• Title/Summary/Keyword: Protection methods

Search Result 2,560, Processing Time 0.031 seconds

Factors Influencing Patient Privacy Protection Behavior among Nursing Students (간호대학생의 환자 프라이버시 보호행동 영향요인)

  • Lee, Eun Joo;Shin, Hyun Sook;Ha, Eun Chae
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.3
    • /
    • pp.225-234
    • /
    • 2018
  • Purpose: The purpose of this study was to identify factors influencing patient privacy protection behavior among nursing students and examine the relationships between these factors. Methods: Participants in this study were 144 nursing students who have experienced clinical practice. The data were analyzed using descriptive statistics, one-way ANOVA, Scheffe test, Pearson's correlation coefficient, and multiple regression with IBM SPSS Win 23.0 program. Results: Professional self-concept and ethical values were factors influencing patient privacy protection behavior among nursing students. These variables explained 21.9% of the variance for patient privacy protection behavior. A higher level of patient privacy protection behavior was associated with higher levels of professional self-concept and ethical values. Conclusion: The findings demonstrate that strategies for enhancing patient privacy protection behaviors of nursing students should include methods for forming images of positive nurses and firming ethical values.

Investigation of Design Methodology for Impressed Current Cathodic Protection Optimum System

  • Yao, Ping;Wu, Jianhua
    • Corrosion Science and Technology
    • /
    • v.7 no.4
    • /
    • pp.197-200
    • /
    • 2008
  • In this paper, physical scale modeling was employed to identify the configurations of ICCP system and the electric field signatures. Computational boundary element modeling technique has been used to simulate the performance of the CP system and to predict the associated electric fields signatures. The optimization methods combined with the computer models and physical scale modeling will be presented here, which enable the optimum system design to be achieved both in terms of the location and current output of the anode but also in the location of reference electrodes for impressed current cathodic protection(ICCP) systems. The combined methodology was utilized to determine optimal placement of ICCP components (anodes and reference electrodes) and to evaluate performance of ICCP system for the 2%, 10% and 14% wetted hull coatings loss. The objective is to design the system to minimise the electric field while at the same time provide adequate protection for the ship. The results show that experimental scale modeling and computational modeling techniques can be used in concert to design an optimum ICCP system and to provide information for quickly analysis of the system and its surrounding environment.

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection

  • BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.119-124
    • /
    • 2021
  • Elastic Optical Networks (EONs) allow to solve the high demand for bandwidth due to the increase in the number of internet users and the explosion of multicast applications. To support multicast applications, network operator computes a tree-shaped path, which is a set of optical channels. Generally, the demand for bandwidth on an optical channel is enormous so that, if there is a single fiber failure, it could cause a serious interruption in data transmission and a huge loss of data. To avoid serious interruption in data transmission, the tree-shaped path of a multicast connection may be protected. Several works have been proposed methods to do this. But these works may cause the duplication of some resources after recovery due to a link failure. Therefore, this duplication can lead to inefficient use of network resources. Our work consists to propose a method of protection that eliminates the link that causes duplication so that, the final backup path structure after link failure is a tree. Evaluations and analyses have shown that our method uses less backup resources than methods for protection of a multicast connection.

Over-Excitation Protection Relaying using the 345kV Power System Modeling Data (345kV 계통 모델링 데이터를 활용한 과여자 보호계전기법)

  • Park, Chul-Won;Ban, Yu-Hyeon
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.4
    • /
    • pp.175-180
    • /
    • 2011
  • A large AC generator is an important component of the power system. It is a need for research of AC generator protection relay for the next-generation ECMS and an efficient operation of protection control system. However, most of protection and control systems used in power plants have been still imported as turn-key and operated in domestic. This may cause the lack of the correct understanding on the protection systems and methods, and thus have difficulties in optimal operation. In this paper, over-excitation protection relaying is one of the protective factors in generator protection IED was presented. The cause and protection principles were dealt and, DFT-based gain compensation algorithm was adopted for the frequency measurement. The Republic of Korea 345kV modeling data by EMTP-RV was used for performance evaluation.

