Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2021, Vol.26, No.6

  • 1.

    Low Resolution Infrared Image Deep Convolution Neural Network for Embedded System

    Yonghee Hong | Sanghun Jin | Dae-Hyeon Kim and 1other persons | 2021, 26(6) | pp.1~8 | number of Cited : 0
    Abstract PDF
    In this paper, we propose reinforced VGG style network structure for low performance embedded system to classify low resolution infrared image. The combination of reinforced VGG style network structure and global average pooling makes lower computational complexity and higher accuracy. The proposed method classify the synthesize image which have 9 class 3,723,328ea images made from OKTAL-SE tool. The reinforced VGG style network structure composed of 4 filters on input and 16 filters on output from max pooling layer shows about 34% lower computational complexity and about 2.4% higher accuracy then the first parameter minimized network structure made for embedded system composed of 8 filters on input and 8 filters on output from max pooling layer. Finally we get 96.1% accuracy model. Additionally we confirmed the about 31% lower inference lead time in ported C code.
  • 2.

    Implementation of a security system using the MITM attack technique in reverse

    Young Woo Rim | KWON JUNG JANG | 2021, 26(6) | pp.9~17 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a reversely using the “Man In The Middle Attack” attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.
  • 3.

    A personalized exercise recommendation system using dimension reduction algorithms

    Ha-Young Lee | Ok Ran Jeong | 2021, 26(6) | pp.19~28 | number of Cited : 0
    Abstract PDF
    Nowadays, interest in health care is increasing due to Coronavirus (COVID-19), and a lot of people are doing home training as there are more difficulties in using fitness centers and public facilities that are used together. In this paper, we propose a personalized exercise recommendation algorithm using personalized propensity information to provide more accurate and meaningful exercise recommendation to home training users. Thus, we classify the data according to the criteria for obesity with a k-nearest neighbor algorithm using personal information that can represent individuals, such as eating habits information and physical conditions. Furthermore, we differentiate the exercise dataset by the level of exercise activities. Based on the neighborhood information of each dataset, we provide personalized exercise recommendations to users through a dimensionality reduction algorithm (SVD) among model-based collaborative filtering methods. Therefore, we can solve the problem of data sparsity and scalability of memory-based collaborative filtering recommendation techniques and we verify the accuracy and performance of the proposed algorithms.
  • 4.

    Improvement of location positioning using KNN, Local Map Classification and Bayes Filter for indoor location recognition system

    Seung-Hoon Oh | MAENG JUHYUN | 2021, 26(6) | pp.29~35 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method that combines KNN(K-Nearest Neighbor), Local Map Classification and Bayes Filter as a way to increase the accuracy of location positioning. First, in this technique, Local Map Classification divides the actual map into several clusters, and then classifies the clusters by KNN. And posterior probability is calculated through the probability of each cluster acquired by Bayes Filter. With this posterior probability, the cluster where the robot is located is searched. For performance evaluation, the results of location positioning obtained by applying KNN, Local Map Classification, and Bayes Filter were analyzed. As a result of the analysis, it was confirmed that even if the RSSI signal changes, the location information is fixed to one cluster, and the accuracy of location positioning increases.
  • 5.

    A Design and Implementation of Yoga Exercise Program Using Azure Kinect

    Jong Hoon Park | SimDaehan | Young Pyo JUN and 1other persons | 2021, 26(6) | pp.37~46 | number of Cited : 0
    Abstract PDF
    In this paper, we designed and implemented a program to measure and to judge the accuracy of yoga postures using Azure Kinect. The program measures all joint positions of the user through Azure Kinect Camera and sensors. The measured values of joints are used as data to determine accuracy in two ways. The measured joint data are determined by trigonometry and Pythagoras theorem to determine the angle of the joint. In addition, the measured joint value is changed to relative position value. The calculated and obtained values are compared to the joint values and relative position values of the desired posture to determine the accuracy. Azure Kinect Camera organizes the screen so that users can check their posture and gives feedback on the user's posture accuracy to improve their posture.
  • 6.

