연구성과로 돌아가기

2020 연구성과 (221 / 270)

※ 컨트롤 + 클릭으로 열별 다중 정렬 가능합니다.
Excel 다운로드
WoS SCOPUS Document Type Document Title Abstract Authors Affiliation ResearcherID (WoS) AuthorsID (SCOPUS) Author Email(s) Journal Name JCR Abbreviation ISSN eISSN Volume Issue WoS Edition WoS Category JCR Year IF JCR (%) FWCI FWCI Update Date WoS Citation SCOPUS Citation Keywords (WoS) KeywordsPlus (WoS) Keywords (SCOPUS) KeywordsPlus (SCOPUS) Language Publication Stage Publication Year Publication Date DOI JCR Link DOI Link WOS Link SCOPUS Link
Conference paper A real-time video processing implementation with massively parallel computation support Recently, performance of mobile device's processor has advanced dramatically. There are many researches to utilize the processor computing ability to maximize application performance. In the field of augmented reality (AR), video stream processing is an application that requires large amount of computing powers, from the real-time processing point of view. However, due to nature of mobile platforms, unnecessary overheads should be minimized to acquire higher performance. In this paper, we introduce OpenCL based video frame segmentation to minimize unnecessary overhead in video processing applications, with dynamically changing the local work group size. Our prototype system show at most 2.3 times speed-up compared to well-known, de-facto image processing library OpenCV. © 2020 IEEE. Shin, Woosuk; Kim, Mingyu; Park, Sukjun; Baek, Nakhoon School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea; School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea; School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea; School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea 57192417891; 57201126946; 57212930681; 7007017954 2020 International Conference on Electronics, Information, and Communication, ICEIC 2020 0.21 2025-06-25 1 Massively parallel processing; Mobile computing; Real-time video processing Augmented reality; Image processing; Application performance; Image processing libraries; Massively parallels; Processor computing; Real-time video processing; Realtime processing; Stream processing; Video processing applications; Video signal processing English Final 2020 10.1109/iceic49074.2020.9051222 바로가기 바로가기
Review A review of privacy-preserving human and human activity recognition Many automation technologies using software are making humans convenient. One of these technologies is to collect data through cameras and sensors that are common in personal life and automatically recognize human and human activities. The goal of automation is to analyze the various types of big data that are difficult to perform mechanical data mining. Raw data collected from cameras and sensors are nothing but big data before analysis. In this case, how to protect data by secure storage is the most important issue. However, when the context-aware semantic information such as a specific person and his behavior is extracted from the analysis, the security sensitivity is increased. In other words, the secondary information generated by interpreting and extracting personal location and behavioral information contained in images and videos is linked to other personal information, causing privacy infringement issues. Privacy issues become important because there is a lot of software that everyone can access. Therefore, it is necessary to study privacy protection methods in the automatic recognition of human and human activities. This paper analyzes the cutting-edge research trends, techniques, and issues of privacy-preserving human and human activity recognition. Jung, Im Y. Kyungpook Natl Univ, Sch Elect Engn, Coll IT Engn, Daegu, South Korea 18037522200 iyjung@ee.knu.ac.kr; INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS INT J SMART SENS INT 1178-5608 13 1 ESCI ENGINEERING, ELECTRICAL & ELECTRONIC 2020 N/A 0.93 2025-06-25 17 18 Human recognition; Human activity recognition; Privacy protection; Machine learning Human activity recognition; Human recognition; Machine learning; Privacy protection English 2020 2020-01 10.21307/ijssis-2020-008 바로가기 바로가기 바로가기 바로가기
