WorldWideScience

Sample records for structured peer-to-peer systems

  1. Efficient Skyline Computation in Structured Peer-to-Peer Systems

    DEFF Research Database (Denmark)

    Cui, Bin; Chen, Lijiang; Xu, Linhao

    2009-01-01

    An increasing number of large-scale applications exploit peer-to-peer network architecture to provide highly scalable and flexible services. Among these applications, data management in peer-to-peer systems is one of the interesting domains. In this paper, we investigate the multidimensional...... skyline computation problem on a structured peer-to-peer network. In order to achieve low communication cost and quick response time, we utilize the iMinMax(\\theta ) method to transform high-dimensional data to one-dimensional value and distribute the data in a structured peer-to-peer network called BATON....... Thereafter, we propose a progressive algorithm with adaptive filter technique for efficient skyline computation in this environment. We further discuss some optimization techniques for the algorithm, and summarize the key principles of our algorithm into a query routing protocol with detailed analysis...

  2. Surveillance of peer to peer payment systems and peer to peer lending platforms

    OpenAIRE

    Faia, Ester

    2014-01-01

    Financial innovation is, as usual, faster than regulation. New forms of speculation and intermediation are rapidly emerging. Largely as a result of the evaporation of trust in financial intermediation, an exponentially increasing role is being played by the so-called peer to peer intermediation. The most prominent example at the moment is Bitcoin. If one expects that shocks in these markets could destabilize also traditional financial markets, then it will be necessary to extend regulatory me...

  3. Cooperative peer-to-peer multiagent-based systems.

    Science.gov (United States)

    Caram, L F; Caiafa, C F; Ausloos, M; Proto, A N

    2015-08-01

    A multiagent based model for a system of cooperative agents aiming at growth is proposed. This is based on a set of generalized Verhulst-Lotka-Volterra differential equations. In this study, strong cooperation is allowed among agents having similar sizes, and weak cooperation if agents have markedly different "sizes", thus establishing a peer-to-peer modulated interaction scheme. A rigorous analysis of the stable configurations is presented first examining the fixed points of the system, next determining their stability as a function of the model parameters. It is found that the agents are self-organizing into clusters. Furthermore, it is demonstrated that, depending on parameter values, multiple stable configurations can coexist. It occurs that only one of them always emerges with probability close to one, because its associated attractor dominates over the rest. This is shown through numerical integrations and simulations, after analytic developments. In contrast to the competitive case, agents are able to increase their capacity beyond the no-interaction case limit. In other words, when some collaborative partnership among a relatively small number of partners takes place, all agents act in good faith prioritizing the common good, when receiving a mutual benefit allowing them to surpass their capacity.

  4. Preventing DoS attacks in peer-to-peer media streaming systems

    Science.gov (United States)

    Conner, William; Nahrstedt, Klara; Gupta, Indranil

    2006-01-01

    This paper presents a framework for preventing both selfishness and denial-of-service attacks in peer-to-peer media streaming systems. Our framework, called Oversight, achieves prevention of these undesirable activities by running a separate peer-to-peer download rate enforcement protocol along with the underlying peer-to-peer media streaming protocol. This separate Oversight protocol enforces download rate limitations on each participating peer. These limitations prevent selfish or malicious nodes from downloading an overwhelming amount of media stream data that could potentially exhaust the entire system. Since Oversight is based on a peer-to-peer architecture, it can accomplish this enforcement functionality in a scalable, efficient, and decentralized way that fits better with peer-to-peer media streaming systems compared to other solutions based on central server architectures. As peer-to-peer media streaming systems continue to grow in popularity, the threat of selfish and malicious peers participating in such large peer-to-peer networks will continue to grow as well. For example, since peer-to-peer media streaming systems allow users to send small request messages that result in the streaming of large media objects, these systems provide an opportunity for malicious users to exhaust resources in the system with little effort expended on their part. However, Oversight addresses these threats associated with selfish or malicious peers who cause such disruptions with excessive download requests. We evaluated our Oversight solution through simulations and our results show that applying Oversight to peer-to-peer media streaming systems can prevent both selfishness and denial-of-service attacks by effectively limiting the download rates of all nodes in the system.

  5. Peer-To-Peer Architectures in Distributed Data Management Systems for Large Hadron Collider Experiments

    CERN Document Server

    Lo Presti, Giuseppe; Lo Re, G; Orsini, L

    2005-01-01

    The main goal of the presented research is to investigate Peer-to-Peer architectures and to leverage distributed services to support networked autonomous systems. The research work focuses on development and demonstration of technologies suitable for providing autonomy and flexibility in the context of distributed network management and distributed data acquisition. A network management system enables the network administrator to monitor a computer network and properly handle any failure that can arise within the network. An online data acquisition (DAQ) system for high-energy physics experiments has to collect, combine, filter, and store for later analysis a huge amount of data, describing subatomic particles collision events. Both domains have tight constraints which are discussed and tackled in this work. New emerging paradigms have been investigated to design novel middleware architectures for such distributed systems, particularly the Active Networks paradigm and the Peer-to-Peer paradigm. A network man...

  6. PBRRI: A Hybrid Peer-to-Peer Communication Model in Distributed Systems

    Institute of Scientific and Technical Information of China (English)

    张亚英; 尤晋元

    2003-01-01

    In distributed systems independent agents need to interact with each other to accomplish their task.Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them cooperate with each other. But in fact, access control should also be considered to limit interaction to make it harmless. This paper proposed a proxy based rule regulated interaction (PBRRI) model. Role based access control is introduced for security concerns. Regulation rules are enforced in a distributed manner so that PBRRI can be applied to the open distributed systems such as Internet.

  7. Redundancy Maintenance and Garbage Collection Strategies in Peer-to-Peer Storage Systems

    Science.gov (United States)

    Liu, Xin; Datta, Anwitaman

    Maintaining redundancy in P2P storage systems is essential for reliability guarantees. Numerous P2P storage system maintenance algorithms have been proposed in the last years, each supposedly improving upon the previous approaches. We perform a systematic comparative study of the various strategies taking also into account the influence of different garbage collection mechanisms, an issue not studied so far. Our experiments show that while some strategies generally perform better than some others, there is no universally best strategy, and their relative superiority depends on various other design choices as well as the specific evaluation criterion. Our results can be used by P2P storage systems designers to make prudent design decisions, and our exploration of the various evaluation metrics also provides a more comprehensive framework to compare algorithms for P2P storage systems. While there are numerous network simulators specifically developed even to simulate peer-to-peer networks, there existed no P2P storage simulators - a byproduct of this work is a generic modular P2P storage system simulator which we provide as open-source. Different redundancy, maintenance, placement, garbage-collection policies, churn scenarios can be easily integrated to the simulator to try out new schemes in future, and provides a common framework to compare (future) p2p storage systems designs - something which has not been possible so far.

  8. Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

    Directory of Open Access Journals (Sweden)

    Francesca Musiani

    2011-06-01

    Full Text Available This article addresses the ongoing, increasing privatization of peer-to-peer (P2P file sharing systems – the emergence of systems that users may only join by personal, friend-to-friend invitation. It argues that, within P2P systems, privacy is increasingly coinciding with “mere” invisibility vis-à-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P technology: The alternation between forms of pervasive surveillance of such systems, and reactions by developers and users to such restrictive measures. Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities.

  9. A Novel Multimedia Streaming System for Urban Rail Environments Using Wi-Fi Peer-to-Peer Technology

    DEFF Research Database (Denmark)

    Poderys, Justas; Farooq, Jahanzeb; Soler, José

    2018-01-01

    to passenger devices using Wi-Fi Peer-to-Peer (P2P) technology. Such a multimedia distribution system can be deployed incrementally, as it can function concurrently with Wi-Fi connections already available in a number of trains. This paper presents the results obtained by emulating multimedia streaming...

  10. Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems

    Science.gov (United States)

    Anceaume, Emmanuelle; Brasileiro, Francisco; Ludinard, Romaric; Sericola, Bruno; Tronel, Frederic

    Awerbuch and Scheideler [2] have shown that peer-to-peer overlays networks can only survive Byzantine attacks if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. A prerequisite for this condition to hold is to guarantee that nodes identifiers randomness is continuously preserved. However targeted join/leave attacks may quickly endanger the relevance of such an assumption. Inducing churn has been shown to be the other fundamental ingredient to preserve randomness. Several strategies based on these principles have been proposed. Most of them are based on locally induced churn. However either they have been proven incorrect or they involve a too high level of complexity to be practically acceptable [2]. The other ones, based on globally induced churn, enforce limited lifetime for each node in the system. However, these solutions keep the system in an unnecessary hyper-activity, and thus need to impose strict restrictions on nodes joining rate which clearly limit their applicability to open systems.

  11. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  12. SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System

    Science.gov (United States)

    Liu, Xiao; Yuan, Dong; Zhang, Gaofeng; Chen, Jinjun; Yang, Yun

    Workflow systems are designed to support the process automation of large scale business and scientific applications. In recent years, many workflow systems have been deployed on high performance computing infrastructures such as cluster, peer-to-peer (p2p), and grid computing (Moore, 2004; Wang, Jie, & Chen, 2009; Yang, Liu, Chen, Lignier, & Jin, 2007). One of the driving forces is the increasing demand of large scale instance and data/computation intensive workflow applications (large scale workflow applications for short) which are common in both eBusiness and eScience application areas. Typical examples (will be detailed in Section 13.2.1) include such as the transaction intensive nation-wide insurance claim application process; the data and computation intensive pulsar searching process in Astrophysics. Generally speaking, instance intensive applications are those processes which need to be executed for a large number of times sequentially within a very short period or concurrently with a large number of instances (Liu, Chen, Yang, & Jin, 2008; Liu et al., 2010; Yang et al., 2008). Therefore, large scale workflow applications normally require the support of high performance computing infrastructures (e.g. advanced CPU units, large memory space and high speed network), especially when workflow activities are of data and computation intensive themselves. In the real world, to accommodate such a request, expensive computing infrastructures including such as supercomputers and data servers are bought, installed, integrated and maintained with huge cost by system users

  13. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  14. Peer to Peer Information Retrieval: An Overview

    NARCIS (Netherlands)

    Tigelaar, A.S.; Hiemstra, D.; Trieschnigg, D.

    2012-01-01

    Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is

  15. Peer to Peer Information Retrieval: An Overview

    NARCIS (Netherlands)

    Tigelaar, A.S.; Hiemstra, Djoerd; Trieschnigg, Rudolf Berend

    Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is

  16. Mathematical Framework For Analyzing Incentives In Peer-To-Peer

    African Journals Online (AJOL)

    The existence and performance of peer-to-peer systems depend on the contribution of resources .... analysis in P2P based on game strategy. The entire P2P ... a robust P2P systems, every peer must be made to contribute by designing efficient free ..... Currently, all P2P can be classified based on structure as structured and ...

  17. Research on load optimization of DHT-based hierarchy peer-to-peer system

    Science.gov (United States)

    Zhong, Haifeng; Luo, Dongjian; Wu, Wei; Xiao, Liang

    2009-08-01

    The main reason of causing the cost in p2p system is the maintenance cost that nodes build their routing information. In a large-scale system or a dynamic environment, p2p system generates considerable maintenance workload, which not only increase the bandwidth consumption but also affect the routing efficiency. So we present here a new Hierarchy_based maintenance method to minimize the maintenance cost which combines the hierarchical DHT algorithm with a peer proximity mechanism. The analysis results show our design can significantly decrease maintenance cost and improve scalability of the P2P system.

  18. Query Processing in Ontology-Based Peer-to-Peer Systems

    NARCIS (Netherlands)

    Stuckenschmidt, Heiner; Harmelen, Frank Van; Giunchiglia, Fausto

    2005-01-01

    The unstructured, heterogeneous and dynamic nature of the Web poses a new challenge to query-answering over multiple data sources. The so-called Semantic Web aims at providing more and semantically richer structures in terms of ontologies and meta-data. A problem that remains is the combined use of

  19. Future Structure of the Life-World. As an inevitable consequence of the «peer-to-peer»

    Directory of Open Access Journals (Sweden)

    Mototaka Mori

    2016-01-01

    Full Text Available This article intends to draw theoretically a future structure of the life-world. The state interventionism in the late capitalism has been often argued by the critical theoreticians like Jurgen Habermas since the last half of the twentieth century. It was particularly the main problem how possible the life-world was in such the technologically systematized society. However, the highly technological development of telecommunication has changed our everyday life very rapidly and totally. If we know such the rapid change of coevolution between human life and technology, we have to fundamentally reconsider on the theory of life-world. Therefore, in this article I will firstly focus on the classical theory of mundane social world which Alfred Schutz presented in the early 1930s. Of course, his project of socio-phenomenology has been one of the most brilliant und important works still now. However, his theory also will have to be renewed. If we know particularly the «peer-to-peer» constellation of the computer network by the distributed anonymous persons, the classical model of life-world must be versioned up to a next theoretical level. Secondly, considering on the virtual currency like the Bitcoin, this article will show you a hypothetical aspect of transformation of the life-world. The mechanism of trust, which has been often understood as one of the most important key concepts for the community or the society, may be replaced with the computer technology of cryptographic proof. Such a theoretical examination will finally lead to an important opened problem. We will have to inquire whether such the social order will be spontaneous, or whether such the ordering will have to be decided only by the speed of computer’s central processing unit.

