefit of supporting a decision based on immediate performance within the most recent quarter. Consequently, the real-time analysis system would use performance indicators which have the property of construct validity to support the decisions of the coach
  • 13.

    A Literature Survey of Machine Learning Based Obstructive Sleep Apnea Diagnosis Research

    Seo-Yeong Kim | Seo, Youngkyun | 2020, 25(7) | pp.113~123 | number of Cited : 0
    Abstract PDF
    Obstructive sleep apnea (OSA) among sleep disorders is one of relatively common diseases. Patients can be checked for the disease through sleep polysomnography. However, as far as he diagnosis of OSA using polysomnography (PSG) is concerned, many practical problems such as an increasing number of patients, expensive testing cost, discomfort during examination, and the limited number of people for testing have been pointed out. Accordingly, for the purpose of substituting PSG researchers have been actively conducting studies on OSA diagnosis based on machine learning using bio signals. In this regard, we review a rich body of existing OSA diagnosis studies applying machine learning techniques based on bio-signal data. As a result, this paper presents a novel taxonomy of the reviewed studies and provides their comprehensive comparative analysis results. Also, we reveal various limitations of the studies using the bio signals and suggest several improvements about utilization of the used machine learning methods. Finally, this paper presents future research topics related to the application of machine learning techniques using bio signals.
  • 14.

    Analyzing the Type of Recognition for College Students’ Department Jumpers

    Cha Su Joung | 2020, 25(7) | pp.125~134 | number of Cited : 0
    Abstract PDF
    In this study, Q methodology was applied to investigate the subjective evaluation of department jumpers and characteristics of each type of recognition for college students. As a result of analyzing, they were classified into three types. Type 1 was recognized that the department jumper plays a role of giving a sense of belonging to the department and promoting the department. In addition, it was analyzed that wearing a department jumper would be cautious, but the activities were comfortable and people around me gave good evaluations and thought it had the effect of enhancing my confidence. In the case of type 2, the department jumper was satisfied because it was an easy-to-work and non-fashionable design, and was always worn when going to university. Type 3 was a type that gives a sense of belonging when wearing the department jumper, and that it was good for the department jumper to follow the fashion. It is thought that a department jumper with a good fit should be developed by reflecting the physical characteristics, showing the image or symbolism, so that the department jumper of college students can function as a uniform.
  • 15.

    Analysis of different types of turnovers between winning and losing performances in men’s NCAA basketball

    Doryung Han | Mark Hawkins | Hyongjun Choi | 2020, 25(7) | pp.135~142 | number of Cited : 0
    Abstract PDF
    Basketball is a highly complex sport, analyses offensive and defensive rebounds, free throw percentages, minutes played and an efficiency rating. These statistics can have a large bearing and provide a lot of pressure on players as their every move can be analysed. Performance analysis in sport is a vital way of being able to track a team or individuals performance and more commonly used resource for player and team development. Discovering information such as this proves the importance of these types of analysis as with post competition video analysis a coach can reach a far more accurate analysis of the game leading to the ability to coach and correct the exact requirements of the team instead of their perceptions. A significant difference was found between winning and losing performances for different types of turnovers supporting current research that states that turnovers are not a valid predictor of match outcomes and that there is no specific type of turnover which can predict the outcome of a match as briefly mentioned in Curz and Tavares (1998). Significant differences were found between winning and tied and losing and tied performance for some types of turnovers, however due to the lack of data collected in this area they cannot be considered valid. Further research could also be conducted in other areas relating to performance indicators where there is currently minimal research in some areas such as assisted baskets, stated about the performance indicators in their own study the performance indicators are inadequate for explaining the complexities of the game suggesting that one indicator will not be constant in every game an research into performance analysis areas would be more appropriate.
  • 16.

    Worker-Driven Service Development Tool for Smart Factory

    Jin-Heung Lee | 2020, 25(7) | pp.143~150 | number of Cited : 0
    Abstract PDF
    Recently, many companies are interested in smart factory services. Because various smart factory services are provided by the combination of mobile devices, cloud computing, and IoT services. However, many workers turn away from these systems because most of them are not implemented from the worker's point of view. To solve this, we implemented a development tool that allows field workers to produce their own services so that workers can easily create smart factory services. Manufacturing data is collected in real time from sensors which are connected to manufacturing facilities and stored within smart factory platforms. Implemented development tools can produce services such as monitoring, processing, analysis, and control of manufacturing data in drag-and-drop. The implemented system is effective for small manufacturing companies because of their environment: making various services quickly according to the company’s purpose. In addition, it is assumed that this also will help workers' improve operation skills on running smart factories and fostering smart factory capable personnel.
  • 17.

