• Title/Summary/Keyword: peer popularity

Search Result 46, Processing Time 0.119 seconds

A Study on the Relationship Between Popularity, Social Behaviors, and Maternal Child-Rearing Practices in Korean Preschool Children (취학전 아동의 인기도와 사회적 행동 및 어머니의 양육태도간의 관계 연구)

  • Chung, Moon Ja;Ahn, Jin Seok
    • Korean Journal of Child Studies
    • /
    • v.3
    • /
    • pp.63-81
    • /
    • 1982
  • The purpose of this study is to relate social behaviors and child-rearing practices to the popularity of preschool children in Korea. Specifically, four major questions were raised and studied First, the relationship between a child's popularity and his/her social behaviors was examined. Second, this relationship was explored as a function of the child's sex. Third, the relationship between a child's popularity and maternal childrearing practices was investigated. Fourth, this relationship was explored as a function of the child's sex. The subjects of this study were 113 middle class preschool aged children and their mothers. Sociometric choices and peer-perceived social behaviors were obtained from these children using Moore's (1973) Sociometric Status Test. Mothers of these children described their childrearing practices in a Q-sort format of Child-Rearing Practices Report (CRPR) developed by Block (1965). The analyses of the data using Kendall's Tau Correlation Coefficient bore the following results: 1. Patterns of social behaviors shown by either popular or unpopular children were distinct; Popular children were friendly and conformative, while unpopular children were aggressive, non-conformative and independent. 2. Patterns of social behaviors in relation to the popularity and the unpopularity differed as a function of the child's sex; Popular boys tended to be active while popular girls were likely to be unaggressive, independent and not-teasing. Unpopular boys showed a great amount of discipline their daughters by means of non-punitive punishment and to express negative reaction to the sibling rivalry among their children. These mothers tended not to enjoy their 3. Certain patterns of maternal child-rearing practices tended to be related to the popularity status of the child; The mothers of popular children as compared to those of unpopular children enjoyed their roles as mothers and didn't use non-punitive punishment. 4. Patterns of maternal child-rearing practices in relation to the child's popularity and unpopularity differed as a function of the child's sex; The mothers of popular boys unlike those of popular girls tended to emphasize on their sons' achievement and perceived that their husbands were greatly involved with their sons. The mothers of unpopular boys appeared to show negative affection toward their sons. The mothers of unpopular girls were likely to displine their daughters by means of non-punitive punishment and to express negative reaction to the sibling rivalry among their children. These mothers tended not to enjoy their roles as mothers and did not believe that their daughters would behave as they should.

  • PDF

TCP-ROME: A Transport-Layer Parallel Streaming Protocol for Real-Time Online Multimedia Environments

  • Park, Ju-Won;Karrer, Roger P.;Kim, Jong-Won
    • Journal of Communications and Networks
    • /
    • v.13 no.3
    • /
    • pp.277-285
    • /
    • 2011
  • Real-time multimedia streaming over the Internet is rapidly increasing with the popularity of user-created contents, Web 2.0 trends, and P2P (peer-to-peer) delivery support. While many homes today are broadband-enabled, the quality of experience (QoE) of a user is still limited due to frequent interruption of media playout. The vulnerability of TCP (transmission control protocol), the popular transport-layer protocol for streaming in practice, to the packet losses, retransmissions, and timeouts makes it hard to deliver a timely and persistent flow of packets for online multimedia contents. This paper presents TCP-real-time online multimedia environment (ROME), a novel transport-layer framework that allows the establishment and coordination of multiple many-to-one TCP connections. Between one client with multiple home addresses and multiple co-located or distributed servers, TCP-ROME increases the total throughput by aggregating the resources of multiple TCP connections. It also overcomes the bandwidth fluctuations of network bottlenecks by dynamically coordinating the streams of contents from multiple servers and by adapting the streaming rate of all connections to match the bandwidth requirement of the target video.

