• Title/Summary/Keyword: peer communication

Search Result 405, Processing Time 0.029 seconds

Exploration of the relationship between adaptive use and maladaptive use in game : Focusing on the types of game users of middle school students, and the differences in self-control, peer-support, and game usage between groups (게임 선용과 과몰입의 관계 탐색 :중학생의 게임이용집단 구분과 자기통제력, 또래 지지, 게임이용량의 차이를 중심으로)

  • Kim, Hyoung-Jee
    • Journal of Korea Game Society
    • /
    • v.21 no.1
    • /
    • pp.113-124
    • /
    • 2021
  • This study distinguished game use groups by considering adaptive game use and maladaptive game use of middle school students at the same time, and analyzed the difference in lack of self-control, peer-support, and game usage by group. To this end, the data of 287 middle school students was analyzed in the Game User Panel Survey(5th year) of the KOCCA. As a result of the cluster analysis, the game use groups were divided into the high level coexist group, the adaptive use group, and the normal group. The three groups showed the gap of lack of self-control, peer-support, and game usage.

The Impact of Negotiation-Based Peer and Self-Assessment Activities on Science-Gifted Students' Modeling (협상에 기반한 동료평가 및 자기평가 활동이 과학 영재 고등학생들의 모델링에 미치는 영향)

  • Jo, Eunbi;Jung, Dojun;Nam, Jeonghee
    • Journal of the Korean Chemical Society
    • /
    • v.65 no.6
    • /
    • pp.455-467
    • /
    • 2021
  • The purpose of this study was to investigate the impact of negotiation-based peer and self-assessment activities on science-gifted students' modeling and students' perceptions of the impact of these assessment activities on modeling. For this purpose, 92 students in the 11th grade of a science high school, in a metropolitan city, were selected to conduct peer assessment, self-assessment, and science writing activities with four topics of Advanced Chemistry. The students' modeling was analyzed in terms of 'structuring scientific concepts', 'logic', 'multiple representations' and 'communication'. Based on the results, the mean scores of modeling increased for each element of evaluation according to the progress of assessment activities. Students' responses in the survey and interviews showed that students perceived the results of student assessment activities as valid, students also recognized the benefit of these assessment activities by referring to the assessment results before their next writing assignment.

Discrimination Scheme of a Malicious Peer in Mobile P2P Networks (모바일 P2P 네트워크에서 악의적 피어 판별 기법)

  • Choi, Minwoong;Lim, Jongtae;Kim, Yeonwoo;Bok, Kyoungsoo;Yoo, Jaesoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.61-62
    • /
    • 2016
  • 최근 모바일 기술 향상과 모바일 디바이스 보급의 급증으로 인해 기존의 중앙 집중 처리식 시스템의 한계를 모바일 기술 등으로 보완하기 위한 연구들이 활발히 진행되고 있다. 본 논문에서는 모마일 P2P 네트워크에서 악의적인 피어 판별 기법을 제안한다. 제안하는 기법은 악의적인 피어들이 내린 평가와 다른 피어들이 내린 평가를 비교하여 임계치 밖의 평가를 내리는 피어들을 판별한다. 또한 제안하는 기법은 민감도에 따라 악의적인 피어를 판별한다. 본 논문에서는 제안하는 기법을 통해 피어들 간 정보교환의 신뢰도를 향상시킨다.

  • PDF

A Study on Open Peer Review Perception of Korean Authors in a Mega OA Journal (메가 OA 학술지 국내 저자의 오픈 피어 리뷰 인식에 관한 연구)

  • Kim, Ji-Young;Kim, Hyun Soo;Shim, Wonsik
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.131-150
    • /
    • 2020
  • This study was conducted to ascertain a better understanding of researchers' perception of open peer review (OPR), which is being attempted to improve the problems of traditional peer review methods in recent journal publications. A survey was conducted on the Korean authors of a mega open access (OA) journals and the results were analyzed. The subjects of the survey were selected as Korean corresponding authors published on PLOS, an international OA journal and mega journal. The survey was conducted as an online questionnaire and a total of 238 responses were collected; the analysis was based on 202 valid responses. Data were analyzed by performing frequency analysis and average comparison between groups for the collected questionnaire results. As a result of analyzing whether there is a difference in perception of OPR depending on the age, research experience, and OPR experience of the researcher, researchers under the age of 44, researchers with research experience of 9 years or less, and researchers with OPR participation experience had differences in some OPR perceptions. Results show that researchers under the age of 44 want to change the current peer review approach, but they are not yet actively accepting OPR. As a result of analyzing the reasons why the researcher disagrees with OPR, they raised questions about lack of objectivity, increased burden of reviewers, emotions and relationships, and responded that the right to be forgotten was also necessary.

Proximity-based Overlay Network Routing for Service Discovery in Mobile Ad-Hoc Network (이동 애드혹 망에서의 서비스 검색을 위한 근접성 기반 오버레이 네트워크 라우팅)

  • Yoon Hyeon-Ju;Lee Eunju;Jeong Hyunku;Kim Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.643-658
    • /
    • 2004
  • Mobile ad hoc networks(MANET) have recently attrarted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on the various problems of MANET in data link and network layers, we consider, in this paper, how to efficiently support applications such as service discovery on top of MANET. Peer-to-Peer(P2P) overlay network can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both arc instances of self-organizing decentralized systems. Especially, distributed hash table(DHT) systems used for r2r overlay network can be effective in reducing the communication overhead in service discovery. However, since overlay network is independent of physical network topology and existing topology-aware mechanisms are based on the wired network, they are inefficient in MANET. We propose a proximity-based overlay network routing to overcome the inefficiency of routing in overlay network. In the proximity-based overlay network routing, each node collects information of physically close nodes by using one hop broadcast and routes messages to the logically closest node to destination. In a detailed ns-2 simulation study, we show that the proximity-based overlay network routing reduces the number of physical hops comparable to the flooding-based mechanism with low communication overhead. We also find that the proposed scheme works well in the mobile environment.

