Korean | English

pISSN : 2466-0078

2020 KCI Impact Factor : 0.0
Home > Explore Content > All Issues > Article List

2019, Vol.5, No.2

  • 1.

    Analysis on Smart Factory in IoT Environment

    DongWoo Lee | Kwangmoon Cho | Lee Seong Hoon | 2019, 5(2) | pp.1~5 | number of Cited : 8
    Abstract
    Looking at the surrounding environment in which we live, we are facing various situations in which new industries are emerging under the influence of ICT and at the same time, existing industries are combined with ICT technology. In addition, the network environment foretells a change from 4G to 5G. One of the things that is actively discussed during this 5G era is the smart factory. Faster transmission speeds are essential for the use of numerous data generated by various sensors used in smart factories. This study deals with smart factory technologies related to the 5G era. In addition to the various interpretations of smart factories, this study examined the situation and progress of smart factories in major countries around the world and described solutions.
  • 2.

    Open Market Sales Trend Analysis System Using Online Shopping Mall Data

    Seung-yeon Cha | Kang-ryeol Kim2 | Labina Shrestha and 2other persons | 2019, 5(2) | pp.7~12 | number of Cited : 0
    Abstract
    As online shopping is activated by the development of the Internet, consumers' purchase form is changing from the traditional face-to-face purchase method to online purchase method. Many sellers have flowed into shopping malls, and competition among sellers is very intense. Therefore, sellers in shopping malls need to establish rational marketing strategies by analyzing consumer purchase patterns and product sales trends. In this paper, we analyzed the purchase price of consumers by analyzing the product price, rating, and sales quantity of competitors who sell the same product in open shopping malls by time zone. In addition, the collected information was visualized in a chart so that the company's and competitors' sales trends could be easily compared. Using the above system, it is possible to predict the sales volume through the analyzed purchasing pattern and to select the reasonable price of the product by grasping the sales trend.
  • 3.

    An Implementation of a System for Video Translation on Window Platform Using OCR

    Sunmyung Hwang | Yeom Hee Gyun | 2019, 5(2) | pp.15~20 | number of Cited : 0
    Abstract
    As the machine learning research has developed, the field of translation and image analysis such as optical character recognition has made great progress. However, video translation that combines these two is slower than previous developments. In this paper, we develop an image translator that combines existing OCR technology and translation technology and verify its effectiveness. Before developing, we presented what functions are needed to implement this system and how to implement them, and then tested their performance. With the application program developed through this paper, users can access translation more conveniently, and also can contribute to ensuring the convenience provided in any environment.
  • 4.

    The Smart Contract based Copyright Protection Model for Wisdom Contents Distribution

    SungHyun Yun | 2019, 5(2) | pp.21~26 | number of Cited : 0
    Abstract
    Wisdom contents is made by an ordinary person and contains life tips helpful in general. As the existing copyright management systems are designed for the corporate or professional authors, it's not easy to use and requires high cost for the ordinary person to get the copyright. Blockchain based system can notarize the block of transactions without help of trustful third party such as existing copyright protection center. Thus, blockchain based copyright protection model is needed to protect the ordinary author's copyright. In this study, we propose the smart contract based copyright protection model which run on the blockchain network. The proposed model consists of smart contract creation, contents purchase and profit sharing stages. The digital signature scheme is used to get the contract agreed by the seller and the author. The smart contract stores the author information, contents information and the percentage of the share as states. If the contents is sold, the sales tokens are redistributed to the author and the seller according to the share. The proposed model can be applied to the ordinary person’s copyright registration and management for Wisdom contents distributed in cafe, blog, YouTube, etc.
  • 5.

    A Study on the Mixed Reality (MR) Based Storytelling Convergence Coding Education

    Lee Byong Kwon | Doo Yong Jung | 2019, 5(2) | pp.27~32 | number of Cited : 0
    Abstract
    Recently, the introduction of the elementary and middle school software education essential courses in 2018, the emergence of educational solutions, and the need for digital content for software education rather than simple coding. In addition, in the case of current coding education, it is necessary to study how to induce interest in elementary, middle and high school students. In this study, we included the interactive (UX / UI) function using MR(Mixed Reality) and induced interest in coding education, and it was possible to cultivate logical thinking by applying storytelling coding rather than injection education. Suggested way. As a result of research, elementary, middle, and high school students easily proposed logical thinking education beyond the existing injection education method using mixed reality(MR) technology, and will break away from the injection coding education which is a problem of the school and school.
  • 6.