Conference paper A Routing Protocol Based on Multi-factor Decision in VANET Vehicular ad hoc network (VANET) is a special form of Mobile Ad hoc Network (MANET), which plays a key role in the Intelligent Transportation System (ITS). Though many outstanding geographic routing protocols are designed for VANETs, Most of the existing proposals only consider a single factor, which makes the link easy to break. In this research, we propose a Routing Protocol Based on Multi-factor Decision (RMFD), which utilizes several features. The scheme is divided into two parts, namely vehicular decision management and intersection decision management. In the vehicular component, a route is establishes between two adjacent static nodes by calculating a fuzzy performance score using Triangular Fuzzy Number (TFN). In the Intersection management, static nodes located at the intersection are selects to decide which road segment the data will be forwarded to. © 2020 IEEE. Cao, Zhenbo; Diyan, Muhammad; Han, Kijun Kyungpook National University, School of Computer Science and Engineering, South Korea; Kyungpook National University, School of Computer Science and Engineering, South Korea; Kyungpook National University, School of Computer Science and Engineering, South Korea 57145726600; 26028317800; 7402963670 kjhan@knu.ac.kr; 2020 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2020 1.33 2025-06-25 8 fuzzy number; ITS, routing protocol; routing protocol, fuzzy number; VANET; VANET, ITS Fuzzy sets; Intelligent systems; Intelligent vehicle highway systems; Routing protocols; Decision management; Geographic routing protocols; Intelligent transportation systems; Intersection managements; Multi factors; Road segments; Triangular fuzzy numbers; Vehicular ad hoc networks English Final 2020 10.1109/icce-asia49877.2020.9277478 바로가기 바로가기
Article A Seamless Adaptive Video Streaming Technique Based on the Double DQN With the recent spread of smartphones, HTTP Adaptive Streaming (HAS)-based video streaming services are becoming more common. The key to HAS-based streaming technology is to choose the video quality that is suitable for dynamic changing network environments and various terminal conditions, making it difficult to consider various environmental variables if only procedural algorithms are used. To compensate for this, various methods of introducing artificial intelligence techniques are being tried, and this paper proposes a Double DQN(DDQN)-based video quality selection algorithm. This method addresses the disadvantages of existing Deep Q-Network(DQN)-based research that although it effectively increases Quality of Experience(QoE), it takes a long time to create a learning model and over-estimation problems occur during the learning process. It also shows that learning model creation time can be reduced by about 21% while choosing more appropriate video quality. © 2020, Korean Institute of Communications and Information Sciences. All rights reserved. Choi, Minje; Jung, Sungwook; Lim, Kyungshik Kyungpook National University, School of Computer Science and Engineering, South Korea; Kyungpook National University, School of Computer Science and Engineering, South Korea; Kyungpook National University, School of Computer Science and Engineering, South Korea 58961868200; 57203641457; 8665522100 kslim@knu.ac.kr; Journal of Korean Institute of Communications and Information Sciences 1226-4717 45 10 0 2025-06-25 0 Adaptive Video Streaming; DASH; Q-learning; Reinforcement Learning Korean Final 2020 10.7840/kics.2020.45.10.1700 바로가기 바로가기
Proceedings Paper A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks With the development of Information and Communication Technology (ICT) and low-power devices, users can access the internet of things (IoT) services provided in various environments such as smart factory, smart health-care, and smart home. However, users cannot withstand various attacks, because sensitive information is transmitted through an open channel. Therefore, secure authentication schemes are essential to provide IoT services for legal users. In 2019, Banerjee et al. proposed an enhanced and secure authentication protocol in wireless sensor networks (WSN) using smart card. They claimed that their protocol can resist against various attacks such as user impersonation and session key disclosure attacks and cannot provide achieve mutual authentication. However, we demonstrated that Banerjee et al.'s protocol cannot prevent various