    Development of 3D Holographic Multi-vision applying Wi-Fi Interlocking Technology

    Park Myeong Chul | Soon-Hee Kim | Hwara Hur | 2021, 26(6) | pp.47~53 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a multi-vision based hologram display to improve the limited viewing angle problem of a single fan hologram display. Existing single fan type displays have a narrow viewing angle. And when the length of the fan becomes longer, there is a problem of low resolution. Also, it is difficult to change data due to the use of the SD card. So, we want to implement a dedicated app to transmit data via Wi-Fi. In this paper, we designed and implemented a display consisting of 3 REG LED fans. As a result of video transmission using the app, it was confirmed that it can be used for commercial purposes such as advertisements and demonstrations. The results of this study are thought to be of great help in the popularization of multi-vision holograms.
  • 7.

    Problem Solving Path Algorithm in Distance Education Environment

    Min Youn-A | 2021, 26(6) | pp.55~61 | number of Cited : 0
    Abstract PDF
    As the demand for distance education increases, it is necessary to present a problem solving path through a learning tracking algorithm in order to support the efficient learning of learners. In this paper, we proposed a problem solving path of various difficulty levels in various subjects by supplementing the existing learning tracking algorithm. Through the data set obtained through the path for solving the learner's problem, the path through the prim’s minimum Spanning tree was secured, and the optimal problem solving path through the recursive neural network was suggested through the path data set. As a result of the performance evaluation of the contents proposed in this paper, it was confirmed that more than 52% of the test subjects included the problem solving path suggested in the problem solving process, and the problem solving time was also improved by more than 45%.
  • 8.

    Development of the Unmanned Automatic Test System for a Portable Detector using TRIZ TESE

    YuShin Chang | 2021, 26(6) | pp.63~71 | number of Cited : 0
    Abstract PDF
    This paper propose an development of the unmanned automatic test system for a portable detector using TRIZ Methodology. A new development scheme among of the unmanned automatic test system configurations was obtained after application of the TESE(Trends of Engineering System Evolution) one of the TRIZ methods. Using Pugh matrix drives some improving ideas. The key idea of this unmanned automatic test system scheme is to minimize whole test procedure time of each portable detector and to maximize the amount of portable detectors at once. Between the before and the after configurations of the 3D mechanical model find out improvements. This paper shows that the proposed development scheme improves the test performance efficiency compared to previous scheme.
  • 9.

    A Packet Processing of Handling Large-capacity Traffic over 20Gbps Method Using Multi Core and Huge Page Memory Approache

    YoungSun Kwon | Byeong-Chan Park | HOON CHANG | 2021, 26(6) | pp.73~80 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a packet processing method capable of handling large-capacity traffic over 20Gbps using multi-core and huge page memory approaches. As ICT technology advances, the global average monthly traffic is expected to reach 396 exabytes by 2022. With the increase in network traffic, cyber threats are also increasing, increasing the importance of traffic analysis. Traffic analyzed as an existing high-cost foreign product simply stores statistical data and visually shows it. Network administrators introduce and analyze many traffic analysis systems to analyze traffic in various sections, but they cannot check the aggregated traffic of the entire network. In addition, since most of the existing equipment is of the 10Gbps class, it cannot handle the increasing traffic every year at a fast speed. In this paper, as a method of processing large-capacity traffic over 20Gbps, the process of processing raw packets without copying from single-core and basic SMA memory approaches to high-performance packet reception, packet detection, and statistics using multi-core and NUMA memory approaches suggest When using the proposed method, it was confirmed that more than 50% of the traffic was processed compared to the existing equipment.
  • 10.

    A Design and Implementation of Bus Information Notification Application

    A-Yeon Kang | Tae-Hyeon Lee | Na-Kyung Lee and 1other persons | 2021, 26(6) | pp.81~88 | number of Cited : 0
    Abstract PDF
    In this paper, we design and implement a bus information notification application based on the GPS sensor of a smartphone. This application provides the ability to check bus stops within a radius of 200m based on the current user's location using the smartphone's GPS sensor, Google Map, and open API. In addition, if you click the marker of the desired stop, you can see the name of the stop, and click the view arrival information button to check the detailed bus arrival information of the stop. In addition, it provides a function to check the location information of pharmacies, nonghyups, and post offices that sell public masks, the names of public mask stores, and mask inventory through the public mask store button. Each icon was used differently to make visual differences in order to easily indicate the difference between the times of public mask sales and bus stops. In addition, if you want to know the information of other bus stops and the route of the desired bus, not around the user's location, click the bus stop search button. Finally, after storing the destination stop or location, it implements a function that provides an alarm when it approaches the location.
  • 11.

