• Title/Summary/Keyword: peer communication

Search Result 405, Processing Time 0.036 seconds

Effects of Smartphone Addiction on Quality of Peer Relationships among Adolescents : The Mediating Role of Depression (청소년의 스마트폰 중독이 또래 관계의 질에 미치는 영향 : 우울의 매개 역할)

  • Yesolran Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.161-166
    • /
    • 2024
  • The current generation of adolescents stands out as the most digitally interconnected in the annals of history, navigating an era characterized by unprecedented levels of technological connectivity. This study explored the impact of smartphone addiction on the quality of peer relationships among adolescents, with a focus on the mediating role of depression. Analyzing data from 2,288 responses of 14-year-old adolescents extracted from the 2022 cross-sectional data of the Korean Children and Youth Panel Survey 2018, research questions were tested. The findings showed that smartphone addiction among adolescents exacerbates depression, consequently leading to a deterioration in the quality of peer relationships. The results contribute to expanding scholarly understanding of the intersection between digital technology and the mental and social well-being of adolescents. Furthermore, there is a call to action for parents, teachers, counselors, policy maker, and practitioner in education institutions to establish programs that monitor and intervene in cases of excessive smartphone use among adolescents.

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.

PTT Service Interworking Between IMS Based Networks and P2P Overlay Networks

  • Tieu, Tuan-Hao;Kim, Younghan;Gim, Gwangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1638-1656
    • /
    • 2013
  • The demand for multimedia streaming services is increasing rapidly. To meet this demand, there has been much research and many practical developments for providing multimedia services. A push-to-talk (PTT) service is one of the multimedia streaming services that have been deployed not only over IP multimedia subsystem (IMS) but also in peer-to-peer (P2P) overlay networks. The benefit of PTT has been demonstrated in the literature. However, the need for using PTT service in communication can be arbitrary among users, regardless what kind of PTT services they use. This demand does not support current PTT systems, so an expansion of PTT services still be limited. Moreover, the combination of PTT services in IMS and P2P networks will help operators to provide more scalable PTT services. Therefore, in this paper, we proposed a model to support PTT service interworking between IMS and P2P overlay networks. We also introduced our system design and some interworking service scenarios. We confirmed our architecture through implementation and testing.

Implementation of the Alert System for Safety of Workers (근로자의 안전을 위한 경보시스템 구현)

  • Kim, In-Min;Ko, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1138-1142
    • /
    • 2011
  • This paper proposes the Alert System, the purpose of which is to detect an accident and to take care of it quickly in a working place. In the previous studies, a wireless network system was suggested using 'Star Topology'. However, this study constructs the wireless network system of Peer-to-Peer Topology, which allows to build more efficient network for communication. Also, with this system it is possible to check other the worker's situation through double sensing with Temperature/Gas sensor and Inclination sensor. In order to take action quickly, the Alert System is using a monitoring program which visualizes a worker's situation and the area where an accident occurs.

A Study on Networks Applications improved Mobile P2P (개선된 모바일 P2P 네트워크 구현에 관한 연구)

  • Kim Yong-Hun;Park Jong-Min;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1458-1464
    • /
    • 2005
  • A P2P is a method that can share and exchange on digital resources through a direct connection on personnel without a central server. In this paper, Although the P2P application that uses our proposed framework should obtain one or more IP addresses of the neighbor peers manually, after instantiate, the application can do its job while maintaining connection to the network continuously and automatically. To evaluate our proposed scheme, we measured and analyzed the time for a peer to reconnect to the network when the mediating peer fails and the network isolation occurs.

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network

  • Rahmadika, Sandi;Noh, Siwan;Lee, Kyeongmo;Kweka, Bruno Joachim;Rhee, Kyung-Hyune
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.699-717
    • /
    • 2020
  • Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.

Technical Analysis of WebRTC based Conferencing System (WebRTC 기반 컨퍼런싱 시스템의 기술 분석)

  • Kim, Seong-Hwan;Ha, Yun-Gi;Choi, Gyu-beom;Youn, Chan-Hyun
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.210-211
    • /
    • 2014
  • WebRTC(Web Real-Time Communication)는 플러그인의 도움 없이 간단한 웹 표준 API(Application Programming Interface)를 이용하여 웹 브라우저 환경에서 Peer-to-Peer 실시간 통신을 가능케 하고자 하는 기술이다. 실시간 통신으로 오디오, 비디오 스트림은 물론이고 데이터 스트림을 포함한다. 해당 기술은 브라우저간에 직접적으로 Peer-to-Peer 세션을 형성하여 스트리밍을 수행하므로 중계 서버를 이용하는 통신에 비하여 향상된 네트위크 성능을 보이지만 연결을 구성하기 위한 보조 기술들이 요구된다. WebRTC 는 웹 기반 기술이기 때문에 기존의 웹 어플리케이션이 가지는 장단점을 공유한다. 본 논문에서는 WebRTC 기술과 해당 기술을 구성하고 있는 세부 기술들의 구조 및 기능을 분석한다. 또한 해당 기술을 이용하여 간단한 컨퍼런스 시스템을 설계하고 구현한 예제를 보인다.

Parents and Peer Attachment in Relation to Automatic Thought of Adolescents (청소년의 부모 및 또래 애착과 자동적 사고의 관계)

  • Lee, Young-Hwa;Lim, Jung-Ha
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.4
    • /
    • pp.35-48
    • /
    • 2011
  • The purpose of this study was to examine the relationship between attachment and automatic thoughts of adolescents. A sample of 443 students at middle and high schools participated. Adolescents reported parent and peer attachment using the modified version of Inventory of Parent and Peer Attachment (Armsden & Greenberg, 1987) and automatic thoughts using the modified version of Automatic Thought Questionnaire (Hollon & Kendall, 1980; Ingram & Wisnicki, 1988). Multiple regression analyses indicated that effects of attachments were different by the type of automatic thoughts. Specifically, trust in peer relations, trust in father-adolescent relations and communication in mother-adolescent relations were important predictors of positive automatic thought, whereas alienation in father-adolescent relations, alienation in peer relations and trust in mother-adolescent relations were important predictors of negative automatic thought.

  • PDF

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment (Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현)

  • Lee, Jeong-Ki;Bae, Il-Ho;Lee, Cheol-Seung;Moon, Jung-Hwan;Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1120-1125
    • /
    • 2002
  • According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.