The Introduction of Submarine Cable Protection Method for HVDC Link Project Between Jindo and Jeju (진도~제주간 HVDC연계사업 해저케이블 보호공법 소개)

  • Lee, Jong-Seok;Moon, Bong-Soo;Song, Sam-Seob;Hong, Soon-Myung
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.359_360
    • /
    • 2009
  • KEPCO signed up with LS CABLE as a contractor for HVDC submarine cable construction in February 2009. The desk research has been completed in may 2009. Also, Cable route and the protection method will be selected by November 2009. The tentative cable route between Jindo and Jeju which is consisted of sea farms and shipping route zone will reach almost 105km. The oceanographic survey for the selection of protection method will be carried out and the survey lists are consisted of MBES, SSS, CPT, ADSP. The protection methods such as burial, Concrete Mattress, UP Pipe, Rock Berm will be selected as per each condition of sea area after the oceanographic survey is completed. Kepco has developed variable methods based on the maintenance experience for HVDC submarine cable between HAENAM and JEJU. Based on the such a accumulated know-how, it can be expected for the confidence and stability of the 2nd HVC project to be improved.

  • PDF

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

Knowledge of Radiation Protection and the Recognition and Performance of Radiation Protection Behavior among Perioperative Nurses (수술실 간호사의 방사선 방어에 대한 지식과 방사선 방어행위에 대한 인식도 및 수행도)

  • Kang, Sung Gum;Lee, Eun Nam
    • Journal of muscle and joint health
    • /
    • v.20 no.3
    • /
    • pp.247-257
    • /
    • 2013
  • Purpose: The purpose of this descriptive study was to investigate the knowledge of radiation protection and the recognition and performance of radiation protection behaviors among perioperative nurses. This study was intended to yield basic data for the development of nursing interventions aimed at improving the nurses' radiation protection behaviors. Methods: One hundred and thirty-seven nurses working in the operating room participated in a survey from September 1 to 30, 2011. The data was analyzed using t-test, ANOVA, and Pearson's correlation with the SPSS/WIN 19.0 program. Results: The average score of radiation protection knowledge was $7.57{\pm}3.45$ out of 16. The average score for the recognition and performance of radiation protection behaviors was $4.32{\pm}0.23$. The knowledge of radiation protection was significantly correlated with the recognition and performance of radiation protection behaviors. Conclusion: Expanding the knowledge of radiation protection could lead to the increase of the recognition and performance of radiation protection behaviors. Therefore, promoting the performance of radiation protection behaviors by improving perioperative nurses' knowledge of radiation protection through reinforcing radiation-related education hereafter could be an important part of nursing.

Biological assessment of streams and rivers in U.S. - design, methods, and analysis

  • Rashleigh, Brenda;Paulson, Steve;Flotemersch, Joe;Pelletier, Peg
    • Journal of Ecology and Environment
    • /
    • v.36 no.1
    • /
    • pp.85-88
    • /
    • 2013
  • Bioassessment is the use of biosurvey data, most commonly for benthic macroinvertebrates and fish, to obtain information about the health of waters in a region. In rivers, bioassessment results are used to evaluate biological condition and trends, to establish relationships between stressors and impairments, and to guide and evaluate management actions.

Factors Affecting Radiation Protection Behaviors among Operating Room Nurses (수술실 간호사의 방사선 방어행위의 영향 요인)

  • Kim, Jin;Kim, Jin Sun;Kim, Hyunlye
    • Korean Journal of Adult Nursing
    • /
    • v.28 no.6
    • /
    • pp.680-690
    • /
    • 2016
  • Purpose: This study was designed to identify knowledge, attitude, environment, and self-efficacy among perioperative nurses in terms of radiation protection and to describe those factors affecting radiation protection behaviors. Methods: The sample was comprised of 128 perioperative nurses who agreed to participate in this descriptive study. Data were collected from a self-administered questionnaire and were analyzed using the t-test, analysis of variance, Mann-whitney U test, Kruskal-Wallis test, Pearson's correlation, and multiple regression analyses. Results: Radiation protection behaviors were significantly different by participant's gender, length of career as a perioperative nurse, educational level and prior experience with radiation protection education. Radiation protection behaviors were significantly correlated with radiation protection environment and self-efficacy in terms of radiation protection behaviors. In the multiple linear regression models, radiation protection environment and self-efficacy on radiation protection behaviors were statistically significant predictors of radiation protection behaviors, which accounted for 50.3% of variance in dependent variable. Conclusion: This study concluded that radiation protective environment in operating room is important to promote radiation protective behaviors and radiation safety management program to enhance self-efficacy is highly recommended.