• 제목/요약/키워드: protocol Analysis

검색결과 2,510건 처리시간 0.03초

Development of a protocol for guidance in the pediatric nursing practicum in South Korea: a methodology study

  • Koo, Hyun Young;Lee, Bo Ryeong
    • Child Health Nursing Research
    • /
    • 제28권1호
    • /
    • pp.51-61
    • /
    • 2022
  • Purpose: Practical training in pediatric nursing gives students the opportunity to apply nursing knowledge to children in a realistic clinical context. Clinical practice faculty (CPF) and clinical nursing instructor (CNI) have played important roles in the pediatric nursing practicum. This study was conducted to develop a protocol to guide clinical practicum in pediatric nursing. Methods: A service design methodology was employed between August 2020 and May 2021 at four universities and four hospitals in South Korea. The participants were five CPFs, five CNIs, five nursing college graduates, and 60 nursing students. The service design process had four phases: discovery, definition, development, and delivery. Data were collected through self-report questionnaires, in-depth interviews, and observations. The data were analyzed using content analysis and descriptive statistics. Results: The participants reported needs for providing concrete guidance and explanation, nursing practice experience, and a link between school and the clinical field. A protocol was developed to fulfill the participants' needs. The protocol comprised detailed information, teaching methodology, and partnership to guide students in the pediatric nursing practicum. Conclusion: The protocol developed in this study can be used to provide guidance for students' clinical practice in the field of pediatric nursing.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

CAN 기반 FCHEV 시뮬레이터의 시간 해석 연구 (A Study on Timing Analysis of a CAN-Based Simulator for FCHEVs)

  • 안봉주;이남수;양승호;손재영;박영환;안현식;정구민;김도현
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.505-507
    • /
    • 2005
  • In this paper, a timing analysis is performed for the CAN-based simulator system for a fuel cell hybrid electric vehicles. The CAN protocol is recently being used for conventional vehicles, however, the network-induced delay can make the in-vehicle network system unstable. This problem may be occurred in the future vehicles because more ECUs are being required than recent vehicles. In order to develop a stable network-based control system, timing analysis is required at the design process. Throughout this analysis, timing parameters that affect transmission delay are examined and an effective method of predicting a sampling time for a stable communication via CAN protocol. In order to show the validityof suggested timing analysis. some experiments are performed using DSPs with CAN module.

  • PDF

계층간 이동성 지원 프로토콜들의 성능 분석 (Perofrmance Analysis of Mobility Support Protocol in Each Layer)

  • 이효범;김광렬;황승희;민성기
    • 한국정보과학회논문지:정보통신
    • /
    • 제34권2호
    • /
    • pp.134-142
    • /
    • 2007
  • OSI 참조 모델에 따라 각 계층에 여러 개의 이동성 지원 프로토콜들이 제안 되어 왔다. 각 프로토콜이 작동하는 계층의 특징은 핸드오버 지연시간에 영향을 끼친다. 본 논문은 MN의 이동 패턴에 따른 각 계층에서 작동하는 대표적인 프로토콜들(MIPv6, mSCTP, SIP)의 핸드오버 성능을 비교 분석한다. 성능 분석을 위해 Markovian 모델에 기반한 서브넷 모델과 한 세션 동안 MN의 이동 모델을 사용하였다. 분석 결과 DAD도 핸드오버에 중요한 요인이지만 프로토콜간의 차이는 보안과 움직임을 감지하기 위한 시간, 메시지의 처리 시간 등에 의해 유발됐음을 알 수 있었다.

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • 제34권1호
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.

언어적 프로토콜 분석을 이용한 쇼핑몰 웹사이트 사용성 측정방법에 관한 연구 (Measuring the Usability of Shopping Mall Web Sites Using Verbal Protocol Analysis)

  • 조휘형;홍일유
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제18권3호
    • /
    • pp.111-134
    • /
    • 2009
  • Today many owners of Web sites are looking to user's satisfaction survey as a key means of measuring the usability of a Web site. While it is preferred for it simplicity and ease of use, this survey method is not without potential risks. This paper focuses on showing that the existing practice of questionnaire-based usability measurement is subject to human recall errors, and that such flaws can be reduced when the questionnaire survey is followed by the users hands-on experience of the site. An empirical study was conducted, and the results indicate that the above speculation holds true. Even if respondents felt highly confident about their responses on a recall survey, a hands-on experience with a focal Web site increased the extent to which the respondents were satisfied with the shopping mall site. This indicates that a user's perception of the quality of a Web site may be distorted or lost as time goes by. In addition, the findings have shown that the use of the verbal protocol analysis method can reveal critical information that can help track the root causes of Web site usability problems, thereby helping to develop site enhancement strategies. The paper concludes with directions for future research.