    Comparing the Effectiveness Between Typical Infant CPR method and Over-head CPR method : A Study of the Single-Person Rescuer Simulation Using a Manikin

    Choi Sung Soo | Han Seung Tae | Seong-Woo Yun | 2020, 25(7) | pp.151~157 | number of Cited : 0
    Abstract PDF
    This study is to find out the effectiveness by Infant CPR method of a single rescuer. It was conducted for 51 general public. And typical infant CPR method by a single rescuer and a new method, CPR with two thumb chest compressions wrapped in both hands over the head were compared. SPSS 22.0 was used as an analysis method and to compare the both CPR methods, Paired t-test was used. As a result of the study, the average chest compression depth(39.38±1.07 mm) by CPR with two thumb chest compressions wrapped in both hands over the head was significantly high(p<0.001). Ease of mouth-to-mouth resuscitation(p<0.001), convenience of CPR method( p<0.001), and finger pain level(p<0.001) had a significant difference. As for the preference of the CPR method, 80.4%(41 people) preferred CPR with two thumb chest compressions wrapped in both hands over the head. In this study, CPR with two thumb chest compressions wrapped in both hands over the head showed more effective results than typical CPR method. However, as a virtual study using mannequins, further research is needed to apply high-quality CPR methods to field.
  • 18.

    Determinants of Asymmetric Cost Behavior : focusing on Managerial Optimistic Bias, Manager’s Ownership

    JANG JI KYUNG | 2020, 25(7) | pp.159~165 | number of Cited : 1
    Abstract PDF
    With respect to the cause of asymmetric cost behavior, there are two streams of the literature. One stream focused on effect of managerial expectation and the other explained using agency system. In this study, we aim to investigate the determinants of asymmetric cost behavior in these streams. We first examine the impact of managerial overconfidence and optimistic bias on asymmetric cost. We also examine ownership ratio as a proxy of the quality of corporate governance effects on asymmetric cost. The results are as follows. First, firms have the anti-sticky asymmetric cost behavior. Second, we find that the firms with managerial optimistic bias mitigate the degree of asymmetric cost. This finding implies that managerial optimism is a factor that alters asymmetric cost behavior. Third, the degree of asymmetric cost is weaker in case of firms with higher manager’s ownership. This result provides an important empirical evidence for understanding the role of corporate governance in cost behavior.
  • 19.

    Comparative Analysis of News Articles related to Airlines and Staff the Previous Corona19(2019) and After Corona19(2020)

    kim | Kwon Choong Hoon | 2020, 25(7) | pp.167~173 | number of Cited : 2
    Abstract PDF
    This study aims to analyze the number and trend of news media news through timely analysis of how the articles about airlines and employees show changes before and after Corona19 in the situation where the world economy faces various problems due to the global pandemic of Corona19. For this purpose, the number of articles and trends related to airlines and employees were analyzed and visualized before and after Corona19 using the Korea Press Foundation Bigkinds news analysis service. For this purpose, the Bigkinds service system was extracted from January 1, 2019 to May 31, 2019 and from January 1, 2020 to May 31, 2020. The results of the analysis showed that the number of articles before and after Corona 19 exploded when aviation related events occurred. And it was confirmed that the trend is changing due to the restructuring news. Government and airlines will need to make active efforts to overcome the crisis in the aviation industry due to the impact of Corona 19. The results of this study are significant in that it analyzed the number and trends related to news articles before and after Corona 19, and suggested practical implications for establishing strategies for the future impacts on airlines and employees.
  • 20.

    Combining Independent Permutation p-Values Associated with Multi-Sample Location Test Data

    Um, Yonghwan | 2020, 25(7) | pp.175~182 | number of Cited : 0
    Abstract PDF
    Fisher’s classical method for combining independent p-values from continuous distributions is widely used but it is known to be inadequate for combining p-values from discrete probability distributions. Instead, the discrete analog of Fisher’s classical method is used as an alternative for combining p-values from discrete distributions. In this paper, firstly we obtain p-values from discrete probability distributions associated with multi-sample location test data (Fisher-Pitman test and Kruskall-Wallis test data) by permutation method, and secondly combine the permutaion p-values by the discrete analog of Fisher’s classical method. And we finally compare the combined p-values from both the discrete analog of Fisher’s classical method and Fisher’s classical method
  • 21.

    Analysis of Major Changes in Press Articles Related to ‘High School Credit System’

    Kwon Choong Hoon | 2020, 25(7) | pp.183~191 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to objectively analyze the trend of media articles related to the 'high school credit system' (2017~2019: 3 years), which has become the biggest concern among Korean education policies, through BIGKinds, a news data big data analysis service for media companies. The main research methodologies were BIGKinds system's specific search term news search, news trend analysis, keyword extraction and wordcloud implementation, network analysis and network picture presentation. The research results are as follows; First, the number of articles related to the high school credit system that appeared in major media outlets in Korea for 3 years from 2017 to 2019 was 3,649. The number of articles was sharply increased at a certain point about 4 times, based on the government's announcement of related policies. It showed an increasing news trend. Second, the top 20 keywords that emerged from the press articles related to the high school credit system for 3 years of analysis were presented, and it was confirmed that the keyword change by year appeared. Third, the network of media articles related to the high school credit system was visualized and presented in different ways by person, institution, and keyword. The results of this study confirmed that the high school credit system education policy was adopted as the representative education policy of the Moon Jae-in government, and is proceeding in the policy decision stage and policy implementation stage.
  • 22.

