Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

http://journal.kci.go.kr/jksci
Home > Explore Content > All Issues > Article List

2020, Vol.25, No.11

  • 1.

    IoT-based Smart Greenhouse System

    Jeong-Min Rho , Jae-Yeon Kang , Kyeong-Yeon Kim and 2 other persons | 2020, 25(11) | pp.1~8 | number of Cited : 1
    Abstract PDF
    In this paper, we proposed a smart greenhouse system that can easily grow plants indoors without professional knowledge by using the criteria of factors affected by common plants (temperature, humidity, soil humidity), and implemented a system that can check the greenhouse state in real time and control the device remotely through mobile applications. Based on Raspberry pie and Arduino, the system measures the state of greenhouse in real time through sensors and automatically controls the device. After growing and experimenting with plants in a greenhouse for a certain period of time, it was confirmed that the environment suitable for each plant was maintained. Therefore, the smart greenhouse system in this paper is expected to improve plant cultivation efficiency and user convenience and also increase beginners' access to plants.
  • 2.

    Implementation of JDAM virtual training function using machine learning

    Eun-Kyung You , Chan-Gyu Bae , Kim, Hyeock-Jin | 2020, 25(11) | pp.9~16 | number of Cited : 0
    Abstract PDF
    The TA-50 aircraft is conducting simulated training on various situations, including air-to-air and air-to-ground fire training, in preparation for air warfare. It is also used for pilot training before actual deployment. However, the TA-50 does not have the ability to operate smart weapon forces, limiting training. Therefore, the purpose of this study is to implement the TA-50 aircraft to enable virtual training of one of the smart weapons, the Point Direct Attack Munition (JDAM). First, JDAM functions implemented in FA-50 aircraft, a model similar to TA-50 aircraft, were analyzed. In addition, since functions implemented in FA-50 aircraft cannot be directly utilized by source code, algorithms were extracted using machine learning techniques(TensorFlow). The implementation of this function is expected to enable realistic training without actually having to be armed. Finally, based on the results of this study, we would like to propose ways to supplement the limitations of the research so that it can be implemented in the same way as it is.
  • 3.

    Remotely Controllable Smart Mobile System Using Arduino and Raspberry Pi for Infants

    Hyun-Wook Park , Young-Weon Shin , Jin-Yeob Kim and 1 other persons | 2020, 25(11) | pp.17~25 | number of Cited : 1
    Abstract PDF
    In this paper, we deal with a system that provides temperature, humidity and fine dust data around infants to parents through Arduino and Raspberry Pi. It controls the operation of the mobiles remotely through applications. Android applications can perform the following functions. First, the infant's surrounding temperature, humidity and fine dust data are received. Second, mobile controls the smart mobile remotely. Third, recording and playing the voices of parents and enhancing the convenience of parenting. Through the experiment of measuring the operating time of the remote control module, it was confirmed that the application can quickly access the system. Existing products on the market do not provide environmental information around the infants and application that has various functions. The system covered in this paper is expected to improve child-rearing convenience by providing parents environmental information around infants, remotely controllable function and convenient functions of the application.
  • 4.