  20. Cooperative Networked Control of Dynamical Peer-to-Peer Vehicle Systems

    National Research Council Canada - National Science Library

    Dullerud, Geir E; Bullo, Francesco; Feron, Eric; Frazzoli, Emilio; Kumar, P. R; Lall, Sanjay; Liberzon, Daniel; Lynch, Nancy A; Mitchell, John C; Mitter, Sanjoy K

    2007-01-01

    ... and semi-autonomous air vehicles. The research is specifically aimed at the critical reliability and performance issues facing autonomous vehicle systems which operate in highly uncertain environments, and enables the vehicles...

  1. Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding

    Science.gov (United States)

    Cui, Laizhong; Lu, Nan; Chen, Fu

    2014-01-01

    Most large-scale peer-to-peer (P2P) live streaming systems use mesh to organize peers and leverage pull scheduling to transmit packets for providing robustness in dynamic environment. The pull scheduling brings large packet delay. Network coding makes the push scheduling feasible in mesh P2P live streaming and improves the efficiency. However, it may also introduce some extra delays and coding computational overhead. To improve the packet delay, streaming quality, and coding overhead, in this paper are as follows. we propose a QoS driven push scheduling approach. The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. Compared with previous approaches, the simulation results demonstrate that packet delay, continuity index, and coding ratio of our system can be significantly improved, especially in dynamic environments. PMID:25114968

  2. qBitcoin: A Peer-to-Peer Quantum Cash System

    OpenAIRE

    Ikeda, Kazuki

    2017-01-01

    A decentralized online quantum cash system, called qBitcoin, is given. We design the system which has great benefits of quantization in the following sense. Firstly, quantum teleportation technology is used for coin transaction, which prevents from the owner of the coin keeping the original coin data even after sending the coin to another. This was a main problem in a classical circuit and a blockchain was introduced to solve this issue. In qBitcoin, the double-spending problem never happens ...

  3. State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System

    Directory of Open Access Journals (Sweden)

    Olamide Jogunola

    2017-12-01

    Full Text Available Transaction-based energy (TE management and control has become an increasingly relevant topic, attracting considerable attention from industry and the research community alike. As a result, new techniques are emerging for its development and actualization. This paper presents a comprehensive review of TE involving peer-to-peer (P2P energy trading and also covering the concept, enabling technologies, frameworks, active research efforts and the prospects of TE. The formulation of a common approach for TE management modelling is challenging given the diversity of circumstances of prosumers in terms of capacity, profiles and objectives. This has resulted in divergent opinions in the literature. The idea of this paper is therefore to explore these viewpoints and provide some perspectives on this burgeoning topic on P2P TE systems. This study identified that most of the techniques in the literature exclusively formulate energy trade problems as a game, an optimization problem or a variational inequality problem. It was also observed that none of the existing works has considered a unified messaging framework. This is a potential area for further investigation.

  4. Peer-to-Peer Service Sharing Platforms

    DEFF Research Database (Denmark)

    Andersson, Magnus; Hjalmarsson, Anders; Avital, Michel

    2013-01-01

    The sharing economy has been growing continuously in the last decade thanks to the proliferation of internet-based platforms that allow people to disintermediate the traditional commercial channels and to share excess resources and trade with one another effectively at a reasonably low transaction...... cost. Whereas early peer-to-peer platforms were designed to enable file sharing and goods trading, we recently witness the emergence of a new breed of peer-to-peer platforms that are designed for ordinary service sharing. Ordinary services entail intangible provisions and are defined as an economic...... activity that generates immaterial benefits and does not result in ownership of material goods. Based on a structured analysis of 41 internet-based rideshare platforms, we explore and layout the unique characteristics of peer-to-peer service sharing platforms based on three distinct temporal patterns...

  5. Digital portfolio og peer to peer feedback

    DEFF Research Database (Denmark)

    Jacobsen, Ditte; Bahrenscheer, Jesper Glarborg

    2017-01-01

    studerende og øget transfer mellem teori og praksis. Artiklen tager afsæt i erfaringerne fra udvikling, anvendelse og evaluering af den digitale portfolio og peer to peer feedback. Portfolien er digital og tilknyttet Metropols Learning Management System. De studerende uploader individuelt ugentligt deres...

  6. Peer-to-peer computing (Introduction to Topic 7)

    NARCIS (Netherlands)

    Montresor, A.; Epema, D.H.J.; Jelasity, M.; Jorba, J.; Luque, E.; Margalef, T.; Benítez, D.

    2008-01-01

    After a decade of intensive investigation, peer-to-peer computing has established itself as an accepted research field in the general area of distributed systems. peer-to-peer computing can be seen as the democratization of computing-overthrowing the old regime of hierarchies as in client-server

  7. Simple Peer-to-Peer SIP Privacy

    Science.gov (United States)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  8. Characteristics of file sharing and peer to peer networking | Opara ...

    African Journals Online (AJOL)

    Characteristics of file sharing and peer to peer networking. ... distributing or providing access to digitally stored information, such as computer programs, ... including in multicast systems, anonymous communications systems, and web caches.

  9. mitigating mitigating free riding in peer-to-peer networks

    African Journals Online (AJOL)

    eobe

    The performance of peer-to-peer systems is based on the quality and quantity of resource contributions from peer systems ... riding [3]. There are several measurement studies ...... J. S. Hua, D. C. Huang, S M Yen, and C. W. Chena, “A dynamic.

  10. Peer-to-Peer Networking -RE-SONANCE

    Indian Academy of Sciences (India)

    networking, operating systems and embedded systems. Peer-to-Peer (P2P) networking in recent times has been touted as .... Gnutella (General file sharing) P2P service at the same time. 2. .... The data processing does not occur in 'real time' ...

  11. Stability analysis of peer-to-peer networks against churn

    Indian Academy of Sciences (India)

    Users of the peer-to-peer system join and leave the network randomly, which makes the overlay network dynamic and unstable in nature. In this paper, we propose an analytical framework to assess the robustness of p2p networks in the face of user churn. We model the peer churn through degree-independent as well as ...

  12. PLATON: Peer-to-Peer load adjusting tree overlay networks

    NARCIS (Netherlands)

    Lymberopoulos, L.; Pittaras, C.; Grammatikou, M.; Papavassiliou, S.; Maglaris, V.

    2011-01-01

    Peer-to-Peer systems supporting multi attribute and range queries use a number of techniques to partition the multi dimensional data space among participating peers. Load-balancing of data accross peer partitions is necessary in order to avoid the presence of network hotspots which may cause

  13. Mobility Helps Peer-to-Peer Security

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre; Buttyan, Levente

    2006-01-01

    We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols...

  14. In Pursuit of Theoretical Ground in Behavior Change Support Systems: Analysis of Peer-to-Peer Communication in a Health-Related Online Community

    Science.gov (United States)

    Cobb, Nathan; Cohen, Trevor

    2016-01-01

    Background Research studies involving health-related online communities have focused on examining network structure to understand mechanisms underlying behavior change. Content analysis of the messages exchanged in these communities has been limited to the “social support” perspective. However, existing behavior change theories suggest that message content plays a prominent role reflecting several sociocognitive factors that affect an individual’s efforts to make a lifestyle change. An understanding of these factors is imperative to identify and harness the mechanisms of behavior change in the Health 2.0 era. Objective The objective of this work is two-fold: (1) to harness digital communication data to capture essential meaning of communication and factors affecting a desired behavior change, and (2) to understand the applicability of existing behavior change theories to characterize peer-to-peer communication in online platforms. Methods In this paper, we describe grounded theory–based qualitative analysis of digital communication in QuitNet, an online community promoting smoking cessation. A database of 16,492 de-identified public messages from 1456 users from March 1-April 30, 2007, was used in our study. We analyzed 795 messages using grounded theory techniques to ensure thematic saturation. This analysis enabled identification of key concepts contained in the messages exchanged by QuitNet members, allowing us to understand the sociobehavioral intricacies underlying an individual’s efforts to cease smoking in a group setting. We further ascertained the relevance of the identified themes to theoretical constructs in existing behavior change theories (eg, Health Belief Model) and theoretically linked techniques of behavior change taxonomy. Results We identified 43 different concepts, which were then grouped under 12 themes based on analysis of 795 messages. Examples of concepts include “sleepiness,” “pledge,” “patch,” “spouse,” and

  15. In Pursuit of Theoretical Ground in Behavior Change Support Systems: Analysis of Peer-to-Peer Communication in a Health-Related Online Community.

    Science.gov (United States)

    Myneni, Sahiti; Cobb, Nathan; Cohen, Trevor

    2016-02-02

    Research studies involving health-related online communities have focused on examining network structure to understand mechanisms underlying behavior change. Content analysis of the messages exchanged in these communities has been limited to the "social support" perspective. However, existing behavior change theories suggest that message content plays a prominent role reflecting several sociocognitive factors that affect an individual's efforts to make a lifestyle change. An understanding of these factors is imperative to identify and harness the mechanisms of behavior change in the Health 2.0 era. The objective of this work is two-fold: (1) to harness digital communication data to capture essential meaning of communication and factors affecting a desired behavior change, and (2) to understand the applicability of existing behavior change theories to characterize peer-to-peer communication in online platforms. In this paper, we describe grounded theory-based qualitative analysis of digital communication in QuitNet, an online community promoting smoking cessation. A database of 16,492 de-identified public messages from 1456 users from March 1-April 30, 2007, was used in our study. We analyzed 795 messages using grounded theory techniques to ensure thematic saturation. This analysis enabled identification of key concepts contained in the messages exchanged by QuitNet members, allowing us to understand the sociobehavioral intricacies underlying an individual's efforts to cease smoking in a group setting. We further ascertained the relevance of the identified themes to theoretical constructs in existing behavior change theories (eg, Health Belief Model) and theoretically linked techniques of behavior change taxonomy. We identified 43 different concepts, which were then grouped under 12 themes based on analysis of 795 messages. Examples of concepts include "sleepiness," "pledge," "patch," "spouse," and "slip." Examples of themes include "traditions," "social support

  16. Peer to peer energy trading with electric vehicles

    OpenAIRE

    Alvaro-Hermana, R.; Fraile-Ardanuy, J.; Zufiria, P.; Knapen, Luk; Janssens, Davy

    2016-01-01

    This paper presents a novel peer-to-peer energy trading system between two sets of electric vehicles, which significantly reduces the impact of the charging process on the power system during business hours. This trading system is also economically beneficial for all the users involved in the trading process. An activity-based model is used to predict the daily agenda and trips of a synthetic population for Flanders (Belgium). These drivers can be initially classified into three sets; after d...

  17. Gossip in a Smartphone Peer-to-Peer Network

    OpenAIRE

    Newport, Calvin

    2017-01-01

    In this paper, we study the fundamental problem of gossip in the mobile telephone model: a recently introduced variation of the classical telephone model modified to better describe the local peer-to-peer communication services implemented in many popular smartphone operating systems. In more detail, the mobile telephone model differs from the classical telephone model in three ways: (1) each device can participate in at most one connection per round; (2) the network topology can undergo a pa...

  18. The Tragedy of the Commons : Arms Race Within Peer-to-Peer Tools

    OpenAIRE

    Carlsson, Bengt

    2001-01-01

    The two major concerns about peer-to-peer are anonymity and non-censorship of documents. Music industry has highlighted these questions by forcing Napster to filter out copyright protected MP3 files and taking legal actions against local users by monitoring their stored MP3 files. Our investigation shows that when copyright protected files are filtered out, users stop downloading public music as well. The success of a distributed peer-to-peer system is dependent on both cooperating coalitions...

  19. Challenges to Participation in the Sharing Economy: The Case of Local Online Peer-to-Peer Exchange in a Single Parents’ Network

    Directory of Open Access Journals (Sweden)

    Airi Lampinen

    2015-05-01

    Full Text Available This paper depicts an initiative to deploy an online peer-to-peer exchange system for a community network of single parents – a group of people in need of goods, services, and social support in their local neighborhoods. We apply participant observation and semi-structured interviews to uncover key issues that can hinder the emergence of sharing practices in local community networks of this type. Our study illustrates how pressures related to single parenthood can impede opportunities to engage in peer-to-peer exchange, even when community members view the social and material benefits of participation as desirable and necessary. This complicates the prevalent narrative that local peer-to-peer exchange systems are an accessible and convenient alternative to traditional markets. Moreover, we discuss our collaboration with the community as well as the developers of the sharing platform, highlighting the challenges of user-centered design in the sharing economy.

