• Title/Summary/Keyword: P2P(peer-to-peer)

Search Result 584, Processing Time 0.027 seconds

A Design and Implementation of Dynamic Hybrid P2P System with Hierarchical Group Management and Maintenance of Reliability (계층적 그룹관리와 신뢰성을 위한 동적인 변형 P2P 시스템 설계 및 구현)

  • Lee, Seok-Hee;Cho, Sang;Kim, Sung-Yeol
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.975-982
    • /
    • 2004
  • In current P2P concept, pure P2P and Hybrid P2P structures are used commonly. Gnutella and Ktella are forms of pure P2P. and forms of Hybrid P2P are innumerable. File searching models exist in these models. These models provide group management for file sharing, searching and indexing. The general file sharing model is good at maintaining connectivity. However, it is defective in group management. Therefore, this study approaches hierarchical structure in file sharing models through routing technique and backup system. This system was designed so that the user was able to maintain group efficiency and connection reliability in large-scale network.

A Method for Determining Sending Rates of Peers for Efficient Network Resource Utilization in P2P Environment (P2P 환경에서 효율적 망 자원 이용을 위한 피어의 송신률 결정 방법)

  • Park, Jaesung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.99-102
    • /
    • 2012
  • The performance of P2P application services may be improved by reducing unnecessary inter-network traffic through intelligent peer selection. However, since a logical link between peers in a P2P overlay network is composed of a set of physical links in an underlay network, the traffic pattern determined by the sending rates of selected peers imposes loads on each underlay links. Thus, if the sending rates are not determined carefully, the loads between underlay links may not be balanced, which means some links are underloaded while the other links are congested. In this paper, we take an optimization approach to determine the sending rates of peers strategically to avoid the inefficient use of underlay links. The proposed scheme also guarantee the minimum receiving rates of peers while minimizing the maximum link utilization of underlay links, which is beneficial both to P2P applications and an underlay network.

Fostering growth: The impact of STEM PBL on students' self-regulation and motivation

  • Hyunkyung Kwon;Robert M. Capraro;Yujin Lee;Ashley Williams
    • Research in Mathematical Education
    • /
    • v.27 no.1
    • /
    • pp.111-127
    • /
    • 2024
  • There is an increasing concern in the United States regarding the workforce's ability to maintain a competitive position in the global economy. This has led to an increased interest in effective science, technology, engineering, and mathematics (STEM) education. The purpose of this study was to investigate the effect of STEM project-based learning (PBL) on students' self-regulation and motivation to learn. Secondary students (n = 60) participated in a STEM summer camp in which STEM PBL was utilized. Results showed that students increased their self-regulation skills (t = 2.83, df = 59, p = .004) and motivation (t = 2.25, df = 59, p =.004), with Cohen's d effect sizes of 0.395 and 0.404, respectively. Student-centered learning and peer collaboration while solving real-world problems were likely the greatest contributing factors to the outcomes. Educators should utilize the results to provide opportunities for students to experience STEM PBL.

The relationships of perceived susceptibility, perceived severity, and subjective norms with COVID-19 preventive behaviors: a secondary data analysis comparing adolescents and emerging adults in South Korea

  • Sunhee Park;Sumi Oh
    • Child Health Nursing Research
    • /
    • v.29 no.2
    • /
    • pp.149-160
    • /
    • 2023
  • Purpose: Based on the health belief model and theory of planned behavior, this study investigated how age group (adolescence and emerging adulthood) moderated the relative effects of perceived susceptibility, perceived severity, and subjective norms on preventive behavior against coronavirus disease 2019 (COVID-19). Methods: This secondary data analysis utilized data from adolescents (n=272) and emerging adults (n=239). Hierarchical multiple regression analysis was performed to test the moderating effect of age group on the relationships among variables. Results: Higher perceived susceptibility (β=.21, p<.001), perceived severity (β=.14, p=.002), subjective norms (friends) (β=.26, p<.001), subjective norms (parents) (β=.44, p<.001), and subjective norms (schools) (β=.28, p<.001) enhanced COVID-19 preventive behaviors. Moderated regression analysis showed that subjective norms (friends and school) impacted preventive behavior in adolescents more than in emerging adults. Conclusion: Given the need to increase perceived susceptibility and severity among adolescents and emerging adults, these findings provide baseline data for designing effective COVID-19 prevention interventions that consider the developmental characteristics of different age groups. Interventions by health centers at universities can strengthen COVID-19 preventive behavior among emerging adults. As adolescents are influenced by friends, their peer roles must be strengthened to enhance adherence to COVID-19 preventive guidelines.

