• 제목/요약/키워드: protocol Analysis

검색결과 2,510건 처리시간 0.029초

이동 애드 혹 네트워크를 위한 다중경로 동적 소스 라우팅 프로토콜 (A Multi-path Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks)

  • 임화정;차영환
    • 정보처리학회논문지C
    • /
    • 제12C권1호
    • /
    • pp.111-120
    • /
    • 2005
  • 이동 애드-혹 네트워크는 물리적 위치 이동이 가능한 노트들에 의해 자체적으로 형성되는 시스템으로 동적 위상을 고려한 라우팅 프로토콜을 필요로 한다 본 논문에서는 IETT의 라우팅 프로토콜 DSR을 확장한 R-DSR이라 불리는 온-디멘드 다중경로 프로토콜을 제안한다. 제안된 프로토콜에서는 DSR에 의해 구축되는 단인 경로 상의 2-홉 간격의 모든 노드들에 대해 별도의 노드론 경유하는 추가 경로가 연결된다. 수학적 분석을 통하여 DSR 관련 연구 중 가장 대표적인 방법 중의 하나인 Das의 다중경로 프로토콜보다 더 높은 메시지 전달 확률을 제공함을 보였다.

노인요양시설의 신체적 억제대 프로토콜 개발 (Protocol for Physical Restraints of Patients in Nursing Homes)

  • 임미혜;고일선
    • 기본간호학회지
    • /
    • 제20권4호
    • /
    • pp.345-358
    • /
    • 2013
  • Purpose: The purpose of this study was to develop a protocol that would help prevent accidents, apply physical restraints properly, and reduce the use of physical restraints in nursing homes. Method: A review of the literature and analysis of existing statutes and regulations were used to develop the preliminary protocol. To test the validity of this preliminary protocol, ten experts were selected from academia and clinical practice to review the protocol. The initial protocol was finalized after it had been reviewed by experts and tested for clinical validity in five different nursing homes. Result: The protocol consists of objectives, definitions and accident probability assessment, principle of using physical restraints, monitoring and documentation of physical restraints. Conclusion: The findings of this study can be used as guidelines to focus on preventing accidents arising out of use of physical restraints, assessing the probability of accidents, and reducing the use of physical restraints through preventive interventions. This will be helpful to prevent ethical, physical, or psychological problems arising from use of physical restraints and to protect the rights of elderly people in nursing homes.

근거중심 치매 간호실무를 위한 e-EBPP 시스템 개발 및 평가 (Development and Evaluation of e-EBPP(Evidence-Based Practice Protocol) System for Evidence-Based Dementia Nursing Practice)

  • 박명화
    • 성인간호학회지
    • /
    • 제17권3호
    • /
    • pp.411-424
    • /
    • 2005
  • Purpose: The purpose of this study was to develop and evaluate e-EBPP(Evidence-based Practice Protocol) system for nursing care for patients with dementia to facilitate the best evidence-based decision in their dementia care settings. Method: The system was developed based on system development life cycle and software prototyping using the following 5 processes: Analysis, Planning, Developing, Program Operation, and Final Evaluation. Result: The system consisted of modules for evidence-based nursing and protocol, guide for developing protocol, tool for saving, revising, and deleting the protocol, interface tool among users, and tool for evaluating users' satisfaction of the system. On the main page, there were 7 menu bars that consisted of Introduction of site, EBN info, Dementia info, Evidence Based Practice Protocol, Protocol Bank, Community, and Site Link. In the operation of the system, HTML, JavaScript, and Flash were utilized and the content consisted of text content, interactive content, animation, and quiz. Conclusion: This system can support nurses' best and cost-effective clinical decision using sharable standardized protocols consisting of the best evidence in dementia care. In addition, it can be utilized as an e-learning program for nurses and nursing students to learn use of evidence based information.

  • PDF

복막투석 환자를 위한 표준화된 간호교육 프로토콜의 개발 (Development of a Standardized Education Protocol for Peritoneal Dialysis Patients)

  • 강정희;강지연;이영옥
    • 중환자간호학회지
    • /
    • 제4권2호
    • /
    • pp.47-60
    • /
    • 2011
  • Purpose: The purpose of this study was to develop a standardized education protocol for peritoneal dialysis patients. Methods: First, the demand for education was investigated from the 27 patients on peritoneal dialysis and 16 guardians, and later, the standardized nursing education protocol has been developed through the comprehensive literature review and the critical analysis of the related studies. Contents validity and applicability have been tested through the expert group survey. Results: The standardized peritoneal dialysis nursing education protocol with 9 areas and 20 items has been developed. The content validity for timing and duration, contents, method, and place of education proposed by the protocol were all above than 0.8. In terms of the applicability of the protocol, the experts scored between 4.20 to 4.93 for all items except one. The item on home visit education acquired the lowest applicability score, because there might exist potential restrictions in visiting patient's home. Conclusion: The standardized education protocol developed in this study turned out to be adequate by representing high content validity for all items and the applicability also was high except the item on home visit education. Further researches to test the effects of this education protocol should be done.