    A Scheme for Information Protection using Blockchain in IoT Environment

    Keun-Ho Lee | 2019, 5(2) | pp.33~39 | number of Cited : 2
    Abstract
    Entering the 4th industrial revolution, many technologies are developing and various threats are emerging. In order to cope with such threats, research is being conducted in many fields. Even in the development of various fields, the threats caused by the development of medical technology and intelligent vehicles are the threats to life due to misinformation about medical care and the threats to life by preventing the safe operation of people through intelligent vehicles. In this paper, as the patient's information is important, the private blockchain is used to increase the safety, efficiency, and scalability of the patient's medical records. We propose an information protection technique using blockchain technology to hack the car system and threaten the driver's life, solve privacy problems by identifying personal information and differences, and prevent forgery in the Internet of Things.
  • 7.

    Design of Self Lunchbox App based on Big Data

    Kwangmoon Cho | 2019, 5(2) | pp.41~45 | number of Cited : 0
    Abstract
    The 1-serving lunchbox app is designed and developed for enabling consumers to order their lunch box by choosing their own lunch side dishes. In modern society, one-person households are growing in larger areas. It is too burdensome to handle alone because it is cumbersome to cook alone and you should order from two people in a restaurant shop. To resolve such inconveniences, it is an app to choose various detailed menus and order personalized lunches. In the process of selecting a detailed menu, information provided by big data is used. You can use the existing order through the bookmark function, or you can use the recommended lunch menu using big data.
  • 8.

    Convergence Research on the Effect of Awareness Enhancing Education of International Development Cooperation on Global Citizenship, Career Identity, Career Preparation Behavior, and Cooperative Efficacy

    RYU YOUNG MI | 심선주 | 박선영 | 2019, 5(2) | pp.47~54 | number of Cited : 0
    Abstract
    This convergence study was conducted to identify the effect of the awareness enhancing program of the international development cooperation of college students sponsored by the Korea International Cooperation Agency (KOICA). A quasi-experimental study design was used. The participants consisted of one experimental group (n=32) who attended the awareness enhancing class of international development cooperation and the other control group (n=32) who did not participate in the class in a university in C city. The data were collected using online survey before the first class and after the last class in spring semester 2019. Collected data were analyzed by ANCOVA using SPSS WIN Version 20.0 program. The levels of global citizenship (p=.003) and career preparation behavior (p=.013) was higher in the experimental group than in the control group. However, career identity(p=.385) and cooperative efficacy(p=.488) did not show significant difference between the groups. This study proposed the direction for the awareness enhancing program of the international development cooperation of college students by showing its positive effects on the global citizenship and career preparation behavior.
  • 9.

    Convergence Analysis of the Factors Influencing Clinical Competency among Nursing Students Participated in Simulation-based Practice

    SEUNG AE YANG | 2019, 5(2) | pp.55~66 | number of Cited : 0
    Abstract
    Objectives: The purpose of the study was to identify the factors influencing the nursing students’ Clinical Competency. Methods: A sample of convenience was 185 nursing students, and a questionnaire was used to measure their self-leadership, critical thinking disposition, self-directed learning ability, problem solving ability and clinical competency. Results: A significant positive correlation was found among clinical competency, self-leadership, critical thinking disposition, self-directed learning ability and problem solving ability. Grade of which the participant was in, interpersonal relationship, critical thinking disposition, problem solving ability, and self-directed learning ability were significant predictive variables of which accounted for 53% of the variance in clinical competency. Conclusions: The results from this study can be used to develop the programs for improving clinical competency.
  • 10.

    The Smart Contract based Voting Model for Internet Community Election

    SungHyun Yun | 2019, 5(2) | pp.67~72 | number of Cited : 0
    Abstract
    As Internet voting can take place regardless of a voter’s location, the participation rate of the voters would be increased and economic costs will be reduced. But the drawback of it is that all participants have to trust the election management server. If the server colludes with the specific candidate, the other candidates cannot prove rigged election. In addition, majority of researches on Internet voting are mainly focused on the voting restricted by the region and the country. Thus, it’s not appropriate for the election in Internet community such as YouTube channels. As the Internet community is composed of members from all around the world, the new type of voting model is needed. In this study, we propose the smart contract based Internet voting model applicable on the blockchain network. The proposed smart contract model consists of candidate registration, voter registration, voting and counting stages. In the proposed model, anonymity of the voter is assured in the voter registration and voting stages, and all candidates can confirm the fairness of the election in the counting stage.
  • 11.