    The Ability of L2 LSTM Language Models to Learn the Filler-Gap Dependency

    Euhee Kim | 2020, 25(11) | pp.27~40 | number of Cited : 3
    Abstract PDF
    In this paper, we investigate the correlation between the amount of English sentences that Korean English learners (L2ers) are exposed to and their sentence processing patterns by examining what Long Short-Term Memory (LSTM) language models (LMs) can learn about implicit syntactic relationship: that is, the filler–gap dependency. The filler–gap dependency refers to a relationship between a (wh-)filler, which is a wh-phrase like ‘what’ or ‘who’ overtly in clause-peripheral position, and its gap in clause-internal position, which is an invisible, empty syntactic position to be filled by the (wh-)filler for proper interpretation. Here to implement L2ers’ English learning, we build LSTM LMs that in turn learn a subset of the known restrictions on the filler-gap dependency from English sentences in the L2 corpus that L2ers can potentially encounter in their English learning. Examining LSTM LMs’ behaviors on controlled sentences designed with the filler-gap dependency, we show the characteristics of L2ers' sentence processing using the information-theoretic metric of surprisal that quantifies violations of the filler-gap dependency or wh-licensing interaction effects. Furthermore, comparing L2ers’ LMs with native speakers’ LM in light of processing the filler-gap dependency, we not only note that in their sentence processing both L2ers’ LM and native speakers’ LM can track abstract syntactic structures involved in the filler-gap dependency, but also show using linear mixed-effects regression models that there exist significant differences between them in processing such a dependency.
  • 5.

    Exploring the Feature Selection Method for Effective Opinion Mining: Emphasis on Particle Swarm Optimization Algorithms

    Kyun Sun Eo , LEE, KUN CHANG | 2020, 25(11) | pp.41~50 | number of Cited : 0
    Abstract PDF
    Sentimental analysis begins with the search for words that determine the sentimentality inherent in data. Managers can understand market sentimentality by analyzing a number of relevant sentiment words which consumers usually tend to use. In this study, we propose exploring performance of feature selection methods embedded with Particle Swarm Optimization Multi Objectives Evolutionary Algorithms. The performance of the feature selection methods was benchmarked with machine learning classifiers such as Decision Tree, Naive Bayesian Network, Support Vector Machine, Random Forest, Bagging, Random Subspace, and Rotation Forest. Our empirical results of opinion mining revealed that the number of features was significantly reduced and the performance was not hurt. In specific, the Support Vector Machine showed the highest accuracy. Random subspace produced the best AUC results.
  • 6.

    Database PasS web service system using Docker

    Tai-Sung Hur | 2020, 25(11) | pp.51~58 | number of Cited : 1
    Abstract PDF
    Most of the students in computer-related departments work on projects, and it is essential to use a database for project execution. To use such a database, it is necessary to install a Database Management System. However, it takes several minutes (hours) to install a DBMS, and some DBMS require a difficult installation process. Therefore, in order to solve this problem, this study proposed a system that can easily install DBMS using Docker. Docker is an open source project that automates the deployment of Linux applications into software containers. Docker Container is wrapped in a complete file system that includes everything necessary for the execution of software, and includes code, runtime, system tools, system libraries, and anything that is installed on the server. This guarantees that they will always run the same regardless of the environment in which they are running. After creating a database using this proposed system, you can check the database access information on the web and check the server status in minutes. As a result of of implementing this proposed system and applying it to the projects of 10 teams, the installation time was reduced by 94.5% for Maria DBMS and 98.3% for Oracle DBMS than individual installation, confirming improved efficiency.
  • 7.

    Design of 3D Oculus VR Action Game using Silhouette Outline

    Ho-Ryel Kim , Chang-Min Han , SYUNGOG AN and 1 other persons | 2020, 25(11) | pp.59~65 | number of Cited : 0
    Abstract PDF
    Lately the VR (Virtual Reality) game genre is becoming increasingly more popular and it has been cementing its place in the market as its own independent game genre. The key advantage of VR is that it lowers the barrier between player and the virtual world, thus creating an immersive experience. The suggested method develops a game that allows the player to experience what it is like to be visually impaired using the unique characteristics of VR. A distinctive feature of this game is that the character is provided only a limited range of sight, which is created using silhouette outlines. This restrictive visual field is then grafted onto VR and the player can indirectly experience blindness in a highly immersive manner. The silhouette outline along with the particle system is created using Oculus Rift, a headset highly used in VR game development, and Unity 3D game engine. We will also explain in detail regarding the removal of borders between the objects.
  • 8.