  • PDF

Modbus와 NMEA0183에 대한 사용자 프로토콜 컨버터 개발 (Development of User Protocol Converter about Modbus and NMEA0183)

  • 엄상희;홍성기
    • 한국정보통신학회논문지
    • /
    • 제19권11호
    • /
    • pp.2584-2589
    • /
    • 2015
  • 본 논문은 산업 네트워크의 프로토콜의 해석과 변환기 개발을 위해 소요 되었던 시간을 효과적으로 단축하고자 하였다. 이를 위하여 산업용 네트워크의 통신 프로토콜을 해석하여 데이터를 획득하고 해석하여 사용자 프로토콜로 재구성하여 재전송 할 수 있는 프로토콜 컨버터를 개발 하였다. 개발된 사용자 프로토콜 컨버터는 소프트웨어와 하드웨어로 구성되며 Modbus, NMEA0183과 이더넷을 지원한다. 하드웨어 메인 프로세서는 AVR128을 사용하였고, 직렬 통신부, Ethernet 통신부를 배치하였다. 데이터 전송 실험 결과 매우 우수한 전송률과 변환율을 얻을 수 있었다.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

병원 성인 환자의 사후 간호 프로토콜 개발 (Development of a Protocol for Nursing Care after Death for Adult Patients in Hospitals)

  • 김기경;김앵도;안경아;천주영
    • 임상간호연구
    • /
    • 제29권1호
    • /
    • pp.75-84
    • /
    • 2023
  • Purpose: This study developed a protocol for nursing care after death for adult patients in hospitals. Methods: This was a methodological study to develop a care after death protocol. The preliminary protocol was developed based on a literature review, guidelines, and practice recommendations from groups of experts and clinical nurses. Content validity was evaluated by a group of experts (n=6) and nurses (n=30) in two hospitals. Results: The preliminary protocol recommendations were modified by validation and the open-question analysis results. The final protocol comprised three general recommendations and 43 recommendations in five steps that are verification and notification of a death, personal care of the body, viewing the patient, patient transfer, and documentation and self-care. Conclusion: This study result provides nurses with a consensus information on patient care after death and family support in a hospital setting. This nursing protocol is expected to improve the quality of care after death for adult patients and their families, and can be used for developing educational and emotional support for nurses to accomplish their important role.

효율적인 분산 저장 시스템을 위한 대칭 트리 복제 프로토콜 (Symmetric Tree Replication Protocol for Efficient Distributed Storage System)

  • 최성춘;윤희용;이강신;이호재
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제31권9호
    • /
    • pp.503-513
    • /
    • 2004
  • 최근 분산 컴퓨팅 환경에서 데이타와 서비스의 복제는 통신비용의 감소, 데이타 가용성 증가, 그리고 단일 서버의 병목현상을 피하기 위해 필수적이다. 기존의 대표적인 복제 프로토콜로 네트워크를 논리적으로 구성하는 Tree quorum 프로토콜과 Grid프로토콜이 있다. Tree quorum프로토콜은 최선의 경우 가장 우수한 읽기 성능을 보이는 반면 트리의 높이가 증가할수록 노드의 수가 기하급수적으로 증가한다는 단점을 가지고 있다. Grid프로토콜은 읽기 동작에 있어 높은 가용성을 가지는 반면 고장이 없는 환경에서도 같은 읽기 및 쓰기 성능을 보이는 단점을 가지고 있다. 따라서 본 논문에서는 기존의 복제 프로토콜이 가지는 문제점을 해결하고, 대칭적 트리 구조를 이용하여 노드의 장애가 발생하는 환경에서도 우수한 성능을 갖는 복제 프로토콜을 제안한다. 제안된 복제 프로토콜은 Tree quorum 프로토콜에 비해 적은 저기 비용을 가지며, 적은 수의 노드 구성 환경에서도 높은 읽기 가용성을 가진다. 또한 응답시간 면에서도 우수한 성능을 보인다.

가상 사설망에서 프로토롤의 성능분석에 관한 연구 (A Study on Performance analysis of protocol in VPN)

  • 김도문;전문석
    • 한국컴퓨터산업학회논문지
    • /
    • 제4권4호
    • /
    • pp.625-632
    • /
    • 2003
  • 가상 사설망에 계층간에 사용하는 프로토콜이 각기 다르다. 네트워크 상에서 정보의 상호 교환은 기밀성과 무결성의 확보가 중요하다. 그러나 보안 방식에 따른 여러 형태의 장비들에 따른 프로토콜의 다양화로 인해 호환성과 가용성에 따르는 문제점이 있다. 그래서 정보의 암호화와 인증을 통해서 전송이 이루어진다면 제 3자의 공격으로부터 안전할 수 있다. 그러므로 가상사설망(VPN) 시스템 통한 터널링을 통해서 계층간 상호교환의 전송이 이루어진다. 본 논문에서는 인증된 공개키를 사용하여 계층2와 계층3에서 사용되는 각각의 프로토콜로서 정보가 전송될 경우 계층간의 성능분석 차이점을 파악하여 본다.

  • PDF