• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.033 seconds

Pressure Ulcer Risk Factors and Preventive Intervention in Long-Term Care Facilities : A Mixed method study (노인요양기관의 욕창발생 위험요인과 욕창예방 관리: 혼합연구)

  • Yun, Haesun;Park, Jeeyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.147-155
    • /
    • 2020
  • The purpose of this study was to compare the risk factors of pressure sores and preventive intervention strategies and to provide basic data for the management of pressure sores prevention for long-term care facilities. It was a mixed method study using a systematic literature review and focus group interviews for analysis. A PRISMA flow diagram was prepared in accordance with the research selection process for the systemic literature review. The studies were retrieved from domestic and international studies from 2010 to June, 2019. A total of 8 studies were selected according to the selection criteria. The studies were searched electronically using a search engine with the key words of 'pressure ulcers', 'bedsore', 'decubitus ulcers', 'intervention', 'prevention', 'elderly', and 'long term'. Focus group interviews were conducted through a semi-structured questionnaire for nurses who had worked for more than three years in long-care facilities. The study results suggest that position change and pressure reduction device reduced the incidence of pressure sores and were important for prevention. The use of standardized care protocols is necessary. Multidisciplinary cooperation was an important issue.

Development of New Prototype of Mechanical Quality Assurance for Clinical Linear Accelerator (의료용 선형가속기의 기계적 점검을 위한 새로운 정도관리 프로토콜의 개발)

  • 윤형근;신교철;김기환;오영기;김진기;정동혁;김정기;조문준;박인규
    • Progress in Medical Physics
    • /
    • v.13 no.3
    • /
    • pp.109-113
    • /
    • 2002
  • In recent years, the radiotherapy equipment has become much more sophisticated, and with the complication comes an increased set of quality assurance (QA) responsibilities. Today's computer controlled linear accelerator requiring QA of not only the radiation integrity, but also the mechanical accuracy of the linear accelerator. The existing QA sheets are adequate for acceptance testing and commissioning but those sheets are somewhat descriptive form for routine QA. establishing the QA sheets for a facility are more efficient if the sheets could estimate the long-term stability for the result of QA. We are going to develope new prototype of mechanical QA sheet to visualize and to verify long-term stability of mechanical QA for clinical linear accelerator. The items included in mechanical QA sheet were 1) gantry rotation, 2) collimator rotation, 3) couch rotation, 4) optical distance indicator (ODI), and 5) laser alignment. We compared new prototype sheet with conventional sheet for several hospitals in Korea for those items. The QA acceptance criteria in this study mainly followed published recommendations. The contents of test for mechanical QA are the following. Confirm that the digital and/or mechanical gantry angle readouts are correct. Verify that digital and/or mechanical readouts of collimator angle agree with the true angle, as determined with the protractor. Measure the light field using a graph paper and compare with the digital readouts. Confirm digital readout accuracy. Verify that the sagittal laser, the left and right lasers, and the ceiling laser intersect at the isocenter. In the design of new QA sheet, we emphasized the representation of the long-term stability of mechanical QA by using Excel program. By using the new prototype QA sheet, we simplified and visualized the mechanical QA process, and could estimate the long-term stability of mechanical error of linear accelerator.

  • PDF

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

Analysis of Automatic Meter Reading Systems (IBM, Oracle, and Itron) (국외 상수도 원격검침 시스템(IBM, Oracle, Itron) 분석)

