• Title/Summary/Keyword: Communication pattern

Search Result 1,767, Processing Time 0.027 seconds

A Conversational Analysis about Patient's Discomfort between a Patient with Cancer and a Nurse (불편감을 가진 암환자와의 간호대화 분석)

  • Lee, Hwa-Jin
    • Journal of Korean Academy of Nursing
    • /
    • v.37 no.1
    • /
    • pp.145-155
    • /
    • 2007
  • Purpose: The purpose of this study was to describe and to analyze real communication about a patient's discomfort between a patient with cancer and a nurse. Method: A dialogue analysis method was utilized. Fifteen patients and 4 nurses who participated in this research gave permission to be videotaped. The data was collected from January, 3 to February 28, 2006. Results: The communication process consisted of 4 functional stages: 'introduction stage', 'assessment stage', 'intervention stage' and 'final stage'. After trying to analyze pattern reconstruction in the 'assessment stage' and 'intervention stage', sequential patterns were identified. In the assessment stage, if the nurse lead the communication, the sequential pattern was 'assessment question-answer' and if the patient lead the communication, it was 'complaint-response'. In the intervention stage, the sequential pattern was 'nursing intervention-acceptance'. Conclusion: This research suggests conversation patterns between patients with cancer and nurses. Therefore, this study will provide insight for nurses in cancer units by better understanding communication behaviors.

Employing an Energy-efficient Pattern for Coverage Problem in WSNs (무선센서네크워크에서 커버리지 문제를 해결하기 위한 에너지효율적인 패턴)

  • Dao, Manh Thuong Quan;Le, Duc Tai;Ahn, Min-Joon;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.601-602
    • /
    • 2011
  • In wireless sensor networks, coverage problem is a fundamental issue that has attracted considerable attention in recent years. Most node scheduling patterns utilize the adjustable range of sensor to minimize the sensing energy consumption. However, a large source of consumption of communication energy of sensor is not strictly taken into account. In this paper, we introduce an energy-efficient pattern that is used to minimize the communication energy consumption of a sensor network. Calculations and extensive simulation are conducted to evaluate the efficiency of the new pattern comparing to existing ones.

A Study on Adaptive Pattern Null Synthesis for Active Phased Array Antenna (능동위상배열안테나의 적응형 패턴 널 형성에 관한 연구)

  • Jung, Jin-Woo;Park, Sung-Il
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.3
    • /
    • pp.407-416
    • /
    • 2021
  • An active phased array antennas can not only electrically steer the beam by controlling the weighting of the excitation signal, but can also form a pattern null in the direction of the interference source. The weight of the excitation signal to steer the main beam can be easily calculated based on the position of the radiating element. In addition, the weight of the excited signal for pattern null formation can also be calculated by setting the required radiation pattern and using WLSM(Weighted Least Squares Method). However, in a general wireless communication network environment, the location of the interference source is unknown. Therefore, an adaptive pattern null synthesis is needed. In this paper, it was confirmed that pattern null synthesis according to the required radiation characteristic was possible. And based on this, adaptive pattern null synthesis into the direction of an interference source was studied using a binary search algorithm based on observation area. As a result of conducting a simulation based on the presented technique, it was confirmed that adaptive pattern null forming into the direction of an interference is possible in efficient way.

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks

  • Kim, Daehee;Kim, Dongwan;An, Sunshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1249-1272
    • /
    • 2016
  • In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.

Communications and Family Cohesion & Adaptability Between Mother and Adolescent (어머니와 청소년자녀가 지각하는 의사소통유형과 가족 응집성 및 적응성)

  • 박은주
    • Journal of the Korean Home Economics Association
    • /
    • v.33 no.5
    • /
    • pp.27-38
    • /
    • 1995
  • The purposes of this study were to find out general trends of mother-adolescent communication patterns and to analyze communication variables which influence on family cohesion and adaptability. The subjects were 386 high school students and their mothers living in Kwang-ju. PACI and FACESIII were used to measure mother-adolescent communication patterns and family cohesion and adaptability. The results are as follows : Mothers highly perceived open communication pattern with adolescents, but adolescents perceived close communication more. Communication patterns, family cohesion and adaptability showed significant differences in according to communication variables as communication time and satisfaction. Family cohesion and adaptability were significantly different in according to communication patterns. Especially, open communication pattern between mothers and adolescents was the most important in order to increase family cohesion and adaptability.