    An Empirical Study on the Impact of Permission Smell in Android Applications

    Wu Zhiqiang | Hakjin Lee | Scott Uk-Jin Lee | 2021, 26(6) | pp.89~96 | number of Cited : 0
    Abstract PDF
    In this paper, we proposed a sniffer to detect permission smells from developer and third-party libraries' code. Moreover, we conducted an empirical study to investigate unnecessary permissions on large real-world Android apps. Our analysis indicates that permission smell extensively exists in Android apps. According to the results, permission smells exist in most Android apps. In particular, third-party libraries request permission for functionalities that are not used by developers, which cause more smells. Moreover, most developers do not properly disable unnecessary permissions that are declared for third-party libraries. We discussed the impacts of permission smells on user experiences. As a result, the existence of permission smell does not impact the number of downloads. However, apps that have more unnecessary permissions have received lower ratings from users.
  • 12.

    BCON : Blockchain-based Content Management Service Using DID

    Hye-Won Kim | Young-Eun Lee | Minho.kwon and 1other persons | 2021, 26(6) | pp.97~105 | number of Cited : 0
    Abstract PDF
    In this paper, we propose BCON, a service that allows individuals to store personal contents safely, and reliably guarantee their ownership of contents, certifying their identities with DIDs(Decentralized identifiers). DID technology, which supports decentralized identification service based on a blockchain that cannot forgery or alter data, allows users to selectively provide their information, controlling personal information and reinforcing their sovereignty over their identity. BCON stores information about the content specified by a user on the blockchain and Authenticates the user's identity based on DID technology. It also provides functions for the user to safely upload and download the user’s content to a distributed database. BCON consists of the content service verifier, the content storage service, the content management contract, and the user application, administrating rhe DID registry for Authority management.
  • 13.

    Forgotten Permission Usages: An Empirical Study on App Description Based Android App Analysis

    Wu Zhiqiang | Scott Uk-Jin Lee | 2021, 26(6) | pp.107~113 | number of Cited : 0
    Abstract PDF
    In this paper, we conducted an empirical study to investigate whether Android app descriptions provide enough permission usages for measuring app quality in terms of human writing and consistency between code and descriptions. Android app descriptions are analyzed for various purposes such as quality measurement, functionality recommendation, and malware detection. However, many app descriptions do not disclose permission usages, whether accidentally or on purpose. Most importantly, the previous studies could not precisely analyze app descriptions if permission usages cannot be completely introduced in app descriptions. To assess the consistency between permissions and app descriptions, we implemented a state-of-the-art method to predict Android permissions for 29,270 app descriptions. As a result, 25% of app descriptions may not contain any permission semantic, and 57% of app descriptions cannot accurately reflect permission usages.
  • 14.

    Methodology for Search Intent-based Document Recommendation

    LEE DONG HOON | Namgyu Kim | 2021, 26(6) | pp.115~127 | number of Cited : 0
    Abstract PDF
    It is not an easy task for a user to find the correct documents that a user really wanted at once from a vast amount of the search results. For this reason, various methods of recommending documents by taking the user’s preferences into consideration based on the user's document browsing history have been proposed. However, the document recommendation methodology based on the document browsing history also has a limitation that only the information the user has viewed is utilized, but the intent of the user searching for the document is not fully utilized. Therefore, we propose a document recommendation method based on the user’s search intent that utilizes information on “Why” the user reads the document, instead of the information on “Who” reads the document. In order to confirm the feasibility of the proposed methodology, an experiment was conducted by analyzing 239,438 actual user’s search history of one of the most popular e-commerce platform companies in Korea. As a result, our methodology showed superior performance compared to the existing content-based or simple browsing history-based recommendation model.
  • 15.

    Analysis of Correlation Coefficient between head posture and muscle stiffness of cervical extensor muscles

    Kim, jeong ja | Wang Joong San | 2021, 26(6) | pp.129~135 | number of Cited : 0
    Abstract PDF
    The purpose of this study was to investigate the relationship of the head posture with the tone and stiffness of the cervical extensor muscles. Eighty adults in their twenties were chosen as subjects, and the tone and stiffness of the cervical extensor muscles were measured, with their usual head posture in the sagittal plane. For the measured head posture, the craniovertebral angle (CVA), craniorotation angle (CRA), and forward shoulder angle (FSA) were analyzed using Image J. It was observed that the tone and stiffness of the upper trapezius muscle increased significantly with a decrease in the CVA as well as with an increase in the CRA (p < 0.05). As a result of further classification into the normal and forward head postures based on the CVA of the subjects, the forward head posture was characterized by a significant increase in the tone and stiffness of the upper trapezius muscle (p<.05). The results of this study are expected to be used as basic data for the evaluation of the forward head posture and posture education in clinical practice.
  • 16.