    A Study on the Educational Plan First Person Storytelling of Realistic Content

    Seo Hyun Kyung | 2020, 25(11) | pp.67~74 | number of Cited : 1
    Abstract PDF
    In this paper, we propose to present a storytelling education plan for the development of realistic content. The need is emerging in the content industry for realistic content along with technological convergence as development of media technology. This phenomenon is being accelerated by COVID-19. In 2019, the government set up strategies to secure future growth engines, announced "three major innovation strategies" in the content industry, and emphasized "fostering leading realistic content." Realistic content is a content that users can experience directly. It is first-person storytelling that should be dealt with as important as the development of technology in the production of realistic content. In this paper, the results of storytelling classes conducted at the actual educational site are analyzed, and the difference from the first-person perspective commonly used in traditional literary works is described. Through this, we present effective teaching methods that can be used to develop realistic content.
  • 9.

    Training in the production of effective prototypes using Core Mechanic Diagram and Unreal Blueprint

    choi buho | 2020, 25(11) | pp.75~82 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a training method to efficiently create prototypes using 'core mechanical diagram' to make game design easier and 'BluePrint', a visual scripting tool of Unreal that enables relatively easy functionality without programming knowledge. With the development of game engines, game development is becoming faster and easier, and using this, non-programmers without knowledge of game development are clearly showing a tendency to participate in game development. However, existing game development methodologies and game implementation methods require complex design processes and specialized knowledge. In order to make it easier for non-programming experts to develop games, they will simplify the complexity of existing game development methodologies, and propose educational methods that can focus on and implement the essence of game design based on cases where non-programmers have implemented prototypes themselves.
  • 10.

    An Efficient Wireless Sensor Network Design considering the different preamble detection capability

    Young-myoung Kang | 2020, 25(11) | pp.83~88 | number of Cited : 0
    Abstract PDF
    This paper proposes a method of applying an advanced preamble detection technology to wireless sensor nodes and analyzes the trade-off relationship between throughput and fairness that may occur when sensor nodes equipped with the MIM function compete with the legacy IEEE 802.15.4 sensors. Sensor nodes employing the MIM capability have more chances of concurrent transmissions than the legacy IEEE 802.15.4-based sensor nodes, resulting in gains in terms of throughput, whereas the transmission opportunities of 802.15.4 sensor nodes might be limited due to the additional simultaneous transmissions of the MIM sensor nodes. The extensive evaluation results performed under a test environment built using Python program with reflecting the setting value of a commercial sensor node shows MIM sensor nodes outperform up to 40% over the legacy 802.11 sensors. Meanwhile, it was confirmed that a balance can be achieved in terms of throughput and fairness by properly adjusting the concurrent transmission threshold.
  • 11.

    Beamforming Training for Asymmetric Links in IEEE 802.11ay: Implementation and Performance Evaluation

    Yena Kim | 2020, 25(11) | pp.89~95 | number of Cited : 0
    Abstract PDF
    In this paper, we present Beamforming (BF) Training (BFT) for asymmetric links in IEEE 802.11ay. IEEE 802.11ay introduced BFT for asymmetric links that aims to increase the BFT success probability for Station (STA) with insufficient link budget to communicate with an Access Point (AP). BFT for asymmetric links utilizes directional BFT allocation to avoid the usage of quasi-omni pattern at the AP side, and thus to increase STA's BFT success rate. However, there are no publicly available simulation tools supporting IEEE 802.11ay. For these reasons, we present in this paper an implementation of BFT for asymmetric links in ns-3 with its novel techniques such as Training RX (TRN-R) subfield and BFT allocation. We then evaluate by simulation the performance of BFT for asymmetric links.
  • 12.