  20. An Introduction to Models of Online Peer-to-Peer Social Networking

    CERN Document Server

    Kesidis, George

    2010-01-01

    This book concerns peer-to-peer applications and mechanisms operating on the Internet, particularly those that are not fully automated and involve significant human interaction. So, the realm of interest is the intersection of distributed systems and online social networking. Generally, simple models are described to clarify the ideas. Beginning with short overviews of caching, graph theory and game theory, we cover the basic ideas of structured and unstructured search. We then describe a simple framework for reputations and for iterated referrals and consensus. This framework is applied to a

  1. A peer-to-peer traffic safety campaign program.

    Science.gov (United States)

    2014-06-01

    The purpose of this project was to implement a peer-to-peer drivers safety program designed for high school students. : This project builds upon an effective peer-to-peer outreach effort in Texas entitled Teens in the Driver Seat (TDS), the : nati...

  2. Child Pornography in Peer-to-Peer Networks

    Science.gov (United States)

    Steel, Chad M. S.

    2009-01-01

    Objective: The presence of child pornography in peer-to-peer networks is not disputed, but there has been little effort done to quantify and analyze the distribution and nature of that content to-date. By performing an analysis of queries and query hits on the largest peer-to-peer network, we are able to both quantify and describe the nature of…

  3. Jupiter: Peer-to-Peer Networking Platform over Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Norihiro Ishikawa

    2006-10-01

    Full Text Available Peer-to-peer has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Compared with traditional Internet technologies, peer-to-peer has the potential to realize highly scalable, extensible, and efficient distributed applications. This is because its basic functions realize resource discovery, resource sharing, and load balancing in a highly distributed manner. An easy prediction is the emergence of an environment in which many sensors, people, and many different kinds of objects exist, move, and communicate with one another. Peer-to-peer is one of the most important and suitable technologies for such networking since it supports discovery mechanisms, simple one-to-one communication between devices, free and extensible distribution of resources, and distributed search to handle the enormous number of resources. The purpose of this study is to explore a universal peer-to-peer network architecture that will allow various devices to communicate with one another across various networks. We have been designing architecture and protocols for realizing peer-to-peer networking among various devices. We are currently designing APIs that are available for various peer-to-peer applications and are implementing a prototype called "Jupiter" as a peer-to-peer networking platform over heterogeneous networks.

  4. Promoting Residential Renewable Energy via Peer-to-Peer Learning

    Science.gov (United States)

    Heiskanen, Eva; Nissilä, Heli; Tainio, Pasi

    2017-01-01

    Peer-to-peer learning is gaining increasing attention in nonformal community-based environmental education. This article evaluates a novel modification of a concept for peer-to-peer learning about residential energy solutions (Open Homes). We organized collective "Energy Walks" visiting several homes with novel energy solutions and…

  5. Optimization of routing strategies for data transfer in peer-to-peer networks

    International Nuclear Information System (INIS)

    Morioka, Atsushi; Igarashi, Akito

    2014-01-01

    Since peer-to-peer file-sharing systems have become familiar recently, the information traffic in the networks is increasing. Therefore it causes various traffic problems in peer-to-peer networks. In this paper, we model some features of the peer-to-peer networks, and investigate the traffic problems. Peer-to-peer networks have two notable characters. One is that each peer frequently searches for a file and download it from a peer who has the requested file. To decide whether a peer has the requested file or not in modelling of the search and download process, we introduce file-parameter P j , which expresses the amount of files stored in peer j. It is assumed that if P j is large, peer j has many files and can meet other peers' requests with high probability. The other character is that peers leave and join into the network repeatedly. Many researchers address traffic problems of data transfer in computer communication networks. To our knowledge, however, no reports focus on those in peer-to-peer networks whose topology changes with time. For routing paths of data transfer, generally, the shortest paths are used in usual computer networks. In this paper, we introduce a new optimal routing strategy which uses weights of peers to avoid traffic congestion. We find that the new routing strategy is superior to the shortest path strategy in terms of congestion frequency in data transfer

  6. Distributed Data Mining in Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — Peer-to-peer (P2P) networks are gaining popularity in many applications such as file sharing, e-commerce, and social networking, many of which deal with rich,...

  7. Analysis of peer-to-peer locking of magnetrons

    International Nuclear Information System (INIS)

    Pengvanich, P.; Lau, Y. Y.; Cruz, E.; Gilgenbach, R. M.; Hoff, B.; Luginsland, J. W.

    2008-01-01

    The condition for mutual, or peer-to-peer, locking of two magnetrons is derived. This condition reduces to Adler's classical phase-locking condition in the limit where one magnetron becomes the ''master'' and the other becomes the ''slave.'' The formulation is extended to the peer-to-peer locking of N magnetrons, under the assumption that the electromagnetic coupling among the N magnetrons is modeled by an N-port network.

  8. Does gender affect funding success at the peer-to-peer credit markets? Evidence from the largest German lending platform

    OpenAIRE

    Barasinska, Nataliya; Schäfer, Dorothea

    2010-01-01

    Studies of peer-to-peer lending in the USA find that female borrowers have better chances of getting funds than males. Is differential treatment of borrowers of different sexes a common feature of peer-to-peer lendingmarkets or is it subject to specific businessmodels, ways of fixing loan contracts and even national financial systems? We aim at answering this question by providing evidence on loan procurement at the largest German peer-to-peer lending platform Smava.de. Our results show that ...

  9. Studying the Effects of Peer-to-Peer Sharing Economy Platforms on Society

    NARCIS (Netherlands)

    Westerbeek, J.; Ubacht, J.; van der Voort, H.G.; ten Heuvelhof, E.F.; Scholl, Hans Jochem; Glassey, Olivier; Janssen, Marijn; Klievink, Bram; Lindgren, Ida; Parycek, Peter; Tambouris, Efthimios; Wimmer, Maria; Janowski, Tomasz; Sa Soares, Delfina

    2016-01-01

    Peer-to-peer sharing economy platforms potentially have big effects on values in society. Policymakers need to develop governance arrangements to benefit from the positive effects, while simultaneously mitigate the negative effects. This requires having a structured overview of the effects of these

  10. DServO: A Peer-to-Peer-based Approach to Biomedical Ontology Repositories.

    Science.gov (United States)

    Mambone, Zakaria; Savadogo, Mahamadi; Some, Borlli Michel Jonas; Diallo, Gayo

    2015-01-01

    We present in this poster an extension of the ServO ontology server system, which adopts a decentralized Peer-To-Peer approach for managing multiple heterogeneous knowledge organization systems. It relies on the use of the JXTA protocol coupled with information retrieval techniques to provide a decentralized infrastructure for managing multiples instances of Ontology Repositories.

  11. Agent-oriented Modeling for Collaborative Learning Environments: A Peer-to-Peer Helpdesk Case Study

    NARCIS (Netherlands)

    Guizzardi-Silva Souza, R.; Wagner, G.; Aroyo, L.M.

    2002-01-01

    In this paper, we present the analysis and modelling of Help&Learn, an agent-based peer-to-peer helpdesk system to support extra-class interactions among students and teachers. Help&Learn expands the student’s possibility of solving problems, getting involved in a cooperative learning experience

  12. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  13. Expertise-based peer selection in Peer-to-Peer networks

    NARCIS (Netherlands)

    Haase, Peter; Siebes, Ronny; Harmelen, van Frank

    2007-01-01

    Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destination peer in the first place is not always trivial. We propose a model in which peers advertise their expertise in

  14. Expertise-based peer selection in Peer-to-Peer networks

    NARCIS (Netherlands)

    Haase, Peter; Siebes, Ronny; Harmelen, van Frank

    2007-01-01

    Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destination peer in the first place is not always trivial. We propose a a message to a given peer. However, determining the

  15. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  16. Hierarchical Data Distribution Scheme for Peer-to-Peer Networks

    Science.gov (United States)

    Bhushan, Shashi; Dave, M.; Patel, R. B.

    2010-11-01

    In the past few years, peer-to-peer (P2P) networks have become an extremely popular mechanism for large-scale content sharing. P2P systems have focused on specific application domains (e.g. music files, video files) or on providing file system like capabilities. P2P is a powerful paradigm, which provides a large-scale and cost-effective mechanism for data sharing. P2P system may be used for storing data globally. Can we implement a conventional database on P2P system? But successful implementation of conventional databases on the P2P systems is yet to be reported. In this paper we have presented the mathematical model for the replication of the partitions and presented a hierarchical based data distribution scheme for the P2P networks. We have also analyzed the resource utilization and throughput of the P2P system with respect to the availability, when a conventional database is implemented over the P2P system with variable query rate. Simulation results show that database partitions placed on the peers with higher availability factor perform better. Degradation index, throughput, resource utilization are the parameters evaluated with respect to the availability factor.

  17. Inspiring peer-to-peer educations with film

    Science.gov (United States)

    Vachon, R. W.

    2014-12-01

    Oceans are vast, complicated, often inaccessible, three-dimensional and dark (for the most part). The value, vulnerabilities and dynamics of marine systems are quite far removed from the consciousness of many people. However, these reasons are not alibis for not understanding and appreciating oceans deep-rooted influences on our lives. Currently, the Nereus Program, a fellowship of climate, fisheries and computer modeling scientists, are accessing school systems in person and virtually, motivating teens to tell stories about their local understanding of the ocean's influence on their communities (even if they live in a landlocked location). In it's first iteration, we are soliciting youth to communicate through the popular medium of film. These films will be assembled into an on-line digital field guide. In part, this program is designed to be a peer-to-peer educational technique, where civilians are teaching other civilians about local or regional ocean dynamics. Additionally, the act of teaching through film is a proven method for deepening engagement, learning and empowerment of the individuals producing the films.

  18. Is there something like a peer to peer science?

    Directory of Open Access Journals (Sweden)

    Michel Bauwens

    2010-03-01

    Full Text Available How will peer to peer infrastructures, and the underlying intersubjective and ethical relational model that is implied by it, affect scientific practice? Are peer-to-peer forms of cooperation, based on open and free input of voluntary contributors, participatory processes of governance, and universal availability of the output, more productive than centralized alternatives? In this short introduction, Michel Bauwens reviews a number of open and free, participatory and commons oriented practices that are emerging in scientific research and practice, but which ultimately point to a more profound epistemological revolution linked to increased participatory consciousness between the scientist and his human, organic and inorganic research material.

  19. The mediatization of peer-to-peer health care

    DEFF Research Database (Denmark)

    Dindler, Camilla; Ahlmark, Nanna

    2018-01-01

    observations and qualitative interviews from a peer-to-peer programme for men in Copenhagen. The article analyses the tensions that occurred in the media coverage of the programme as well as in the municipal facilitation and management of the peer-to-peer health care programme defined partly...... by a democratization of health expertise and by a broader culture characterized by individualized, risk aware health promotion. We will argue that tensions between media logics and logics of care and of risk created a mediatized conception of health and of the peer programme that highlighted health care...

  20. Peer-to-Peer Simulation Architecture

    CSIR Research Space (South Africa)

    Duvenhage, B

    2007-06-01

    Full Text Available simulation. Simulation execution requirements for constructive simulations tend to be less stringent, but the faster a simulation executes, the more applicable it becomes as a what-if type analyses tool, as it allows a simulation user to test and evaluate... entities that are modelled at system of systems level, typically require distributed simulation to either provide faster than or real-time compatibility. The ideal simulation architecture would support both distributed and non-distributed simulation...

  1. Students' use of Facebook for peer-to-peer learning

    DEFF Research Database (Denmark)

    Dalsgaard, Christian

    are using Facebook groups to help each other with all kinds of school-related matters, including issues relating directly to academic subjects. Based on the findings from the study, the paper concludes that there is an educational potential of Facebook groups in supporting peer-to-peer learning between...

  2. Key agreement in peer-to-peer wireless networks

    DEFF Research Database (Denmark)

    Cagalj, Mario; Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any ...

  3. Surfing Peer-to-Peer IPTV: Distributed Channel Switching

    Science.gov (United States)

    Kermarrec, A.-M.; Le Merrer, E.; Liu, Y.; Simon, G.

    It is now common for IPTV systems attracting millions of users to be based on a peer-to-peer (P2P) architecture. In such systems, each channel is typically associated with one P2P overlay network connecting the users. This significantly enhances the user experience by relieving the source from dealing with all connections. Yet, the joining process resulting in a peer to be integrated in channel overlay usually requires a significant amount of time. As a consequence, switching from one channel to another is far to be as fast as in IPTV solutions provided by telco operators. In this paper, we tackle the issue of efficient channel switching in P2P IPTV system. This is to the best of our knowledge the first study on this topic. First, we conducted and analyzed a set of measurements of one of the most popular P2P systems (PPlive). These measurements reveal that the set of contacts that a joining peer receives from the central server are of the utmost importance in the start-up process. On those neigbors, depends the speed to acquire the first video frames to play. We then formulate the switching problem, and propose a simple distributed algorithm, as an illustration of the concept, which aims at leveraging the presence of peers in the network to fasten the switch process. The principle is that each peer maintains as neighbors peers involved in other channels, providing peers with good contacts upon channel switching. Finally, simulations show that our approach leads to substantial improvements on the channel switching time. As our algorithmic solution does not have any prerequisite on the overlays, it appears to be an appealing add-on for existing P2P IPTV systems.