    A Study on the make Fire Scenario for Residential Facility Combustible Materials

    Kim Dong Eun | Lee Dong Yeol | 2021, 26(6) | pp.137~143 | number of Cited : 0
    Abstract PDF
    In the case of residential facilities, general fire scenarios cannot be applied. Becauseit is difficult to quantify due to the types of combustibles and various fire loads. Existing research conducting surveys of combustibles, but research on fire characteristics is insufficient. Therefore, in this study, an Excel macro that can be quantified by experimenting with the HRR experiments of sofa, drawer, mattress, chair, desk and TV, which are typical combustibles. As a result of experimenting 6 loading combustibles in domestic residential facilities by using a furniture calorimeter, values of 2,391.26kW appeared from the sofa, 1,891.80kW from the drawer, 1,778.95kW from the mattress, 1,104kW from the chair, 291kW from the desk, and 135.09kW from the TV. Also, by applying the α value of the fire growth rate by classifying fire-growing speeds at NFPA 72 (National Fire Alarm Code 2007, Annex B), the mattress can be defined as Very Fast, the sofa and drawer Fast, the TV Slow, the desk Slow, and the chair Medium.
  • 17.

    The strengthening of democratic control over the authority of the superintendent of education in the Corona era

    park | Sang-Ouk Noe | 2021, 26(6) | pp.145~154 | number of Cited : 0
    Abstract PDF
    While welcoming the distributing of the powers of the Ministry of Education, which is currently being promoted, to the city and provincial offices of education, I am very concerned that this will expand and amplify the powers concentrated in one central institution to 17 local institutions closer to the field. Until now, the Ministry of Education and the Office of Education have served as co-cause providers as important reasons for hindering school education. The transfer of the authority of the Ministry of Education is highly likely to be deformed as soon as it results in the quantitative reduction of the functions and roles of the existing Ministry of Education and the quantitative expansion of the roles and functions of the city and provincial offices of education. In the reality that no legal device for school autonomy has been established, it is highly likely that emphasizing the principle of school autonomy in our educational climate, which is deeply rooted in the vertical bureaucratic administrative culture, will end with a simple measure or stop at the level of imitation. Therefore, a more stable device is needed to check the authority of the city and provincial office of education and the superintendent of education to take over the authority of the Ministry of Education. This is also a system that is still required even when school autonomy becomes legal. Therefore, it is necessary to revitalize the independent education committee, establish a local education committee in the city and province education office, and activate the resident participation system (resident proposal system, resident voting system, resident litigation system, resident audit request system).
  • 18.

    The Influence of Public Transfer Income and Private Transfer Income on Life Satisfaction of the Elderly: Multiple mediating effects of depression and social support

    Lee Hyoung Ha | 2021, 26(6) | pp.155~166 | number of Cited : 0
    Abstract PDF
    The purpose of this study is to investigate whether depression and social support have a multiple mediating effect in affecting the life satisfaction of the elderly with public and private transfer income. To this end, the 7th panel data (2017) among the data of the Korean Retirement & Income Study (KReLS) was used for analysis, and the analysis was conducted using structural equation modeling (SEM). As a result of the analysis, first, it was analyzed that the higher the public transfer income of the elderly, the lower the level of depression, the higher the social support, and the higher the satisfaction of life. Second, the partial mediating effect of depression was verified in the influence of the elderly's public transfer income and private transfer income on life satisfaction. Third, the partial mediating effect of social support was verified in the influence of the elderly's public transfer income and private transfer income on life satisfaction. Fourth, it was verified that the multiple mediating effects of depression and social support were significant in the effect of the elderly's public and private transfer income on life satisfaction. Based on the results of this analysis, policy proposals were made, such as revitalizing the Community Care program to strengthen the social support network of the elderly.
  • 19.

