• 제목/요약/키워드: Multiple Client

검색결과 217건 처리시간 0.024초

우리 나라 가정.방문간호 사업을 위한 가정간호요구 사정도구 개발 - 자가간호개념에 근거한 가정간호진단을 중심으로 - (Development of a Home Care Need Assessment Tool - Focused on Home Care Nursing Diagnoses based on Self Care -)

  • 소애영;조병희
    • 지역사회간호학회지
    • /
    • 제13권3호
    • /
    • pp.433-443
    • /
    • 2002
  • Objectives; The purpose of this study was to develop a framework for home care and a Home Care Need Assessment Tool. Method 1. Identifying common domains in the provision of home care. 2. Charts of 253 home care clients were reviewed to obtain a classification of the nursing diagnoses. 3. A focus group methodology was used to develop the domains. 4. The tool was applied to 439 home care clients.(Kappa value=0.460-1.000, sensitivity, 0.444-1.000: specificity, 0.743-1.000). 5. Some refinements and extractions of the defining characteristics and related factors were made based on the results of the focus group. Results Home Care Need Assessment Tool consists of three parts; -Part I : factors related to basic conditions -Part II : a screening component that enables home care nurses to assess 30 multiple domains of 53 nursing diagnoses. -Part III : summative nursing diagnoses and nursing need intensity for the clients. Conclusion This tool provides a comprehensive assessment that helps the recognition of many strengths as well as problems of the clients. It will be usefully utilized in scheduling home care nursing plans and evaluating client outcomes.

  • PDF

Recipient S-CSCF Assured (RSA) Session Transfer for IMS based NGN

  • Yun, Chang-Ho;Cho, A-Ra;Kim, Seung-Geun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.355-364
    • /
    • 2010
  • A session transfer method, referred to as a Recipient Serving-call session control function (S-CSCF) Assured (RSA), is proposed in order to support both session mobility and consistency in IP multimedia subsystem (IMS) based next generation network (NGN). RSA session transfer simplifies a basic session transfer operation specified in [1] by using the user agent client (UAC) like characteristics of an S-CSCF. To show its efficiency, the session transfer delay and the traffic cost of RSA session transfer are investigated and compared with those of existing session transfer applications, including Assured and Consultative session transfers, by practically considering multiple session transfer failures. It is shown that RSA session transfer can further improve user experience by reducing session transfer delay as well as traffic cost than Assured and Consultative session transfers.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • 제37권4호
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

복제 웹 서버 환경에서 적응력 있는 서버 선택 메커니즘 (Adaptive Server Selection Mechanism in the Replicated Web Server Environment)

  • 김선호;신용태
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제31권9호
    • /
    • pp.495-502
    • /
    • 2004
  • 최근 인터넷 사용자와 대용량 콘텐츠의 급증으로 서버와 네트워크의 부하가 가중되고 서비스의 질이 떨어지는 문제가 발생하였다. 이러한 문제의 해결로 콘텐츠를 다수의 지역 서버에 복제하여 서비스하고자 하는 기술들이 대두되고 있고, 이런 환경에서는 클라이언트의 요청에 대해 서비스할 적절한 서버를 선택하는 것이 매우 중요한 문제이다. 그러므로 본 연구에서는 클라이언트의 요청 시점에서 인터넷 토폴로지 상 가깝고 부하가 적은 서버가 서비스할 수 있도록 하는 서버 선택 메커니즘을 설계하여 제안한다. 본 연구는 계속적으로 증가하는 대용량, 실시간 멀티미디어 콘텐츠의 빠르고 안정적인 서비스를 가능하게 할 것이며 이로 인해 디지털 콘텐츠 서비스의 새로운 비즈니스 모델 창출에 크게 기여할 수 있을 것이다.

다중 운영체제 플랫폼 소프트웨어 스트리밍 서비스의 구현과 성능평가 (The Implementation and Performance Evaluation of a Multi-OS Platform Software Streaming Services)

  • 오창훈;송동호;전용희
    • 한국통신학회논문지
    • /
    • 제33권1B호
    • /
    • pp.25-37
    • /
    • 2008
  • 네트워크 스트리밍 기술은 네트워크에서 스트리밍을 통하여 여러 가지의 애플리케이션 소프트웨어를 지원할 수 있는 서비스 방법이다. 멀티미디어 스트리밍 기술이 개발되어 광범위하게 사용되고 있지만, 소프트웨어 스트리밍 기술에 대한 연구는 활발하게 진행되지 않고 있다. 본 논문에서는, 개선된 성능을 가진 자바 언어 기반 소프트웨어 스트리밍 기술을 설계 및 구현하고, 기존 관련 시스템과 비교하고 여러 가지의 특성을 분석하고 성능 평가를 수행한다. 구현된 시스템은 윈도우 체제 이외에 다중 운영체제에서 사용될 플랫폼을 가지고 있다. 또한 클라이언트의 컴퓨터에 소프트웨어를 설치하지 않고 사용할 수 있으며, 사용자의 편리성이 극대화되는 이상적인 특징이 있다.