    Study to safely transmit encrypted images from various noises in space environment

    Ki-Hawn Kim , Hoon-Jae Lee | 2020, 25(11) | pp.97~104 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a random number generator PP(PingPong256) and a shuffle technique to improve the problem that the encrypted image is damaged due to a lot of noise by the channel coding of wireless communication recommended in the special environment of space. The PP can constantly generate random numbers by entering an initial value of 512 bits. Random numbers can be encrypted through images and exclusive logical computations. Random numbers can be encrypted through images and exclusive logical computations. The shuffle technique randomly rearranges the image pixel positions while synchronizing the image pixel position and the random number array position and moving the random number arrangement in ascending order. Therefore, the use of PP and shuffle techniques in channel coding allows all pixels to be finely distributed and transmit high-quality images even in poor transmission environments.
  • 13.

    Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

    Tae-Keun Park , Jong-Geun Park , Keewon Kim | 2020, 25(11) | pp.105~114 | number of Cited : 2
    Abstract PDF
    In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization’s defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.
  • 14.

    MES system based on real-time process capability managemen

    Jin-Su Han | 2020, 25(11) | pp.115~122 | number of Cited : 2
    Abstract PDF
    In this paper, we propose an MES system based on real-time process capability management and how to manage the manufacturing process using the system. The current MES system presents a KPI report that makes it easy to recognize the manufacturing site, but has not been able to derive an improvement method to improve the actual manufacturing site KPI. In other words, it is difficult to extract the cause of the increase in defective rate, decrease in yield, and increase in production lead-time, and to draw an improvement plan and apply it to the manufacturing site. The purpose of the MES system based on real-time process capability management proposed in this paper is to establish an manufacturing operation management system that overcomes the limitations of the existing MES by managing the distribution of major factors of the equipment that determines the process capability. In addition, by presenting a speed improvement method for real-time large-capacity data processing, it is intended to be applied so that the system can operate well.
  • 15.

    The Next Generation Malware Information Collection Architecture for Cybercrime Investigation

    Ho Mook Cho , Chang-Su Bae , Jaehoon Jang and 1 other persons | 2020, 25(11) | pp.123~129 | number of Cited : 1
    Abstract PDF
    Recently, cybercrime has become increasingly difficult to track by applying new technologies such as virtualization technology and distribution tracking avoidance. etc. Therefore, there is a limit to the technology of tracking distributors based on malicious code information through static and dynamic analysis methods. In addition, in the field of cyber investigation, it is more important to track down malicious code distributors than to analyze malicious codes themselves. Accordingly, in this paper, we propose a next-generation malicious code information collection architecture to efficiently track down malicious code distributors by converging traditional analysis methods and recent information collection methods such as OSINT and Intelligence. The architecture we propose in this paper is based on the differences between the existing malicious code analysis system and the investigation point's analysis system, which relates the necessary elemental technologies from the perspective of cybercrime. Thus, the proposed architecture could be a key approach to tracking distributors in cyber criminal investigations.
  • 16.

    Automatic malware variant generation framework using Disassembly and Code Modification

    LEEJONGLAK , 원일용 | 2020, 25(11) | pp.131~138 | number of Cited : 0
    Abstract PDF
    Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.
  • 17.

    User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment

    Eun-Gyeom Jang | 2020, 25(11) | pp.139~146 | number of Cited : 3
    Abstract PDF
    Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.
  • 18.

    A Study on the Standardization of System Support Software in the Combat Management System

    Young-Dong Heo | 2020, 25(11) | pp.147~155 | number of Cited : 2
    Abstract PDF
    System support software is one of the software that makes up ship combat management system and has the characteristics of being mounted in the combat management systems of all ships but with little functional change. However, despite these characteristics, software modifications due to equipment, etc. are inevitable in the application of new ships. Modification of software causes software reliability testing which is a key factor in increasing development costs. In this paper, the structure of the existing system support software was analyzed to identify and supplement the code change factors, and the system support standardization architecture was designed. The feature model elicited common and variable elements of system support software, and applied white-box reuse to improve software design. In addition, the results of comparing existing system support software with the new architecture in terms of development elements and time to perform reliability test were presented to verify the effectiveness of the new one.
  • 19.