  4. Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service

    OpenAIRE

    Chen, Ruichuan; Lua, Eng Keong; Cai, Zhuhua; Crowcroft, Jon; Chen, Zhong

    2011-01-01

    Peer-to-Peer (P2P) content sharing systems are susceptible to the content pollution attack, in which attackers aggressively inject polluted contents into the systems to reduce the availability of authentic contents, thus decreasing the confidence of participating users. In this paper, we design a pollution-free P2P content sharing system, Green, by exploiting the inherent content-based information and the social-based reputation. In Green, a content provider (i.e., creator or sharer) publishe...

  5. A peer-to-peer platform for decentralized logistics

    OpenAIRE

    Gallay, Olivier; Korpela, Kari; Tapio, Niemi; Nurminen, Jukka K.; Kersten, Wolfgang; Blecker, Thorsten; Ringle, Christian M.

    2017-01-01

    We introduce a novel platform for decentralized logistics, the aim of which is to magnify and accelerate the impact offered by the integration of the most recent advances in Information and Communication Technologies (ICTs) to multi-modal freight operations. The essence of our peer-to-peer (P2P) framework distributes the management of the logistics operations to the multiple actors according to their available computational resources. As a result, this new approach prevents the dominant playe...

  6. Large-Scale Cooperative Task Distribution on Peer-to-Peer Networks

    Science.gov (United States)

    2012-01-01

    SUBTITLE Large-scale cooperative task distribution on peer-to-peer networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...disadvantages of ML- Chord are its fixed size (two layers), and limited scala - bility for large-scale systems. RC-Chord extends ML- D. Karrels et al...configurable before runtime. This can be improved by incorporating a distributed learning algorithm to tune the number and range of the DLoE tracking

  7. Streaming Multimedia via Overlay Networks using Wi-Fi Peer-to-Peer Connections

    DEFF Research Database (Denmark)

    Poderys, Justas; Soler, José

    2017-01-01

    Short range ad-hoc wireless networks can be used to deliver streaming multimedia for information, entertainment and advertisement purposes. To enable short-range communication between various devices, the Wi-Fi Alliance proposed an extension to the IEEE802.11 Wi-Fi standard called Wi-Fi Peer......-to-Peer (P2P). It allows compliant devices to form ad-hoc communication groups without interrupting conventional access point-based Wi-Fi communication. This paper proposes to use Wi-Fi P2P connectivity to distribute streaming multimedia in ah-hoc formed user groups. The exchange of multimedia data...... is performed by forming an overlay network using Peer-to-Peer Streaming Peer Protocol (PPSPP). In order to make PPSPP function over WiFi P2P connections, this paper proposes a number of changes to the protocol. The performance of the proposed system is evaluated using a computer networks emulator...

  8. Robust Reputations for Peer-to-peer Markets

    Science.gov (United States)

    2007-05-24

    a cryptographic protocol that permits persistent pseudonyms: on-line identities that maintain privacy and anonymity yet providing a strong guarantee...July 2005. [106] ——, “Resisting sybils in peer-to-peer markets,” 2007, to appear in the Proceedings of the Joint iTrust and PST Conference on Privacy ...vendors unite to voice their concerns,” Startup Journal, May 2004, http://startup.wsj.com/ ecommerce / ecommerce /20040526-wingfield.html. 179 [117] B. Yu and M

  9. Peer-to-peer communication, cancer prevention, and the internet

    Science.gov (United States)

    Ancker, Jessica S.; Carpenter, Kristen M.; Greene, Paul; Hoffmann, Randi; Kukafka, Rita; Marlow, Laura A.V.; Prigerson, Holly G.; Quillin, John M.

    2013-01-01

    Online communication among patients and consumers through support groups, discussion boards, and knowledge resources is becoming more common. In this paper, we discuss key methods through which such web-based peer-to-peer communication may affect health promotion and disease prevention behavior (exchanges of information, emotional and instrumental support, and establishment of group norms and models). We also discuss several theoretical models for studying online peer communication, including social theory, health communication models, and health behavior models. Although online peer communication about health and disease is very common, research evaluating effects on health behaviors, mediators, and outcomes is still relatively sparse. We suggest that future research in this field should include formative evaluation and studies of effects on mediators of behavior change, behaviors, and outcomes. It will also be important to examine spontaneously emerging peer communication efforts to see how they can be integrated with theory-based efforts initiated by researchers. PMID:19449267

  10. Predicting Availability of Mobile Peers in Large Peer-to-Peer Networks

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Ekler, Péter

    2013-01-01

    users and network operators. In these situations, a certain redundancy must be built into the system because the availability of the nodes can vary greatly. The goal of this paper is to present a methodology to minimize the necessary redundancy by predicting the number of available nodes. The prediction......Peer-to-peer (P2P) applications for mobile devices are becoming more and more popular because of increasing bandwidth, computational performance and storage capabilities. Such a mobile based distributed architecture offers significant advantages in several scenarios from the perspective of both...

  11. Peer-to-Peer Lending in Surabaya: How It Drives Regional Economy?

    OpenAIRE

    Mahardhika, Galih Satria

    2017-01-01

    Financial technology, or so called as “Fintech”, has been remarked as a disruptive idea that changed our current financial system. In Indonesia, one of the emerging financial practices related to Fintech is the online-based peer-to-peer lending (P2PL). This research has two objectives: to explore current scheme of P2PL in Surabaya and to learn how P2PL drives the economy of Surabaya. To meet the objectives, numbers of existing papers are being reviewed related to the matter of P2PL and Micro,...

  12. Global phenomena from local rules: Peer-to-peer networks and crystal steps

    Science.gov (United States)

    Finkbiner, Amy

    Even simple, deterministic rules can generate interesting behavior in dynamical systems. This dissertation examines some real world systems for which fairly simple, locally defined rules yield useful or interesting properties in the system as a whole. In particular, we study routing in peer-to-peer networks and the motion of crystal steps. Peers can vary by three orders of magnitude in their capacities to process network traffic. This heterogeneity inspires our use of "proportionate load balancing," where each peer provides resources in proportion to its individual capacity. We provide an implementation that employs small, local adjustments to bring the entire network into a global balance. Analytically and through simulations, we demonstrate the effectiveness of proportionate load balancing on two routing methods for de Bruijn graphs, introducing a new "reversed" routing method which performs better than standard forward routing in some cases. The prevalence of peer-to-peer applications prompts companies to locate the hosts participating in these networks. We explore the use of supervised machine learning to identify peer-to-peer hosts, without using application-specific information. We introduce a model for "triples," which exploits information about nearly contemporaneous flows to give a statistical picture of a host's activities. We find that triples, together with measurements of inbound vs. outbound traffic, can capture most of the behavior of peer-to-peer hosts. An understanding of crystal surface evolution is important for the development of modern nanoscale electronic devices. The most commonly studied surface features are steps, which form at low temperatures when the crystal is cut close to a plane of symmetry. Step bunching, when steps arrange into widely separated clusters of tightly packed steps, is one important step phenomenon. We analyze a discrete model for crystal steps, in which the motion of each step depends on the two steps on either side of

  13. A digital peer-to-peer learning platform for clinical skills development.

    Science.gov (United States)

    Basnak, Jesse; Ortynski, Jennifer; Chow, Meghan; Nzekwu, Emeka

    2017-02-01

    Due to constraints in time and resources, medical curricula may not provide adequate opportunities for pre-clerkship students to practice clinical skills. To address this, medical students at the University of Alberta developed a digital peer-to-peer learning initiative. The initiative assessed if students can learn clinical skills from their peers in co-curricular practice objective structured clinical exams (OSCEs). A total of 144 first-year medical students participated. Students wrote case scenarios that were reviewed by physicians. Students enacted the cases in practice OSCEs, acting as the patient, physician, and evaluator. Verbal and electronic evaluations were completed. A digital platform was used to automate the process. Surveys were disseminated to assess student perceptions of their experience. Seventy-five percent of participants said they needed opportunities to practice patient histories and physical exams in addition to those provided in the medical school curriculum. All participants agreed that the co-curricular practice OSCEs met this need. The majority of participants also agreed that the digital platform was efficient and easy to use. Students found the practice OSCEs and digital platform effective for learning clinical skills. Thus, peer-to-peer learning and computer automation can be useful adjuncts to traditional medical curricula.

  14. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  15. PSG: Peer-to-Peer semantic grid framework architecture

    Directory of Open Access Journals (Sweden)

    Amira Soliman

    2011-07-01

    Full Text Available The grid vision, of sharing diverse resources in a flexible, coordinated and secure manner, strongly depends on metadata. Currently, grid metadata is generated and used in an ad-hoc fashion, much of it buried in the grid middleware code libraries and database schemas. This ad-hoc expression and use of metadata causes chronic dependency on human intervention during the operation of grid machinery. Therefore, the Semantic Grid is emerged as an extension of the grid in which rich resource metadata is exposed and handled explicitly, and shared and managed via grid protocols. The layering of an explicit semantic infrastructure over the grid infrastructure potentially leads to increase interoperability and flexibility. In this paper, we present PSG framework architecture that offers semantic-based grid services. PSG architecture allows the explicit use of semantics and defining the associated grid services. PSG architecture is originated from the integration of Peer-to-Peer (P2P computing with semantics and agents. Ontologies are used in annotating each grid component, developing users/nodes profiles and organizing framework agents. While, P2P is responsible for organizing and coordinating the grid nodes and resources.

  16. Defining Peer-to-Peer Accountability From the Nurse's Perspective.

    Science.gov (United States)

    Lockett, Jacqueline Jansen; Barkley, Leslie; Stichler, Jaynelle; Palomo, Jeanne; Kik, Bozena; Walker, Christopher; Donnelly, Janet; Willon, Judy; Sanborn, Julie; O'Byrne, Noeleen

    2015-11-01

    The aim of this study was to define and create a conceptual model for peer-to-peer accountability (P to PA). Many organizations cite the importance of peer accountability (PA) as essential in ensuring patient safety. Professionalism in nursing requires self-regulation of practice and PA. Although discussed in the literature, P to PA is not conceptually defined. A grounded theory study design with constant comparative data collection and analysis was used to explore nurses' definitions of P to PA and their perceptions of motivators and barriers to engaging in P to PA. Transcripts of digital recordings of all interviews were analyzed using line-by-line coding until identified themes emerged. P to PA was defined as the act of speaking up when one observes a peer not practicing to acceptable standards. A conceptual model illustrates the antecedents, attributes, and consequences of P to PA. P to PA is the professional responsibility of every nurse and healthcare provider and is essential for safe patient care. The conceptual definition facilitates actualization of P to PA in practice.

  17. Peer-to-Peer Enclaves for Improving Network Defence

    Directory of Open Access Journals (Sweden)

    David W. Archer

    2013-07-01

    Full Text Available Information about cyberthreats within networks spreads slowly relative to the speed at which those threats spread. Typical "threat feeds" that are commercially available also disseminate information slowly relative to the propagation speed of attacks, and they often convey irrelevant information about imminent threats. As a result, hosts sharing a network may miss opportunities to improve their defence postures against imminent attack because needed information arrives too late or is lost in irrelevant noise. We envision timely, relevant peer-to-peer sharing of threat information – based on current technologies – as a solution to these problems and as a useful design pattern for defensive cyberwarfare. In our setting, network nodes form communities that we call enclaves, where each node defends itself while sharing information on imminent threats with peers that have similar threat exposure. In this article, we present our vision for this solution. We sketch the architecture of a typical node in such a network and how it might interact with a framework for sharing threat information; we explain why certain defensive countermeasures may work better in our setting; we discuss current tools that could be used as components in our vision; and we describe opportunities for future research and development.

  18. Peer-to-peer lending and bias in crowd decision-making.

    Science.gov (United States)

    Singh, Pramesh; Uparna, Jayaram; Karampourniotis, Panagiotis; Horvat, Emoke-Agnes; Szymanski, Boleslaw; Korniss, Gyorgy; Bakdash, Jonathan Z; Uzzi, Brian

    2018-01-01

    Peer-to-peer lending is hypothesized to help equalize economic opportunities for the world's poor. We empirically investigate the "flat-world" hypothesis, the idea that globalization eventually leads to economic equality, using crowdfinancing data for over 660,000 loans in 220 nations and territories made between 2005 and 2013. Contrary to the flat-world hypothesis, we find that peer-to-peer lending networks are moving away from flatness. Furthermore, decreasing flatness is strongly associated with multiple variables: relatively stable patterns in the difference in the per capita GDP between borrowing and lending nations, ongoing migration flows from borrowing to lending nations worldwide, and the existence of a tie as a historic colonial. Our regression analysis also indicates a spatial preference in lending for geographically proximal borrowers. To estimate the robustness for these patterns for future changes, we construct a network of borrower and lending nations based on the observed data. Then, to perturb the network, we stochastically simulate policy and event shocks (e.g., erecting walls) or regulatory shocks (e.g., Brexit). The simulations project a drift towards rather than away from flatness. However, levels of flatness persist only for randomly distributed shocks. By contrast, loss of the top borrowing nations produces more flatness, not less, indicating how the welfare of the overall system is tied to a few distinctive and critical country-pair relationships.