attacks, including impersonation and session key disclosure attacks and cannot achieve mutual authentication. Therefore, we propose a secure biometric based user authentication protocol in wireless sensor networks to resolve these security flaws of Banerjee et al.'s protocol. We prove that our protocol can prevent various attacks such as smart card stolen attack, user impersonation attack, session key disclosure attack and replay attack and provide secure mutual authentication using informal security analysis. In addition, we compare the performance and security features of the proposed scheme with related schemes. We show that the proposed scheme provides slightly higher than Banerjee et al.'s scheme. Furthermore, we demonstrate that the proposed protocol provides better safety than related schemes. Consequently, our protocol can be suitable for practical IoT based WSN environment. Yu, SungJin; YoungLee, Joon; Kim, MyeongHyun; Park, YoungHo Kyungpook Natl Univ, Sch Elect Engn, Daegu, South Korea 57203974524; 57216313041; 57210278739; 56962990300 darkskiln@naver.com;harry250@naver.com;kimmyeong12@naver.com;parkyh@knu.ac.kr; 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) 0.74 2025-06-25 3 5 Authentication; Biometric; IoT; WSN; Cryptanalysis; Countermeasures KEY; INTERNET; SCHEME Authentication; Biometric; Countermeasures; Cryptanalysis; IoT; WSN Authentication; Automation; Biometrics; Cryptography; Home health care; Internet of things; Internet protocols; Security systems; Smart cards; Wireless sensor networks; Information and Communication Technologies; Internet of thing (IOT); Low-power devices; Mutual authentication; Secure authentications; Sensitive informations; User authentication protocols; User impersonation attacks; Network security English 2020 2020 10.1109/ccwc47524.2020.9031136 바로가기 바로가기 바로가기
Article A service-oriented cloud modeling method and process The transition of software development from web to cloud has been accelerated. The development of cloud services requires a modeling method that reflects the characteristics of cloud including personalized service, resource sharing service, grouped and distributed services, and cross-platform operability. This study aimed to suggest a method of developing UML-based cloud services suitable for the characteristics of cloud services. A cloud service metamodel was defined using cloud applications' characteristic modeling elements, and after that, how these cloud modeling elements are expressed into UML modeling elements was defined with an integrated metamodel between cloud and UML. By applying this hierarchical cloud metamodel, an MDA and MVC-based service-oriented cloud modeling process was established. By doing so, it will be possible to easily design services (applications) and solutions that are suitable for cloud computing environments, and in particular, to create hierarchical reuse models by the level of the abstraction of model-driven development. © 2020 Institute of Advanced Engineering and Science. All rights reserved. Song, Chee-Yang; Cho, Eun-Sook Department of Software, Kyungpook National University, 2559, Kyeongsang Dae-ro, Sangju-Si, Gyeongsang Buk-Do, 742-711, South Korea; Department of Software Engineering, Seoil University, South Korea 8546000500; 7202649957 cysong@knu.ac.kr; International Journal of Electrical and Computer Engineering 2088-8708 10 1 0.16 2025-06-25 3 Cloud metamodel; Cloud modeling process; Cloud service; Development method; MDA English Final 2020 10.11591/ijece.v10i1.pp962-977 바로가기 바로가기
Review A short review: Comparisons of high-throughput phenotyping methods for detecting drought tolerance Drought is a major threat worldwide for crop production, especially due to the rapid climate changes. Current drought solutions involve improving irrigation system, rainwater harvesting, damming, cloud seeding, and changes of cultivation methods. Despite effective, each solution has economic, environmental, and temporal drawbacks. Among all solutions, the most effective, inexpensive and manageable method is the use of drought-tolerant cultivars via plant breeding. However, conventional plant breeding is a time-consuming and laborious task, especially for phenotypic data acquisition of target traits of numerous progenies. High-throughput phenotyping (HTP) is a recently developed method and has potential to overcome the mentioned issues. HTP offers massive, accurate, rapid, and automatic data acquisition in the breeding procedure and can be a breakthrough for developing drought resistant/tolerant cultivars. This study introduces various methods of HTP to detect drought stress, which can accelerate the breeding processes of drought-tolerant cultivars to provide helpful guidelines for breeders and researchers to choose appropriate methods. © 2020, Scientia Agricola. All rights reserved. Kim, Jaeyoung; Kim, Ki-Seung; Kim, Yoonha; Chung, Yong Suk Jeju National University, Dept. of Plant Resources and Environment, Jejudaehak-ro 102, Jeju-si, 63243, Jeju-do, South Korea; FarmHannong Ltd, Daejeon, 34115, South Korea; Kyungpook National University – Major in Plant Bioscience, Daegu, 41566, South Korea; Jeju National University, Dept. of Plant Resources and Environment, Jejudaehak-ro 102, Jeju-si, 63243, Jeju-do, South Korea 58060905400; 24463202100; 57224866763; 36983850100 yschung@jejunu.ac.kr; Scientia Agricola 0103-9016 78 4 0.78 2025-06-25 23 Drought solution; Image analysis; Plant breeding; Remote sensing platforms; Sensors English Final 2020 10.1590/1678-992x-2019-0300 바로가기 바로가기
Proceedings Paper A Simplified Structure of the Simplest Interval Type-2 Fuzzy Two-Term Controller Interval Type-2 (IT2) fuzzy controllers are quite efficient in handling disturbances and uncertainties. This is mainly due to the Footprint of Uncertainty (FoU) in type-2 fuzzy sets. However the computational complexity also increases with FoU. Therefore we propose a simplified structure of IT2 Takagi-Sugeno (TS) fuzzy two-term controller in this paper. A novel TS rule base is introduced which incorporates uncertainty in the input type-2 fuzzy sets and also in the rule consequent parameters. The rule base consists of two rules which are logically connected with 'Algebraic Product (AP)' AND operator and 'Bounded Sum (BS)' OR operator. AP and BS operators enable the simplification of the input plane which in turn reduces the complexity of the controller structure. Further, the performance of the controller structure is evaluated through simulation study on a nonlinear (coupled-tank) system. (C) 2020, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved. Raj, Ritu; Mohan, B. M.; Yang, Jung-Min Kyungpook Natl Univ, Sch Elect Sci, Daegu, South Korea; IIT Kharagpur, Dept Elect Engn, Kharagpur, W Bengal, India ; Bosukonda, Murali/KLE-0140-2024 57189688598; 7006334785; 57208450551 riturajsam@gmail.com;mohan@ee.iitkgp.ac.in;jmyang@ee.knu.ac.kr; IFAC PAPERSONLINE 2405-8963 53 1 1.15 2025-06-25 5 6 Mathematical model; Takagi-Sugeno (TS) controller; PI/PD controller; Interval Type-2 (IT2) fuzzy control; Footprint of uncertainty (FoU) COMPUTATIONAL COST; PI Footprint of uncertainty (FoU); Interval Type-2 (IT2) fuzzy control; Mathematical model; PI/PD controller; Takagi-Sugeno (TS) controller Controllers; Dynamical systems; Fuzzy sets; Controller structures; Footprint of uncertainties; Fuzzy controllers; Interval type-2 fuzzy; Simulation studies; Takagi-sugeno; Two-term controllers; Type-2 fuzzy set; Fuzzy inference English 2020 2020 10.1016/j.ifacol.2020.06.110 바로가기 바로가기 바로가기
Article A Structural Model on the Post-Traumatic Growth of Police Officers Purpose: The purpose of this study is to construct and test a structural model for the Post-traumatic Growth (PTG) of police officers. The conceptual model is based on Calhoun and Tedeschi's PTG theory. Methods: Data were collected from 269 police officers working at 10 police stations in Seoul from September 26 to October 9, 2017. The exogenous variable was traumatic experiences, and endogenous variables were pain perception, self disclosure, social support, deliberate rumination, and PTG. The collected data were analyzed in order to calculate the direct and indirect effects of factors affecting PTG using SPSS/WIN 23.0 and AMOS 21.0. Results: The hypothetical model showed a good fit to the data: x2/df=2.57, GFI=.90, CFI=.95, TLI=.91, RMSEA=.07, SRMR=.07. The hypothetical model showed a similar result with the data, and out of 10 paths, 7 were statistically significant. The model explained 36% of the variance in the PTG of police officers. The model confirmed that social support and