• Title/Summary/Keyword: A2P

Search Result 80,151, Processing Time 0.091 seconds

The Fourier Analysis on DSA and P$_2$SA for Discrete-Ordinates Solutions of Neutron Transport Equations

  • Noh, Taewan
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.10a
    • /
    • pp.103-108
    • /
    • 1995
  • By applying the P$_1$ and P$_2$ equations to the operator form of a synthetic acceleration, we derive the p,-acceleration (diffusion synthetic acceleration: DSA) and P$_2$-acceleration (p$_2$SA) schemes in one dimensional slab geometry. We Fourier-analyze the derived acceleration schemes with the discrete-ordinates transport equation and showed that the DSA outperforms the P$_2$SA. These results confirm that one cannot simply assume that replacement of the DSA with a higher order approximation will lead to a better acceleration performance.

  • PDF

COMMUTING AUTOMORPHISM OF p-GROUPS WITH CYCLIC MAXIMAL SUBGROUPS

  • Vosooghpour, Fatemeh;Kargarian, Zeinab;Akhavan-Malayeri, Mehri
    • Communications of the Korean Mathematical Society
    • /
    • v.28 no.4
    • /
    • pp.643-647
    • /
    • 2013
  • Let G be a group and let $p$ be a prime number. If the set $\mathcal{A}(G)$ of all commuting automorphisms of G forms a subgroup of Aut(G), then G is called $\mathcal{A}(G)$-group. In this paper we show that any $p$-group with cyclic maximal subgroup is an $\mathcal{A}(G)$-group. We also find the structure of the group $\mathcal{A}(G)$ and we show that $\mathcal{A}(G)=Aut_c(G)$. Moreover, we prove that for any prime $p$ and all integers $n{\geq}3$, there exists a non-abelian $\mathcal{A}(G)$-group of order $p^n$ in which $\mathcal{A}(G)=Aut_c(G)$. If $p$ > 2, then $\mathcal{A}(G)={\cong}\mathbb{Z}_p{\times}\mathbb{Z}_{p^{n-2}}$ and if $p=2$, then $\mathcal{A}(G)={\cong}\mathbb{Z}_2{\times}\mathbb{Z}_2{\times}\mathbb{Z}_{2^{n-3}}$ or $\mathbb{Z}_2{\times}\mathbb{Z}_2$.

A P2P Multimedia Streaming Protocol Using Multiple-Peer Binding (다중 피어 결합을 이용한 P2P 멀티미디어 스트리밍 프로토콜)

  • Jung Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.253-261
    • /
    • 2006
  • In spite of the popularity of P2P technology, a multimedia streaming using the P2P technology has been neglected. The reason for this is that the P2P multimedia streaming has suffered from several inherent problems especially poor bandwidth and unreliable connection among peers. We suggest a Multi-Peer Binding Protocol (MPBP) in this paper that provides a virtual single channel composed of multiple connections to several peers to ease these problems. The protocol enables applications to download data from multiple peers simultaneously, so they can achieve throughput improvement and reliable streaming. For this, the MPBP splits media files into small chunks and provides a mechanism for identifying and transmitting each chunk. Implemented MPBP engine focuses on handling an abrupt disconnection from data sending peers and the evaluation result shows the MPBP is able to handle it gracefully. The MPBP is also desisted to support various media types. To verify this, video and audio applications are implemented using the MPBP engine in this paper.

  • PDF

A Distributed Trust Model Based on Reputation Management of Peers for P2P VoD Services

  • Huang, Guimin;Hu, Min;Zhou, Ya;Liu, Pingshan;Zhang, Yanchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2285-2301
    • /
    • 2012
  • Peer-to-Peer (P2P) networks are becoming more and more popular in video content delivery services, such as Video on Demand (VoD). Scalability feature of P2P allows a higher number of simultaneous users at a given server load and bandwidth to use stream service. However, the quality of service (QoS) in these networks is difficult to be guaranteed because of the free-riding problem that nodes download the recourses while never uploading recourses, which degrades the performance of P2P VoD networks. In this paper, a distributed trust model is designed to reduce node's free-riding phenomenon in P2P VoD networks. In this model, the P2P network is abstracted to be a super node hierarchical structure to monitor the reputation of nodes. In order to calculate the reputation of nodes, the Hidden Markov Model (HMM) is introduced in this paper. Besides, a distinction algorithm is proposed to distinguish the free-riders and malicious nodes. The free-riders are the nodes which have a low frequency to free-ride. And the malicious nodes have a high frequency to free-ride. The distinction algorithm takes different measures to response to the request of these two kinds of free-riders. The simulation results demonstrate that this proposed trust model can improve QoS effectively in P2P VoD networks.

Block Selection Strategy for P2P Streaming (P2P 스트리밍을 위한 블록 선택 전략)

  • Kim, Heung-Jun;Son, Sei-Il;Lee, Kwang-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2179-2187
    • /
    • 2008
  • The P2P technology has been widely used to distribute files efficiently, and its use in streaming is rapidly increasing. P2P streaming has issues about startup-delay, scalability, and real-time playback, however, what affects these factors has not been researched sufficiently. This paper suggests a buffering model for progressive download within mesh-based P2P system, which corresponds to downloading and playing the content at the same time. It is used to analyze PDF(Playback Deadline First), Rarest algorithms which are block-selection strategies of P2P streaming and proposes a mixed selection of them. The mixed block selection strategy dynamically performs different strategies based on whether the blocks to be played are received or not. In consequence, it enhances the QoS of streaming in a single peer point of view, as well as improving block distributions in an overlay network.

