• Title/Summary/Keyword: Self-integrity

Search Result 157, Processing Time 0.029 seconds

A Concept Analysis of Slow Nursing (느린 간호의 개념 분석)

  • Woo, Hyeon-Mi;Park, Jeong-Sook
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.381-389
    • /
    • 2020
  • Patients, particularly elderly patients, need nursing appropriate to their characteristics and pace, whereas 'fast nursing' is actually emphasized in Korea. Hence, this study attempts to identify the characteristics of 'slow nursing' in Korea. Walker & Avant's approach to concept analysis was performed through a literature review on the concept of 'slow nursing.' A literature search and concept analysis, using the keywords of 'slow,' 'slow nursing' and 'slow prescription' in Pubmed, Riss, NDSL, DBPIA, and Google Scholar from 2000 to 2019, yielded the following attributes of 'slow nursing': 'respect for the speed of the subject,' 'carefulness,' 'comfort in the process,' 'participation' and 'consideration of the meaning of life.' Model cases were derived based on these attributes. Predisposing factors involved in 'slow nursing' include patient malfunction, psychological deflection, indifference, fear of treatment, and lack of willingness to live. The outcomes were a discovery of patients' potential capacities, recovery of confidence, health promotion, improved communication with medical staff, confidence, and self-integrity. It is expected that the development of measurement tools using the attributes of 'slow nursing' would contribute to patient nursing and research in the future.

Security and Privacy Mechanism using TCG/TPM to various WSN (다양한 무선네트워크 하에서 TCG/TPM을 이용한 정보보호 및 프라이버시 매커니즘)

  • Lee, Ki-Man;Cho, Nae-Hyun;Kwon, Hwan-Woo;Seo, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.195-202
    • /
    • 2008
  • In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wareless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.

  • PDF

A Study the 7th Revised Curriculum Development for the Fisheries and Merchant Marine High School (수산·해운계 고등학교 제7차 교육과정 각론 개정 연구)

  • Kim, Sam-Kon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.12 no.1
    • /
    • pp.83-97
    • /
    • 2000
  • This article refers to the processions and the improvement of the 7th revised curriculum development for the Fisheries and Merchant Marine High School, published at Dec. 30, 1997. The general point of the 7th revised curriculum development was to cultivate creative Korean who will lead the epoch of globalization and information and to perform the learner-centered curriculum. Moreover, it defines the nature of Business High School not as completive but as continuing education. Based on this view, the improvment of 7th revised curriculum has been searched in varous sides. The group of general researchers and cooperators consisted of 12 members who were of university professors, teachers, related business men and executives in the administration branches, and the total researchers of 7th revised curriculum development were 90 members. The basic orientation of the research for the revised curriculum development was as following : The improvement of basic ability, job-analysis ability, integrity of theory and practice, acquisition of the certificate of national qualification, interrelation and cooperative role division between school and industrial fields, extension of self-decision ability of school and local society, protection of learner-selection right and maintaining close relations with the business-educational organization under life-long education system. Thus on the whole, the research for educational goals and contents, instructions, learning theory and evaluation is being processed with a high activity, based on the above mentioned plan of 7th revised curriculum development. At the same time, the methods and the models are being investigated. At last, it is to be noted that, in such as the 7th revised curriculum development research in this case, the effort should not be spared to harmonize the basic technological knowledge of the specialists in the Fisheries and Merchant Marine field and the cultural, liberal arts of personality education.

  • PDF

Scale Development of Wisdom among Korean Elderly ('한국노인의 지혜척도' 개발에 관한 연구)

  • Sung, Ki-Wol;Lee, Shin-Young;Park, Jong-Han
    • 한국노년학
    • /
    • v.30 no.1
    • /
    • pp.65-80
    • /
    • 2010
  • Purpose: The purpose of this study was to develop a wisdom scale among Korean elderly with high validity and reliability. Method: The process of the development of this scale follows: A conceptual framework was identified based on literature a review of the elderly and discussion with experts in physiology and sociology. Total 128 items were developed. Through reliability testing, factor analysis, 60 preliminary items, and 4-points scale were selected. By a means of the internal consistency for 60 items, 33 items were deleted. Finally, 27 items were remained. To verity 27 items, factor analysis, reliability testing, and correlation were done. Data were collected from 480 elderly subjects in Daegu, Kyungpook Province, and Busan, Kyungnam Province from August, 2008 to February, 2009. Results: From the results of the factor analysis for 27 items, 3 factors were extracted. These factors were labeled as 'empathic emotion', 'self-reflection', and 'bitter experience of life'. Cronbach's Alpha for the 27 items was .921 and correlation coefficient of ego-integrity was .69. Conclusion: An exploratory study of the variables related to wisdom among the elderly is needed for criterion validity of this scale. A study on wisdom for different age groups is needed for re-verification.