  19. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP

    Science.gov (United States)

    Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni

    The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.

  20. APPLICATION OF PEER-TO-PEER ASSESSMENT OF WRITTEN WORKS OF STUDENTS IN STREAM INTERNAL COURSES

    Directory of Open Access Journals (Sweden)

    Д А Королев

    2016-12-01

    Full Text Available At reduction of contact time in subject matters the instruments of preservation of active forms of studying for students assuming independent research work are required. One of such forms is peer-to- peer evaluation of works (peer assessment allowing to go beyond a narrow framework of automaticallychecked tests for the level of small research works. In article results of a two-year experiment on use of a piring on a stream course are given in MIEM Higher School of Economics National Research University taking into account specifics of audience rather mass online of courses.The received results and conclusions have formed a basis for modeling of ways of estimation of written works at peer-to-peer check without participation of the teacher. In an experiment schemes of estimation and motivation for management of a ratio of number of authors and reviewers have been fulfilled, and also the general questions of use of the offered system of assessment it is aware.

  1. Give-and-take based peer-to-peer content distribution networks

    Indian Academy of Sciences (India)

    Compared to traditional content distribution schemes, peer- to-peer networks ... are shared among users who desire to download files. In a peer-to-peer ..... randomly generated data points, with 300 segments and 200 peers. From the figure ...

  2. Managing Supply and Demand of Bandwidth in Peer-to-Peer Communities

    NARCIS (Netherlands)

    Meulpolder, M.

    2011-01-01

    On today's Internet, millions of people participate in peer-to-peer communities where they share content such as audio and video files. Contrary to websites such as Youtube, which rely on large and expensive computer servers to store and deliver all of their content, peer-to-peer communities rely on

  3. Personalised Peer-Supported Learning: The Peer-to-Peer Learning Environment (P2PLE)

    Science.gov (United States)

    Corneli, Joseph; Mikroyannidis, Alexander

    2011-01-01

    The Peer-to-Peer Learning Environment (P2PLE) is a proposed approach to helping learners co-construct their learning environment using recommendations about people, content, and tools. The work draws on current research on PLEs, and participant observation at the Peer-to-Peer University (P2PU). We are particularly interested in ways of eliciting…

  4. Author's rights in the digital age: how Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs

    Directory of Open Access Journals (Sweden)

    Milijana Micunovic

    2016-01-01

    Full Text Available Author's rights and copyright law have gone through quite a few changes in the 'post-print' culture of binary systems, digital formations and techno-practices. Technological development supports new concept of author's rights by promoting free internet and digital market, as well as new contemporary experience of culture that is being rooted in digital technology, mass communication and the world of multimedia and virtuality. Though computer and digital technology have served both authors and users in various ways, they have also served as a very fertile ground for sharing copyrighted content thus leading to numerous copyright infringements and conflicts with the copyright law. The aim of this paper is to identify and analyze the ways in which computer and digital technology have given rise to new trends in the production (e.g. remix culture and consumption (e.g. peer-to-peer file sharing technology of culture, but also to determine how new forms of distribution, use and sharing of digital content changed and shaped the perception of authorship in the 21st century. In order to analyze the dynamic, nature and structure by which new digital and networking technologies are affecting the concept of authorship and author's rights and to test the consistency of previously established hypotheses, we conducted a survey amongst general public. Altogether 535 questionnaires were completed. Data was analyzed using SPSS tool and quantitative method of analysis. In the analysis special attention was given to both, the concept of authorship in the digital environment and the concept of peer-to-peer file sharing technology as not so new, but still very popular networked architecture for distributing, using and sharing digital content. Results have shown that most of the respondents use peer-to-peer file sharing technology to access, consume and/or share different cultural content (e.g. movies, music, books, etc. while violating the rights of copyright holders

  5. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  6. Peer-to-peer I/O (P2PIO) protocol specification Version 0.6

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Gunter, Dan; Hoschek, Wolfgang

    2004-04-21

    Today's distributed systems require simple and powerful resource discovery queries in a dynamic environment consisting of a large number of resources spanning many autonomous administrative domains. The distributed search problem is hard due to the variety of query types, the number of resources and their autonomous, partitioned and dynamic nature. We propose a generalized resource discovery framework that is built around an application level messaging protocol called Peer-to-Peer I/O (P2PIO). P2PIO addresses a number of scalability problems in a general way. It provides flexible and uniform transport-independent resource discovery mechanisms to reduce both the client and network burden in multi-hop P2P systems.

  7. Peer-to-peer shadowing as a technique for the development of nurse middle managers clinical leadership.

    Science.gov (United States)

    Lalleman, Pieterbas; Bouma, Joanne; Smid, Gerhard; Rasiah, Jananee; Schuurmans, Marieke

    2017-10-02

    Purpose The purpose of this study was to explore the experiences and impact of peer-to-peer shadowing as a technique to develop nurse middle managers' clinical leadership practices. Design/methodology/approach A qualitative descriptive study was conducted to gain insight into the experiences of nurse middle managers using semi-structured interviews. Data were analysed into codes using constant comparison and similar codes were grouped under sub-themes and then into four broader themes. Findings Peer-to-peer shadowing facilitates collective reflection-in-action and enhances an "investigate stance" while acting. Nurse middle managers begin to curb the caring disposition that unreflectively urges them to act, to answer the call for help in the here and now, focus on ad hoc "doings", and make quick judgements. Seeing a shadowee act produces, via a process of social comparison, a behavioural repertoire of postponing reactions and refraining from judging. Balancing the act of stepping in and doing something or just observing as well as giving or withholding feedback are important practices that are difficult to develop. Originality/value Peer-to-peer shadowing facilitates curbing the caring disposition, which is essential for clinical leadership development through unlocking a behavioural repertoire that is not easy to reveal because it is, unreflectively, closely knit to the professional background of the nurse managers. Unlike most leadership development programmes, that are quite introspective and detached from context, peer-to-peer shadowing does have the potential to promote collective learning while acting, which is an important process.

  8. Peer-to-peer psychological contracts in the South African wine industry

    Directory of Open Access Journals (Sweden)

    Ruth Penfold

    2015-12-01

    Full Text Available Orientation: Very few studies examine the impact of peer relationships on the psychological contract. Research purpose: Using the backdrop of wine farm workers in the Western Cape, South Africa, the aim of our study was to explore the nature of peer relationships shaping the psychological contract. Motivation for the study: The agricultural sector of South Africa, in particular the wine farms in the Western Cape, has undergone radical change in the past decades as a result of labour legislation and changing government structures. It was therefore expected that these changes would influence the psychological contracts held by wine farm workers. Research approach, design and method: This qualitative study sampled all 24 full-time employees and 2 managers on the Constantia Hills Wine Estate in Cape Town, South Africa. Semi-structured interviews were conducted using the critical incident technique in combination with a series of open questions. Main findings: Our findings showed support for the existence of peer-to-peer psychological contracts and noted the valuable influence of a suitable conduit individual on the relationship between employees and their employer. Practical and/or managerial implications: Wine farm workers in South Africa have a strong need to be consulted after a lifetime of having no voice. In addition to ensuring suitable levels of two-way communication, management must understand the inter-peer contract and the nature of the relationships sustaining it. Contribution: Whilst literature has suggested that management of the psychological contract lies firmly within the domain of the employer, our findings indicated that ensuring harmonious peer-to-peer contracts was also central to good working relationships.

  9. Peer-to-peer as a travel accommodation option and the customer value

    OpenAIRE

    Rakovets, Elizaveta

    2016-01-01

    The purpose of the study was to investigate the concept of peer-to-peer accommodation as a travel lodging option from the customers’ point of view and the reasons for choosing that. Airbnb and Couchsurfing were used as examples of peer-to-peer accommodation. The theoretical section of the thesis covers the history of the homestay concept as the original form of peer-to-peer accommodation, its features as a part of hospitality exchange network, and the influence of modern technologies. The...

  10. Economic models for management of resources in peer-to-peer and grid computing

    Science.gov (United States)

    Buyya, Rajkumar; Stockinger, Heinz; Giddy, Jonathan; Abramson, David

    2001-07-01

    The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Enterprises (VE) for sharing resources distributed across the world. However, resource management, application development and usage models in these environments is a complex undertaking. This is due to the geographic distribution of resources that are owned by different organizations or peers. The resource owners of each of these resources have different usage or access policies and cost models, and varying loads and availability. In order to address complex resource management issues, we have proposed a computational economy framework for resource allocation and for regulating supply and demand in Grid computing environments. The framework provides mechanisms for optimizing resource provider and consumer objective functions through trading and brokering services. In a real world market, there exist various economic models for setting the price for goods based on supply-and-demand and their value to the user. They include commodity market, posted price, tenders and auctions. In this paper, we discuss the use of these models for interaction between Grid components in deciding resource value and the necessary infrastructure to realize them. In addition to normal services offered by Grid computing systems, we need an infrastructure to support interaction protocols, allocation mechanisms, currency, secure banking, and enforcement services. Furthermore, we demonstrate the usage of some of these economic models in resource brokering through Nimrod/G deadline and cost-based scheduling for two different optimization strategies on the World Wide Grid (WWG) testbed that contains peer-to-peer resources located on five continents: Asia, Australia, Europe, North America, and South America.

  11. A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper describes a local and distributed expectation maximization algorithm for learning parameters of Gaussian mixture models (GMM) in large peer-to-peer (P2P)...

  12. 2012 national state safety engineers and traffic engineers peer-to-peer workshop.

    Science.gov (United States)

    2013-11-01

    The Illinois Department of Transportation (IDOT) and the Illinois Center for Transportation (ICT) sponsored and hosted the : 2012 National State Safety Engineers and Traffic Engineers Peer-to-Peer Workshop on November 14 and 15, 2012, at the : Hyatt ...

  13. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... eNcentive facilitates peer-to-peer electronic marketing in mobile ad hoc environments. Our framework employs an intelligent marketing scheme, by providing users the capability to collect information like sales promotions and discounts...

  14. A digital peer-to-peer learning platform for clinical skills development.

    Directory of Open Access Journals (Sweden)

    Jesse Paul Basnak

    2017-02-01

    Conclusion: Students found the practice OSCEs and digital platform effective for learning clinical skills. Thus, peer-to-peer learning and computer automation can be useful adjuncts to traditional medical curricula.

  15. Mitigating Free Riding in Peer-To-Peer Networks: Game Theory ...

    African Journals Online (AJOL)

    Mitigating Free Riding in Peer-To-Peer Networks: Game Theory Approach. ... In this paper, we model the interactions between peers as a modified gift giving game and proposed an utility exchange incentive ... AJOL African Journals Online.

  16. Secure Peer-to-Peer Networks for Scientific Information Sharing, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Our goal is to adapt the peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, as the basis for development of...

  17. A Local Asynchronous Distributed Privacy Preserving Feature Selection Algorithm for Large Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we develop a local distributed privacy preserving algorithm for feature selection in a large peer-to-peer environment. Feature selection is often used...

  18. Client-side Web Mining for Community Formation in Peer-to-Peer Environments

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we present a framework for forming interests-based Peer-to-Peer communities using client-side web browsing history. At the heart of this framework is...

  19. Energy-efficient peer-to-peer networking for constrained-capacity mobile environments

    OpenAIRE

    Harjula, E. (Erkki)

    2016-01-01

    Abstract Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of end-user devices in mobile computing. Peer-to-peer technology provides decentralized and self-organizing architecture for distributing content between devices in networks that scale up almost infinitely. However, peer-to-peer networking may require lots of resources from peer nodes, which in turn may lead to increased energy consumption on mobile d...

  20. Online Peer-to-Peer Support for Young People With Mental Health Problems: A Systematic Review

    OpenAIRE

    Ali, Kathina; Farrer, Louise; Gulliver, Amelia; Griffiths, Kathleen M

    2015-01-01

    Background Adolescence and early adulthood are critical periods for the development of mental disorders. Online peer-to-peer communication is popular among young people and may improve mental health by providing social support. Previous systematic reviews have targeted Internet support groups for adults with mental health problems, including depression. However, there have been no systematic reviews examining the effectiveness of online peer-to-peer support in improving the mental health of a...

  1. Peer-to-peer architectures for exascale computing : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Vorobeychik, Yevgeniy; Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Donald W.