deliberate rumination had a direct effect, and that self-disclosure had an indirect effect on police officers' PTG. Conclusion: Nursing intervention programs to increase PTG of police officers should focus on deliberate rumination, social support, and self-disclosure. In addition, they should be accompanied by various crisis managements and consultations that can promote PTG. © 2020 Korean Academy of Community Health Nursing. All Rights Reserved. Han, Seung Woo; Choi, Eun Suk Assistant Professor, Department of Emergency Medical Technology, Kyungil University, Gyeongsan; Professor, Department of Nursing · Research Institute of Nursing Science, Kyungpook National University, Deagu, South Korea 57210797256; 56542373200 eschoi2007@knu.ac.kr; Journal of Korean Academy of Community Health Nursing 1225-9594 31 3 0.15 2025-06-25 2 Growth; Pain perception; Police; Self disclosure; Social support article; conceptual model; consultation; data analysis software; endogenous variable; exogenous variable; human; nociception; nursing intervention; police; rumination; self disclosure; social support; South Korea; structural model; theoretical study English Final 2020 10.12799/jkachn.2020.31.3.348 바로가기 바로가기
Conference paper A study of x-ray radiation shielding properties of bricks contained barium sulfate The x-ray room wall thickness is usually around 20-25 centimeters, using clay bricks and cement as material to create x-ray protective barrier for staffs and patients. Gain more space to provide a wall of X-ray room. In this study, the x-ray radiation shielding properties of bricks contained barium sulfate (BaSO4) was determined at the proportion of barium sulfate and clay about 0, 5, 10, 15 and 20% in parameters radiation dose between 50-120 kilovoltage (kVp) 40 milliamperes seconds (mAs) for radiation shielding to employees and members of the public. The results revealed that the Mass attenuation coefficient value (μm) are increased when the proportion of barium sulfate is higher. Nevertheless, they are decreased when radiation dose is higher. The half-value layer (HVL) are decreased when barium sulfate increase. The HVL of barium sulfate brick less than when compared with commercial brick and concrete. The results indicating the potential of the prepared barium sulfate brick as lead free for x-ray room. © 2020 Author(s). Kiatwattanacharoen, S.; Srimaroeng, P.; Kothan, S.; Jumpee, C.; Kim, H.J.; Kaewjaeng, S. Department of Radiologic Technology, Faculty of Associated Medical Sciences, Chiang Mai University, Chiang Mai, 50200, Thailand; Department of Radiologic Technology, Faculty of Associated Medical Sciences, Chiang Mai University, Chiang Mai, 50200, Thailand; Department of Radiologic Technology, Faculty of Associated Medical Sciences, Chiang Mai University, Chiang Mai, 50200, Thailand; Department of Radiologic Technology, Faculty of Associated Medical Sciences, Chiang Mai University, Chiang Mai, 50200, Thailand; Department of Physics, Kyungpook National University, Daegu, 702-701, South Korea; Department of Radiologic Technology, Faculty of Associated Medical Sciences, Chiang Mai University, Chiang Mai, 50200, Thailand 30467831200; 57220004874; 6507017165; 56149899400; 59051568100; 55871868200 Suchart_kiat@yahoo.com; AIP Conference Proceedings 0094-243X 2279 3.67 2025-06-25 11 English Final 2020 10.1063/5.0022959 바로가기 바로가기
Proceedings Paper A study on conceptual design of test equipment to evaluate grasp strength of gripper for robotic manipulator Conceptual design of test equipment to evaluate grasp strength of gripper for robotic manipulator is specified. As usage and installation rate of robotic manipulator has been increased, importance of performance evaluation of end-effector, specifically gripper has become one of the most important factors for safe usage of robotic arm in the field of industry. In order to secure safety workplace, especially where robotic manipulators handle heavy objects, apply rightful gripper by using exact capability. Under this circumstance, grasp strength of gripper has been key factor to evaluate performance of gripper and robotic manipulation. Thus, we have developed mechanical factors in regards of test equipment in order to achieve higher level of test result by considering two points. One of them is modularity of test equipment and the other one is to make the equipment adjustable on sensor location. Kim, Hongseob; Kim, Jihan; Kang, Bo-Yeong; Woo, JongWoon; Baek, Hyung-taek Korea Inst Robot Ind Adv, Certificat & Assessment Ctr, Daegu 41496, South Korea; Kyungpook Natl Univ, Dept Mech Engn, Daegu 41566, South Korea Kang, Bo-Yeong/IXW-6764-2023 khs1330@kiria.org;jihankim8383@knu.ac.kr;kby09@knu.ac.kr;woon@kiria.org;aslucky@kiria.org; 2020 20TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS) 2093-7121 0 Robotics and Mechatronics; Grasp strength test equipment; Performance evaluation English 2020 2020 바로가기
