• Title/Summary/Keyword: Protocol Analysis

Search Result 2,547, Processing Time 0.027 seconds

A Multi-path Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks (이동 애드 혹 네트워크를 위한 다중경로 동적 소스 라우팅 프로토콜)

  • Lim Hwa-Jung;Tscha Yeong-hwan
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.111-120
    • /
    • 2005
  • A mobile ad-hoc network is an autonomous system of mobile nodes which are free to move around randomly and organize themselves arbitrarily, hence a routing protocol that handles the dynamic network topology changes is required for the network. In this paper we present a multi -Path on-demand routing protocol called R-DSR (Robust Dynamic Source Routing), an extension to the existing IETF protocol DSR. The proposed protocol has it that every pair of 2-hop away nodes on the single route is additionally connected via an alternative node. Throughout mathematical analysis we show the proposed protocol reveals higher message delivery rate than that of the Das's multi-path protocol, currently known as one of the most typical approaches related to DSR.

Protocol for Physical Restraints of Patients in Nursing Homes (노인요양시설의 신체적 억제대 프로토콜 개발)

  • Lim, Mi Hye;Ko, Il Sun
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.20 no.4
    • /
    • pp.345-358
    • /
    • 2013
  • Purpose: The purpose of this study was to develop a protocol that would help prevent accidents, apply physical restraints properly, and reduce the use of physical restraints in nursing homes. Method: A review of the literature and analysis of existing statutes and regulations were used to develop the preliminary protocol. To test the validity of this preliminary protocol, ten experts were selected from academia and clinical practice to review the protocol. The initial protocol was finalized after it had been reviewed by experts and tested for clinical validity in five different nursing homes. Result: The protocol consists of objectives, definitions and accident probability assessment, principle of using physical restraints, monitoring and documentation of physical restraints. Conclusion: The findings of this study can be used as guidelines to focus on preventing accidents arising out of use of physical restraints, assessing the probability of accidents, and reducing the use of physical restraints through preventive interventions. This will be helpful to prevent ethical, physical, or psychological problems arising from use of physical restraints and to protect the rights of elderly people in nursing homes.

Development and Evaluation of e-EBPP(Evidence-Based Practice Protocol) System for Evidence-Based Dementia Nursing Practice (근거중심 치매 간호실무를 위한 e-EBPP 시스템 개발 및 평가)

  • Park, Myonghwa
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.3
    • /
    • pp.411-424
    • /
    • 2005
  • Purpose: The purpose of this study was to develop and evaluate e-EBPP(Evidence-based Practice Protocol) system for nursing care for patients with dementia to facilitate the best evidence-based decision in their dementia care settings. Method: The system was developed based on system development life cycle and software prototyping using the following 5 processes: Analysis, Planning, Developing, Program Operation, and Final Evaluation. Result: The system consisted of modules for evidence-based nursing and protocol, guide for developing protocol, tool for saving, revising, and deleting the protocol, interface tool among users, and tool for evaluating users' satisfaction of the system. On the main page, there were 7 menu bars that consisted of Introduction of site, EBN info, Dementia info, Evidence Based Practice Protocol, Protocol Bank, Community, and Site Link. In the operation of the system, HTML, JavaScript, and Flash were utilized and the content consisted of text content, interactive content, animation, and quiz. Conclusion: This system can support nurses' best and cost-effective clinical decision using sharable standardized protocols consisting of the best evidence in dementia care. In addition, it can be utilized as an e-learning program for nurses and nursing students to learn use of evidence based information.

  • PDF

Development of a Standardized Education Protocol for Peritoneal Dialysis Patients (복막투석 환자를 위한 표준화된 간호교육 프로토콜의 개발)

  • Kang, Jeong-Hee;Kang, Ji-Yeon;Lee, Young-Ock
    • Journal of Korean Critical Care Nursing
    • /
    • v.4 no.2
    • /
    • pp.47-60
    • /
    • 2011
  • Purpose: The purpose of this study was to develop a standardized education protocol for peritoneal dialysis patients. Methods: First, the demand for education was investigated from the 27 patients on peritoneal dialysis and 16 guardians, and later, the standardized nursing education protocol has been developed through the comprehensive literature review and the critical analysis of the related studies. Contents validity and applicability have been tested through the expert group survey. Results: The standardized peritoneal dialysis nursing education protocol with 9 areas and 20 items has been developed. The content validity for timing and duration, contents, method, and place of education proposed by the protocol were all above than 0.8. In terms of the applicability of the protocol, the experts scored between 4.20 to 4.93 for all items except one. The item on home visit education acquired the lowest applicability score, because there might exist potential restrictions in visiting patient's home. Conclusion: The standardized education protocol developed in this study turned out to be adequate by representing high content validity for all items and the applicability also was high except the item on home visit education. Further researches to test the effects of this education protocol should be done.

