• 제목/요약/키워드: reliable data delivery

검색결과 92건 처리시간 0.026초

스마트그리드를 위한 지그비 기반의 라우팅 알고리즘에 관한 연구 (A Study on ZigBee-Based Routing Algorithm)

  • 강형석;임송빈;오영환
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권12호
    • /
    • pp.137-148
    • /
    • 2012
  • 본 논문에서는 스마트그리드 환경에서 적용되고 있는 ZigBee 무선 통신 환경의 주소 지정 방식과 라우팅 알고리즘의 성능을 향상시키기 위한 새로운 위치 기반 좌표 라우팅 알고리즘을 제안하였다. 기존 kip 알고리즘을 이용한 분산 주소 할당 기법의 낭비되는 주소공간의 문제를 해결하기 위해 (x,y,z) 3개의 좌표 축을 제안하여 16bit 주소공간을 분할하여 사용한다. 그러나 좌표 라우팅은 채널 상태를 고려하지 않는다. 채널 상태를 고려하지 않는다면, 라우팅 테이블이 업데이트 될 때 채널 상태가 좋지 않은 노드가 테이블에 업데이트 되어 릴레이 노드로 선택 되어질 수 있다. 따라서, 본 논문에서는 위치 기반 라우팅에서 채널 상태를 고려함으로 신뢰성 있는 데이터 전송을 보장하고 소비되는 에너지를 최소화 할 수 있는 위치 기반 좌표 라우팅 알고리즘 라우팅 방법을 제시하였다. 그리고 제안한 알고리즘의 평균멀티홉수, 부하에 대한 패킷전달률, 지연시간, 에너지 소비를 ZigBee 위치 기반 라우팅의 안전 영역과 전이 영역에 대해 비교하였다. 성능 평가 결과 각 항목에 대해 각각 성능 향상을 보였다.

고흥지역 수산물 경매시장의 특성에 관한 연구 (A Study on the Auction Schemes of Fish Commodities in the Koheung Region)

  • 강연실
    • 수산경영론집
    • /
    • 제29권2호
    • /
    • pp.111-141
    • /
    • 1998
  • Why are auctions so prevalent in fisheries fields\ulcorner One answer is, perhaps, that fisheries products have no standard value. The price of any catch of fish (at least of fish destined for the fresh fish market) depends on the demand and supply conditions at a specific moment of time, influenced by prospective market developments and prices must be remade for each transaction. There are various auction schemes including written-bid method in Korea. It is difficult to make decision the application of auction selling in market distribution. One reason is the absence of adequate data on which to base firm statements. There is very little precise information about the relative volume handled by auction scheme as compared with other sales schemes Because of the paucity reliable data, one must depend largely on qualitative in attempting to above this problem. This paper is designed to examine which auction scheme is more efficient as a economic tool by introducing the three auctions, as samples, utilized in Koheung peninsula. Koheung coast with abundant fisheries resource, locates on the Middle-South part in Korea and has three auction firm operating by fisheries cooperatives. fur selling of dry fish included sea weed, live fish and fresh fish respectively, As a result, 1 found that there are three interesting auction schemes as follow : 1. More than one winners are selected as buyers. The highest bidder can at first get fishes he wants to buy, second winner can get surplus fishes after the highest bidder employes one's privilege with the highest pay, and next winner would be a buyer if fishes would be left in sequence after being sold with higher price. Every fisherman can sell one' s fishes with equal unit price if he delivery it to the winner within one day. Therefore, all the vendors feel they are equal members of fisheries cooperation. 2. Written-bid pricing on the cover of handy book. It is easy to write and to erase the figure more than on the small black board, and is convenient also to keep in the pocket. 3. Auctioning on the fixed platform with fixed fish tank is a very fast auction scheme in spite of short displaying time. Auctioneer presides bidding at one place on the fixed platform, instead of moving, vendors should carry a container of live fishes in the fish tank into showing table in front of would-be buyers and auctioneer. Although the applicability of the auction system to a marketing problem depends in part on subjective considerations by those making decision, basically it is a matter of comparative economic efficiency. In general, if the scheme maximizes returns in relation to the effort expanded by both buyers and sellers, it will be utilized. If it does not, a more efficiency may take place over a period of time, but, even more important, those making decisions may become aware of the potentialities of new schemes. Therefore, in order to applicate the three interesting auction schemes introduced in this paper to other fisheries market, it is necessary not only to analyze many other auction schemes but also to compare the economic efficiency those schemes utilizing in other fisheries market.