Conference paper A study on conceptual design of test equipment to evaluate grasp strength of gripper for robotic manipulator Conceptual design of test equipment to evaluate grasp strength of gripper for robotic manipulator is specified. As usage and installation rate of robotic manipulator has been increased, importance of performance evaluation of end-effector, specifically gripper has become one of the most important factors for safe usage of robotic arm in the field of industry. In order to secure safety workplace, especially where robotic manipulators handle heavy objects, apply rightful gripper by using exact capability. Under this circumstance, grasp strength of gripper has been key factor to evaluate performance of gripper and robotic manipulation. Thus, we have developed mechanical factors in regards of test equipment in order to achieve higher level of test result by considering two points. One of them is modularity of test equipment and the other one is to make the equipment adjustable on sensor location. © 2020 Institute of Control, Robotics, and Systems - ICROS. Hongseob Kim, First A.; Jihan Kim, Second B.; Bo-Yeong Kang, Third C.; Jongwoon Woo, Fourth D; Hyung-Taek Baek, Fifth E. Korea Institute for Robot Industry Advancement, Certification Assessment Center, Daegu, 41496, South Korea; Kyungpook National University, Department of Mechanical Engineering, Daegu, 41566, South Korea; Kyungpook National University, Department of Mechanical Engineering, Daegu, 41566, South Korea; Korea Institute for Robot Industry Advancement, Certification Assessment Center, Daegu, 41496, South Korea; Korea Institute for Robot Industry Advancement, Certification Assessment Center, Daegu, 41496, South Korea 57221043980; 57221052466; 26643468300; 57221047690; 57221048881 kby09@knu.ac.kr; International Conference on Control, Automation and Systems 1598-7833 2020-October 0 2025-06-25 0 Grasp strength test equipment; Performance evaluation; Robotics and Mechatronics Conceptual design; End effectors; Equipment testing; Flexible manipulators; Grippers; Industrial robots; Robotics; Test facilities; Key factors; Mechanical factors; Robotic manipulation; Robotic manipulators; Sensor location; Test equipments; Two-point; Industrial manipulators English Final 2020 10.23919/iccas50221.2020.9268345 바로가기 바로가기
Proceedings Paper A study on evaluation method for indoor guide robot As applications of service robotics has become widely broaden, necessity for evaluation method upon each particular application of service robots stands out in order to secure safe usage of service robot products and promote service robot market. With these circumstances, this study focused on developing evaluation method for guide robot particularly with 2 reasons: popularity of guide robots and functional universality. By analyzing common functions of guide robots, we developed evaluation method and criteria on indoor guide robot. Through the development process, we expect that we could develop other particular evaluation methods for specific application types on the basis of this study. Kim, Jihan; Kang, Bo-Yeong; Woo, JongWoon; Baek, Hyung-taek Korea Inst Robot Ind Adv, Certificat & Assessment Ctr, Daegu 41496, South Korea; Kyungpook Natl Univ, Dept Mech Engn, Daegu 41566, South Korea Kang, Bo-Yeong/IXW-6764-2023 jihankim8383@kiria.org;kby09@knu.ac.kr;woon@kiria.org;aslucky@kiria.org; 2020 20TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS) 2093-7121 2 Service robot; Indoor guide robot; Evaluation method English 2020 2020 바로가기