  • Joo, Jin Chul;Kim, Juhwan;Lee, Doojin;Choi, Taeho;Kim, Jong Kyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.264-264
    • /
    • 2017
  • 국외의 상수도 원격검침 시스템 내 데이터 전송방식은 도시 규모, 계량기의 밀도, 전력공급 여부 및 통신망의 설치 여부 등을 종합적으로 고려하여 결정되었다. 대부분의 스마트워터미터 제조업체들은 계량기의 부호기가 공급하는 판독 내용(데이터)을 전송할 검침단말기와 근거리 통신망(neighborhood area network)을 연계하여 개발 및 판매하였으며, 자체 소유 통신 프로토콜을 사용하여 라디오 주파수(RF) 통신 기술을 사용하고 있다. 광역통신망(wide area network)의 경우, 노드(말단의 계량기 및 센서)들과 이에 연결된 통신망 들을 포함한 네트웍의 배열이나 구성이 스타(star), 메쉬(mesh), 버스(bus), 나무(tree) 등의 형태로 통신망이 구성되어 있으나, 스타와 메쉬형 통신망 구성형태가 가장 널리 활용되는 것으로 조사되었다. 시스템 통합운영관리 업체들인 IBM, Oracle, Itron 등은 용수 인프라 관리 또는 통합네트워크 솔루션 등의 통합 물관리 시스템(integrated water management system)을 개발하여 현장적용을 하고 있으며, 원격검침 시스템을 통해 고객들의 현재 소비량과 과거 누적 소비량, 누수 감지 서비스 및 실시간 요금 고지 등을 실시간으로 웹 포털과 앱을 통해 제공하고 있다. 또한, 일부 제조업체들은 도시 용수공급/소비 관리자가 주민의 용수사용량을 모니터링하여 일평균 용수사용량 및 사용 경향을 파악하고, 누수를 검지하여 복구 및 용수 사용 지속가능성 지수를 제시하고, 실시간으로 주민의 용수사용량 관련 데이터를 모니터링하여 용수공급의 최적화를 위한 의사결정지원 서비스를 용수공급자에게 제공하고 있다. 최근에는 인공지능을 활용해 가정용수의 용도별(세탁용수, 화장실용수, 샤워용수, 식기세척용수 등) 사용량 곡선을 패터닝하여 profiling 기법을 도입해, 스마트워터미터에서 용수사용량이 통합되어 검지될 시 용수사용량의 세부 용도별 re-profiling 기법을 도입하여 가정용수내 과소비되는 지점을 도출 후 절감을 유도하는 기술이 개발 중이다. 또한, 미래 용수 사용량 예측을 위해 다양한 시계열 자료를 분석하는 선형 종속 모형(자기회귀모형, 자기회귀이동평균모형, 자기회귀적분이동평균모형 등)과 비선형 종속 모형(Fuzzy Logic, Neural Network, Genetic Algorithm 등)을 활용한 예측기능이 구축되어 상호 비교하여 최적의 용수사용량 예측 도구를 제공되고 있다.

  • PDF

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof (영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록)

  • Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.999-1012
    • /
    • 2020
  • As the utilize of personal health records increases in recent years, research on cryptographic protocol for protecting personal information of personal health records has been actively conducted. Currently, personal health records are commonly encrypted and outsourced to the cloud. However, this method is limited in verifying the integrity of personal health records, and there is a problem with poor data availability because it is essential to use it in decryption. To solve this problem, this paper proposes a verifiable cloud-based personal health record management scheme using Redactable signature scheme and zero-knowledge proof. Verifiable cloud-based personal health record management scheme can be used to verify the integrity of the original document while preserving privacy by deleting sensitive information by using Redactable signature scheme, and to verify that the redacted document has not been deleted or modified except for the deleted part of the original document by using the zero-knowledge proof. In addition, it is designed to increase the availability of data than the existing management schemes by designing to recover deleted parts only when necessary through the Redact Recovery Authority. And we propose a verifiable cloud-based personal health record management model using the proposed scheme, and analysed its efficiency by implementing the proposed scheme.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

The study of MDCT of Radiation dose in the department of Radiology of general hospitals in the local area (일 지역 종합병원 영상의학과 MDCT선량에 대한 연구)