  • PDF

유도결합방식에 의한 무선 에너지 및 데이터 전송 (Wireless Energy and Data Transmission Using Inductive Coupling)

  • 이준하
    • 한국의학물리학회지:의학물리
    • /
    • 제19권1호
    • /
    • pp.42-48
    • /
    • 2008
  • 최근 첨단 과학의 발달과 함께 인체조직에 대한 적용도가 뛰어난 소재가 개발되어 초소형의 이식형 장치가 개선되어감에 따라 전력공급방법의 다양한 연구가 이루어져 유도코일을 이용하여 무선으로 전력을 전송하는 장치가 연구되어오고 있다. 이에 저자는 이론적으로 효율이 100%인 E급 전력증폭기를 사용하여 $2{\sim}30mm$의 공극거리에서 가장 이상적인 주파수를 1MHz로 설정하여 제작하였고, 직경 46mm의 송수신 코일을 이용하여 코일의 비정렬에 대한 전송율이 이격거리가 10mm일 때, 20% 감소되었다. PLL을 사용하여 주파수추적동조법으로 공극거리 15 mm 이내에서는 완만하게 20% 정도의 에너지 전송효율을 얻을 수 있었다. 또한 최적의 공진거리에서 50 mA 정도의 출력전류가 얻을 수 있다는 것은 초소형 전기 자극기와 같은 이식형 장치를 동작시키는데 구동 전력으로 가능하다는 것을 알 수 있었다.

  • PDF

모바일 복합 단말기 사용자 만족: 기대-불일치 접근 (User Satisfaction of Mobile Convergence Device: The Expectation and Disconfirmation Approach)

  • 이승창;서응교
    • 유통과학연구
    • /
    • 제10권11호
    • /
    • pp.89-99
    • /
    • 2012
  • Purpose - Mobile devices, especially mobile terminals capable of telecommunication and wireless connectivity, are leading the advancements in consumer electronics. Digital convergence drives the functions of various devices, such as cellular phones, MP3 players, personal digital assistants, and gaming, into a single device. This trend would continue and applications such as digital audio and video streaming (including personalized content delivery mechanisms) would soon be on a handheld device. As customers want mobile convergence devices, manufacturers are driving new initiatives in the emerging mobile device market. Given the roles played by device design and service content in user satisfaction of a mobile convergence device, this study focuses on identifying and measuring the constructs for the process by which user satisfaction is achieved. This study synthesizes the expectation-disconfirmation paradigm with empirical theories in user satisfaction. Device and service levels are separated, and nine key constructs for user satisfaction of mobile convergence devices are proposed. Insight into this process could help web-based businesses to improve user satisfaction, thus enhancing the effectiveness of e-commerce for sellers and buyers. Research design, data, methodology - This study draws on three users of mobile convergence devices as examples. To test there search model and hypotheses, survey questionnaires were sent to 607 mobile device users. Mobile device users were initially identified from several members, and subjects were randomly drawn. Data from 577 survey responses were finally analyzed. The unit of measurement and analysis in this research study is at a personal level. Results - The measurements for the constructs were developed and tested in a two-phase study. In the first phase, the device and service dimensions were identified, and instruments for measuring them were developed and tested. In the second phase, using the salient dimensions of the device and service as the formulating first-order factors, instruments were developed and empirically tested to measure satisfaction of the device and service. In measuring satisfaction of mobile convergence devices, the critical tasks are to identify the key constructs of such user satisfaction and to develop validated instruments to measure them. Hence, the results of this study have immediate implications for businesses and for research in user satisfaction of mobile convergence devices. Conclusions - This study provides reliable instruments for operationalizing key constructs in the analysis of user satisfaction of mobile convergence devices within the expectation-disconfirmation paradigm. Hence, convergence device makers will be able to examine whether their websites meet their customers' expectations by examining the device aspect of the mobile convergence device customers, and the service aspect expectations and disconfirmation. Moreover, the introduction of expectation and disconfirmation constructs brings the marketing aspect of convergence devices into focus for such retailers, an aspect crucial to the effective design of websites for online businesses. In addition,this study provides the metrics required to initiate future studies on user satisfaction of mobile convergence devices.