    A Study on Workers' Risk-Aware Smart Bands System in Explosive Areas

    Lee Byong Kwon | 2019, 5(2) | pp.73~79 | number of Cited : 0
    Abstract
    Research is underway on services and systems that provide real-time alerts for suffocating gases and potentially explosive materials, but currently smart bend type services are lacking. This study supports real-time identification of explosion hazards due to static electricity in the workplace and immediate elimination of accident occurrence factors, real-time monitoring of worker status and workplace hazards (oxygen, hazardous chemical concentration), and immediate warning and data in case of danger. We propose a method of establishing an accident prevention system through analysis. In this way, various accidents that may occur in industrial sites are monitored using IoT-based intelligent sensor nodes, wireless network technology, data processing middleware, and integrated control system, and real-time risk information at the industrial sites is prevented and accidents are prevented. By supporting a safe working environment, the company can significantly reduce costs compared to post-procurement costs.
  • 12.

    Design of Learning Model using Triz for PBL(Project-based Learning) in IoT Environment

    Keun-Ho Lee | 2019, 5(2) | pp.81~87 | number of Cited : 1
    Abstract
    It is changing to the 4th Industrial Revolution rapidly as the information age through the Internet is changing, and it is rapidly changing to the era of the IoT using all things. In education, with the change to the Internet of Things, interest in education for the 4th Industrial Revolution is increasing. It is necessary to change from NetPBL method using Internet to T-PBL using Triz. In this paper, we focus on the task-based learning (T-PBL) method using Triz and examine the necessity and importance of its use. We propose a teaching model using Triz as a tool for T-PBL. Triz is being used as a tool to solve problems in creative ways. We will design a model applying Triz to the blockchain system security class related to the IoT.
  • 13.

    Convergence Strategy for Promoting the Admissions of Adult Learning in the College of Lifelong Education

    Insook kim | 2019, 5(2) | pp.89~94 | number of Cited : 0
    Abstract
    and the factors that are important in selecting it. In the motivation for participation of adult learners, learning new knowledge and skills in the first place and learning new things in the second place were good, so that they could learn together in the third place. Active school investment in faculty and staff will be needed to increase program diversity and quality through professionalism. Adult learners are getting information from the system they are interacting with, and furthermore, they learn the information from the public relations of university professors. Since they are acquiring paths and information through acquaintances, it is necessary to continuously promote the curriculum to unspecified adult learners. Advertisement should take advantage of various convergence strategies such as hanging banners in the area, publicity of the subway, local newspapers, word of mouth, SNS, and the Internet.
  • 14.

    A Scheme on Anomaly Prevention for Systems in IoT Environment

    Keun-Ho Lee | 2019, 5(2) | pp.95~101 | number of Cited : 5
    Abstract
    Entering the era of the 4th Industrial Revolution and the Internet of Things, various services are growing rapidly, and various researches are actively underway. Among them, research on abnormal behaviors on various devices that are being used in the IoT is being conducted. In a hyper-connected society, the damage caused by one wrong device can have a serious impact on the various connected systems. In this paper, We propose a technique to cope with the problem that the threats caused by various abnormal behaviors such as anti-debugging scheme, anomalous process detection method and back door detection method on how to increase the safety of the device and how to use the device and service safely in such IoT environment.
  • 15.

    A study on IoT platform for private electrical facilities management

    JANG, KYUNGBAE | 2019, 5(2) | pp.103~110 | number of Cited : 5
    Abstract
    In this paper, we suggested how the Internet of Things (IoT) technology could be applied to an internet platform that is used for managing the customer’s power grid efficiently. For an internet platform with efficient management, analysis is done by several sections; communication method, and its protocol, and also security element. From this analysis, with currently used sensors, we have presented a development method for the sensor to server data reliable communication solution and data management server with a security solution. Moreover, this paper suggests a communication module that could be used for a power grid management platform, protocol and security algorithm and also a way to build a server for managing those systems and modules.