    2010-09-01

    The goal of this research was to investigate the potential for employing dynamic, decentralized software architectures to achieve reliability in future high-performance computing platforms. These architectures, inspired by peer-to-peer networks such as botnets that already scale to millions of unreliable nodes, hold promise for enabling scientific applications to run usefully on next-generation exascale platforms ({approx} 10{sup 18} operations per second). Traditional parallel programming techniques suffer rapid deterioration of performance scaling with growing platform size, as the work of coping with increasingly frequent failures dominates over useful computation. Our studies suggest that new architectures, in which failures are treated as ubiquitous and their effects are considered as simply another controllable source of error in a scientific computation, can remove such obstacles to exascale computing for certain applications. We have developed a simulation framework, as well as a preliminary implementation in a large-scale emulation environment, for exploration of these 'fault-oblivious computing' approaches. High-performance computing (HPC) faces a fundamental problem of increasing total component failure rates due to increasing system sizes, which threaten to degrade system reliability to an unusable level by the time the exascale range is reached ({approx} 10{sup 18} operations per second, requiring of order millions of processors). As computer scientists seek a way to scale system software for next-generation exascale machines, it is worth considering peer-to-peer (P2P) architectures that are already capable of supporting 10{sup 6}-10{sup 7} unreliable nodes. Exascale platforms will require a different way of looking at systems and software because the machine will likely not be available in its entirety for a meaningful execution time. Realistic estimates of failure rates range from a few times per day to more than once per hour for these

  2. Privacy and Cooperation in Peer-to-Peer Systems

    NARCIS (Netherlands)

    Zeilemaker, N.S.M.

    2015-01-01

    P2P networks employ the resources available at peers to reduce the load at, or eliminate the need for a server. In order to achieve these goals, protocols are implemented which aim to allow peers to collaborate efficiently. However, these same protocols can make peers an easy target, as their

  3. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  4. AntBot: Anti-pollution peer-to-peer botnets

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Ha, Duc T [UNIV. AT BUFFALO

    2009-01-01

    Botnets, which are responsible for many email sparnming and DDoS (Distributed Denial of Service) attacks in the current Internet, have emerged as one of most severe cyber-threats in recent years. To evade detection and improve resistance against countermeasures, botnets have evolved from the first generation that relies on IRC chat channels to deliver commands to the current generation that uses highly resilient P2P (Peer-to-Peer) protocols to spread their C&C (Command and Control) information. It is, however, revealed that P2P botnets, although relieved from the single point of failure that IRC botnets suffer, can be easily disrupted using pollution-based mitigation schemes [15]. In this paper, we play the devil's advocate and propose a new type of hypothetical botnets called AntBot, which aim to propagate their C&C information to individual bots even though there exists an adversary that persistently pollutes keys used by seized bots to search the command information. The key idea of AntBot is a tree-like structure that bots use to deliver the command so that captured bots reveal only limited information. To evaluate effectiveness of AntBot against pollution-based mitigation in a virtual environment, we develop a distributed P2P botnet simulator. Using extensive experiments, we demonstrate that AntBot operates resiliently against pollution-based mitigation. We further present a few potential defense schemes that could effectively disrupt AntBot operations.

  5. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Jian Dong

    2014-09-01

    Full Text Available The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen’s classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen’s model. Moreover, B-AFD has better adaptability to P2P network.

  6. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    Science.gov (United States)

    Dong, Jian; Ren, Xiao; Zuo, Decheng; Liu, Hongwei

    2014-01-01

    The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P) networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS) can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen's classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD) is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen's model. Moreover, B-AFD has better adaptability to P2P network. PMID:25198005

  7. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    Science.gov (United States)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  8. Peer to Peer Distributed Energy Trading in Smart Grids: A Survey

    Directory of Open Access Journals (Sweden)

    Juhar Abdella

    2018-06-01

    Full Text Available Due to the expansion of distributed renewable energy resources, peer to peer energy trading (P2P DET is expected to be one of the key elements of next generation power systems. P2P DET can provide various benefits such as creating a competitive energy market, reducing power outages, increasing overall efficiency of power systems and supplementing alternative sources of energy according to user preferences. Because of these promising advantages, P2P DET has attracted the attention of several researchers. Current research related to P2P DET include demand response optimization, power routing, network communication, security and privacy. This paper presents a review of the main research topics revolving around P2P DET. Particularly, we present a comprehensive survey of existing demand response optimization models, power routing devices and power routing algorithms. We also identify some key challenges faced in realizing P2P DET. Furthermore, we discuss state of the art enabling technologies such as Energy Internet, Blockchain and Software Defined Networking (SDN and we provide insights into future research directions.

  9. DOLCLAN – Middleware Support for Peer-to-Peer Distributed Shared Objects

    DEFF Research Database (Denmark)

    Bardram, Jakob; Mogensen, Martin

    2007-01-01

    Contemporary object-oriented programming seeks to enable distributed computing by accessing remote objects using blocking remote procedure calls. This technique, however, suffers from several drawbacks because it relies on the assumption of stable network connections and synchronous method...... invocations. In this paper we present an approach to support distributed programming, which rely on local object replicas keeping themselves synchronized using an underlying peer-to-peer infrastructure. We have termed our approach Peer-to-peer Distributed Shared Objects (PDSO). This PDSO approach has been...

  10. A Peer-to-Peer Indexing Service for Data Grids

    DEFF Research Database (Denmark)

    Jensen, Henrik Thostrup; Kleist, Josva

    2007-01-01

    deal with nomadic data. The system provides extra services to ease integration with other systems: A registrant service integrates existing storage elements into the system, and a query proxy provides an easy way to query the system. A security model, which builds on the existing grid security model...

  11. Global health partnership for student peer-to-peer psychiatry e-learning: Lessons learned.

    Science.gov (United States)

    Keynejad, Roxanne C

    2016-12-03

    Global 'twinning' relationships between healthcare organizations and institutions in low and high-resource settings have created growing opportunities for e-health partnerships which capitalize upon expanding information technology resources worldwide. E-learning approaches to medical education are increasingly popular but remain under-investigated, whilst a new emphasis on global health teaching has coincided with university budget cuts in many high income countries. King's Somaliland Partnership (KSP) is a paired institutional partnership health link, supported by Tropical Health and Education Trust (THET), which works to strengthen the healthcare system and improve access to care through mutual exchange of skills, knowledge and experience between Somaliland and King's Health Partners, UK. Aqoon, meaning knowledge in Somali, is a peer-to-peer global mental health e-learning partnership between medical students at King's College London (KCL) and Hargeisa and Amoud Universities, Somaliland. It aims to extend the benefits of KSP's cross-cultural and global mental health education work to medical students and has reported positive results, including improved attitudes towards psychiatry in Somaliland students. The process of devising, piloting, evaluating, refining, implementing, re-evaluating and again refining the Aqoon model has identified important barriers to successful partnership. This article describes lessons learned during this process, sharing principles and recommendations for readers wishing to expand their own global health link beyond qualified clinicians, to the healthcare professionals of the future.

  12. Adaptative Peer to Peer Data Sharing for Technology Enhanced Learning

    Science.gov (United States)

    Angelaccio, Michele; Buttarazzi, Berta

    Starting from the hypothesis that P2P Data Sharing in a direct teaching scenario (e.g.: a classroom lesson) may lead to relevant benefits, this paper explores the features of EduSHARE a Collaborative Learning System useful for Enhanced Learning Process.

  13. Introduction to the special section on peer-to-peer computing and web data management

    Institute of Scientific and Technical Information of China (English)

    Aoying ZHOU

    2008-01-01

    @@ Peer-to-peer (P2P) computing has been attracting attention from quite a few researchers and practitioners from different fields of computer science, such as networking, distributed computing, and database. Over P2P environment, the data management becomes a challenging issue.

  14. A Database Query Processing Model in Peer-To-Peer Network ...

    African Journals Online (AJOL)

    Peer-to-peer databases are becoming more prevalent on the internet for sharing and distributing applications, documents, files, and other digital media. The problem associated with answering large-scale ad hoc analysis queries, aggregation queries, on these databases poses unique challenges. This paper presents an ...

  15. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  16. Perception and Management of Risk in Internet-Based Peer-to-Peer Milk-Sharing

    Science.gov (United States)

    Gribble, Karleen D.

    2014-01-01

    The perception and management of the risks of peer-to-peer milk sharing was explored via a written questionnaire administered to 97 peer milk donors and 41 peer milk recipients who were recruited via Facebook. All recipients' respondents were aware that there were risks associated with using peer-shared milk and took action to mitigate these…

  17. Information Propagation in Peer-to-Peer Networking : Modeling and Empirical Studies

    NARCIS (Netherlands)

    Tang, S.

    2010-01-01

    Although being a young technology, peer-to-peer (P2P) networking has spurred dramatic evolution on the Internet over the recent twenty years. Unlike traditional server-client mode, P2P networking applications are user-centric. Users (peers) generate their own content and share it with others across

  18. A multi-tiered architecture for content retrieval in mobile peer-to-peer networks.

    Science.gov (United States)

    2012-01-01

    In this paper, we address content retrieval in Mobile Peer-to-Peer (P2P) Networks. We design a multi-tiered architecture for content : retrieval, where at Tier 1, we design a protocol for content similarity governed by a parameter that trades accu...

  19. A Peer-to-Peer Health Education Program for Vulnerable Children in Uganda

    Science.gov (United States)

    Falk, Diane S.; Pettet, Kristen; Mpagi, Charles

    2016-01-01

    In this paper, children attending a U.S.-sponsored private primary school serving orphaned and vulnerable children in Uganda were interviewed in focus groups about their participation in a peer-to-peer health education program in which they used music, dance, poetry, art, and drama to convey health information. The children reported enhanced…

  20. Peer-to-Peer Teaching Using Multi-Disciplinary Applications as Topics

    Science.gov (United States)

    Sturdivant, Rodney X.; Souhan, Brian E.

    2011-01-01

    Most educators know that the best way to truly understand new material is to teach it. The use of students as peer educators provides numerous benefits to the student teacher and his or her classmates. Student-led instruction or peer-to-peer teaching is not a new concept or teaching technique. Peer teaching traces its roots back to the ancient…

  1. Telemedicine for Peer-to-Peer Psychiatry Learning between U.K. and Somaliland Medical Students

    Science.gov (United States)

    Keynejad, Roxanne; Ali, Faisal R.; Finlayson, Alexander E. T.; Handuleh, Jibriil; Adam, Gudon; Bowen, Jordan S. T.; Leather, Andrew; Little, Simon J.; Whitwell, Susannah

    2013-01-01

    Objective: The proportion of U.K. medical students applying for psychiatry training continues to decline, whereas, in Somaliland, there are no public-sector psychiatrists. This pilot study assessed the usefulness and feasibility of online, instant messenger, peer-to-peer exchange for psychiatry education between cultures. Method: Twenty medical…

  2. Online Peer-to-Peer Support for Young People With Mental Health Problems: A Systematic Review.

    Science.gov (United States)

    Ali, Kathina; Farrer, Louise; Gulliver, Amelia; Griffiths, Kathleen M

    2015-01-01

    Adolescence and early adulthood are critical periods for the development of mental disorders. Online peer-to-peer communication is popular among young people and may improve mental health by providing social support. Previous systematic reviews have targeted Internet support groups for adults with mental health problems, including depression. However, there have been no systematic reviews examining the effectiveness of online peer-to-peer support in improving the mental health of adolescents and young adults. The aim of this review was to systematically identify available evidence for the effectiveness of online peer-to peer support for young people with mental health problems. The PubMed, PsycInfo, and Cochrane databases were searched using keywords and Medical Subject Headings (MeSH) terms. Retrieved abstracts (n=3934) were double screened and coded. Studies were included if they (1) investigated an online peer-to-peer interaction, (2) the interaction discussed topics related to mental health, (3) the age range of the sample was between 12 to 25 years, and (4) the study evaluated the effectiveness of the peer-to-peer interaction. Six studies satisfied the inclusion criteria for the current review. The studies targeted a range of mental health problems including depression and anxiety (n=2), general psychological problems (n=1), eating disorders (n=1), and substance use (tobacco) (n=2). The majority of studies investigated Internet support groups (n=4), and the remaining studies focused on virtual reality chat sessions (n=2). In almost all studies (n=5), the peer support intervention was moderated by health professionals, researchers or consumers. Studies employed a range of study designs including randomized controlled trials (n=3), pre-post studies (n=2) and one randomized trial. Overall, two of the randomized controlled trials were associated with a significant positive outcome in comparison to the control group at post-intervention. In the remaining four

  3. An agent-based peer-to-peer architecture for semantic discovery of manufacturing services across virtual enterprises

    Science.gov (United States)

    Zhang, Wenyu; Zhang, Shuai; Cai, Ming; Jian, Wu

    2015-04-01

    With the development of virtual enterprise (VE) paradigm, the usage of serviceoriented architecture (SOA) is increasingly being considered for facilitating the integration and utilisation of distributed manufacturing resources. However, due to the heterogeneous nature among VEs, the dynamic nature of a VE and the autonomous nature of each VE member, the lack of both sophisticated coordination mechanism in the popular centralised infrastructure and semantic expressivity in the existing SOA standards make the current centralised, syntactic service discovery method undesirable. This motivates the proposed agent-based peer-to-peer (P2P) architecture for semantic discovery of manufacturing services across VEs. Multi-agent technology provides autonomous and flexible problemsolving capabilities in dynamic and adaptive VE environments. Peer-to-peer overlay provides highly scalable coupling across decentralised VEs, each of which exhibiting as a peer composed of multiple agents dealing with manufacturing services. The proposed architecture utilises a novel, efficient, two-stage search strategy - semantic peer discovery and semantic service discovery - to handle the complex searches of manufacturing services across VEs through fast peer filtering. The operation and experimental evaluation of the prototype system are presented to validate the implementation of the proposed approach.