  • PDF

무선 애드 혹 네트워크에서 보안성을 고려한 Token Escrow 트리 기반의 효율적인 라우팅 프로토콜 (An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks)

  • 이재식;김성천
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제2권4호
    • /
    • pp.155-162
    • /
    • 2013
  • 최근 무선 네트워크 기술이 각광을 받으면서 다양한 애드 혹 환경에서의 라우팅 프로토콜이 제안되고 있다. 하지만 애드 혹 네트워크라는 환경의 특성 상 보안상 취약한 문제점을 가지고 있으며, 기존의 유선 네트워크 환경에서 제안되었던 보안 라우팅 프로토콜을 적용시키기 힘들다는 문제점이 있다. 이에 따라 Secure AODV나 SRPTES 등의 보안성을 고려한 새로운 애드 혹 라우팅 프로토콜이 제안되었지만 다양한 무선 네트워크 환경의 변화에 유동적으로 대응하기 힘들고 보안적인 측면에 집중을 한 나머지 에너지소모 측면에서는 단점을 노출하고 있다. 본 논문에서는 다양한 애드 혹 네트워크 환경에 적용 가능하고, 기존의 보안 라우팅 프로토콜에 비해 에너지 효율적인 보안 라우팅 프로토콜을 제안하고자 한다. 보안 정보의 보호를 위해 Tree 구조를 도입하고 보안 단계를 통한 Multi-path를 구성하여 악의적인 노드의 Dropping Attack에 대비하여, 예기치 못한 Data Packet의 손실에 대해서도 효율적으로 대처하게 하였다. 실험 결과 악의적인 노드가 존재하는 네트워크 환경에서 기존의 애드 혹 네트워크 보안 라우팅 프로토콜보다 패킷 전송 성공률을 21%정도 향상시킬 수 있었으며 또한 각 노드의 에너지를 균등하게 소모함으로써 전체적인 네트워크의 생존시간이 연장되는 것을 확인할 수 있었다.

철도통합무선망(LTE-R) 환경에서 무선통신 안정성과 가용성 향상을 위한 방안 연구 (A study on the reliability and availability improvement of wireless communication in the LTE-R)

  • 최민석;오상철;이숙진;윤병식;김동준;성동일
    • 한국정보통신학회논문지
    • /
    • 제24권9호
    • /
    • pp.1172-1179
    • /
    • 2020
  • 철도통합무선망(LTE-R) 환경이 구축되었고, 이를 활용한 무선통신 기반의 열차제어 데이터 및 음성, 영상 등 다양한 형태의 서비스 인프라 관련 연구개발이 진행되고 있다. 이러한 서비스가 원활하게 제공되기 위해서는 안정성 및 가용성 높은 무선통신 환경 구성이 중요하며, 지속적인 철도통합무선망의 성능 개선이 요구된다. 본 논문은 철도통합무선망 안정성 및 가용성 등의 무선통신 성능개선을 위해 철도통합무선망 무선통신 환경을 측정하여 결과를 분석하고 시뮬레이션을 위한 무선 환경 모델을 구축하였다. 또한, 구축된 모델을 기반으로 안정성 향상을 위해 열차를 제어하기 위한 향상된 무선접속 알고리즘을 제안하여 열차 운행 시 발생하는 핸드오버에 대해 안정성을 향상 시킬 수 있는 방법을 제안하였고 가용성 향상을 위해 주파수 자동천이 알고리즘을 제안하여 망 장애로 인한 패킷 손실을 줄이고자 한다. 시뮬레이션을 위해, 철도통합무선망 무선통신 환경의 실측 데이터를 측정할 수 있는 철도시설공단(대전), 만종역-강릉역 KTX 노선에서 다양한 무선 환경 파라메터를 수집하였으며 본 논문에서 제안한 알고리즘의 성능이 기존 방식보다 우수함을 시뮬레이션 결과를 통하여 확인하였다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

