• Title/Summary/Keyword: Protocol Adaptation

Search Result 101, Processing Time 0.026 seconds

Development and Evaluation of an Evidence-Based Nursing Protocol for Fever Management in Adult Patients (성인 발열 환자를 위한 근거기반 간호 지침 개발 및 평가)

  • Shin, Yong Soon;Kim, Sung Reul;Yoo, Sung-Hee;Kim, Sun Hwa;Kim, Jeoung Hee;Kim, Hyun Jung;Na, Ra;Chae, Jee Sun;Lee, Hye Jin;An, Young Hee;Kim, Kyoung-Ok
    • Korean Journal of Adult Nursing
    • /
    • v.25 no.3
    • /
    • pp.250-262
    • /
    • 2013
  • Purpose: This study was designed to develop, to implement and evaluate a fever management nursing protocol for adult patients. Methods: This study was conducted through seven steps following both the guideline development procedures of the Scottish Intercollegiate Guidelines Network and the Model of the Asan Medical Center Evidence-Based Practice, as follows: 1) identifying the clinical needs and composition of the protocol development group; 2) identifying and evaluating the evidence; 3) assessing the level of evidence and grading recommendations; 4) forming a protocol; 5) evaluating the protocol using an expert group validity test and identifying barriers to its implementation; 6) protocol development; and 7) evaluation of practical improvement measures following implementation of the protocol. Results: The evidence-based protocol for fever management in adult patients was completed and includes five domains and 15 items. The protocol had good content validity (CVI=.90) and nursing practice could be improved after implementation of the protocol. Conclusion: This nursing protocol can be used as a guide for nursing in febrile adult patients. We recommend that further guidelines be updated in an interdisciplinary manner in order to foster local adaptation of the best clinical practices.

Extending Network Domain for IEEE1394

  • Lee, Seong-Hee;Park, Seong-Hee;Choi, Sang-Sung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.177-178
    • /
    • 2005
  • Wireless 1394 over IEEE802.15.3 must allow a data reserved for delivery over a wired 1394 network to be delivered over an IEEE802.15.3 wireless network through bridging IEEE 1394 to IEEE802.15.3. Isochronous transfers on the 1394 bus guarantee timely delivery of data. Specifically, isochronous transfers are scheduled by the bus so that they occur once every $125\;{\mu}s$ and require clock time synchronization to complete the real-time data transfer. IEEE1394.1 and Protocol Adaptation Layer for IEEE1394 over IEEE802.15.3 specify clock time synchronization for a wired 1394 bus network to a wired 1394 bus network and wireless 1394 nodes, which are IEEE802.15.3 nodes handling 1394 applications, over IEEE802.15.3. Thus, the clock time synchronizations are just defined within a homogeneous network environment like IEEE1394 or IEEE802.15.3 until now. This paper proposes new clock time synchronization method for wireless 1394 heterogeneous networks between 1394 and 802.15.3. If new method is adopted for various wireless 1394 products, consumer electronics devices such as DTV and Set-top Box or PC devices on a 1394 bus network can transmit real time data to the AV devices on the other 1394 bus in a different place via IEEE 802.15.3.

  • PDF

Adaptive Data Transmission Control for Multilane-Based Ethernet

  • Han, Kyeong-Eun;Kim, Kwangjoon;Kim, SunMe;Lee, Jonghyun
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.146-149
    • /
    • 2013
  • We propose a reconciliation sublayer (RS)-based lane and traffic control protocol for energy-efficient 40-G/100-G Ethernet. The RS performs active/inactive lane control and data rate adaptation depending on active lane information received from the upper layer. This protocol does not result in a processing delay in the media access control layer, nor is an additional buffer required at the physical layer for dynamic lane control. It ensures minimal delay and no overhead for the exchange of control frames and provides a simple adaptive data rate.

Adaptation of Secure Algorithm of Short Messaging Services(SMS) on CDMA Network (CDMA에서 단문 메시지 서비스(SMS)의 보안 적용 알고리즘)

  • Kim Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.30-37
    • /
    • 2006
  • At the present, Short Messaging Transfer Protocol Standard described under TIA/EIA/IS-637-A does not cover the measures for security at all. Sequentially, in case of necessity, it seems to be a better idea that security functions are made up for current short messaging transfer protocol. This paper proposes security mechanisms including algorithms and protocols for Short Messaging Services(SMS) which present not only high levels of confidentiality and integrity but also appropriate level of authentication.

