• Title/Summary/Keyword: Peer-to-Peer Network

Search Result 423, Processing Time 0.027 seconds

Influence of concurrent horizontal and vertical ground excitations on the collapse margins of non-ductile RC frame buildings

  • Farsangi, E. Noroozinejad;Yang, T.Y.;Tasnimi, A.A.
    • Structural Engineering and Mechanics
    • /
    • v.59 no.4
    • /
    • pp.653-669
    • /
    • 2016
  • Recent earthquakes worldwide show that a significant portion of the earthquake shaking happens in the vertical direction. This phenomenon has raised significant interests to consider the vertical ground motion during the seismic design and assessment of the structures. Strong vertical ground motions can alter the axial forces in the columns, which might affect the shear capacity of reinforced concrete (RC) members. This is particularly important for non-ductile RC frames, which are very vulnerable to earthquake-induced collapse. This paper presents the detailed nonlinear dynamic analysis to quantify the collapse risk of non-ductile RC frame structures with varying heights. An array of non-ductile RC frame architype buildings located in Los Angeles, California were designed according to the 1967 uniform building code. The seismic responses of the architype buildings subjected to concurrent horizontal and vertical ground motions were analyzed. A comprehensive array of ground motions was selected from the PEER NGA-WEST2 and Iran Strong Motions Network database. Detailed nonlinear dynamic analyses were performed to quantify the collapse fragility curves and collapse margin ratios (CMRs) of the architype buildings. The results show that the vertical ground motions have significant impact on both the local and global responses of non-ductile RC moment frames. Hence, it is crucial to include the combined vertical and horizontal shaking during the seismic design and assessment of non-ductile RC moment frames.

A Multi-Agent framework for Distributed Collaborative Filtering (분산 환경에서의 협력적 여과를 위한 멀티 에이전트 프레임워크)

  • Ji, Ae-Ttie;Yeon, Cheol;Lee, Seung-Hun;Jo, Geun-Sik;Kim, Heung-Nam
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.119-140
    • /
    • 2007
  • Recommender systems enable a user to decide which information is interesting and valuable in our world of information overload. As the recent studies of distributed computing environment have been progressing actively, recommender systems, most of which were centralized, have changed toward a peer-to-peer approach. Collaborative Filtering (CF), one of the most successful technologies in recommender systems, presents several limitations, namely sparsity, scalability, cold start, and the shilling problem, in spite of its popularity. The move from centralized systems to distributed approaches can partially improve the issues; distrust of recommendation and abuses of personal information. However, distributed systems can be vulnerable to attackers, who may inject biased profiles to force systems to adapt their objectives. In this paper, we consider both effective CF in P2P environment in order to improve overall performance of system and efficient solution of the problems related to abuses of personal data and attacks of malicious users. To deal with these issues, we propose a multi-agent framework for a distributed CF focusing on the trust relationships between individuals, i.e. web of trust. We employ an agent-based approach to improve the efficiency of distributed computing and propagate trust information among users with effect. The experimental evaluation shows that the proposed method brings significant improvement in terms of the distributed computing of similarity model building and the robustness of system against malicious attacks. Finally, we are planning to study trust propagation mechanisms by taking trust decay problem into consideration.

  • PDF

An Empirical Study of Gender Differences in Motivational Orientations of Students in Statistics Classroom

  • Ken W. Li
    • Research in Mathematical Education
    • /
    • v.26 no.2
    • /
    • pp.83-104
    • /
    • 2023
  • Lecture theatres and computing laboratories are common types of classrooms used for teaching and learning in this study; both were equipped with a computer network through which teachers and students can access learning management system, digital library, educational software, and so on. Students were divided into groups of two or three; each group of students collaborated on the worksheets in the laboratory and naturally sat together when attending a class held in the lecture theatre. The social organization of classroom learning would promote student learning but what drives student learning; how to engage students with learning; and how to maintain their interest in learning are of research interest in the present study. The study illustrated the theoretical and empirical links, student motivation has a relation to rich collaboration with peers, communication as verbal interactions as well as teacher-student interactions. These are within socio-cultural contexts for learning to take place. The study was extended to make comparisons of the motivational orientations between student genders. It was found that female students were keener on fun or enjoyment in learning, peer communication, and teacher's intervention, whereas male students were concerned more about digital learning tools, a positive working relationship, social reciprocity, and interpersonal relationships.

Signal Processing and Development Process Based on "MOOC + SPOC + Flipped Classroom"

  • Bei Qiao;Yan Mi
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.105-115
    • /
    • 2024
  • The hybrid teaching approach of "MOOC + SPOC + Flipped Classroom" overcomes the constraints of time and space that are typically associated with traditional teaching methods, thus compensating for the shortcomings of traditional approaches. These changes in education are driven by the "Internet+" wave and the growing popularity of online teaching. The "MOOC + SPOC + Flipped Classroom" hybrid teaching mode can successfully compensate for the drawbacks of traditional teaching methods, thereby overcoming their restrictions. By defining relevant concepts, one can distill the key characteristics of the "MOOC + SPOC + Flipped Classroom" hybrid teaching mode. Formative assessment was employed to thoroughly evaluate the effectiveness of this teaching approach. By leveraging the advantages of massive open online course (MOOC), small private online course (SPOC), and flipped classroom, the "MOOC +SPOC + Flipped Classroom" teaching mode incorporates real-time student assessment through peer evaluation, computer-aided evaluation, and teacher evaluation. This mode promotes the simultaneous development of theoretical knowledge and practical skills, helping students to establish strong foundations while fostering their practical abilities. While the traditional teaching method remains fruitful, the convenience of today's network allows the teaching profession to continually evolve. The traditional teaching mode heavily relies on teachers, making it impossible to conduct lessons without them. However, the development of MOOC enables students to seek knowledge online from their preferred teachers, rather than solely relying on their assigned instructors.