Performance Analysis of Peer Aware Communications with CSMA/CA Based on Overhearing (Overhearing을 적용한 CSMA/CA 기반 대상인식통신 성능 분석)

  • Lee, Jewon;Ahn, Jae Min;Lee, Keunhyung;Park, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.251-259
    • /
    • 2014
  • In this paper, we propose Low Energy Service Discovery (LESD) protocol for common discovery mode of IEEE 802.15.8 Peer Aware Communications (PAC). In order to minimize power consumption, Basic Repetition Block (BRB) is defined. Device is able to select operating mode and synchronize other devices through it. Proposed MAC procedure is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based on overhearing technique. Even if device has not been received response signal since transmitted request signal, it is able to discover other devices of same group through the overhearing technique. IEEE 802.15.8 PAC has required that performances of common discovery mode are presented about discovered devices during the simulation time, discovery latency and average power consumption. By considering the number of devices per group and channel environment, two scenarios are evaluated through system level simulation and the simulation results of proposed scheme are compared with CSMA/CA in same simulation conditions. As a result, proposed scheme is able to get high energy efficiency of devices as well as increase the number of discovered devices during simulation time when the longer the number of devices is distributed over a limited area.

Exploration of variables effecting on poor adolescents' self-resilience and self-esteem : Focusing on parents' child-rearing attitudes and the quality of peer and teacher relationships (빈곤가정 청소년의 자아탄력성 및 자아존중감에 영향을 미치는 변인 탐색 : 부모의 양육태도 및 또래.교사관계의 질을 중심으로)

  • Lim, Yang-Mi
    • Journal of Korean Home Economics Education Association
    • /
    • v.25 no.2
    • /
    • pp.147-167
    • /
    • 2013
  • This study aimed to analyze the relative effects of parents' child-rearing attitudes and the quality of peer and teacher relationships on poor adolescents' self-resilience and self-esteem. The subjects were 639 1st grade middle school students from the firstly poor, the secondary poor, and the thirdly poor families who participated in the Korea Child Youth Panel Surveys(KCYPS). The data were analyzed with descriptive statistics and hierarchical regressions. The results of this study were as follows. Firstly, the poor adolescents' self-resilience were influenced by the quality of peer relationships, parents' child-rearing attitudes, and the quality of teacher relationships in order and the specific variables enhancing adolescents' self-resilience were communication between adolescents and peers, trust with peers, parents' love, reasonable explanation, supervision, and teacher-adolescents' friendly relationships. Secondly, the poor adolescents' self-esteem were influenced by parents' child-rearing attitudes, the quality of peer relationships, and the quality of teacher relationships in order and the specific variables enhancing adolescents' self-esteem were parents' love, supervision, inconsistency, senses of non-alienation among peers, communication between adolescents and peers, trust with peers, and teacher-adolescents' friendly relationships. Finally, the future directions of education welfare programs targeting poor adolescents were suggested on the basis of the results.

  • PDF

Is a Robot better than Video for Initiating Remote Social Connections among Children? (원격로봇학습과 원격화상학습에 대한 아동 반응 비교)

  • Kim, Nuri;Han, Jeonghye;Ju, Wendy
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.513-519
    • /
    • 2014
  • Videoconferencing technology is increasingly used in classrooms to introduce children to people from other countries and cultures in order to provide a wider learning experience. However, with traditional screen-based video conferencing technology, research has shown that it is easy for students to miss non-verbal cues that play a key role in developing human relationships. To investigate how children interact differently when their interactions are mediated through screen-based video communication versus robot-mediated communication, we conducted a study with elementary students in Korea, comparing the use of both technologies to introduce classroom students with peer-aged individuals in America. Our findings show that the children displayed more positive emotions during certain tasks and exhibited more interest and intimacy to remote participants in the context of robot-mediated communication than with video-mediated communication.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

Design and implementation of Jini-based secure event service using SPKI/SDSI certificate (SPKI/SDSI 인증서를 이용한 Jini 기반의 안전한 이벤트 서비스 설계 및 구현)

  • Park, Hee-Man;Kim, In-Su;Lee, Young-Lok;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.3-13
    • /
    • 2006
  • As computing devices become ubiquitous and increasingly mobile, it becomes obvious that a synchronous and direct peer-to-peer communication model is not sufficient in distributed computing environment. Using an indirect event service instead of other traditional communication model has an advantage of decreasing the coupling of applications in a distributed environment and removing the need for many static dependencies. In this paper, we design and implement the secure event service for providing secure ubiquitous computing environment. The Secure Event Service implemented enables users to perform content-based event retrieval, and supports only eligible event comsumer and event producer can publish and receive events through the secure event service. SPKI/SDSI certificate is used for supporting authentication and authorization in the secure event service. In order to provide a content-based event retrieval, an asynchronous communication between event producers and consumers, and a disconnectedness support for mobile devices, we modify and expand the Javaspace package.