  4. Peer-to-peer Cooperative Scheduling Architecture for National Grid Infrastructure

    Science.gov (United States)

    Matyska, Ludek; Ruda, Miroslav; Toth, Simon

    For some ten years, the Czech National Grid Infrastructure MetaCentrum uses a single central PBSPro installation to schedule jobs across the country. This centralized approach keeps a full track about all the clusters, providing support for jobs spanning several sites, implementation for the fair-share policy and better overall control of the grid environment. Despite a steady progress in the increased stability and resilience to intermittent very short network failures, growing number of sites and processors makes this architecture, with a single point of failure and scalability limits, obsolete. As a result, a new scheduling architecture is proposed, which relies on higher autonomy of clusters. It is based on a peer to peer network of semi-independent schedulers for each site or even cluster. Each scheduler accepts jobs for the whole infrastructure, cooperating with other schedulers on implementation of global policies like central job accounting, fair-share, or submission of jobs across several sites. The scheduling system is integrated with the Magrathea system to support scheduling of virtual clusters, including the setup of their internal network, again eventually spanning several sites. On the other hand, each scheduler is local to one of several clusters and is able to directly control and submit jobs to them even if the connection of other scheduling peers is lost. In parallel to the change of the overall architecture, the scheduling system itself is being replaced. Instead of PBSPro, chosen originally for its declared support of large scale distributed environment, the new scheduling architecture is based on the open-source Torque system. The implementation and support for the most desired properties in PBSPro and Torque are discussed and the necessary modifications to Torque to support the MetaCentrum scheduling architecture are presented, too.

  5. RatBot: anti-enumeration peer-to-peer botnets

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Chen, Songqing [GEORGE MASON UNIV.

    2010-01-01

    Botnets have emerged as one of the most severe cyber threats in recent years. To obtain high resilience against a single point of failure, the new generation of botnets have adopted the peer-to-peer (P2P) structure. One critical question regarding these P2P botnets is: how big are they indeed? To address this question, researchers have proposed both actively crawling and passively monitoring methods to enumerate existing P2P botnets. In this work, we go further to explore the potential strategies that botnets may have to obfuscate their true sizes. Towards this end, this paper introduces RatBot, a P2P botnet that applies some statistical techniques to defeat existing P2P botnet enumeration methods. The key ideas of RatBot are two-fold: (1) there exist a fraction of bots that are indistinguishable from their fake identities, which are spoofing IP addresses they use to hide themselves; (2) we use a heavy-tailed distribution to generate the number of fake identities for each of these bots so that the sum of observed fake identities converges only slowly and thus has high variation. We use large-scale high-fidelity simulation to quantify the estimation errors under diverse settings, and the results show that a naive enumeration technique can overestimate the sizes of P2P botnets by one order of magnitude. We believe that our work reveals new challenges of accurately estimating the sizes of P2P botnets, and hope that it will raise the awareness of security practitioners with these challenges. We further suggest a few countermeasures that can potentially defeat RatBot's anti-enumeration scheme.

  6. Potential Benefits of Incorporating Peer-to-Peer Interactions Into Digital Interventions for Psychotic Disorders: A Systematic Review.

    Science.gov (United States)

    Biagianti, Bruno; Quraishi, Sophia H; Schlosser, Danielle A

    2018-04-01

    Peer-to-peer interactions and support groups mitigate experiences of social isolation and loneliness often reported by individuals with psychotic disorders. Online peer-to-peer communication can promote broader use of this form of social support. Peer-to-peer interactions occur naturally on social media platforms, but they can negatively affect mental health. Recent digital interventions for persons with psychotic disorders have harnessed the principles of social media to incorporate peer-to-peer communication. This review examined the feasibility, acceptability, and preliminary efficacy of recent digital interventions in order to identify strategies to maximize benefits of online peer-to-peer communication for persons with psychotic disorders. An electronic database search of PubMed, EMBASE, PsycINFO, Ovid MEDLINE, Cochrane Central Register of Controlled Trials, and Health Technology Assessment Database was conducted in February 2017 and yielded a total of 1,015 results. Eight publications that reported data from six independent trials and five interventions were reviewed. The technology supporting peer-to-peer communication varied greatly across studies, from online forums to embedded social networking. When peer-to-peer interactions were moderated by facilitators, retention, engagement, acceptability, and efficacy were higher than for interventions with no facilitators. Individuals with psychotic disorders were actively engaged with moderated peer-to-peer communication and showed improvements in perceived social support. Studies involving service users in intervention design showed higher rates of acceptability. Individuals with psychotic disorders value and benefit from digital interventions that include moderated peer-to-peer interactions. Incorporating peer-to-peer communication into digital interventions for this population may increase compliance with other evidence-based therapies by producing more acceptable and engaging online environments.

  7. Online Peer-to-Peer Communities in the Daily Lives of People With Chronic Illness

    DEFF Research Database (Denmark)

    Kingod, Natasja; Cleal, Bryan; Wahlberg, Ayo

    2017-01-01

    This qualitative systematic review investigated how individuals with chronic illness experience online peer-to-peer support and how their experiences influence daily life with illness. Selected studies were appraised by quality criteria focused upon research questions and study design, participant...... selection, methods of data collection, and methods of analysis. Four themes were identified: (a) illness-associated identity work, (b) social support and connectivity, (c) experiential knowledge sharing, and (d) collective voice and mobilization. Findings indicate that online peer-to-peer communities...... everyday life with illness. This type of knowledge was perceived as extending far beyond medical care. Online communities were also used to mobilize and raise collective awareness about illness-specific concerns....

  8. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  9. Peer-to-peer Services in the Field of Accommodation: Finland vs. Latin America

    OpenAIRE

    Tuominen, Sofia; Kosunen, Sonja

    2016-01-01

    This thesis focuses on peer-to-peer services in the field of accommodation, more closely Airbnb. The thesis aims at researching the differences of the use of Airbnb in Finland and Latin America with the main focus on Mexico. The thesis is commissioned by SMAL (Association of Finnish Travel Agents). The thesis will consist of eight parts. The first part presents an overall introduction of the topic, aims, commissioner, methods and hypotheses. The second part presents the sharing economy ph...

  10. Peer-to-peer milk donors' and recipients' experiences and perceptions of donor milk banks.

    Science.gov (United States)

    Gribble, Karleen D

    2013-07-01

    To explore the intersection of peer-to-peer milk sharing and donor milk banks. A descriptive survey design containing closed and open-ended questions was used to examine women's perceptions of peer-to-peer milk sharing and milk banking. Closed-ended questions were analyzed using descriptive statistics and conventional qualitative content analysis was used to analyze open-ended responses. Participants were recruited via the Facebook sites of two online milk-sharing networks (Human Milk 4 Human Babies and Eats on Feet). Ninety-eight milk donors and 41 milk recipients who had donated or received breast milk in an arrangement that was facilitated via the Internet. One half of donor recipients could not donate to a milk bank because there were no banks local to them or they did not qualify as donors. Other respondents did not donate to a milk bank because they viewed the process as difficult, had philosophical objections to milk banking, or had a philosophical attraction to peer sharing. Most donor respondents felt it was important to know the circumstances of their milk recipients. No recipient respondents had obtained milk from a milk bank; it was recognized that they would not qualify for banked milk or that banked milk was cost prohibitive. Peer-to-peer milk donors and recipients may differ from milk bank donors and recipients in significant ways. Cooperation between milk banks and peer sharing networks could benefit both groups. © 2013 AWHONN, the Association of Women's Health, Obstetric and Neonatal Nurses.

  11. Using peer-to-peer energy-trading platforms to incentivize prosumers to form federated power plants

    Science.gov (United States)

    Morstyn, Thomas; Farrell, Niall; Darby, Sarah J.; McCulloch, Malcolm D.

    2018-02-01

    Power networks are undergoing a fundamental transition, with traditionally passive consumers becoming `prosumers' — proactive consumers with distributed energy resources, actively managing their consumption, production and storage of energy. A key question that remains unresolved is: how can we incentivize coordination between vast numbers of distributed energy resources, each with different owners and characteristics? Virtual power plants and peer-to-peer (P2P) energy trading offer different sources of value to prosumers and the power network, and have been proposed as different potential structures for future prosumer electricity markets. In this Perspective, we argue they can be combined to capture the benefits of both. We thus propose the concept of the federated power plant, a virtual power plant formed through P2P transactions between self-organizing prosumers. This addresses social, institutional and economic issues faced by top-down strategies for coordinating virtual power plants, while unlocking additional value for P2P energy trading.

  12. Sexual and reproductive health in Greenland: evaluation of implementing sexual peer-to-peer education in Greenland (the SexInuk project).

    Science.gov (United States)

    Homøe, Anne-Sophie; Knudsen, Ane-Kersti Skaarup; Nielsen, Sigrid Brisson; Grynnerup, Anna Garcia-Alix

    2015-01-01

    For decades, the rates of sexually transmitted infections (STIs), such as gonorrhoea, chlamydia and syphilis, have increased in Greenland, especially within the young age groups (15-29 years). From 2006 to 2013, the number of abortions has been consistent with approximately 800-900 abortions per year in Greenland, which is nearly as high as the total number of births during the same period. Previous studies in Greenland have reported that knowledge about sexual health is important, both as prevention and as facilitator to stop the increasing rates of STIs. A peer-to-peer education programme about sexual health requires adaption to cultural values and acceptance among the population and government in order to be sustainable. Formative evaluation of a voluntary project (SexInuk), in relation to peer-to-peer education with focus on sexual health. Two workshops were conducted in Nuuk, Greenland, to recruit Greenlandic students. Qualitative design with focus group interviews (FGIs) to collect qualitative feedback on feasibility and implementation of the project. Supplemented with a brief questionnaire regarding personal information (gender, age, education) and questions about the educational elements in the SexInuk project. Eight Greenlandic students, who had completed one or two workshops, were enrolled. The FGIs showed an overall consensus regarding the need for improving sexual health education in Greenland. The participants requested more voluntary educators, to secure sustainability. The articulation of taboo topics in the Greenlandic society appeared very important. The participants suggested more awareness by promoting the project. Cultural values and language directions were important elements in the FGIs. To our knowledge, voluntary work regarding peer-to-peer education and sexual health has not been structurally evaluated in Greenland before. To achieve sustainability, the project needs educators and financial support. Further research is needed to investigate

  13. The future of mental health care: peer-to-peer support and social media.

    Science.gov (United States)

    Naslund, J A; Aschbrenner, K A; Marsch, L A; Bartels, S J

    2016-04-01

    People with serious mental illness are increasingly turning to popular social media, including Facebook, Twitter or YouTube, to share their illness experiences or seek advice from others with similar health conditions. This emerging form of unsolicited communication among self-forming online communities of patients and individuals with diverse health concerns is referred to as peer-to-peer support. We offer a perspective on how online peer-to-peer connections among people with serious mental illness could advance efforts to promote mental and physical wellbeing in this group. In this commentary, we take the perspective that when an individual with serious mental illness decides to connect with similar others online it represents a critical point in their illness experience. We propose a conceptual model to illustrate how online peer-to-peer connections may afford opportunities for individuals with serious mental illness to challenge stigma, increase consumer activation and access online interventions for mental and physical wellbeing. People with serious mental illness report benefits from interacting with peers online from greater social connectedness, feelings of group belonging and by sharing personal stories and strategies for coping with day-to-day challenges of living with a mental illness. Within online communities, individuals with serious mental illness could challenge stigma through personal empowerment and providing hope. By learning from peers online, these individuals may gain insight about important health care decisions, which could promote mental health care seeking behaviours. These individuals could also access interventions for mental and physical wellbeing delivered through social media that could incorporate mutual support between peers, help promote treatment engagement and reach a wider demographic. Unforeseen risks may include exposure to misleading information, facing hostile or derogatory comments from others, or feeling more uncertain

  14. Peer-to-Peer JXTA Architecture for Continuing Mobile Medical Education Incorporated in Rural Public Health Centers.

    Science.gov (United States)

    Rajasekaran, Rajkumar; Iyengar, Nallani Chackravatula Sriman Narayana

    2013-04-01

    Mobile technology helps to improve continuing medical education; this includes all aspects of public health care as well as keeping one's knowledge up-to-date. The program of continuing medical and health education is intertwined with mobile health technology, which forms an imperative component of national strategies in health. Continuing mobile medical education (CMME) programs are designed to ensure that all medical and health-care professionals stay up-to-date with the knowledge required through mobile JXTA to appraise modernized strategies so as to achieve national goals of health-care information distribution. In this study, a 20-item questionnaire was distributed to 280 health professionals practicing traditional training learning methodologies (180 nurses, 60 doctors, and 40 health inspectors) in 25 rural hospitals. Among the 83% respondents, 56% are eager to take new learning methodologies as part of their evaluation, which is considered for promotion to higher grades, increments, or as part of their work-related activities. The proposed model was executed in five public health centers in which nurses and health inspectors registered in the JXTA network were referred to the record peer group by administrators. A mobile training program on immunization was conducted through the ADVT, with the lectures delivered on their mobiles. Credits are given after taking the course and completing an evaluation test. The system is faster compared with traditional learning. Medical knowledge management and mobile-streaming application support the CMME system through JXTA. The mobile system includes online lectures and practice quizzes, as well as assignments and interactions with health professionals. Evaluation and assessments are done online and credits certificates are provided based on the score the student obtains. The acceptance of mobile JXTA peer-to-peer learning has created a drastic change in learning methods among rural health professionals. The professionals

  15. How Do Peers Impact Learning? An Experimental Investigation of Peer-To-Peer Teaching and Ability Tracking

    OpenAIRE

    Kimbrough, Erik O.; McGee, Andrew; Shigeoka, Hitoshi

    2017-01-01

    Classroom peers are believed to influence learning by teaching each other, and the efficacy of this teaching likely depends on classroom composition in terms of peers' ability. Unfortunately, little is known about peer-to-peer teaching because it is never observed in field studies. Furthermore, identifying how peer-to-peer teaching is affected by ability tracking – grouping students of similar ability – is complicated by the fact that tracking is typically accompanied by changes in curriculum...

