• Title/Summary/Keyword: protocol Analysis

Search Result 2,534, Processing Time 0.033 seconds

Development of a protocol for guidance in the pediatric nursing practicum in South Korea: a methodology study

  • Koo, Hyun Young;Lee, Bo Ryeong
    • Child Health Nursing Research
    • /
    • v.28 no.1
    • /
    • pp.51-61
    • /
    • 2022
  • Purpose: Practical training in pediatric nursing gives students the opportunity to apply nursing knowledge to children in a realistic clinical context. Clinical practice faculty (CPF) and clinical nursing instructor (CNI) have played important roles in the pediatric nursing practicum. This study was conducted to develop a protocol to guide clinical practicum in pediatric nursing. Methods: A service design methodology was employed between August 2020 and May 2021 at four universities and four hospitals in South Korea. The participants were five CPFs, five CNIs, five nursing college graduates, and 60 nursing students. The service design process had four phases: discovery, definition, development, and delivery. Data were collected through self-report questionnaires, in-depth interviews, and observations. The data were analyzed using content analysis and descriptive statistics. Results: The participants reported needs for providing concrete guidance and explanation, nursing practice experience, and a link between school and the clinical field. A protocol was developed to fulfill the participants' needs. The protocol comprised detailed information, teaching methodology, and partnership to guide students in the pediatric nursing practicum. Conclusion: The protocol developed in this study can be used to provide guidance for students' clinical practice in the field of pediatric nursing.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

A Study on Timing Analysis of a CAN-Based Simulator for FCHEVs (CAN 기반 FCHEV 시뮬레이터의 시간 해석 연구)

  • Ahn, Bong-Ju;Lee, Nam-Su;Yang, Seung-Ho;Son, Jae-Young;Park, Young-Hwan;Ahn, Hyun-Sik;Jeong, Gu-Min;Kim, Do-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.505-507
    • /
    • 2005
  • In this paper, a timing analysis is performed for the CAN-based simulator system for a fuel cell hybrid electric vehicles. The CAN protocol is recently being used for conventional vehicles, however, the network-induced delay can make the in-vehicle network system unstable. This problem may be occurred in the future vehicles because more ECUs are being required than recent vehicles. In order to develop a stable network-based control system, timing analysis is required at the design process. Throughout this analysis, timing parameters that affect transmission delay are examined and an effective method of predicting a sampling time for a stable communication via CAN protocol. In order to show the validityof suggested timing analysis. some experiments are performed using DSPs with CAN module.

  • PDF

Perofrmance Analysis of Mobility Support Protocol in Each Layer (계층간 이동성 지원 프로토콜들의 성능 분석)

  • Lee, Hyo-Beom;Kim, Kwang-Ryoul;Hwang, Seung-Hee;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.134-142
    • /
    • 2007
  • Several mobility supporting protocols have been proposed across OSI reference layers. Each protocol has similar or different characteristics based on its operating layer which affect a handover latency. In this paper, we analyze handover performance of most representative protocols in each layer. For analysis, we use SUBNET model based Markovian model and movement model. In result, difference of protocol handover latency is not occurred by DAD but also by security, movement detection, message processing time.

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.

Measuring the Usability of Shopping Mall Web Sites Using Verbal Protocol Analysis (언어적 프로토콜 분석을 이용한 쇼핑몰 웹사이트 사용성 측정방법에 관한 연구)

  • Cho, Hwi-Hyung;Hong, Il-Yoo
    • The Journal of Information Systems
    • /
    • v.18 no.3
    • /
    • pp.111-134
    • /
    • 2009
  • Today many owners of Web sites are looking to user's satisfaction survey as a key means of measuring the usability of a Web site. While it is preferred for it simplicity and ease of use, this survey method is not without potential risks. This paper focuses on showing that the existing practice of questionnaire-based usability measurement is subject to human recall errors, and that such flaws can be reduced when the questionnaire survey is followed by the users hands-on experience of the site. An empirical study was conducted, and the results indicate that the above speculation holds true. Even if respondents felt highly confident about their responses on a recall survey, a hands-on experience with a focal Web site increased the extent to which the respondents were satisfied with the shopping mall site. This indicates that a user's perception of the quality of a Web site may be distorted or lost as time goes by. In addition, the findings have shown that the use of the verbal protocol analysis method can reveal critical information that can help track the root causes of Web site usability problems, thereby helping to develop site enhancement strategies. The paper concludes with directions for future research.

Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services (차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜)

  • Jin, Byungwook;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.

Experiments on decision tree analysis for four-peg tower of Hanoi (4 개의 기둥을 가진 하노이의 탑에 대한 결정 트리 생성 실험)

  • Kang, Dae-Ki;Choi, Jae-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.171-172
    • /
    • 2011
  • In this research, we discuss the process of analyzing the solution of four-peg tower of Hanoi using protocol analysis technique, and of developing decision trees from the analyzed contents. For these, we design and implement a computer program that can simulate four-peg tower of Hanoi. The implemented program generates a certain regular-to-regular tower of Hanoi problem, let a user to solve the problem, and records the solution process. From the process by the implemented program and the recorded protocol, we can build the decision tree for the solution. We expect this research can contribute to find a non-optimal solution for n-peg tower of Hanoi.

  • PDF

Systematic Review for the Development of the Clinical Study with Economical Assessment Protocol on Atopic Dermatitis (아토피 피부염의 임상연구병행 경제성평가 프로토콜 개발을 위한 체계적 문헌고찰연구)

  • Gwon, Ji-Yae;Seon, Ji-Hye;Yun, Hwa-Jeong;Kim, Nam-Kwen
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.30 no.1
    • /
    • pp.17-28
    • /
    • 2017
  • Objectives : The aim of this study is reviewing the literature to extracting the key parameter and finding the calibration parameter for the clinical study with economical assessment protocol on atopic dermatitis. Methods : Literature search is performed using PUBMED for literature published from Janurary 2000 to December 2016. We included randomized controlled trials(RCTs) with economic assessment in which human participants. Results : Among the articles published from January 2000 to December 2016, The 1464 articles were found. After reviewing the title, abstract and full text, the five articles were selected. Selected articles are classified 3 CEA(cost effective analysis)study, 1 CMA(cost minimizing analysis)study and 1 cost analysis study. Conclusions : We found highly reliable key parameters and calibration parameters, which might be necessary factors for developing research protocol of economic evaluation alongside clinical trial about atopic dermatitis patients.

Design, Analysis and Evaluation of A New Energy Conserving MAC Protocol for Wireless Sensor Networks

  • Lim, Sangsoon;Kang, Young-Myoung;Jeong, Jiwoong;Kim, Chong-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3046-3060
    • /
    • 2012
  • Low power listening (LPL) MAC protocols based on duty-cycling mechanism have been studied extensively to achieve ultra low energy consumption in wireless sensor networks (WSNs). Especially, recent ACK-based LPL schemes such as X-MAC employ strobe preambles and an early ACK, and show fair performances in communications and energy efficiencies. However, the state-of-the-art ACK-based LPL scheme still suffers from collision problems due to the protocol incompleteness. These collision effects are not trivial and make WSNs unstable, aggravate energy consumptions. In this paper, we propose two novel schemes; (i) ${\tau}$-duration CCA to mitigate the collision problem in ACK-based LPL MAC protocols. (ii) Short Preamble Counter (SPC) to conserve more energy by reducing unnecessary overhearing. We demonstrate the performance improvement of our scheme via a mathematical analysis and real-time experiments. Both analysis and experimental results confirm that our proposed scheme saves energy by up to 36% compared to the naive ACK-based LPL MAC protocol thanks to ${\tau}$-duration CCA and SPC.