• Title/Summary/Keyword: PROTOCOL

Search Result 13,905, Processing Time 0.039 seconds

Protocol for Physical Restraints of Patients in Nursing Homes (노인요양시설의 신체적 억제대 프로토콜 개발)

  • Lim, Mi Hye;Ko, Il Sun
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.20 no.4
    • /
    • pp.345-358
    • /
    • 2013
  • Purpose: The purpose of this study was to develop a protocol that would help prevent accidents, apply physical restraints properly, and reduce the use of physical restraints in nursing homes. Method: A review of the literature and analysis of existing statutes and regulations were used to develop the preliminary protocol. To test the validity of this preliminary protocol, ten experts were selected from academia and clinical practice to review the protocol. The initial protocol was finalized after it had been reviewed by experts and tested for clinical validity in five different nursing homes. Result: The protocol consists of objectives, definitions and accident probability assessment, principle of using physical restraints, monitoring and documentation of physical restraints. Conclusion: The findings of this study can be used as guidelines to focus on preventing accidents arising out of use of physical restraints, assessing the probability of accidents, and reducing the use of physical restraints through preventive interventions. This will be helpful to prevent ethical, physical, or psychological problems arising from use of physical restraints and to protect the rights of elderly people in nursing homes.

Development and Evaluation of e-EBPP(Evidence-Based Practice Protocol) System for Evidence-Based Dementia Nursing Practice (근거중심 치매 간호실무를 위한 e-EBPP 시스템 개발 및 평가)

  • Park, Myonghwa
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.3
    • /
    • pp.411-424
    • /
    • 2005
  • Purpose: The purpose of this study was to develop and evaluate e-EBPP(Evidence-based Practice Protocol) system for nursing care for patients with dementia to facilitate the best evidence-based decision in their dementia care settings. Method: The system was developed based on system development life cycle and software prototyping using the following 5 processes: Analysis, Planning, Developing, Program Operation, and Final Evaluation. Result: The system consisted of modules for evidence-based nursing and protocol, guide for developing protocol, tool for saving, revising, and deleting the protocol, interface tool among users, and tool for evaluating users' satisfaction of the system. On the main page, there were 7 menu bars that consisted of Introduction of site, EBN info, Dementia info, Evidence Based Practice Protocol, Protocol Bank, Community, and Site Link. In the operation of the system, HTML, JavaScript, and Flash were utilized and the content consisted of text content, interactive content, animation, and quiz. Conclusion: This system can support nurses' best and cost-effective clinical decision using sharable standardized protocols consisting of the best evidence in dementia care. In addition, it can be utilized as an e-learning program for nurses and nursing students to learn use of evidence based information.

  • PDF

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

A Revised QT Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 QT 프로토콜)

  • Lim, In-Taek;Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.430-436
    • /
    • 2006
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev protocol outperforms the QT protocol in terms of the number of queries and the number of response bits.

Anti-Collision Protocol with Stop Signal in RFID Systems (RFID 시스템에서 중지 신호를 이용한 충돌방지 프로토콜)

  • Lim In-Taek;Choi Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.4
    • /
    • pp.638-644
    • /
    • 2006
  • In this paper, a QT_ss protocol is proposed for identifying all the tags within the identification range. The proposed QT_ss protocol revises the QT protocol, which has a memoryless property. In the QT_ss protocol, the tag will send all the bits of their identification codes when the query string matches the first bits of their identification codes. While the tags are sending their identification codes, if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ss protocol outperforms the QT protocol in terms of the number of response bits.

Implementation of Global Position Location System using X.400 Protocol (X.400을 이용한 글로벌 위치확인 시스템 구현)

  • Lee, Myung-Eui
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.2
    • /
    • pp.178-182
    • /
    • 2005
  • The proposed system in this paper is designed to provide users with a means of global location information using Orbcomm satellite communication and X.400 protocol. The system's two-way data transmission capabilities allow users to track mobile or fixed objects anywhere in the world via Internet. This study utilizes the X.400 protocol, and the SIP(Serial Interface Protocol) and self defined control protocol to implement data communication link in this paper. Data processor board connected to SC(Subscriber Communicator) is also designed and implemented to interface with GPS receiver. The experimental results of the proposed global position location system is evaluated through real-time experiments, and we have confirmed it works well according to the protocol designed in this paper.