  • Shin, Jung-Sub
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.4
    • /
    • pp.281-290
    • /
    • 2012
  • The difference of radiation dose of MDCT due to different protocols between hospitals was analyzed by CTDI, DLP, the number of Slice and the number of DLP/Slice in 30 cases of the head, the abdomen and the chest that have 10 cases each from MDCT examination of the department of diagnostic imaging of three general hospitals in Gyeongsangbuk-do. The difference of image quality, CTDI, DLP, radiation dose in the eye and radiation dose in thyroid was analyzed after both helical scan and normal scan for head CT were performed because a protocol of head CT is relatively simple and head CT is the most frequent case. Head CT was significantly higher in two-thirds of hospitals compared to A hospital that does not exceed a CTDI diagnostic reference level (IAEA 50mGy, Korea 60mGy) (p<0.001). DLP was higher in one-third of hospitals than a diagnostic reference level of IAEA 1,050mGy.cm and Korea 1,000mGy.cm and two-thirds exceeded the recommendation of Korea and those were significantly higher than A hospital that does not exceed a diagnostic reference level (p<0.001). Abdomen CT showed 119mGy that was higher than a diagnostic reference level of IAEA 25mGy and Korea 20mGy in one-third. DLP in all hospitals was higher that Korea recommendation of 700mGy.cm. Among target hospitals, C hospital showed high radiation dose in all tests because MPR and 3D were of great importance due to low pitch and high Tube Curren. To analyze the difference of radiation dose by scan methods, normal scan and helical scan for head CT of the same patient were performed. In the result, CTDI and DLP of helical CT were higher 63.4% and 93.7% than normal scan (p<0.05, p<0.01). However, normal scan of radiation dose in thyroid was higher 87.26% (p<0.01). Beam of helical CT looked like a bell in the deep part and the marginal part so thyroid was exposed with low radiation dose deviated from central beam. In addition, helical scan used Gantry angle perpendicularly and normal scan used it parallel to the orbitomeatal line. Therefore, radiation dose in thyroid decreased in helical scan. However, a protocol in this study showed higher radiation dose than diagnostic reference level of KFDA. To obey the recommendation of KFDA, low Tube Curren and high pitch were demanded. In this study, the difference of image quality between normal scan and helical scan was not significant. Therefore, a standardized protocol of normal scan was generally used and protective gear for thyroid was needed except a special case. We studied a part of CT cases in the local area. Therefore, the result could not represent the entire cases. However, we confirmed that patient's radiation dose in some cases exceeded the recommendation and the deviation between hospitals was observed. To improve this issue, doctors of diagnostic imaging or technologists of radiology should perform CT by the optimized protocol to decrease a level of CT radiation and also reveal radiation dose for the right to know of patients. However, they had little understanding of the situation. Therefore, the effort of relevant agencies with education program for CT radiation dose, release of radiation dose from CT examination and addition of radiation dose control and open CT contents into evaluation for hospital services and certification, and also the effort of health professionals with the best protocol to realize optimized CT examination.

Design and Implementation of UHF RFID Reader System Supporting Sensor Data Processing (센서 데이터 처리를 지원하는 UHF RFID 리더 시스템의 설계 및 구현)

  • Shin, Dong-Beom;Lee, Heyung-Sub;Choi, Gil-Young;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.925-932
    • /
    • 2009
  • Precise temperature monitoring is the major preconditioning to supervise quality losses within the transport chain for fresh products. ISO/IEC18000-6REV1 defines new protocols supporting BAP(Battery Assisted Passive) RFID tag which is completely compatible with EPCglobal Class1 Generation2 specification. In this paper, we designed a modem supporting BAP RFID tag with FPGA(Field Programmable Gate Array) and implemented sensor data processing function defined in ISO/IEC18000-6REV1. The transmit block of the modem supports pulse shaping filter and the output signal of the implemented RFID reader is satisfied with the spectrum mask defined in the standard. The receive block of the modem uses Gardner TED to synchronize timing of symbol. In this paper, we designed a modem supporting ISO/IEC18000-6REV1 standard and developed a RFID reader sndard. The developed RFID reader sndard can recognize sensor tag and passive tag in the wireless environment and supports real-time processing of the sensor data in the embedded linux platform.

The research of Sensor network service analysis based on OGC (OGC 기반의 센서 네트워크 서비스 분석 연구)

  • Kim, Nam-Hoon;Ham, Jong-Wan;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.774-780
    • /
    • 2010
  • USN(Ubiquitous Sensor Network) is a core infrastructure that u-life use to enable the realization in the ubiquitous society through various services of area such as u-city, u-Health. Therefore, we need a research for domestic standards to establish USN technique. Currently, status of USN standards is most standard and research that it is a technology for sensor node implementation and a protocol for energy-efficient communication and interlock with existing network. But, Standard and research for sensor network and integration management of heterogeneous sensor networks for USN application and sensing data management and USN database structure definition such as application and middleware is weak level. In this paper, we researched for standard development of domestic a sensor network and the relevant standard analysis to configure SWE(Sensor Web Enablement) of OGC(Open Geospatial Consortium) for standarded plattform technology. Also we researched that it's a connection between domestic ITA(Telecommunications Technology Association) standards and SWE Standard.