    A Study on Changes in Media Report of Police Assigned for Special Guard Using Big Kinds

    Park-Suhyeon | Cho Cheol Kyu | 2021, 26(6) | pp.167~172 | number of Cited : 0
    Abstract PDF
    The objective of this study is to present the academic implications and developmental direction of the police assigned for special guard system through big data analysis on the objective and macroscopic viewpoint of the media. As research method, this study conducted the analysis on ‘police assigned for special guard’ and the analysis of related words that would visualize the keywords highly related to keyword trend and news. Also, after dividing the period into the 1990s, 2000s, and 2010s, the number of relevant articles in each period was drawn for understanding the flow. In the results of this study, the perception of media report of police assigned for special guard was about the recruitment of police assigned for special guard, and relevant events/accidents, which showed the coexistence of positive interest in the recruitment of police assigned for special guard and negative image of events/accidents related to police assigned for special guard. As a result, however, the necessity and demand for police assigned for special guard are increasing. Thus, the police assigned for special guard should be engaged in work after carefully thinking of its role in charge of ethical responsibility and safety as an axis for maintaining the national safety and social order.
  • 20.

    A Study on the Relationship among Skin Care Situations, Skin Care Recognition, and Skin Care Satisfaction by Gender in Medical Skin Care Center Patients: - Focused on Females and Males in Hainan Province, China-

    Yue Jia | kim kyeong-ran | 2021, 26(6) | pp.173~181 | number of Cited : 0
    Abstract PDF
    Chinese people have increasingly high interests in skin care and trust and prefer medical institution products and equipment to treat skin problems. The purpose of this study is to examine skin types and skin care situations, skin care recognition, and skin care satisfaction by gender in medical skin care center patients from in their 10s to 50s in Hainan Province, China. The questionnaire survey consisted of general characteristics(n=8), skin care situations(n=6), skin care recognition(n=11), and skin care satisfaction(n=21). A total of 328 questionnaires were researched from December 21, 2020 to January 9, 2021 using WeChat and Wenjuanxing program. Data were analyzed by SPSSWIN 21.0. Frequency analysis was applied for general characteristics, skin care situations, skin care recognition, and skin care satisfaction and Cronbach’s α was used for the reliability of skin care recognition and satisfaction. The relationship among skin care situations, skin care recognition, and skin care satisfaction was analyzed by χ2 test and t-test. As a result, the common skin types by gender was dry skin in females and oily skin in males. The highest skin trouble was melasma and pigments in females and pimple in males. The most common way to manage troubled skin was homecare in both females and males, followed by the dermatology department in females and pharmacy in males, suggesting a significant difference. The common period of skin trouble was from one year to three years and the most effective way to improve skin was good life habit, followed by laser treatment in both females and males. The most important consideration to choose a hospital was a famous franchise hospital and the most important matters in management was doctor or skin care professionalism. Skin care and treatment recognition was high in external effects for females and internal effects for males. Skin care satisfaction was high in service for females and effect for males. Skin care satisfaction was significantly higher in males than in females. In conclusion, there was a difference in skin types, skin troubles, skin problems, skin care ways, and skin care satisfaction by gender in Chinese medical skin care center patients. Therefore, this study suggests the development of various products and the need of systematic management programs.
  • 21.

    Digital Transformation of Education Brought by COVID-19 Pandemic

    Hye-jin Kim | 2021, 26(6) | pp.183~193 | number of Cited : 0
    Abstract PDF
    In this paper, the author found and analyzed the problems caused by the change of traditional teaching methods to online in classrooms and laboratories. Looking at the analysis of major problems, first, there were various technical problems, including not all environments and facilities being connected to the Internet. Second, the effectiveness of virtual classes, which were suddenly switched online, could also be questioned. Finally, in the face of a new environment, the stress of teachers to adapt rapidly to the new teaching methodology was a problem. The author proposed digital transformation as a way to address these problems. The author analyzed educational changes, learning modalities and various technical tools, and various tasks to enable digital transformation. First, the author investigated, analyzed, and presented the factors necessary to efficiently operate the classroom environment that will change to online. Next, the author analyzed the factors and problems needed to make the students' classes reliable and efficient, and proposed solutions. Finally, the author pointed out the problem that during online lectures, the responsibility of learning is excessively transferred from teachers to students, and proposed a solution to this problem. Subsequently, the author proposed future studies.