사이버나이프에서 폐종양 추적 시스템의 정확도 분석 (Verification of X-sight Lung Tracking System in the CyberKnife)

  • 허현도;최상현;김우철;김헌정;김성훈;조삼주;민철기;조광환;이상훈;최진호;임상욱;신동오
    • 한국의학물리학회지:의학물리
    • /
    • 제20권3호
    • /
    • pp.174-179
    • /
    • 2009
  • 사이버나이프 로봇 방사선 수술 시스템은 환자를 치료하는 동안 환자의 내부 기준 마커를 이용하여 종양의 위치를 실시간으로 추적 할 수 있는 시스템이다. 최근 폐종양 치료의 경우 기준 마커의 삽입 없이 폐종양의 밀도 차이를 이용하여 실시간 종양 추적을 할 수 있는 폐종양추적시스템이 개발되어 치료에 적용되고 있다. 최근 개발되어 국내 최초 도입된 폐종양 추적치료시스템의 위치 추적 정확도의 분석은 동적흉부 팬톰과 GafChromic film을 이용하였다. 폐종양추적시스템을 이용하여 종양의 위치 추적 정확도는 평균 오차 $0.85{\pm}0.22$ mm로 분석되었다. 기준마커 삽입 없이 폐종양추적시스템을 이용하여 폐종양 치료에 매우 유용한 것으로 판단되었다.

  • PDF

원위내경동맥에 위치한 비파열성 동맥류의 치료에 있어 풍선-스텐트 테크닉에 대한 단일기관의 경험: Scepter-Atlas 조합을 사용하기 위한 간단하지만 확실한 방법 (Single Center Experience of the Balloon-Stent Technique for the Treatment of Unruptured Distal Internal Carotid Artery Aneurysms: Sharing a Simple and Reliable Tip to Use Scepter-Atlas Combination)

  • 박유정;노지은;백승국;염정아;강철후;정희석;이상원
    • 대한영상의학회지
    • /
    • 제82권5호
    • /
    • pp.1258-1273
    • /
    • 2021
  • 목적 풍선-스텐트 테크닉(balloon-stent technique; 이하 BST)은 복잡한 동맥류를 치료하는 보조술로서 그 고유한 장점을 가지고 있다. 저자들의 기관에서 Atlas의 출시 이래 Scepter-Atlas 조합의 BST를 치료에 적용해 온 경험을 공유하고자 한다. 대상과 방법 초기에 Atlas를 Scepter 카테터에 진입시키지 못하는 기술적 실패를 겪은 뒤 이를 해결하기 위해 문제가 되었던 기구들을 면밀히 관찰하였다. 2018년 3월부터 2019년 12월까지 총 57개의 비파열성 원위내경동맥 동맥류에 대해 코일 색전술을 시행하였고, 이중 25개(23명)의 증례는 BST로 치료하였다. 포함된 증례들의 영상 및 임상 정보는 후향적으로 수집하고 분석하였다. 결과 이 논문에서 소개하는 간단한 팁을 알게 된 이후 Scepter-Atlas 조합의 기술적 성공률은 50%에서 100%로 상승하였다. BST로 치료한 환자군에서 시술 직후에 84%, 추적검사에서 95.8%가 완전하거나 거의 완전한 폐색을 보였고 stent-assisted coil 그룹에서는 각각 96.3%, 88.4%가 시술 직후와 추적검사에서 같은 결과를 보였다. 소수의 환자에서 합병증을 보였지만 임상적으로 문제가 된 증례는 없었다. 결론 Scepter-Atlas 조합을 이용한 BST는 원위내경동맥에 위치한 비파열성 동맥류를 치료하는 데 효과적이고 안전한 방법이 될 수 있다. Scepter는 Atlas를 매개하는 카테터로 충분히 사용될 수 있다.