  • PDF

Detecting smartphone user habits using sequential pattern analysis

  • Lu, Dang Nhac;Nguyen, Thu Trang;Nguyen, Thi Hau;Nguyen, Ha Nam;Choi, Gyoo Seok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.20-22
    • /
    • 2015
  • Recently, the study of smart phone user habits has become a highly focused topic due to the rapid growth of the smart phone market. Indeed, sequential pattern analysis methods were efficiently used for web-based user habit mining long time ago. However, by means of simulations, it has been observed that these methods might fail for smart phone-based user habit mining. In this paper, we propose a novel approach that leads to a considerably increased performance of the traditional sequential pattern analysis methods by reasonably cutting off each chronological sequence of user logs on a device into shorter ones, which represent the sequential user activities in various periods of a day.

Movement Pattern Analysis based on Transmission Performance over Underwater MANET (수중 MANET에서 전송성능기반 이동패턴분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1083-1088
    • /
    • 2019
  • Even though the transmission performance is very important factor for not only study and development but also for design, implementation, and operation of underwater MANET. There is a trend of using it as a measurement factor for comparing and analyzing degree of network performance. In this paper, movement pattern using transmission performance is analyzed to enlarge the use of transmission performance in underwater MANET. The relation between transmission performance and movement pattern is firstly considered and then through this consideration, causing effects of movement pattern to transmission performance is studied. Results of this study can be used as an important base to predict and analyze movement pattern through measuring of transmission performance of moving objects in underwater environments.

Conversations about Open Data on Twitter

  • Jalali, Seyed Mohammad Jafar;Park, Han Woo
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.31-37
    • /
    • 2017
  • Using the network analysis method, this study investigates the communication structure of Open Data on the Twitter sphere. It addresses the communication path by mapping influential activities and comparing the contents of tweets about Open Data. In the years 2015 and 2016, the NodeXL software was applied to collect tweets from the Twitter network, containing the term "opendata". The structural patterns of social media communication were analyzed through several network characteristics. The results indicate that the most common activities on the Twitter network are related to the subjects such as new applications and new technologies in Open Data. The study is the first to focus on the structural and informational pattern of Open Data based on social network analysis and content analysis. It will help researchers, activists, and policy-makers to come up with a major realization of the pattern of Open Data through Twitter.

Intermediator Pattern for Interoperability of Business Components (비즈니스 컴포넌트의 상호운용성을 위한 Intermediator 패턴)

  • 이창목;유철중;장옥배;문윤호
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.4
    • /
    • pp.443-454
    • /
    • 2001
  • Software design patterns are reusable solutions to recurring problems that occur during software development. As programmers gain experience, they recognize the similarity of new problems to problems they have solved before. With even more experience, they recognize that solutions for similar problems follow recurring patterns. In this paper, as one of these reusable design-patterns, the Intermediator pattern for the efficient communication between business component is designed and implemented. Existent business components were way that follow Facade pattern. But Facade pattern is almost like the existing Interface pattern in that the communication of all the object outside the set is done by only one representative object, and this causes the traffic system to be overloaded. Therefore, the Intermediator pattern supplements the traffic overloads by improving the inefficient system of business components' communication through multi-interface, and make all communication behavior between objects done by Intermediator object which controls all actual behavior by way of Intermediator method implementation. Consequently, the Intermediator pattern is designed and implemented in this paper can bring down the level of coupling and raise the cohesion among objects, and refer to many of other object flexibly through several interfaces.

  • PDF