Blockchain for Securing Smart Grids

  • Aldabbagh, Ghadah;Bamasag, Omaimah;Almasari, Lola;Alsaidalani, Rabab;Redwan, Afnan;Alsaggaf, Amaal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.255-263
    • /
    • 2021
  • Smart grid is a fully-automated, bi-directional, power transmission network based on the physical grid system, which combines sensor measurement, computer, information communication, and automatic control technology. Blockchain technology, with its security features, can be integrated with Smart Grids to provide secure and efficient power management and transmission. This paper dicusses the deployment of Blockchain technology in Smart Grid. It presents application areas and protocols in which blockchain can be applied to in securing smart grid. One application of each area is explored in detail, such as efficient peer-to-peer transaction, lower platform costs, faster processes, greater flexibility in power generation to transmission, distribution and power consumption in different energy storage systems, current barriers obstructing the implementation of blockchain applications with some level of maturity in financial services but concepts only in energy and other sectors. Wide range of energy applications suggesting a suitable blockchain architecture in smart grid operations, a sample block structure and the potential blockchain technicalities employed in it. Also, added with efficient data aggregation schemes based on the blockchain technology to overcome the challenges related to privacy and security in the smart grid. Later on, consensus algorithms and protocols are discussed. Monitoring of the usage and statistics of energy distribution systems that can also be used to remotely control energy flow to a particular area. Further, the discussion on the blockchain-based frameworks that helps in the diagnosis and maintenance of smart grid equipment. We have also discussed several commercial implementations of blockchain in the smart grid. Finally, various challenges have been discussed for integrating these technologies. Overall, it can be said at the present point in time that blockchain technology certainly shows a lot of potentials from a customer perspective too and should be further developed by market participants. The approaches seen thus far may have a disruptive effect in the future and might require additional regulatory intervention in an already tightly regulated energy market. If blockchains are to deliver benefits for consumers (whether as consumers or prosumers of energy), a strong focus on consumer issues will be needed.

Factors influencing subjective happiness on the perceived stress and faith maturity of christian university freshman (일개 기독교 대학 신입생의 지각된 스트레스, 신앙성숙도가 주관적 행복감에 미치는 영향)

  • Jang, Insun
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.2
    • /
    • pp.328-339
    • /
    • 2020
  • The purpose of this study was to identify the predictors of subjective happiness of christian university freshman. The study was a cross-sectional descriptive survey. A self-report questionnaire was used to collect data from 232 freshmen in April, 2018. Data were analysed using descriptive statistics and t-test with SPSS win 21.0. Significant predictors of subjective happiness included life satisfaction (β=.515, p<.001), perceived stress (β=-.164, p<.001), peer support (β=.162, p<.001), family support (β=.153, p<.001) and faith maturity (β=.150, p<.001). The regression model explained 70.3% of subjective happiness. Based on these results, effective happiness promotion programs focusing on stress management and build social support system and faith-training program are highly recommended to promote the improved quality of life among christian university freshman.

A Study on the Protection Switching Mechanism for Distribution Automation System Ethernet Networks Service of Distribution Automation System (배전자동화시스템 통신서비스를 위한 이중화 통신망 보호절체 알고리즘 연구)

  • Yu, Nam-Cheol;Kim, Jae-Dong;Oh, Chae-Gon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.6
    • /
    • pp.744-749
    • /
    • 2013
  • The protection switching technology is widely adopted in the fiber-optical transmission equipments based on TDM(Time Division Multiplexing), such as PDH, SDH/SONET. A variety of protection switching algorithms for Ethernet networks and the progress of standardization are summarized in the document. There are several kinds of protection switching algorithms for Ethernet networks, such as STP, RSTP, MSTP and etc. However, since Ethernet signal move through detour route, it causes much time to recover. Accordingly, it is difficult to secure a usability of Ethernet networks and QOS(Quality of Service). Also, if the protection switching protocol standardized by IEEE and ITU-T is used, it remains a inherent network switching time for protection. Therefore, a specific protection switching algorithm for Ethernet are needed for seamless and stable operation of Ethernet networks service for Distribution Automation System(DAS). A reliable protection algorithm with no switching delay time is very important to implement Self-healing service for DAS. This study of FPGA based protection switching algorithm for Ethernet networks shows that in case of faults occurrence on distribution power network, immediate fault isolation and restoration are conducted through interaction with distribution equipments using P2P(Peer to Peer) communication for protection coordination. It is concluded that FPGA based protection switching algorithm for Ethernet networks available 0ms switching time is crucial technology to secure reliability of DAS.

An Exploratory Study on the Effects of Mobile Proptech Application Quality Factors on the User Satisfaction, Intention of Continuous Use, and Words-of-Mouth (모바일 부동산중개 애플리케이션의 품질요인이 사용자 만족, 지속적 사용 및 구전의도에 미치는 영향)

  • Jaeyoung Kim;Horim Kim
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.15-30
    • /
    • 2020
  • In the real estate industry, the latest changes in the Fourth Industrial Revolution, such as big data analytics, machine learning, and VR (virtual reality), combine to bring about industry change. Proptech is a new term combining properties and technology. This study aims to derive and analyze from a comprehensive perspective the quality factors (systems, services, interfaces, information) for mobile real estate brokerage services that are well known and used in the domestic market. The surveys in this study were conducted online and offline and a total of 161 samples were used for statistical analysis. As a result, all hypotheses were approved to except system quality and service quality. The results show that the domestic proptech companies who are mostly focused on real estate brokerage services, peer-to-peer lending, advertising platforms and apartments need to grow in various fields of proptech business of other countries including Europe, USA and China.

