• 제목/요약/키워드: S/KEY

검색결과 9,881건 처리시간 0.042초

A Statistical Study on the Key Words in the Titles of Nursing Related Theses (학위논문의 주요어 분석 (간호학 및 간호학관련 학위논문을 중심으로 : 1960-1991. 8))

  • 고옥자;김상혜;김희걸;이금재;이영숙
    • Journal of Korean Academy of Nursing
    • /
    • 제24권1호
    • /
    • pp.58-69
    • /
    • 1994
  • In order to see the development of Nursing related research activities in Korea over the last three decades, abstracts of almost all of the Master and Ph.D theses that appeared from 1961 up to August 1991 were collected. The number of theses was 2354, from which an index of key words has been constructed. Key words were defined as those terms in each thesis title that convey major objectives of the given thesis study and the important nursing concepts dealt with in the thesis. Although all the key words were picked from the thesis title only, full use was made of the abstracts in deciding the principal objectives and essential contents of the thesis studies and their important concepts as well. In total, 539 kinds of key words were identified from the 2354 titles, and the identified words were all found to be in the International Nursing Index. On an average each title has two key words. Which key words were most frequently used, how they have changed with time, what kind of concept is preferably dealt with by each graduate school, and the concepts to which a given key word is likely to be connected were examined. The results are summerized below : 1) For each decade the theses numbers were as follows : 54(2.3%) from the 60’s, 413(17.5%) from the 70’s, 1523(64.7%) from the 80’s, and 364(15.5%) from the 90’s. Master’s thesis contributed 96% (2252) of the papers and Ph. D’s theses filled the remaining 4%(102). 2) A total of 539 key words were used, averaging about 2 for each thesis. The most frequently used key words were ‘Nurse’, ‘Anxiety’, ‘Knowledge / Attitude /Practice’, ‘Stress /Stressor’, ‘Attitude’, ‘Job-Satisfaction’, ‘Mental Disorder’, ‘Operation’, ‘Elderly’, ‘Nursing Role’. 3) Each decades key words can be classified as : the 60’s : ‘Nursing Education’, ‘Pulmonary Tuberculosis’, ‘Mother-Child Health’, ‘Growth & Development’, ‘Public Facilities’, ‘Mental Disorder’ : the 70’s : ‘Nurse’, ‘Family Planning’, ‘Attitude’ / ‘Knowledge, Attitude / Practice’, ‘Curriculum in Nursing Education’, ‘Clinical Practice in Nursing’, ‘Analysis of the Work of the Nurse’, ‘Health Education of School’, : the 80’s : ‘Nurse’, ‘Anxiety’, ‘Stress /Stressor’, ‘Operation’, ‘Nursing Role’, ‘Job Satisfaction’ : the 90’s : ‘Nurse’, ‘Elderly’, ‘Family-Support’, ‘Stress /Stressor’, ‘Home Care’. Key word ‘Nurse’ appears continuously and most frequently through the years, which indicates that there has been active study of the characteristics of nurses and related fields. The concept ‘Anxiety’ has been studied steadly from the 80’s and it shows that interest in health and disease are increasing Which comes as a result of society changing to an industrial and informational community. 4) Looking into each graduate school’s study area key words ‘Anxiety’, ‘Nurse’, ‘Mental Disorder’, ‘Stress /Stressor’, ‘Operation’, ‘Attitude’, ‘Hemo-dialysis’, were studied in the regular graduate school : ‘Family Planning /Contraception’, ‘Knowledge / Attitude /Practice’, ‘Physical Health-State /Physical Health Examination’, ‘Nurse’, ‘Using Clinical Facilities’, ‘Health Education of School’, were studied in the Graduate School of Public Health’ ; ‘Nurse’, ‘Anxiety’, ‘Stress / Stressor’, ‘Job-Satisfaction’, ‘Clinical Practice Education’, ‘Nursing Education’, were studied in the Graduate School of Education : ‘Nurse’, ‘Job Satisfaction’, ‘Nursing Role’, ‘Administration - Employment /Employment Management’, ‘Leadership’, ‘Personnel Profile’, ‘Nursing Manpower / Changing Working Place’, were studied in the Graduate School of Public Administration. 5) The Connection between key words were : ‘Nurse Job Satisfaction’, ‘Stress / Stressor ⇔ Coping / Ajustment’, ‘Nurse ⇔ Nursing Role’, ‘Anxiety ⇔ Giving Information’, ‘Nurse ⇔ Stress / Stressor’, ‘Anxiety ⇔ Operation’, ‘Nurse ⇔ Burnout’, ‘Knowledge, Attitude, Practice ⇔ Family Planning’, ‘Nurse Administration ⇔ Employment’, ‘Anxiety Muscle ⇔ Relaxation Technic’, ‘Anxiety ⇔ Mental Disorder’. From the above it can be noted that many nursing concepts were handled in the thesis titles. But there were more than enough papers on the characteristics of the nurse. It is suggested that in depth research be made on ‘Nursing Accidents’, t-‘Ethics’, ‘Nurse - Patient Interactions’, ‘Spritual Care’, ‘Dying’, ‘Hospice’, ‘Resident Helper’ and that there should be in depth research relating to the physical and mental development of youth and in particular physical concepts like ‘Drug - Abuse’, ‘Child -Abuse and Teaching’.