Adolescent Smoking Behaviors and the Related Risk Factors in Korea: A Descriptive Literature Review

  • Moon In-Ok
    • Korean Journal of Health Education and Promotion
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2004
  • This study conducted descriptive literature review on adolescent smoking and the related factors to realize significance of adolescent smoking onset in Korea and to identify risk factors of smoking incidence. Korean adolescent smoking status was generated based on the cumulated data of the Korean Association of Smoking and Health. Risk factors of adolescent smoking were identified based on 18 studies written in English, with cross-sectional research design and published as a peer-reviewed journal article between 1994 and 2003. The results were as follows. 1. Korean adolescent smoking rate was the highest among OECD affiliated countries; in particular, male adolescent smoking incidence was very serious. 2. Risk factors related to smoking of adolescent population were personal factor, friend factor, family factor, and mass-media factor. Demographic characteristics, attitudes on smoking, and willingness of smoking, and health behaviors were selected as personal factor of smoking. 3. Best friends smoking was a strong factor of students' smoking set. Prevalent popularity of smoking in peer-group allowed students to feel free to smoking. 4. Concerning family factor related to smoking status, parents' smoking and sibling's smoking were significant indicators of adolescent smoking status. 5. Seeing smoking behaviors and scenes through films, TV shows, drama, and advertisement was a significant risk factor of adolescent smoking status.

A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group (동적 피어 그룹을 위한 삼진 트리방식의 인증된 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1253-1263
    • /
    • 2012
  • As a result of the increased popularity of group oriented applications, the design of an efficient authenticated group key agreement protocol has received a lot of attention. Lee et al. proposed a tree-based group key agreement protocol, which applies a ternary key tree structure and pairing-based cryptography to the key agreement of Dynamic Peer Group. In their protocol, only the group sponsor knows all member's session random keys computes all blinded keys. In addition, when the group sponsor leaves a group, all nodes of the tree should be changed. In this paper, we present the modified protocol that has several sponsors. Since a secret value for each member isn't given to the group sponsor, the key renewing of our protocol is more secure and efficient than that of Lee et al.'s protocol in the previous case. Therefore, our protocol is suitable to Dynamic Peer Groups.

Measuring the Technical Efficiency in Railway Transport using Data Envelopment Analysis (DEA기법을 이용한 철도수송의 효율성 측정)

  • Kim, Hyun-Woong;Kook, Kwang-Ho
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.730-736
    • /
    • 2009
  • The objective of this paper is to measure the relative technical efficiency of Korean railway transport service. Previous studies on the efficiency in Korean railway service have carried out before the structural reform of Korean railway industry in 2004, whereas this study used the latest data which reflected the impact of reform. We analyzed the efficiency in Korean railway transport by means of measuring the technical efficiencies of other countries, these were estimated with data envelopment analysis. DEA has gained great popularity in measuring efficiency in transport industry, school, government, hospital and so on in recent years. This analysis could serve as peer to help improve performance of the railway management and operation.

  • PDF

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

Search Algorithm for Advanced Transmission Rate based on Probabilistic Proportion Search of Distributed Objects (분산 객체의 확률적 비례 검색 기반 전송률 향상 검색 알고리즘)

  • Kim, Boon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.49-56
    • /
    • 2006
  • A special feature of P2P distributed system isn't always the guarantee of online status for peers. In other words we want to download the file from the peer when we use the P2P system but it sometimes caused this system to fail the download. Many studies to resolve this problem depend on re-transmission method. It caused to lower performance so we have to resolve this problem. In this study, we analysis the average usage time of P2P application user and raise the resource transmission guarantee to apply the selection criteria of resource supplier. Moreover the combinations of distributed object replication techniques, the role to enhance the data transmission opportunity of high popularity resource. will cause this search algorithm to advance.