모유수유교육과 추후간호방법이 산모의 모유수유실천율과 모유수유방법에 미치는 효과 - 가정방문과 전화상담을 중심으로 - (Effect of Breast-feeding Education and Follow-up care on the Breast-feeding Rate and the Breast-feeding Method - Focused on Home Visit and Phone Counselling -)

  • 박숙희;고효정
    • 여성건강간호학회지
    • /
    • 제7권1호
    • /
    • pp.30-43
    • /
    • 2001
  • This was a pre-experimental study to confirm the breast-feeding ability and effect of follow up care on the breast-feeding rate and the breast-feeding method by the mother-infant breast-feeding assessment tool for the mothers who got the breast-feeding education. The subjects were 46 mothers who experienced normal delivery of infants at a college hospital in K-city, Kyungsangbuk-do, from July 1 to October 21, 2000. The instrument for data obtainment were The Mother-Infant Breast-Feeding Assessment Tool of Johnson et al. (1999), and The Breast- Feeding Method Measurement Tool of Jeong, Geum-hee(1997). This instrument was reliable, showing Cronbach $\alpha$.751. This study classified them into 3 groups: at high risk for breast-feeding failure, at risk for breast-feeding problems, and at low risk for breast-feeding failure by the mother-infant breast-feeding assessment tool on the day of discharge from the hospital after delivering individual breast-feeding education to the subjects. This study investigated the breast-feeding rate and the breast-feeding method through mail questionnaire at the four week after childbirth, and through the phone counselling and the home visit for follow up care at the first week and the second week after childbirth. The sixth week after childbirth, this study investigated the breast-feeding rate by phone. The data analyzed the hypothesizes by $x^2$-test, paired t-test, ANOVA, Wilcoxon signed rank test, Wilcoxon rank sum test and trend analysis using SPSS/PC+ WIN 10.0 program. The results were as follows : 1) Hypothesis 1-1, "there won't be any difference the breast-feeding rate of a group at risk for breast-feeding failure by the time elapsed" was supported through constant the breast-feeding rate, because changes in the breast-feeding rate by the time elapsed after childbirth wasn't statistically significant(t= -1.501, p=.270). Hypothesis 1-2, "there won't be any difference the breast-feeding rate of group at low risk for breast-feeding failure by the time elapsed" was supported through constant the breast-feeding rate, because changes in the breast-feeding rate by the time elapsed after childbirth wasn't statistically significant(t=-1.732, p=.225). 2) Hypothesis 2-1, "there won't be any difference between the breast-feeding method of group at risk for breast-feeding failure for four weeks after childbirth and just after childbirth” was rejected, because the mean point of post test appeared to be higher than that of pre test(t=-7.267, p=.000). Hypothesis 2-2, "there won't be any difference between the breast-feeding method of the group at low risk for breast-feeding failure for four weeks after childbirth and just after childbirth" was rejected, because the mean point of post test appeared to be higher than that of pre test(t=-2.501, p=.012). 3)The 3rd hypothesis, "there won't be any difference between breast-feeding method of groups at risk for breast-feeding problems and at low risk for breast-feeding failure at the 4th week after childbirth and just after childbirth" didn't show any difference between the breast-feeding method of groups at risk for breast-feeding problems and at low risk for breast-feeding failure in the advance test(t=-1.521, p=.130) but there was difference between them in post test (t=-2.012, p=.044). As a result, the 3rd hypothesis was supported by pre test, but it was rejected by post test. In conclusion, this study confirmed breast- feeding education and follow up care just after childbirth were effective for the breast-feeding rate and method. Accordingly, it is proposed that successful nursing intervention of breast-feeding to be necessary by continuously providing follow up care through the mother-infant breast-feeding assessment tool as well as to execute individual breast-feeding education to mothers just after childbirth.

  • PDF