  • PDF

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • 제3권9호
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

Effects of Selenizing Codonopsis pilosula Polysaccharide on Macrophage Modulatory Activities

  • Qin, Tao;Ren, Zhe;Lin, Dandan;Song, Yulong;Li, Jian;Ma, Yufang;Hou, Xuehan;Huang, Yifan
    • Journal of Microbiology and Biotechnology
    • /
    • 제26권8호
    • /
    • pp.1358-1366
    • /
    • 2016
  • The purpose of the present study was to investigate the immune-enhancing activity of selenizing Codonopsis pilosula polysaccharide (sCPPS5) in nonspecific immune response. In in vitro experiment, the results showed that sCPPS5 could promote the phagocytic uptake, NO production, and TNF-α and IL-6 secretion of RAW264.7 cells. sCPPS5 could also strongly increase the IκB-α degradation in the cytosol and the translocation of NF-κB p65 subunit into the nucleus of RAW264.7 cells. In the vivo experiment, sCPPS5 at medium doses could significantly improve the phagocytic index of peritoneal macrophages and induce the secretion of TNF-α and IL-6. Moreover, the effect of sCPPS5 was significantly better than Codonopsis pilosula polysaccharide (CPPS). These results indicated that selenylation modification could significantly enhance the immune-enhancing activity of CPPS in the nonspecific immune response.

Assessing the Diagnostic Value of Serum Dickkopf-related Protein 1 Levels in Cancer Detection: a Case-control Study and Meta-analysis

  • Jiang, Xiao-Ting;Ma, Ying-Yu;Guo, Kun;Xia, Ying-Jie;Wang, Hui-Ju;Li, Li;He, Xu-Jun;Huang, Dong-Sheng;Tao, Hou-Quan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권21호
    • /
    • pp.9077-9083
    • /
    • 2014
  • Background: This study aimed to summarize the potential diagnostic value of serum DKK1 levels in cancer detection. Materials and Methods: Serum DKK1 was measured using enzyme-linked immunosorbent assay in a case-control study. Then we performed a meta-analysis and the pooled sensitivity, specificity, diagnostic odds ratio, and summary receiver operating characteristic (sROC) curves were used to evaluate the overall test performance. Results: Serum DKK1 levels were found to be significantly upregulated in gastric cancer as compared to controls. ROC curve analysis revealed an AUC of 0.636, indicating the test has the potential to diagnose cancer with poor accuracy. The summary estimates of the pooled sensitivity, specificity and diagnostic odds ratio in meta-analysis were 0.55 with a 95% confidence interval (CI) (0.53-0.57), 0.86 (95%CI, 0.84-0.88) and 12.25 (95%CI, 5.31-28.28), respectively. The area under the sROC was 0.85. Subgroup analysis revealed that the diagnostic accuracy of serum DKK1 in lung cancer (sensitivity: 0.69 with 95%CI, 0.66-0.74; specificity: 0.95 with 95%CI, 0.92-0.97; diagnostic odds ratio: 44.93 with 95%CI, 26.19-77.08) was significantly higher than for any other cancer. Conclusions: Serum DKK1 might be useful as a noninvasive method for confirmation of cancer diagnosis, particularly in the case of lung cancer.