  • PDF

ADSL을 이용한 Access Network의 Architectures, Interfaces 및 Protocols

  • 김기호
    • Information and Communications Magazine
    • /
    • v.16 no.10
    • /
    • pp.125-136
    • /
    • 1999
  • ADSL은 일반 가정이나 SOHO에서 Internet access나 Remote LAN Access와 같은 application을 대상으로 사용하기에 적합하다. 제 2장에서는 CPN에서의 configuration, usage scenario를 알아보고 splitter configuration들과 PDN, SM, TE간의 interface가 어떻게 정의되는가를 살펴보았다. 제 3장에서는 central office의 configuration을 간단히 살펴보고, DSLAM 및 service provider network의 requirement들을 알아보았다. 제 4장에서는 원활한 network adaptation 및 service를 위한 Frame based 및 ATM based ADSL architecture들에 대해 언급하고 가능한 protocol stacks들에 대해 간단히 알아보았다. 또한 home network이나 corporate network에서 필요한 tunneling protocol이나 firewall의 구현가능성도 검토하였다. 현재 이러한 내용들이 ADSL Forum에서 활발히 논의되고 있으나, UADSL을 비롯한 ADSL의 대규모 설치에 따른 field trial 및 service를 통해 장단점이 검증될 것으로 보이며 따라서 앞으로 $1\sim2$년 후에나 좀더 효율적인 ADSL architecture, interface 및 protocol이 표준모델로 정착될 것으로 보인다.

  • PDF

Context-aware Based Distributed Clustering for MANET (상황인식 기반의 MANET을 위한 분산 클러스터링 기법)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.277-280
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method that the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient.

  • PDF

Performance analysis of multiple access mechanism based on error adaptation in CDMA cellular system (CDMA 셀룰러 시스템용 오율 적응 다중 엑세스 기법의 성능분석)

  • 송상호;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.713-720
    • /
    • 1996
  • In recent, the demand of mobile communication system is increasing rapidly. However, since wireless resources is limitted, the protocol to utilize wireless resource efficiently is needed. Up to now, Slotted CDMA_ALOHA(S_CDMA_ALOHA) and Mini-Slotted CDMA_ALOHA(MS_CDMA_ALOHA) methods are proposed as a CDMA_ALOHA mechanism, and it is turned out that MS_CDMA_ALOHA offers betterperformance than S_CDMA_ALOHA mechanism. Also, IS-95 multiple access mechanism has been proposed as common air interface(CAI) protocol of CDMA digital cellular system. However, in former study, the performance evaluations were made without considertion of chnnel characteristics of wireless communication environment. In this paper, a new access mechanism for improring the performance in the DS/CDMA digital cellular environment is suggested. This mechanism is adaptive to the channel condition and based on the conventional MS_CDMA_ALOHA mechanism. Also, the performance of new access mechanism is compared with that of conventional mechanisms, through computer simulation. According tot h simulation results, it is shown that the proposed NA_CDMA_ALOHA(Noise-Adaptation CDMA_ALOHA) mechanism offers better performance than conventional three CDMA_ALOHA mechanisms in view of mean delay time and system throughput characteristics. This phenomenon is due to the fast that NA_CDMA_ALOHA mechanism controls the access attempts efficiently based on the channel condition in heavy traffic environments.

  • PDF

Early Rate Adaptation Protocol in DiffServ for Multimedia Applications (멀티미디어 서비스를 위한 DiffServ 망에서의 빠른 혼잡 제어 알고리즘)

  • Park Jonghun;Yoo Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.39-46
    • /
    • 2005
  • As the multimedia application traffic takes more portion in the internet traffic, it is necessary to control the network congestion through the congestion control protocol. In addition, the QoS-enabled networks such as DiffServ become an indispensable technology when running the multimedia applications. However, the previously proposed end-to-end congestion control algorithms take the round trip time to react the network congestion. Thus, as the RTT becomes larger, the reaction against the congestion gets delayed further, while the network congestion gets worse. In addition the performance of end-to-end congestion control algorithm is degraded if the QoS-enabled network runs the congestion control mechanism in the network level without any coordination between them. In this paper, we propose the early rate adaptation protocol for the DiffServ network which effectively linke the congestion control algorithm at the host and the congestion mechanism in the network together. By taking advantage of early congestion notification from the network it is possible to react the network congestion more quickly and effectively.

Design and Implementation of a R1000/R2000 based RFID Reader Which Supports the Low Level Reader Protocol (LLRP를 지원하는 R1000/R2000 겸용 RFID 리더)

  • Bae, Sung-Woo;Ryu, Won-Sang;Kwak, Ho-Gil;Joung, Sub-Myoung;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.279-286
    • /
    • 2010
  • RFID reader protocol is an interface between RFID readers and higher (host) such as RFID middlewares and applications. At present, reader protocols provided by vendors are different from each other and there are compatibility problems in environment using heterogeneous readers. In this paper, to solve this problem, an RFID reader which supports LLRP(Low Level Reader Protocol), a well-known standard reader protocol presented by EPCglobal is designed and implemented. It is designed with two modules and supports various interfaces for easy adaptation to various applications. The LLRP protocol is implemented over a embedded LINUX multi-thread environment. It not only supports almost all properties of LLRP, and is designed with flexible hardware/software architecture to meet various requirements.

Clustering Ad hoc Network Scheme and Classifications Based on Context-aware

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.475-479
    • /
    • 2009
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Current research activity for the Minimum Energy Multicast (MEM) problem has been focused on devising efficient centralized greedy algorithms for static ad hoc networks. In this paper, we consider mobile ad hoc networks(MANETs) that could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method, the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that CACH could find energy efficient depth of hierarchy of a cluster.