Anti-seismic behavior of composite precast utility tunnels based on pseudo-static tests

  • Yang, Yanmin;Tian, Xinru;Liu, Quanhai;Zhi, Jiabo;Wang, Bo
    • Earthquakes and Structures
    • /
    • v.17 no.2
    • /
    • pp.233-244
    • /
    • 2019
  • In this work, we have studied the effects of different soil thicknesses, haunch heights, reinforcement forms and construction technologies on the seismic performance of a composite precast fabricated utility tunnel by pseudo-static tests. Five concrete specimens were designed and fabricated for low-cycle reciprocating load tests. The hysteretic behavior of composite precast fabricated utility tunnel under simulated seismic waves and the strain law of steel bars were analyzed. Test results showed that composite precast fabricated utility tunnel met the requirements of current codes and had good anti-seismic performance. The use of a closed integral arrangement of steel bars inside utility tunnel structure as well as diagonal reinforcement bars at its haunches improved the integrity of the whole structure and increased the bearing capacity of the structure by about 1.5%. Increasing the thickness of covering soil within a certain range was beneficial to the earthquake resistance of the structure, and the energy consumption was increased by 10%. Increasing haunch height within a certain range increased the bearing capacity of the structure by up to about 19% and energy consumption by up to 30%. The specimen with the lowest haunch height showed strong structural deformation with ductility coefficient of 4.93. It was found that the interfaces of haunches, post-casting self-compacting concrete, and prefabricated parts were the weak points of utility tunnel structures. Combining the failure phenomena of test structures with their related codes, we proposed improvement measures for construction technology, which could provide a reference for the construction and design of practical projects.

Analytical Study on Structural Behaviors of Post-Tensioned Column-Base Connections for Steel Modular Structures (철골 모듈러 구조물의 포스트텐션 기둥-바닥 접합부 거동에 대한 해석적 연구)

  • Choi, Kyung-Suk;Shin, Dong-Hyeon;Kim, Hyung-Joon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.6
    • /
    • pp.427-435
    • /
    • 2020
  • Modular structures are relatively lightweight compared to reinforced-concrete or steel structures. However, it is difficult to achieve structural integrity between the columns of unit modules in a modular structure, which causes undesirable effects on the lateral force resistance capacity against wind and earthquake loads. This is more prominent in modular structures whose overall heights are greater. Hence, a post-tensioned modular structural system is proposed herein to improve the lateral force resistance capacity of a typical modular structure. A post-tensioned column-base connection, which is the main component of the proposed modular structural system, is configured with shapes and characteristics that allow inducing self-centering behaviors. Finite element analysis was then performed to investigate the hysteretic behaviors of the post-tensioned column-base connection. The analysis results show that the hysteretic behaviors are significantly affected by the initial tension forces and beam-column connection details at the base.

"The Architecture of Movement" Considered in the Viewpoint of Communicative Space - A Case Study of Zaha Hadid's Design Theory and Practice - (소통공간의 관점에서 고찰한 "움직임의 건축" - 자하 하디드의 설계이론과 작품 사례연구 -)

  • Seo, Jeongil
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.125-134
    • /
    • 2018
  • This study examines Dalibor Vesely's theoretical proposition of communicative space and tries to develop it through a review of the contemporary architectural case. Vesely poses a critical question about communication: how do the situational conditions of our everyday life and the spatial characteristics of the natural world in which we live communicate through representation. He emphasizes the spatial and situational conditions and the role of representation in communication, arguing that architecture should create the formation of communicative space to restore its primary role as the corporeal foundation of culture. This study thus focuses on one of the critical concepts of his theory: "the communicative movement," which is, according to him, ontological and situational because it animates and transforms human circumstances as a whole. Further, it pursues some practical knowledge of creating the communicative space, by examining the design theory and practice of Zaha Hadid, who thematizes communication and movement in her architectural approach. This study analyses the different levels of representation and modes of movement in her architectural space to reveal the possibilities and limits of its communicative roles. We will find that the representation of Hadid's architectural space is not the formal representation of reality, but a mathematical and projective representation of abstract concepts. Despite its apparent aesthetic consistency, the inward and self-referential relation between the individual elements of the architectural space reveals its limit for the communicative space.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

Forensic study of autonomous vehicle using blockchain (블록체인을 이용한 자율주행 차량의 포렌식 연구)

  • Jang-Mook, Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.209-214
    • /
    • 2023
  • In the future, as autonomous vehicles become popular at home and abroad, the frequency of accidents involving autonomous vehicles is also expected to increase. In particular, when a fully autonomous vehicle is operated, various criminal/civil problems such as sexual violence, assault, and fraud between passengers may occur as well as the vehicle accident itself. In this case, forensics for accidents involving autonomous vehicles and accidents involving passengers in the vehicles are also about to change. This paper reviewed the types of security threats of autonomous vehicles, methods for maintaining the integrity of evidence data using blockchain technology, and research on digital forensics. Through this, it was possible to describe threats that would occur in autonomous vehicles using blockchain technology and forensic techniques for each type of accident in a scenario-type manner. Through this study, a block that helps forensics of self-driving vehicles before and after accidents by investigating forensic security technology of domestic and foreign websites to respond to vulnerabilities and attacks of autonomous vehicles, and research on block chain security of research institutes and information security companies. A chain method was proposed.

Modification and Installation Design of Airframe Structures for Performance Improved Aircraft (성능개량 항공기의 기체구조물 개조 및 장착설계)

  • Dae Han Bang;Hyeon Seok Lee;Min Soo Lee;Min Ho Lee;Jae Man Lee
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.87-94
    • /
    • 2023
  • This paper addresses the installation and modification design of airframe structures for new and modified equipment installations that are essential for aircraft performance improvement. Typical performance improvement equipment mounted on the exterior of the aircraft include antenna, radar, electro-optical/infrared (EO/IR), and self-protection system equipment, which require structural reinforcement, modification, and mounting design of the green aircraft for operation. In the interior of the aircraft, console and rack structures are modified or added according to user operation requirements. In addition, this is accompanied by the installation design of equipment to be replaced and added for performance improvement, and the according modification of environmental control system components for internal cooling. The engineering process and cases in which airworthiness was verified through the detailed design of airframe structures with structural integrity, operability, and maintainability of performance-improved aircraft are presented.