    Development of “ZIGTECHnology” Apparel for Body Shape Renovation of New Senior Life Generation

    Cha Su Joung | 2020, 25(11) | pp.157~166 | number of Cited : 0
    Abstract PDF
    In this study, I tried to develop ZIGTECHnology clothing for renovation that can correct the body shape of elderly women according to aging and delay the change of body shape. Develop and suggest corrective clothing for elderly women with easy movement that can alleviate symptoms and delay changes in body shape by analyzing body types for each symptom, such as bending of shoulders, back and waist caused by aging and diseases such as spinal curvature. As a result of the wear evaluation of the developed ZIGTECHnology clothing designs 1, 2, and 3, in terms of functionality, Design 1 was evaluated as excellent by reducing the back angle by 3.17°, but design 3 was evaluated as the most excellent considering the fit. In the clothing of elderly women, the need for clothing that complements physical shortcomings increases, so it is thought that continuous development of body shape relief devices should be made.
  • 20.

    Comparison of New Hanbok Jeogory Pattern for Customizing System Development

    Cha Su Joung , HEO SEUNGYEUN , MyungSook An | 2020, 25(11) | pp.167~178 | number of Cited : 4
    Abstract PDF
    This study attempted to find out the difference in the patterns of jeogori between commercially available Shinhanbok brands by comparing and analyzing the patterns of the changing Shinhanbok jeogori in consideration of material characteristics, fit, and fastening. After purchasing and disassembling 6 products, analysis was conducted with the disassembly pattern. As a result of analyzing the shape of the jeogori, the 1st, 3rd and 6th brands showed no darts. In the case of the 5th brand, the three-dimensional effect of the human body was expressed with a princess line. As a result of the appearance evaluation, the 5 brands were evaluated as the highest in most items except for the space of the front width and the group wrinkles of back sleeve armhole, and the appearance was analyzed to be the best. As a result of evaluating the clothing pressure, it was analyzed that the chest circumference of the first brand was smaller than that of the other brands, and the shoulder width and shoulder length were also shorter, and pulling occurred even after wearing. As the demand for new hanbok increases, it is believed that it is necessary to establish a size system for ready-made clothes
  • 21.

    Impact Factors and Validity of Blood Variables on Death in COVID-19 patient: Using Data of Korea Disease Control and Prevention Agency

    Yu-Rin Kim , Nam, Seoul Hee , Seon-Rye Kim | 2020, 25(11) | pp.179~185 | number of Cited : 4
    Abstract PDF
    In this paper, we propose impact factors and validity of blood variables on death of COVID-19 patients. The clinical-epidemiological data of 5628 COVID-19 patients, provided from Korea Disease Control and Prevention Agency as day of 30th April 2020, were used. As results, impact factors of death were dementia, older age, high lymphocyte, cancer, dyspnea, COPD, change of consciousness, heart disease, high platelets, abnormal diastolic pressure and fever. The validities of blood variables for death were high in the order of lymphocyte, hemoglobin, hematocrit, platelet and WBC. Therefore, risk factors such as initial clinical characteristics, underlying disease and blood test results, could be regarded for efficient management of COVID-19 patients.
  • 22.

    Effects of Interval Training and Aerobic Exercise on Body Composition and Physical Fitness in Young Obese males

    Ko Mingyun | 2020, 25(11) | pp.187~193 | number of Cited : 3
    Abstract PDF
    This study is proposed to the effects of interval training by different intensity on body fat, flexibility, agility, quickness, and maximal oxygen consumption. A total of 30 healthy men voluntarily participated in the study. The participants were randomized to moderate aerobic exercise(n=15) and high-intensity interval training groups(n=15). Exercise programs lasted for six weeks, with each session occurring four times per week for 50 minutes per session. There were significant differences in fat and physical fitness according to flexibility, agility, quickness, and maximal oxygen consumption within the high-intensity interval training groups(p<.05). For the moderate aerobic exercise group, there was a significant difference in fat, flexibility, maximal oxygen consumption(p<.05). There were significant differences between groups for fat, flexibility, agility and quickness(p<.05). Therefore using high-intensity interval training will significantly benefit obese young men in musculoskeletal capacity and quickness.
  • 23.