Conference paper A study on evaluation method for indoor guide robot As applications of service robotics has become widely broaden, necessity for evaluation method upon each particular application of service robots stands out in order to secure safe usage of service robot products and promote service robot market. With these circumstances, this study focused on developing evaluation method for guide robot particularly with 2 reasons: popularity of guide robots and functional universality. By analyzing common functions of guide robots, we developed evaluation method and criteria on indoor guide robot. Through the development process, we expect that we could develop other particular evaluation methods for specific application types on the basis of this study. © 2020 Institute of Control, Robotics, and Systems - ICROS. Jihan Kim, A.; Bo-Yeong Kang, B.; Jongwoon Woo, C.; Hyung-Taek Baek, D. Korea Institute for Robot Industry Advancement, Certification Assessment Center, Daegu, 41496, South Korea; Kyungpook National University, Department of Mechanical Engineering, Daegu, 41566, South Korea; Korea Institute for Robot Industry Advancement, Certification Assessment Center, Daegu, 41496, South Korea; Korea Institute for Robot Industry Advancement, Certification Assessment Center, Daegu, 41496, South Korea 57198531396; 26643468300; 57221054372; 57221048265 kby09@knu.ac.kr; International Conference on Control, Automation and Systems 1598-7833 2020-October 0.21 2025-06-25 2 Evaluation method; Indoor guide robot; Service robot Control engineering; Development process; Evaluation methods; Guide robots; Service robotics; Service robots; Mobile robots English Final 2020 10.23919/iccas50221.2020.9268281 바로가기 바로가기
Article A study on identification of the heat vulnerability area considering spatial autocorrelation - Case study in Daegu The IPCC (Intergovernmental Panel on Climate Change) recommended the importance of preventive measures against extreme weather, and heat waves are one of the main themes for establishing preventive measures. In this study, we tried to analyze the heat vulnerable areas by considering not only spatial characteristics but also social characteristics. Energy consumption, popu lation density, normalized difference vegetation index, waterfront distance, solar radiation, and road distribution were examined as variables. Then, by selecting a suitable model, SLM (Spatial Lag Model), available variables were extracted. Then, based on the Fuzzy theory, the degree of vulnerability to heat waves was analyzed for each variable, and six variables were superimposed to finally derive the heat vulnerable area. The study site was selected as the Daegu area where the effects of the heat wave were high. In the case of vulnerable areas, it was confirmed that the existing urban areas are mainly distributed in Seogu, Namgu, and Dalseogu of Daegu, which are less affected by waterside and vegetation. It was confirmed that both spatial and social characteristics should be considered in policy support for reducing heat waves in Daegu. © 2020 Korean Society of Surveying. All rights reserved. Seong, Ji Hoon; Lee, Ki Rim; Kwon, Yong Seok; Han, You Kyung; Lee, Won Hee Dept. of Spatial Information, South Korea, Kyungpook National University, South Korea; Dept. of Spatial Information, South Korea, Kyungpook National University, South Korea; Daegu Gyeongbuk Development Institute, South Korea; School of Convergence & Fusion System Engineering, Kyungpook National University, South Korea 57204212026; 57193932338; 57219532235; 55457676600; 57190774365 wlee33@knu.ac.kr; Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography 1598-4850 38 4 0.22 2025-06-25 3 Climate Change; Heat Vulnerability Area; Moran's I; Spatial Regression; Vulnerability Assessment South Korea; Taegu [South Korea]; Taegu [Taegu (ADS)]; autocorrelation; climate change; fuzzy mathematics; heat wave; identification method; regression analysis; spatial analysis; vulnerability Korean Final 2020 10.7848/ksgpc.2020.38.4.295 바로가기 바로가기
페이지 이동:

논문 데이터 용어 설명

용어 설명
WoS Web of Science. Clarivate Analytics에서 제공하는 학술 데이터베이스입니다. 해당 논문이 WoS에 수록되어 있는지 여부를 표시합니다 (○: 수록됨).
SCOPUS Elsevier에서 제공하는 세계 최대 규모의 초록 및 인용 데이터베이스입니다. 해당 논문이 SCOPUS에 수록되어 있는지 여부를 표시합니다 (○: 수록됨).
Document Type 문헌의 유형을 나타냅니다. Article(원저), Review(리뷰), Proceeding Paper(학회논문), Editorial Material(편집자료), Letter(레터) 등으로 분류됩니다.
Title 논문의 제목입니다.
Abstract 논문의 초록(요약)입니다. 연구의 목적, 방법, 결과, 결론을 간략히 요약한 내용입니다.