The File Splitting Distribution Scheme Using the P2P Networks with The Mesh topology (그물망 위상의 P2P 네트워크를 활용한 파일 분리 분산 방안)

  • Lee Myoung-Hoon;Park Jung-Su;Kim Jin-Hong;Jo In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1669-1675
    • /
    • 2005
  • Recently, the small sized wireless terminals have problems of processing of large sized file because of the trends of a small sized terminals and a large sized files. Moreover, the web servers or the file servers have problems of the overload because of the concentration with many number of files to the them. Also, There is a security vulnerability of the data processing caused by the processing with a unit of the independent file. To resolve the problems, this paper proposes a new scheme of fat splining distribution using the P2P networks with the mesh topology. The proposed scheme is to distribute blocks of file into any peer of P2P networks. It can do that the small sized wireless terminals can process the large size file, the overload problems of a web or file servers can solve because of the decentralized files, and, the security vulnerability of the data processing is mitigated because of the distributed processing with a unit of the blocks to the peers.

Importance of End User's Feedback Seeking Behavior for Faithful Appropriation of Information Systems in Small and Medium Enterprises (중소기업 환경에서의 합목적적 정보시스템 활용을 위한 최종사용자 피드백 탐색행위의 중요성)

  • Shin, Young-Mee;Lee, Joo-Ryang;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.61-95
    • /
    • 2007
  • Small-and-medium sized enterprises(SMEs) represent quite a large proportion of the industry as a whole in terms of the number of enterprises or employees. However researches on information system so far have focused on large companies, probably because SMEs were not so active in introducing information systems as larger enterprises. SMEs are now increasingly bringing in information systems such as ERP(Enterprise Resource Planning Systems) and some of the companies already entered the stage of ongoing use. Accordingly, researches should deal with the use of information systems by SME s operating under different conditions from large companies. This study examined factors and mechanism inducing faithful appropriation of information systems, in particular integrative systems such as ERP, in view of individuals` active feedback-seeking behavior. There are three factors expected to affect end users` feedback-seeking behavior for faithful appropriation of information systems. They are management support, peer IT champ support, and IT staff support. The main focus of the study is on how these factors affect feedback-seeking behavior and whether the feedback-seeking behavior plays the role of mediator for realizing faithful appropriation of information systems by end users. To examine the research model and the hypotheses, this study employed an empirical method based on a field survey. The survey used measurements mostly employed and verified by previous researches, while some of the measurements had gone through minor modifications for the purpose of the study. The survey respondents are individual employees of SMEs that have been using ERP for one year or longer. To prevent common method bias, Task-Technology Fit items used as the control variable were made to be answered by different respondents. In total, 127 pairs of valid questionnaires were collected and used for the analysis. The PLS(Partial Least Squares) approach to structural equation modeling(PLS-Graph v.3.0) was used as our data analysis strategy because of its ability to model both formative and reflective latent constructs under small-and medium-size samples. The analysis shows Reliability, Construct Validity and Discriminant Validity are appropriate. The path analysis results are as follows; first, the more there is peer IT champ support, the more the end user is likely to show feedback-seeking behavior(path-coefficient=0.230, t=2.28, p<0.05). In other words, if colleagues proficient in information system use recognize the importance of their help, pass on what they have found to be an effective way of using the system or correct others' misuse, ordinary end users will be able to seek feedback on the faithfulness of their appropriation of information system without hesitation, because they know the convenience of getting help. Second, management support encourages ordinary end users to seek more feedback(path-coefficient=0.271, t=3.06, p<0.01) by affecting the end users' perceived value of feedback(path-coefficient=0.401, t=6.01, p<0.01). Management support is far more influential than other factors that when the management of an SME well understands the benefit of ERP, promotes its faithful appropriation and pays attention to employees' satisfaction with the system, employees will make deliberate efforts for faithful appropriation of the system. However, the third factor, IT staff support was found not to be conducive to feedback-seeking behavior from end users(path-coefficient=0.174, t=1.83). This is partly attributable to the fundamental reason that there is little support for end users from IT staff in SMEs. Even when IT staff provides support, end users may find it less important than that from coworkers more familiar with the end users' job. Meanwhile, the more end users seek feedback and attempt to find ways of faithful appropriation of information systems, the more likely the users will be able to deploy the system according to the purpose the system was originally meant for(path-coefficient=0.35, t=2.88, p<0.01). Finally, the mediation effect analysis confirmed the mediation effect of feedback-seeking behavior. By confirming the mediation effect of feedback-seeking behavior, this study draws attention to the importance of feedback-seeking behavior that has long been overlooked in research about information system use. This study also explores the factors that promote feedback-seeking behavior which in result could affect end user`s faithful appropriation of information systems. In addition, this study provides insight about which inducements or resources SMEs should offer to promote individual users' feedback-seeking behavior when formal and sufficient support from IT staff or an outside information system provider is hardly expected. As the study results show, under the business environment of SMEs, help from skilled colleagues and the management plays a critical role. Therefore, SMEs should seriously consider how to utilize skilled peer information system users, while the management should pay keen attention to end users and support them to make the most of information systems.