    A Study on the Improvement of Protection System for Public Interest Reporters

    Lee Young Woo , Su-Yeon Jang | 2020, 25(11) | pp.195~200 | number of Cited : 1
    Abstract PDF
    Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.
  • 24.

    A SNA Based Loads Analysis of Naval Submarine Maintenance

    Ji-Seok Song , Dongsu Kang , Lee Sang Hoon | 2020, 25(11) | pp.201~210 | number of Cited : 0
    Abstract PDF
    Navy submarines are developed into complex weapons systems with various equipment, which directly leads to difficulties in submarine maintenance. In addition, the method of establishing a maintenance plan for submarines is limited in efficient maintenance because it relies on statistical access to the number of people, number of target ships, and consumption time. For efficient maintenance, it is necessary to derive and maintain major maintenance factors based on an understanding of the target. In this paper, the maintenance loads rate is defined as a key maintenance factor. the submarine maintenance data is analyzed using the SNA scheme to identify phenomena by focusing on the relationship between the analysis targets. Through this, maintenance loads characteristics that have not been previously revealed in quantitative analysis are derived to identify areas that the maintenance manager should focus on.
  • 25.

    A Comparatibe on Selection Attributes of Airport throught traditional IPA and revised IPA -Focusing on the Gwangju and Muan Airport-

    In ok nam , Eun-Hye Park | 2020, 25(11) | pp.211~218 | number of Cited : 3
    Abstract PDF
    Gwangju Airport and Muan International Airport are planned to merge in 2021 while the aviation market is suffering an unprecedented prolonged crisis due to COVID-19 and therefore it is necessary to revitalize the airport to keep up with the passenger’s demands. The study conducts an empirical research survey on the passengers of both airports regarding the importance, satisfaction, and overall satisfaction to derive a strategic marketing direction. The results show that to establish a strategic marketing direction, an urgent improvement is required for all “Commercial Facility and Diversity,” “Rest Facility and Comfort,” “Facilities for the Transportation Vulnerable,” “Latest Facility” factors, and “Air Route Diversity.” On the other hand, it is required to stop further investing and improving in “Publicity and Marketing” and “Flight Schedule”. The results of this study demonstrate academic and practical importance through the comparison of two IPA models, based on Gwangju Airport and Muan International Airport before their integration, to provide substantive and meaningful marketing strategies.
  • 26.

    Educational Needs for Employment Competency of College Students in Management Using IPA Technique

    Kang Kyoung Yeoun | 2020, 25(11) | pp.219~228 | number of Cited : 2
    Abstract PDF
    The purpose of this study is to analysis the educational needs for employment competency of college students in management. For this purpose, a survey about importance and retention level of employment competency was administered to 215 students at A college in Chungcheong between December 2 and 6, 2019. The difference between importance and retention level was analyzed through the corresponding sample t-test, and the educational needs was confirmed through the IPA technique. The results of Study were as follows: ‘major knowledge capabilities’ was found to be in the high priority of educational needs in all students.; male showed high-priority needs for ‘information search, foreign language utilization’ and female showed high-priority needs for ‘information search, setting employment goals’; ‘information search’ was ranked as priority educational needs in all grades, it was necessary to add ‘information search’, ‘foreign language utilization’, ‘fill out the necessary documents for job search’ for 1 grade and ‘Self-understanding’, ‘foreign language utilization’ for 4 grade. The findings of this study may produce data useful for designing the employment support program for college students in management.
  • 27.