차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜 (Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services)

  • 진병욱;차시호
    • 디지털산업정보학회논문지
    • /
    • 제14권1호
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.

4 개의 기둥을 가진 하노이의 탑에 대한 결정 트리 생성 실험 (Experiments on decision tree analysis for four-peg tower of Hanoi)

  • 강대기;최재훈
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 추계학술대회
    • /
    • pp.171-172
    • /
    • 2011
  • 본 연구에서는, 4 개의 기둥을 가진 하노이의 탑을 푸는 방안을 프로토콜 분석 기법으로 분석하고, 이렇게 분석된 내용에서 결정 트리를 구성하는 방안을 연구한다. 이를 위해, 4개의 기둥을 가진 하노이의 탑을 시뮬레이트할 수 있는 프로그램을 설계하고 구현하였다. 구현된 프로그램은 사용자로 하여금 임의의 정규형-정규형 하노이의 탑 문제를 풀게 하고, 푸는 과정을 기록한다. 구현된 프로그램을 통해 푸는 과정과 프로토콜로부터 결정 트리를 구성할 수 있었다. 본 연구는 향후, 4 개의 기둥을 가진 하노이의 탑 문제의 해결 방안을 찾는 데, 도움이 될 것으로 기대된다.

  • PDF

아토피 피부염의 임상연구병행 경제성평가 프로토콜 개발을 위한 체계적 문헌고찰연구 (Systematic Review for the Development of the Clinical Study with Economical Assessment Protocol on Atopic Dermatitis)

  • 권지예;선지혜;윤화정;김남권
    • 한방안이비인후피부과학회지
    • /
    • 제30권1호
    • /
    • pp.17-28
    • /
    • 2017
  • Objectives : The aim of this study is reviewing the literature to extracting the key parameter and finding the calibration parameter for the clinical study with economical assessment protocol on atopic dermatitis. Methods : Literature search is performed using PUBMED for literature published from Janurary 2000 to December 2016. We included randomized controlled trials(RCTs) with economic assessment in which human participants. Results : Among the articles published from January 2000 to December 2016, The 1464 articles were found. After reviewing the title, abstract and full text, the five articles were selected. Selected articles are classified 3 CEA(cost effective analysis)study, 1 CMA(cost minimizing analysis)study and 1 cost analysis study. Conclusions : We found highly reliable key parameters and calibration parameters, which might be necessary factors for developing research protocol of economic evaluation alongside clinical trial about atopic dermatitis patients.

Design, Analysis and Evaluation of A New Energy Conserving MAC Protocol for Wireless Sensor Networks

  • Lim, Sangsoon;Kang, Young-Myoung;Jeong, Jiwoong;Kim, Chong-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3046-3060
    • /
    • 2012
  • Low power listening (LPL) MAC protocols based on duty-cycling mechanism have been studied extensively to achieve ultra low energy consumption in wireless sensor networks (WSNs). Especially, recent ACK-based LPL schemes such as X-MAC employ strobe preambles and an early ACK, and show fair performances in communications and energy efficiencies. However, the state-of-the-art ACK-based LPL scheme still suffers from collision problems due to the protocol incompleteness. These collision effects are not trivial and make WSNs unstable, aggravate energy consumptions. In this paper, we propose two novel schemes; (i) ${\tau}$-duration CCA to mitigate the collision problem in ACK-based LPL MAC protocols. (ii) Short Preamble Counter (SPC) to conserve more energy by reducing unnecessary overhearing. We demonstrate the performance improvement of our scheme via a mathematical analysis and real-time experiments. Both analysis and experimental results confirm that our proposed scheme saves energy by up to 36% compared to the naive ACK-based LPL MAC protocol thanks to ${\tau}$-duration CCA and SPC.