Authors 논문의 저자 목록입니다. 공동 저자가 여러 명인 경우 세미콜론(;)으로 구분됩니다.
Affiliation 저자들의 소속 기관 정보입니다. 대학, 연구소, 기업 등 저자가 소속된 기관명이 표시됩니다.
ResearcherID (WoS) Web of Science의 고유 연구자 식별번호입니다. 동명이인을 구분하고 연구자의 업적을 정확하게 추적할 수 있습니다.
AuthorsID (SCOPUS) SCOPUS의 고유 저자 식별번호입니다. 연구자의 모든 출판물을 추적하고 관리하는 데 사용됩니다.
Journal 논문이 게재된 학술지의 정식 명칭입니다.
JCR Abbreviation Journal Citation Reports에서 사용하는 저널의 공식 약어입니다. 저널을 간략하게 표기할 때 사용됩니다.
ISSN International Standard Serial Number. 국제표준연속간행물번호로, 인쇄본 저널에 부여되는 고유 식별번호입니다.
eISSN Electronic ISSN. 전자 버전 저널에 부여되는 고유 식별번호입니다.
Volume 저널의 권(Volume) 번호입니다. 보통 연도별로 하나의 권이 부여됩니다.
Issue 저널의 호(Issue) 번호입니다. 한 권 내에서 여러 호로 나누어 출판되는 경우가 많습니다.
WoS Edition Web of Science의 에디션입니다. SCIE(Science Citation Index Expanded), SSCI(Social Sciences Citation Index), AHCI(Arts & Humanities Citation Index) 등으로 구분됩니다.
WoS Category Web of Science의 주제 분류 카테고리입니다. 저널과 논문이 속한 학문 분야를 나타냅니다.
JCR Year 해당 저널의 JCR(Journal Citation Reports) 지표가 산출된 연도입니다.
IF (Impact Factor) 저널 영향력 지수. 최근 2년간 발표된 논문이 해당 연도에 평균적으로 인용된 횟수를 나타냅니다. 저널의 학술적 영향력을 나타내는 대표적인 지표입니다.
JCR (%) 해당 카테고리에서 저널이 위치하는 상위 백분율입니다. 값이 낮을수록 우수한 저널임을 의미합니다 (예: 5%는 상위 5%를 의미).
FWCI Field-Weighted Citation Impact. 분야별 가중 인용 영향력 지수입니다. 논문이 받은 인용을 동일 분야, 동일 연도, 동일 문헌 유형의 평균과 비교한 값입니다. 1.0이 평균이며, 1.0보다 높으면 평균 이상의 인용을 받았음을 의미합니다.
FWCI UpdateDate FWCI 값이 마지막으로 업데이트된 날짜입니다. FWCI는 인용이 누적됨에 따라 주기적으로 업데이트됩니다.
WOS Citation Web of Science에서 집계된 해당 논문의 총 인용 횟수입니다.
SCOPUS Citation SCOPUS에서 집계된 해당 논문의 총 인용 횟수입니다.
Keywords (WoS) 저자가 논문에서 직접 지정한 키워드입니다. Web of Science에 등록된 저자 키워드 목록입니다.
KeywordsPlus (WoS) Web of Science에서 자동으로 추출한 추가 키워드입니다. 논문의 참고문헌 제목에서 자주 등장하는 단어들로 생성됩니다.
Keywords (SCOPUS) 저자가 논문에서 직접 지정한 키워드입니다. SCOPUS에 등록된 저자 키워드 목록입니다.
KeywordsPlus (SCOPUS) SCOPUS에서 자동으로 추출하거나 추가한 색인 키워드입니다.
Language 논문이 작성된 언어입니다. 대부분 English이며, 그 외 다양한 언어로 작성된 논문이 포함될 수 있습니다.
Publication Year 논문이 출판된 연도입니다.
Publication Date 논문의 정확한 출판 날짜입니다 (년-월-일 형식).
DOI Digital Object Identifier. 디지털 객체 식별자로, 논문을 고유하게 식별하는 영구적인 식별번호입니다. 이를 통해 논문의 온라인 위치를 찾을 수 있습니다.