An Efficient P2P Based Proxy Patching Scheme for Large Scale VOD Systems (대규모 VOD 시스템을 위한 효율적인 P2P 기반의 프록시 패칭 기법)

  • Kwon, Chun-Ja;Choi, Hwang-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.341-354
    • /
    • 2005
  • The main bottleneck for large scale VOD systems is bandwidth of storage or network I/O due to the large number of client requests simultaneously, and then efficient techniques are required to solve the bottleneck problem of the VOD system. Patching is one of the most efficient techniques to overcome the bottleneck of the VOD system through the use of multicast scheme. In this paper, we propose a new patching scheme, called P2P proxy patching, for improving the typical patching technique by jointly using the prefix caching and P2P proxy. In our proposed scheme, each client plays a role in a proxy to multicast a regular stream to other clients that request the same video stream. Due to the use of the P2P proxy and the prefix caching, the client requests that ive out of the patching window range can receive the regular stream from other clients in the previous patching group without allocating the new regular channels from the VOD server to the clients. In the performance study, we show that our patching scheme can reduce the server bandwidth requirement about $33\%$ less than that of the existing patching technique with respect to prefix size and request interval.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Epidemic Reliable Multicast by Peer Collaborations in Wireless Tactical Networks (무선 전술 네트워크에서 단말의 협력을 통한 전염 기반의 신뢰성 있는 멀티캐스트)

  • Hong, Min-Ki;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.865-875
    • /
    • 2008
  • In this paper, we propose a reliable multicast scheme for the tactical wireless ad hoc network where the members share the situation and operation data. Our scheme consists of two phases to guarantee the reliability. During the dissemination phase, we utilizes an epidemic approach similar to gossip-based ad hoc routing. Then the group members interchange the message reception state information periodically so that they are able to recover missing packets from the other members. We evaluate the performance of our scheme through extensive simulations using the network simulator in comparison with other existing reliable multicast schemes in mobile ad hoc network. Our scheme shows higher packet delivery ratio regardless of the mobility and imposes much lower control overhead to the non-group members compared with the existing schemes.

Trends in Leopard Cat (Prionailurus bengalensis) Research through Co-word Analysis

  • Park, Heebok;Lim, Anya;Choi, Taeyoung;Han, Changwook;Park, Yungchul
    • Journal of Forest and Environmental Science
    • /
    • v.34 no.1
    • /
    • pp.46-49
    • /
    • 2018
  • This study aims to explore the knowledge structure of the leopard cat (Prionailurus bengalensis) research during the period of 1952-2017. Data was collected from Google Scholar and Research Information Service System (RISS), and a total of 482 author keywords from 125 papers from peer-reviewed scholarly journals were retrieved. Co-word analysis was applied to examine patterns and trends in the leopard cat research by measuring the association strengths of the author keywords along with the descriptive analysis of the keywords. The result shows that the most commonly used keywords in leopard cat research were Felidae, Iriomte cat, and camera trap except for its English and scientific name, and camera traps became a frequent keyword since 2005. Co-word analysis also reveals that leopard cat research has been actively conducted in Southeast Asia in conjugation with studying other carnivores using the camera traps. Through the understanding of the patterns and trends, the finding of this study could provide an opportunity for the exploration of neglected areas in the leopard cat research and conservation.

The Trends of Youth Research: 'Korean Journal of Youth Studies' in 2010-2018 (청소년 연구의 동향 : 2010년~2018년의 '청소년학연구'지를 중심으로)

  • Chang, Cin-Jae;Lee, Won-Jie
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.307-314
    • /
    • 2019
  • This paper was intended to identify the knowledge structure of youth-related research by looking at the research trends of research papers published in Korean Journal of Youth Studies from 2010 to 2018. Using keywords extracted from the papers, the Centrality and Cohesion analysis of the keyword network analysis of the NetMiner program were used. In the analysis of degree centrality, the "relationship" was the highest, followed by schools and youth, and high in the order of parents and violence. In the analysis of betweenness centrality, the "relationship" was also the highest, followed by youth, school, need, education, parents, children, abuse/emotion(the same level), institutions, regions, cell phones/prevention/welfare(the same level), elementary, attachment, suicide, addiction, society, violence, children, services, support, policy/teachers(the same level). According to the cohesion analysis, school life and policy, addiction, parent & peer relations, civic education & welfare support, sentiment and thinking, college, abuse & suicide were divided into a total of seven sub-topic subjects.

The Study on improve method of GNUnet for structured P2P Model of encording block (제안 인코딩 블록을 구조적 P2P 모델에 적용한 GNUnet 성능 개선방안)

  • Lee, Myoung-Hoon;Park, Byung-Yeon;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.75-81
    • /
    • 2005
  • The GNUnet in P2P system have solved an anonymous(publisher, storer, demander); a service of condition equal for peer. The GNUnet for an anonymous has separated a file and dispersed to the network. But, the 1Kbyte block size of the GNUnet is a creation of many additional block. I and R block has created with indirect point of D block The waste of I and R block appeared to 4% of the original file and the additional network traffic for the block transmission. To resolve the problems, this paper proposes an new scheme of file splitting distribution using P2P networks with the new GNUnet protocol, The GNUnet support minimization of the additional block and for a network traffic. It proposed an efficiency improvement of encording block and routing algorithm.

  • PDF