리스크 분석을 통한 지하 구조체 공법 선정에 관한 연구 (A Study on the Selection of Underground Construction Method by Risk Analysis)

  • 윤여완;양극영;홍성휘
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2001년도 학술논문발표회
    • /
    • pp.99-117
    • /
    • 2001
  • In the past, The selection of individual method of construction was done by head of construction site or an experienced person very frequently. By doing this, The wrong selection of construction method without exact adjudication of construction site situation lead to increasing of cost and extension of construction term. Finally it will effect all over the construction process. Especially, In case of Underground construction in the beginning, there are a lot of a variable factor and it also effect on the entire construction process and it need rely careful process. The purpose of this study is to present the best suitable methodology fer selection of construction method by considering potential risk of construction method and variables together with external condition for Underground construction. The purpose of this study is to select the most suitable construction method by analysing potential conditions(Construction site situation and Client. Request in designing) To do this, We prepared arrangement rule to arrangement conditions for construction method. And then make Checklist the analyzing construction method. Though above process, To expect the risk of individual construction method using above risk checklist and using Analytic Hierarchy Process among Multiple-Criteria Decision Making, the professional opinions is to be adapted. By doing this, It can lead and select the most suitable considering method considering the data which get from risk density test.

  • PDF

Ardulink 기반 MQTT를 이용한 센서 데이터 저장을위한 IoT 게이트웨이 설계 (Design of IoT Gateway for Storing Sensor Data using Ardulink based MQTT)

  • 라이오넬;장종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 추계학술대회
    • /
    • pp.744-747
    • /
    • 2017
  • The Internet of things (IoT) needs to be an event-driven approach for efficient real time response and processing. An IoT gateway is sometimes employed to provide the connection and translation between devices and the cloud. Storing data in the local database, and then forwarding it on the cloud is a task to be relegated to a gateway device In this paper, we propose the design of the IoT gateway with Fog computing for storing data from sensors into a local database. In the procedure of designing storing tasks, we propose to use the interfacing software known as Ardulink MQTT bridge. MQTT is a protocol for sensors to publish data to the clients. When it comes to needing historical data, MQTT connector can push MQTT data into SQL database. We write an MQTT client and based on the message topic insert the values into a SQL Database The design of IoT gateway with Fog computing adds value because it provides processing of the data across multiple devices before it sends to the cloud.

  • PDF

The Mediating Roles of Trust and System Quality in Achieving System Success: A System Integrator Perspective

  • JUN, Jongkun;LEE, Won-Jun;JUNG, Jongki
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제6권2호
    • /
    • pp.203-212
    • /
    • 2019
  • A system Integrator (SI) makes a consortium with multiple providers of hardware and software solutions to sell an information system. The success of information systems (IS) mainly depends on establishing a trustful relationship between SI supplier and client, and delivering high-quality system. However, the determinants of trust and system quality have been investigated mostly from the perspective of s ystem buyers rather than system sellers. This study examines the influence of key variables that SI can handle to improve trust and system quality which finally leads to user satisfaction toward SI. This study adopts resource complementarity, user participation and information sharing as the key variable then builds a research model to explain their relationships to user satisfaction. Respondents are recruited from 251 firms that have built any information system in recent two years in South Korea. Results of partial least square (PLS) modeling analysis show that both resource complementarity and information sharing have positive relationships with trust. Also the relationships between trust, system quality and user satisfaction toward S.I are supported. In addition, the mediating roles of trust and system quality are identified. We discussed some of the key managerial and theoretical implications of the paper and suggested further research directions.

An Optimal Peer Selection Algorithm for Mesh-based Peer-to-Peer Networks

  • Han, Seung Chul;Nam, Ki Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.133-151
    • /
    • 2019
  • In order to achieve faster content distribution speed and stronger fault tolerance, a P2P peer can connect to multiple peers in parallel and receive chunks of the data simultaneously. A critical issue in this environment is selecting a set of nodes participating in swarming sessions. Previous related researches only focus on performance metrics, such as downloading time or the round-trip time, but in this paper, we consider a new performance metric which is closely related to the network and propose a peer selection algorithm that produces the set of peers generating optimal worst link stress. We prove that the optimal algorithm is practicable and has the advantages with the experiments on PlanetLab. The algorithm optimizes the congestion level of the bottleneck link. It means the algorithm can maximize the affordable throughput. Second, the network load is well balanced. A balanced network improves the utilization of resources and leads to the fast content distribution. We also notice that if every client follows our algorithm in selecting peers, the probability is high that all sessions could benefit. We expect that the algorithm in this paper can be used complementary to existing methods to derive new and valuable insights in peer-to-peer networking.

Hyperledger Fabric을 이용한 중첩형 무한 해시체인 기반의 클라이언트 인증기법 (Client Authentication Scheme based on Infinitely Overlapped Hashchains on Hyperledger Fabric)

  • 신동진;박창섭
    • 융합보안논문지
    • /
    • 제18권4호
    • /
    • pp.3-10
    • /
    • 2018
  • 복수의 온라인 상거래 및 SNS 서비스에 가입해서 로그인 할 때 마다 사용자의 입장에서는 중복된 회원가입 및 별도의 식별자 / 패스워드를 관리해야 한다. 특히, 사용자와 SNS 서버는 동일한 비밀정보를 공유하기 때문에 서버공격에 의한 개인정보 유출은 사용자의 프라이버시 침해 및 금전적 피해를 유발 시킬 수 있다. 본 논문에서는 사용자의 로그인 인증을 위해 사용자 인증정보를 블록체인에 저장하여 다수의 SNS 서버가 공유하는 방식을 고려한다. 해시체인 기반 OTP를 개선한 인증기법을 사용하기 위해 Hyperledger Fabric을 이용하여 블록체인 네트워크의 노드를 구성하고 사용자는 단 한 번의 등록으로 동일한 식별자와 OTP를 사용하여 서비스를 제공받을 수 있는 아키텍처를 제안한다.

  • PDF