    The Direction of Innovation in Curriculum of Universities in the Fourth Industrial Revolution

    Hwang Eui Chul | 2020, 25(11) | pp.229~238 | number of Cited : 12
    Abstract PDF
    Upcoming 4th industrial revolution era and the post-covid19 made procedure, contents, and the ways of education innovative changes. Thesis analyzed the changes of educational procedures of universities unsing Bigkinds of ‘KPF’, (which is Korea Press Foundation) and DataLab system of ‘Naver’. The following three results were derived from relational analysis, monthly keyword trend, and related word analysis with 633 cases searched for the keyword of “university curriculum innovation, creativity, and convergence.” Firstly, the frequency of relationship keyword analysis of recent 4 years(2016~2020) was ministry of education(190), industrial revolution(154), system(137), career(136), global(131), smart(97), and enrolled students(95) in order. Secondly, The frequency of keywords related to the related words was Human Resources Development (136), Industrial-Academic Cooperation (119), Education Ministry (86), Specialization (69), and LiNC (62), which showed the importance of supporting the government (Ministry of Education) and fostering human resources, industry-academic cooperation, LiNC, and characterization in order to foster human resources in universities. According to this study, the paradigm of education is the artificial intelligence environment of the fourth industrial revolution, which is meaningful in presenting the direction of specialization, industry-academic cooperation, smart, and globalization, and the future direction of education that fosters creative talent in the era of the fourth industrial revolution.
  • 28.

    A Study on the Injury Charateristics of Trauma Patients by Madical information -Focused on the Patients in a Regional Emergency Medical center in Gwangju

    Young-Ju Jeun | 2020, 25(11) | pp.239~244 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to provide basic data for injury prevention measures through the risk factors of injury occurrence by comprehending injury characteristics of the trauma patients visiting a regional emergency medical center according to distribution based on external causes and injury severity score. This study was analyzed using SPSS-Window(ver. 20.1) for 2585 trauma patients who visited a regional emergency medical center and the research period is for four months from 1st of September, 2019 to 31th of December, 2019. The following were the results of the research. First, it is shown from the analyzed data that the proportion of males (61.3%) is greater than that of females (38.7%) and the group aged from 20 to 50 had a significantly higher occurrence rate of injury but in terms of injury severity, 50 takes up the great proportion(P<.001). Second, roads and traffic areas (35.1%) were the highest in the place of occurrence of injury(P<.001). Third, the time of injury occurrence was as high as 12-18 hours(35.8%)(P<.001). Fourth, the injury part was highest in the head and face (55.4%)(P<.001). Fifth, the type of injury was higher in open wounds (31.2%)(P<.001). Therefore, it is required to establish detailed injury prevention policies according to the characteristics of injury severity.
  • 29.

    Longitudinal Model Verification of Life Satisfaction of Generation X and Generation Y

    Jae-Nam Kim | 2020, 25(11) | pp.245~253 | number of Cited : 1
    Abstract PDF
    This study is a longitudinal analysis of the life satisfaction of Generation X and Generation Y, with different historical backgrounds, growth backgrounds, values, and lifestyles, using data from the Korean Welfare Panel(KOWEPS). The research data is from the KOWEPS 1st year(2006) to 14th year(2019), out of 27,301 people, who conducted life satisfaction from the latest 12th to 14th year, and the responses were properly answered data from 3 years of 2,492 were used. As a result of the study, the higher the life satisfaction of both Generation X and Generation Y, the more the life satisfaction slowly increases at a slower rate as time passes. In addition, in terms of life satisfaction and rate of change, the initial value of life satisfaction was higher as the living satisfaction increased in both Generation X and Generation Y, but in the case of Generation X, the higher living satisfaction, the lower the rate of change in life satisfaction for 3 years by .327, in the case of Generation Y, the rate of change in life satisfaction was not affected. Finally, in the model of this study, a partial mediation of health condition was established between living satisfaction and life satisfaction tendency. Living satisfaction was analyzed to have a direct effect on life satisfaction and at the same time indirectly with a health condition as a parameter.
  • 30.