  • PDF

Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols

  • Nam, Junghyun;Choo, Kim-Kwang Raymond;Kim, Moonseong;Paik, Juryon;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3244-3260
    • /
    • 2013
  • A three-party password-based authenticated key exchange (PAKE) protocol allows two clients registered with a trusted server to generate a common cryptographic key from their individual passwords shared only with the server. A key requirement for three-party PAKE protocols is to prevent an adversary from mounting a dictionary attack. This requirement must be met even when the adversary is a malicious (registered) client who can set up normal protocol sessions with other clients. This work revisits three existing three-party PAKE protocols, namely, Guo et al.'s (2008) protocol, Huang's (2009) protocol, and Lee and Hwang's (2010) protocol, and demonstrates that these protocols are not secure against offline and/or (undetectable) online dictionary attacks in the presence of a malicious client. The offline dictionary attack we present against Guo et al.'s protocol also applies to other similar protocols including Lee and Hwang's protocol. We conclude with some suggestions on how to design a three-party PAKE protocol that is resistant against dictionary attacks.

A Novel WBAN MAC protocol with Improved Energy Consumption and Data Rate

  • Rezvani, Sanaz;Ghorashi, S. Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2302-2322
    • /
    • 2012
  • Wireless Body Area Networks (WBANs) are introduced as an enabling technology in tele-health for patient monitoring. Designing an efficient Medium Access Control (MAC) protocol is the main challenge in WBANs because of their various applications and strict requirements such as low level of energy consumption, low transmission delay, the wide range of data rates and prioritizing emergency data. In this paper, we propose a new MAC protocol to provide different requirements of WBANs targeted for medical applications. The proposed MAC provides an efficient emergency response mechanism by considering the correlation between medical signals. It also reduces the power consumption of nodes by minimizing contention access, reducing the probability of the collision and using an efficient synchronization algorithm. In addition, the proposed MAC protocol increases the data rate of the nodes by allocating the resources according to the condition of the network. Analytical and simulation results show that the proposed MAC protocol outperforms IEEE 802.15.4 MAC protocol in terms of power consumption level as well as the average response delay. Also, the comparison results of the proposed MAC with IEEE 802.15.6 MAC protocol show a tradeoff between average response delay and medical data rate.

Cooperative Nano Communication in the THz Gap Frequency Range using Wireless Power Transfer

  • Samarasekera, A. Chaminda J.;Shin, Hyundong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5035-5057
    • /
    • 2019
  • Advancements in nanotechnology and novel nano materials in the past decade have provided a set of tools that can be used to design and manufacture integrated nano devices, which are capable of performing sensing, computing, data storing and actuation. In this paper, we have proposed cooperative nano communication using Power Switching Relay (PSR) Wireless Power Transfer (WPT) protocol and Time Switching Relay (TSR) WPT protocol over independent identically distributed (i.i.d.) Rayleigh fading channels in the Terahertz (THz) Gap frequency band to increase the range of transmission. Outage Probability (OP) performances for the proposed cooperative nano communication networks have been evaluated for the following scenarios: A) A single decode-and-forward (DF) relay for PSR protocol and TSR protocol, B) DF multi-relay network with best relay selection (BRS) for PSR protocol and TSR protocol, and C) DF multi-relay network with multiple DF hops with BRS for PSR protocol and TSR protocol. The results have shown that the transmission distance can be improved significantly by employing DF relays with WPT. They have also shown that by increasing the number of hops in a relay the OP performance is only marginally degraded. The analytical results have been verified by Monte-Carlo simulations.

Development of a Standardized Education Protocol for Peritoneal Dialysis Patients (복막투석 환자를 위한 표준화된 간호교육 프로토콜의 개발)

  • Kang, Jeong-Hee;Kang, Ji-Yeon;Lee, Young-Ock
    • Journal of Korean Critical Care Nursing
    • /
    • v.4 no.2
    • /
    • pp.47-60
    • /
    • 2011
  • Purpose: The purpose of this study was to develop a standardized education protocol for peritoneal dialysis patients. Methods: First, the demand for education was investigated from the 27 patients on peritoneal dialysis and 16 guardians, and later, the standardized nursing education protocol has been developed through the comprehensive literature review and the critical analysis of the related studies. Contents validity and applicability have been tested through the expert group survey. Results: The standardized peritoneal dialysis nursing education protocol with 9 areas and 20 items has been developed. The content validity for timing and duration, contents, method, and place of education proposed by the protocol were all above than 0.8. In terms of the applicability of the protocol, the experts scored between 4.20 to 4.93 for all items except one. The item on home visit education acquired the lowest applicability score, because there might exist potential restrictions in visiting patient's home. Conclusion: The standardized education protocol developed in this study turned out to be adequate by representing high content validity for all items and the applicability also was high except the item on home visit education. Further researches to test the effects of this education protocol should be done.

  • PDF