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model

  • Wu, Xiaonian;Yan, Jiaxu;Li, Lingchen;Zhang, Runlian;Yuan, Pinghai;Wang, Yujue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권10호
    • /
    • pp.3815-3833
    • /
    • 2021
  • MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the contradiction of the impossible differential distinguisher. To analyze the security of ESF algorithm, this paper introduces a simplified MILP-based search model of the differential distinguisher by reducing constrains of XOR and S-box operations, and variables by combining cyclic shift with its adjacent operations. Also, a new method to find contradictions of the impossible differential distinguisher is proposed by introducing temporary variables, which can avoid wrong and miss selection of contradictions. Based on a 9-round impossible differential distinguisher, 15-round attack of ESF can be achieved by extending forward and backward 3-round in single-key setting. Compared with existing results, the exact lower bound of differential active S-boxes in single-key setting for 10-round ESF are improved. Also, 2108 9-round impossible differential distinguishers in single-key setting and 14 12-round impossible differential distinguishers in related-key setting are obtained. Especially, the round of the discovered impossible differential distinguisher in related-key setting is the highest, and compared with the previous results, this attack achieves the highest round number in single-key setting.

A Study on the Defense Key Interface Profiles Process for Improving Interoperability (상호운용성 향상을 위한 국방 KIP 프로세스에 관한 연구)

  • Park, H.K.;Jeong, C.K.
    • Journal of the military operations research society of Korea
    • /
    • 제35권3호
    • /
    • pp.61-79
    • /
    • 2009
  • It is recognized that guaranteeing the interoperability of defense complex systems(SoS: System of Systems, FoS: Family of Systems) provides an information advantage, which is one of the essential factors for determining an warfighting advantage. This study presents the defense KIP(Key Interface Profile) process for improving interoperability of defense complex systems. The KIP process is to develop key interface profiles based on the key interfaces which are identified through the analysis of architecture. The KIP developed can be leveraged to manage the interfaces of complex systems. We verify the effectiveness of the proposed KIP process through a case study based on the systems of counter-fire operation.

An Authentication Protocol using the key server in the EPCglobal RFID System (EPCglobal RFID 시스템에서 Key server를 사용하는 인증 프로토콜)

  • Lee, Kyu-Hwan;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제34권10B호
    • /
    • pp.1013-1020
    • /
    • 2009
  • This paper proposes an authentication protocol using the key server in the ECPglobai RFID system. The proposed authentication protocol uses the key server and the time-out mechanism to resist various attacks including DoS(Denial of Service) attack. For easy implementation, the proposed protocol also uses the function existing in EPCglobal class 1 gen2 protocol without additive function such as hash function. The proposed protocol is evaluated through two analytical methods. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, this paper showed that the proposed protocol is resistant to various attacks including DoS attack. The analytical results demonstrated that the proposed protocol offered a secure RFID system.

MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES

  • Lee, Hyang-Sook;Lee, Young-Ran;Lee, Ju-Hee
    • Communications of the Korean Mathematical Society
    • /
    • 제18권1호
    • /
    • pp.169-179
    • /
    • 2003
  • In this paper, we propose multiparty key agreement protocols by generalizing the Blom's scheme based on 2 variable polynomials. Especially we develop three party and four party key agreement schemes with security. The advantage of the new schemes is to have small demands on storage space.

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제18권1호
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.