    A Strategies for Using Smartphone as a Social Real Life Tools for Students with Developmental Disabilities

    park | 2020, 25(11) | pp.255~262 | number of Cited : 1
    Abstract PDF
    The purpose of this study is to find out an effective way for students with developmental disabilities to use smartphone applications as a social real life tools in a society. For the purpose of this study, the researcher reviewed relevant previous literature on topics such as “students with developmental disabilities, information society, use of smartphone, and application use”. The results of this study are as follows. First, the researcher describes strategies to support students with developmental disabilities living in an information society to improve their social integration ability by using smartphone. Second, it describes the types of smartphone applications that could support the social real life of students with developmental disabilities. Third, it describes the needs of smartphone applications to improve social adaptability of students with developmental disabilities. The results of this study will lead students with developmental disabilities to learn and use various functions of smartphone in the information society to interact with people around them and improve their communication skills. In addition, the results can be used as basic data to develop and support appropriate applications that can help vocational rehabilitation and social integration of students with developmental disabilities.
  • 31.

    The Effect of Manual Lymph Drainage on the Changes of Autonomic Nervous System and Pain in Stressed Hospital Office Employees

    Ko Mingyun | 2020, 25(11) | pp.263~268 | number of Cited : 2
    Abstract PDF
    This study is to investigate the effects of manual lymphatic drainage of stressed hospital office employees on the autonomic nervous. A total of 30 stressed hospital office women voluntarily participated in the study. The participants were randomized to the manual lymphatic drainage groups and rest groups. The intervention was conducted for 20 minutes in each group. There were significant differences in sympathetic nerve, parasympathetic nerve, and pain within manual lymphatic drainage groups(p<.05). There were significant differences between groups for the sympathetic nerve, parasympathetic nerve, and pain(p<.05). Therefore, manual lymphatic drainage is an effective intervention for reducing the stress and pain of stressed hospital office employees.
  • 32.

    The Effects of Ethical Leadership on Followers’ Unethical Pro-Organizational Behavior: The Mediating Effect of Affective Commitment

    Jonghyuk Park | 2020, 25(11) | pp.269~276 | number of Cited : 2
    Abstract PDF
    Recently some researchers have challenged the truism by arguing that ethical leadership evokes followers’ engagement in unethical behavior when that is benefit for organization(unethical pro-organizational behavior, called UPB). In this paper, I propose the relationships among the ethical leadership, affective commitment, and UPB based on social exchange theory and social identity theory. Using survey data from 10 companies 90 employees, the regressing analysis results indicate that there is positive and significant direct relationship between ethical leadership and UPB, and affective commitment paly as a partial mediator role among ethical leadership and UPB. Some implications, future research directions, and study limitations were discussed.
  • 33.

    A Study on Programming Concepts of Programming Education Experts through Delphi and Conceptual Metaphor Analysis

    Dong-Man Kim , Lee Taewuk | 2020, 25(11) | pp.277~286 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a new educational approach to help learners form concepts by identifying the properties of programming concepts targeting a group of experts in programming education. Therefore, we confirmed the typical properties of concepts by programming education experts for programming learning elements through conceptual metaphor analysis, which is a qualitative research method, and confirmed the validity through the delphi method. As a result of this study, we identified 17 typical properties of programming concepts that learners should form in programming education. The conclusions of this study are that need to compose the educational content more specifically for the conceptualization of learners' programming as follows: 1)the concept of a variable is to understand how to store data, how to set a name, what an address has, how to change a value, various types of variables, and the meaning of the size of a variable, 2)the concept of operator is to understand how to operate the four rules, how to deal with it logically, how to connect according to priority, meaning of operation symbols, and how to compare, 3)the concept of the control structure is to understand how to control the execution flow, how to make a logical judgment, how to set an execution rule, meaning of sequential execution, and how to repeat executing.