The Traffic Analysis of P2P-based Storm Botnet using Honeynet (허니넷을 이용한 P2P 기반 Storm 봇넷의 트래픽 분석)

  • Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the cyber-attacks using botnets are being increased, Because these attacks pursue the money, the criminal aspect is also being increased, There are spreading of spam mail, DDoS(Distributed Denial of Service) attacks, propagations of malicious codes and malwares, phishings. leaks of sensitive informations as cyber-attacks that used botnets. There are many studies about detection and mitigation techniques against centralized botnets, namely IRC and HITP botnets. However, P2P botnets are still in an early stage of their studies. In this paper, we analyzed the traffics of the Peacomm bot that is one of P2P-based storm bot by using honeynet which is utilized in active analysis of network attacks. As a result, we could see that the Peacomm bot sends a large number of UDP packets to the zombies in wide network through P2P. Furthermore, we could know that the Peacomm bot makes the scale of botnet maintained and extended through these results. We expect that these results are used as a basis of detection and mitigation techniques against P2P botnets.

PROJECTIVE PROPERTIES OF REPRESENTATIONS OF A QUIVER OF THE FORM Q = • ⇉ • → •

  • Park, Sangwon;Han, Juncheol
    • Korean Journal of Mathematics
    • /
    • v.17 no.4
    • /
    • pp.429-436
    • /
    • 2009
  • We define a projective representation $M_1{^{\rightarrow}_{\rightarrow}}M_2{\rightarrow}M_3$ of a quiver $Q={\bullet}{^{\rightarrow}_{\rightarrow}}{\bullet}{\rightarrow}{\bullet}$ and consider their properties. Then we show that any projective representation $M_1{^{\rightarrow}_{\rightarrow}}M_2{\rightarrow}M_3$ of a quiver $Q={\bullet}{^{\rightarrow}_{\rightarrow}}{\bullet}{\rightarrow}{\bullet}$ is isomorphic to the quotient of a direct sum of projective representations $0{^{\rightarrow}_{\rightarrow}}0{\rightarrow}P,\;0{^{\rightarrow}_{\rightarrow}}P{\rightarrow\limits^{id}}P$ and $P{^{\rightarrow}_{\rightarrow}}^{e1}_{e2}P{\oplus}P{\rightarrow\limits^{id_{P{\oplus}P}}}P{\oplus}P$, where $e_1(a)=(a,0)$ and $e_2(a)=(0,a)$.

  • PDF

Efficient Mobile P2P Structure for Content Search Services (콘텐츠 검색 서비스를 위한 효율적인 이동 P2P 구조)

  • Kwak, Dong-Won;Bok, Kyoung-Soo;Kang, Tae-Ho;Yeo, Myung-Ho;Yoo, Jae-Soo;Joe, Ki-Hung
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.30-44
    • /
    • 2009
  • In this paper, we propose the mobile P2P structure supporting content searches for mobile peers efficiently. The proposed mobile P2P structure is a 3-tier structure which consists of a mobile peer, a mobile super peer, and a stationary super peer to reduce the content search cost of mobile P2P service. For content searches, mobile peer searches content in the communication range and performs hierarchical content searches which is using mobile super peer, stationary super peer for expansion of query region. In order to support hierarchial content searches and the continuity of services according to peer mobilities, peer's join/leave processes are explicitly stored by supporting message structures to the upper layer It is shown through experimental evaluation that the proposed structure improves about 32% contents search performance over the existing 2-tier structure. Since it also reduces the messages transferred to the stationary super peers, it reduced about 25% search loads of them.

A Method for Determining Sending Rates of Peers for Efficient Network Resource Utilization in P2P Environment (P2P 환경에서 효율적 망 자원 이용을 위한 피어의 송신률 결정 방법)

  • Park, Jaesung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.99-102
    • /
    • 2012
  • The performance of P2P application services may be improved by reducing unnecessary inter-network traffic through intelligent peer selection. However, since a logical link between peers in a P2P overlay network is composed of a set of physical links in an underlay network, the traffic pattern determined by the sending rates of selected peers imposes loads on each underlay links. Thus, if the sending rates are not determined carefully, the loads between underlay links may not be balanced, which means some links are underloaded while the other links are congested. In this paper, we take an optimization approach to determine the sending rates of peers strategically to avoid the inefficient use of underlay links. The proposed scheme also guarantee the minimum receiving rates of peers while minimizing the maximum link utilization of underlay links, which is beneficial both to P2P applications and an underlay network.

PAIR DIFFERENCE CORDIAL LABELING OF PETERSEN GRAPHS P(n, k)

  • R. PONRAJ;A. GAYATHRI;S. SOMASUNDARAM
    • Journal of Applied and Pure Mathematics
    • /
    • v.5 no.1_2
    • /
    • pp.41-53
    • /
    • 2023
  • Let G = (V, E) be a (p, q) graph. Define $${\rho}=\{{\frac{2}{p}},\;{\text{{\qquad} if p is even}}\\{\frac{2}{p-1}},\;{{\text{if p is odd}}$$ and L = {±1, ±2, ±3, … , ±ρ} called the set of labels. Consider a mapping f : V ⟶ L by assigning different labels in L to the different elements of V when p is even and different labels in L to p-1 elements of V and repeating a label for the remaining one vertex when p is odd.The labeling as defined above is said to be a pair difference cordial labeling if for each edge uv of G there exists a labeling |f(u) - f(v)| such that ${\mid}{\Delta}_{f_1}-{\Delta}_{f^c_1}{\mid}{\leq}1$, where ${\Delta}_{f_1}$ and ${\Delta}_{f^c_1}$ respectively denote the number of edges labeled with 1 and number of edges not labeled with 1. A graph G for which there exists a pair difference cordial labeling is called a pair difference cordial graph. In this paper we investigate pair difference cordial labeling behaviour of Petersen graphs P(n, k) like P(n, 2), P(n, 3), P(n, 4).