  • PDF

Development of User Protocol Converter about Modbus and NMEA0183 (Modbus와 NMEA0183에 대한 사용자 프로토콜 컨버터 개발)

  • Eum, Sang-hee;Hong, Sung-ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2584-2589
    • /
    • 2015
  • In this paper, we want to able to reduce the time effectively about the analysis of protocol and development of protocol converter in industrial network. For this purpose, we developed the user protocol converter that can be to analysing the communication protocol in the industrial network. and also that is able to converting to user protocol and transmitting to another network. The developed user protocol converter was consist of S/W and H/W, and is supporting the Modbus, the NMEA0183 and the ethernet. The hardware main processor was used the AVR128, and placed the serial communication part and the ethernet part in converter board. The experiment results, we acquired very high transmission rate and conversion rate.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Development of a Protocol for Nursing Care after Death for Adult Patients in Hospitals (병원 성인 환자의 사후 간호 프로토콜 개발)

  • Kim, Ki Kyong;Kim, Aeng Do;Ahn, Kyung Ah;Cheon, Jooyoung
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.1
    • /
    • pp.75-84
    • /
    • 2023
  • Purpose: This study developed a protocol for nursing care after death for adult patients in hospitals. Methods: This was a methodological study to develop a care after death protocol. The preliminary protocol was developed based on a literature review, guidelines, and practice recommendations from groups of experts and clinical nurses. Content validity was evaluated by a group of experts (n=6) and nurses (n=30) in two hospitals. Results: The preliminary protocol recommendations were modified by validation and the open-question analysis results. The final protocol comprised three general recommendations and 43 recommendations in five steps that are verification and notification of a death, personal care of the body, viewing the patient, patient transfer, and documentation and self-care. Conclusion: This study result provides nurses with a consensus information on patient care after death and family support in a hospital setting. This nursing protocol is expected to improve the quality of care after death for adult patients and their families, and can be used for developing educational and emotional support for nurses to accomplish their important role.

Symmetric Tree Replication Protocol for Efficient Distributed Storage System (효율적인 분산 저장 시스템을 위한 대칭 트리 복제 프로토콜)

  • 최성춘;윤희용;이강신;이호재
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.9
    • /
    • pp.503-513
    • /
    • 2004
  • In large distributed systems, replications of data and service are needed to decrease communication cost, increase availability, and avoid single server bottleneck. Tree Quorum protocol is a representative replication protocol, which exploits a logical structure. Tree quorum protocol is one of the replication protocols allowing low read cost only in the best case, while the number of replicas exponentially increases as the level grows. In this paper, thus, we propose a new replication protocol, called symmetric tree protocol which efficiently solves the problem. The proposed symmetric tree protocol also requires much smaller read cost than previous protocols. We conduct cost and availability analysis of the protocols, and the proposed protocol displays comparable read availability to the tree protocol using much smaller number of nodes. Also, the symmetric tree protocol has much smaller response time than the logarithmic protocol.

A Study on Performance analysis of protocol in VPN (가상 사설망에서 프로토롤의 성능분석에 관한 연구)

  • 김도문;전문석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.625-632
    • /
    • 2003
  • We are view of the information on VPN(Virtual private Network) into each difference layer protocol. network on mutuality exchanged of information is importance of the confidentiality and Integrity. But it is presented problems about compatability and availability between variable equipment as several protocol. hence, it was achieved of the transmission through encryption and authentication of information, although there is secured an intended attack from the third intruder. so tunneling VPN system on achieving, each layer position transmit of mutuality exchanged. This study will investigate the codification and certified security status when layer2 and layer 3 informations are each transmitted using protocol with integrity Public Key. In addition, we will using protocol and the performance analysis difference between layers and layers.

  • PDF