    The Effect of Job Stress and Job Exhaustion on Job Performance of Body Guards and Security Guards due to Organizational Culture

    Kim, Sang-Jin | 2020, 25(7) | pp.193~202 | number of Cited : 1
    Abstract PDF
    This study conducted a questionnaire survey of 320 security guards to investigate the effects of job stress and job exhaustion on job performance according to the bodyguard's organizational culture. The conclusions obtained through this study are as follows. First, in the organizational culture, the innovation culture was found to have a negative effect on the job stress at the .01 level. Second, organizational culture was found to have no direct effect on job performance. Third, among organizational cultures, market culture was found to have a statistically negative effect on job performance at the .01 level. Fourth, job stress was found to affect job performance statistically as a negative (-) at .001 level. Fifth, job exhaustion was found to affect job performance statistically as negative (-) at .001 level. Sixth, job stress was found to have a mediating effect as negative (-) at the .01 level statistically in relation to the innovation culture of organizational culture and job performance. Seventh, job exhaustion was found to have no statistically significant effect on the relationship between organizational culture and job performance.
  • 23.

    The Impact of New Logistics Factors on the Intention of use and Consumer Happiness: Focusing on the Mediating Effect of Perceived Benefits

    JIA MENG | LIU ZIYANG | CUI DONG | 2020, 25(7) | pp.203~211 | number of Cited : 0
    Abstract PDF
    This purpose of this study is to verity the impact of new logistics factors on the Intention of use and consumer happiness, the mediating effect of perceived benefits, and provide suggestions on how to improve the level of new distribution. Based on the previous theories of online experience, off-line experience, logistics experience, perceived benefits, Intention of use and consumer happiness, the study puts forward 6 key research hypotheses. Reliability and validity tests were carried out by using data collected on new logistics factors on the Intention of use and consumer happiness. The hypotheses are verified through structural equation modelling. The study on the impact of new logistics factors on the Intention of use and consumer happiness and the mediating effect of perceived benefits, indicates that online experience, off-line experience, logistics experience have positive effects on perceived benefits, the perceived benefits has positive effects on Intention of use and consumer happiness, and the Intention of use has positive effects on consumer happiness. Moreover, perceived benefits as the mediating variable have effects on the relationship between online experience, off-line experience, logistics experience and the Intention of use and consumer happiness. The study extended the existing previous studies to provide theoretical and practical implications by verifying the relationship between new logistics factors and the Intention of use and consumer happiness.
  • 24.

    Effects of Programming-based TPACK Education Program on the Teaching Expertise of Pre-service Teachers

    Seong-Won Kim | Lee Youngjun | 2020, 25(7) | pp.213~224 | number of Cited : 0
    Abstract PDF
    This study analyzes the effects of programming-based TPACK education programs, designed by Kim and Lee (2019), on the teaching expertise of pre-service teachers. The research subjects were 40 pre-service teachers, divided into an experimental group and a control group. The experimental group underwent the programming-based TPACK education program, and the control group used an ICT-based TPACK education program. A test tool was used to measure not only teaching expertise but also teaching efficacy and self-efficacy beliefs about technology integration. As a result of the study, teaching expertise, teaching efficacy, and self-efficacy beliefs about technology integration improved significantly in the experimental group. The pretest showed no significant difference between the experimental group and the control group, but in the post-test, the experimental group showed significantly higher teaching expertise than the control group. These results showed that the programming-based TPACK education program is effective for developing teaching expertise in pre-service teachers.
  • 25.

    Application of Programming based TPACK Education Program to Increase TPACK of Pre-service Teachers

    Seong-Won Kim | 2020, 25(7) | pp.225~237 | number of Cited : 0
    Abstract PDF
    This study verified the effects that a programming-based TPACK education program, through design-based research on TPACK, had on pre-service teachers. The research subjects were pre-service teachers attending teacher training at a university in Korea, and 129 control groups and 126 experimental groups were recruited through lectures. The treatment used a TPACK educational program developed in a design-based study (Kim & Lee, 2019). A TPACK test tool developed by Park and Kang (2014) was used. The test results were analyzed via independent sample t-test and paired sample t-test. The results show that the programming-based TPACK education program (first cycle) was only effective in improving TPK and TPACK, but an effective educational program was developed to improve PCK, TCK, TK (second cycle), PK (third cycle), and CK (final cycle). This design-based research therefore confirmed the development of a programming-based TPACK education program that was effective for improving the TPACK of pre-service teachers.