  • PDF

Signal Processing and Development Process Based on "MOOC + SPOC + Flipped Classroom"

  • Bei Qiao;Yan Mi
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.105-115
    • /
    • 2024
  • The hybrid teaching approach of "MOOC + SPOC + Flipped Classroom" overcomes the constraints of time and space that are typically associated with traditional teaching methods, thus compensating for the shortcomings of traditional approaches. These changes in education are driven by the "Internet+" wave and the growing popularity of online teaching. The "MOOC + SPOC + Flipped Classroom" hybrid teaching mode can successfully compensate for the drawbacks of traditional teaching methods, thereby overcoming their restrictions. By defining relevant concepts, one can distill the key characteristics of the "MOOC + SPOC + Flipped Classroom" hybrid teaching mode. Formative assessment was employed to thoroughly evaluate the effectiveness of this teaching approach. By leveraging the advantages of massive open online course (MOOC), small private online course (SPOC), and flipped classroom, the "MOOC +SPOC + Flipped Classroom" teaching mode incorporates real-time student assessment through peer evaluation, computer-aided evaluation, and teacher evaluation. This mode promotes the simultaneous development of theoretical knowledge and practical skills, helping students to establish strong foundations while fostering their practical abilities. While the traditional teaching method remains fruitful, the convenience of today's network allows the teaching profession to continually evolve. The traditional teaching mode heavily relies on teachers, making it impossible to conduct lessons without them. However, the development of MOOC enables students to seek knowledge online from their preferred teachers, rather than solely relying on their assigned instructors.

A Study On the Effects of Game Players' Environment on their Game Experience and Overindulgence in Games (게임 이용자의 환경이 게임 이용 및 과몰입에 미치는 영향에 관한 연구)

  • Lee, Ji-Hun
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.63-76
    • /
    • 2015
  • The purposes of this study are, firstly, to investigate the relationship between the online and mobile game players' psychological aspects (reference group, government regulation, game contents) and their game experience and overindulgence in games and, secondly, to suggest possible ways to reduce overindulgence in games. The implications of this research are as follows; Firstly, families and school authorities should strive to make sports and other pastime activities popular among peer groups rather than allowing online and video games to become only source of popularity among peer groups. Secondly, it is better for families members to establish a set of rules for controlling their children's time spent on online and mobile games rather than entirely forbidding the games. Family members should also strive to have more family conversations and to find a common source of interests. Thirdly, government should strive to develop policy responses to the overindulgence in games based on practical research and analysis. Fourthly, game makers should pay more attention to the components and expressions used in their games so as to draw game players' interests to the story and design of the games. Game makers also need to consider elements in their games that may potentially cause overindulgence in the development stage. Lastly, game players should strive to find new leisure activities besides online and mobile games that they can enjoy and have good experience with.

A Multi-Agent framework for Distributed Collaborative Filtering (분산 환경에서의 협력적 여과를 위한 멀티 에이전트 프레임워크)

  • Ji, Ae-Ttie;Yeon, Cheol;Lee, Seung-Hun;Jo, Geun-Sik;Kim, Heung-Nam
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.119-140
    • /
    • 2007
  • Recommender systems enable a user to decide which information is interesting and valuable in our world of information overload. As the recent studies of distributed computing environment have been progressing actively, recommender systems, most of which were centralized, have changed toward a peer-to-peer approach. Collaborative Filtering (CF), one of the most successful technologies in recommender systems, presents several limitations, namely sparsity, scalability, cold start, and the shilling problem, in spite of its popularity. The move from centralized systems to distributed approaches can partially improve the issues; distrust of recommendation and abuses of personal information. However, distributed systems can be vulnerable to attackers, who may inject biased profiles to force systems to adapt their objectives. In this paper, we consider both effective CF in P2P environment in order to improve overall performance of system and efficient solution of the problems related to abuses of personal data and attacks of malicious users. To deal with these issues, we propose a multi-agent framework for a distributed CF focusing on the trust relationships between individuals, i.e. web of trust. We employ an agent-based approach to improve the efficiency of distributed computing and propagate trust information among users with effect. The experimental evaluation shows that the proposed method brings significant improvement in terms of the distributed computing of similarity model building and the robustness of system against malicious attacks. Finally, we are planning to study trust propagation mechanisms by taking trust decay problem into consideration.

  • PDF