  16. Analysis of online trading transaction (peer to peer) on e-commerce based on Islamic law

    OpenAIRE

    Siregar, Richardy Affan Sojuangon; Caroline, Bella Marisela; Lazuardi, Luqman Isyraqi; Renanda, Tris; Qodrya, Hersy Ayu; Sari, Atthiya Prima; Arbi, Ramadana

    2018-01-01

    E-commerce lets buyers order things over the Internet via gadgets wherever they are and whenever they want to. The order will be delivered right to the buyer’s doorstep. There are several e-commerce models at the moment. One model is called peer-to-peer model which has been implemented on three largest e-commerce platforms in Indonesia. The validity of e-commerce from Islamic view is studied in order to clear the Muslims doubt regarding transactions made online. After scrutinizing the peer-to...

  17. Macroeconomics and FinTech: Uncovering Latent Macroeconomic Effects on Peer-to-Peer Lending

    OpenAIRE

    Foo, Jessica; Lim, Lek-Heng; Wong, Ken Sze-Wai

    2017-01-01

    Peer-to-peer (P2P) lending is a fast growing financial technology (FinTech) trend that is displacing traditional retail banking. Studies on P2P lending have focused on predicting individual interest rates or default probabilities. However, the relationship between aggregated P2P interest rates and the general economy will be of interest to investors and borrowers as the P2P credit market matures. We show that the variation in P2P interest rates across grade types are determined by three macro...

  18. Peer-to-peer and mass communication effect on opinion shifts

    Science.gov (United States)

    Kindler, A.; Solomon, S.; Stauffer, D.

    2013-02-01

    Opinion dynamics is studied through a minimal Ising model with three main influences (fields): personal conservatism (power-law distributed), inter-personal and group pressure, and a global field incorporating peer-to-peer and mass communications, which is generated bottom-up from the faction supporting the new opinion. A rich phase diagram appears separating possible terminal stages of the opinion diffusion, characterizing failure phases by the features of the individuals who had changed their opinion. An exhaustive solution of the model is produced, allowing predictions to be made on the opinion’s assimilation in the society.

  19. Búsqueda de recursos en redes peer-to-peer totalmente descentralizadas basada en redes neuronales artificiales

    OpenAIRE

    Corbalán, Leonardo César

    2014-01-01

    Las redes Peer-to-Peer (P2P) puras no estructuradas como Gnutella, dónde los nodos se conectan entre sí como pares o iguales, sin roles diferenciados ni jerarquías de ninguna clase, son sistemas distribuidos, dinámicos, sin punto alguno de centralización, que favorecen la robustez y tolerancia a fallos. Sin embargo, la búsqueda de recursos en estos sistemas constituye un problema esencial. El algoritmo de búsqueda BFS de Gnutella genera gran cantidad de tráfico dificultando su escalabilidad. ...

  20. Online peer-to-peer lending and its implications for small business credit financing in Norway

    OpenAIRE

    Brekke, Henrik; Hagerud, Simon

    2017-01-01

    Masteroppgave(MSc) in Master of Science in Business, Strategy - Handelshøyskolen BI, 2017 This thesis seeks to explore how the emergence of online peer-to-peer (P2P) lending will impact small businesses lending in Norway. Increasing attention has been drawn to small businesses and their apparent struggle to obtain appropriate credit financing. At the same time, online P2P lending, part of the new wave of financial technologies, has been held up as a potential remedy for this cr...

  1. Jornada “Usos i abusos del peer-to-peer

    Directory of Open Access Journals (Sweden)

    Raquel Xalabarder

    2010-07-01

    Full Text Available El 3 de desembre de 2009, els Estudis de Dret i Ciència Política de la Universitat Oberta de Catalunya (UOC, juntament amb l'Internet Interdisciplinary Institute (IN3, van organitzar la jornada "Usos i abusos del peer-to-peer", que va tenir lloc a la seu central de la UOC a Barcelona. La jornada la van coordinar els professors d'aquests Estudis integrants del grup de recerca Interdret de l'IN3.

  2. Online peer-to-peer lending and its implications for small business credit financing in Norway

    OpenAIRE

    Brekke, Henrik; Hagerud, Simon

    2017-01-01

    This thesis seeks to explore how the emergence of online peer-to-peer (P2P) lending will impact small businesses lending in Norway. Increasing attention has been drawn to small businesses and their apparent struggle to obtain appropriate credit financing. At the same time, online P2P lending, part of the new wave of financial technologies, has been held up as a potential remedy for this credit rationing. Our research involves two main parts. First, we study the extent to whi...

  3. PowerFolder – Peer-to-Peer powered Sync and Share

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    PowerFolder is a peer-to-peer (P2P) sync and share solution which started as spin-off from the University of Cologne and University of Applied Science Niederrhein in 2007. It is available as commercial and open-source solution and in use by hundreds of education and research organization and several thousand businesses. The software enables datacenter providers, NRENs or any education and research organization to operate its own PowerFolder cloud as alternative to public clouds while preserving the same end-user experience: Access to data anywhere on any device (Windows, Linux, Apple, Web, Android and iOS). While approaches to sync and share data from/to a single central location have several drawbacks the PowerFolder solution offers a unique peer-to-peer algorithm to replicate and transfer data between sites, users and devices with the freedom to choose whether to store or not to store files at the central hub. This is archived by intelligent; decentralize meta- and binary-data handling between nodes in a se...

  4. Providing interoperability of eHealth communities through peer-to-peer networks.

    Science.gov (United States)

    Kilic, Ozgur; Dogac, Asuman; Eichelberg, Marco

    2010-05-01

    Providing an interoperability infrastructure for Electronic Healthcare Records (EHRs) is on the agenda of many national and regional eHealth initiatives. Two important integration profiles have been specified for this purpose, namely, the "Integrating the Healthcare Enterprise (IHE) Cross-enterprise Document Sharing (XDS)" and the "IHE Cross Community Access (XCA)." IHE XDS describes how to share EHRs in a community of healthcare enterprises and IHE XCA describes how EHRs are shared across communities. However, the current version of the IHE XCA integration profile does not address some of the important challenges of cross-community exchange environments. The first challenge is scalability. If every community that joins the network needs to connect to every other community, i.e., a pure peer-to-peer network, this solution will not scale. Furthermore, each community may use a different coding vocabulary for the same metadata attribute, in which case, the target community cannot interpret the query involving such an attribute. Yet another important challenge is that each community may (and typically will) have a different patient identifier domain. Querying for the patient identifiers in the target community using patient demographic data may create patient privacy concerns. In this paper, we address each of these challenges and show how they can be handled effectively in a superpeer-based peer-to-peer architecture.

  5. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Science.gov (United States)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  6. Estimating Probability of Default on Peer to Peer Market – Survival Analysis Approach

    Directory of Open Access Journals (Sweden)

    Đurović Andrija

    2017-05-01

    Full Text Available Arguably a cornerstone of credit risk modelling is the probability of default. This article aims is to search for the evidence of relationship between loan characteristics and probability of default on peer-to-peer (P2P market. In line with that, two loan characteristics are analysed: 1 loan term length and 2 loan purpose. The analysis is conducted using survival analysis approach within the vintage framework. Firstly, 12 months probability of default through the cycle is used to compare riskiness of analysed loan characteristics. Secondly, log-rank test is employed in order to compare complete survival period of cohorts. Findings of the paper suggest that there is clear evidence of relationship between analysed loan characteristics and probability of default. Longer term loans are more risky than the shorter term ones and the least risky loans are those used for credit card payoff.

  7. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  8. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  9. A Preliminary Study of Peer-to-Peer Human-Robot Interaction

    Science.gov (United States)

    Fong, Terrence; Flueckiger, Lorenzo; Kunz, Clayton; Lees, David; Schreiner, John; Siegel, Michael; Hiatt, Laura M.; Nourbakhsh, Illah; Simmons, Reid; Ambrose, Robert

    2006-01-01

    The Peer-to-Peer Human-Robot Interaction (P2P-HRI) project is developing techniques to improve task coordination and collaboration between human and robot partners. Our work is motivated by the need to develop effective human-robot teams for space mission operations. A central element of our approach is creating dialogue and interaction tools that enable humans and robots to flexibly support one another. In order to understand how this approach can influence task performance, we recently conducted a series of tests simulating a lunar construction task with a human-robot team. In this paper, we describe the tests performed, discuss our initial results, and analyze the effect of intervention on task performance.

  10. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  11. MO-E-18C-01: Open Access Web-Based Peer-To-Peer Training and Education in Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Pawlicki, T [UC San Diego Medical Center, La Jolla, CA (United States); Brown, D; Dunscombe, P [Tom Baker Cancer Centre, Calgary, AB (Canada); Mutic, S [Washington University School of Medicine, Saint Louis, MO (United States)

    2014-06-15

    Purpose: Current training and education delivery models have limitations which result in gaps in clinical proficiency with equipment, procedures, and techniques. Educational and training opportunities offered by vendors and professional societies are by their nature not available at point of need or for the life of clinical systems. The objective of this work is to leverage modern communications technology to provide peer-to-peer training and education for radiotherapy professionals, in the clinic and on demand, as they undertake their clinical duties. Methods: We have developed a free of charge web site ( https://i.treatsafely.org ) using the Google App Engine and datastore (NDB, GQL), Python with AJAX-RPC, and Javascript. The site is a radiotherapy-specific hosting service to which user-created videos illustrating clinical or physics processes and other relevant educational material can be uploaded. Efficient navigation to the material of interest is provided through several RT specific search tools and videos can be scored by users, thus providing comprehensive peer review of the site content. The site also supports multilingual narration\\translation of videos, a quiz function for competence assessment and a library function allowing groups or institutions to define their standard operating procedures based on the video content. Results: The website went live in August 2013 and currently has over 680 registered users from 55 countries; 27.2% from the United States, 9.8% from India, 8.3% from the United Kingdom, 7.3% from Brazil, and 47.5% from other countries. The users include physicists (57.4%), Oncologists (12.5%), therapists (8.2%) and dosimetrists (4.8%). There are 75 videos to date including English, Portuguese, Mandarin, and Thai. Conclusion: Based on the initial acceptance of the site, we conclude that this open access web-based peer-to-peer tool is fulfilling an important need in radiotherapy training and education. Site functionality should expand in

  12. MO-E-18C-01: Open Access Web-Based Peer-To-Peer Training and Education in Radiotherapy

    International Nuclear Information System (INIS)

    Pawlicki, T; Brown, D; Dunscombe, P; Mutic, S

    2014-01-01

    Purpose: Current training and education delivery models have limitations which result in gaps in clinical proficiency with equipment, procedures, and techniques. Educational and training opportunities offered by vendors and professional societies are by their nature not available at point of need or for the life of clinical systems. The objective of this work is to leverage modern communications technology to provide peer-to-peer training and education for radiotherapy professionals, in the clinic and on demand, as they undertake their clinical duties. Methods: We have developed a free of charge web site ( https://i.treatsafely.org ) using the Google App Engine and datastore (NDB, GQL), Python with AJAX-RPC, and Javascript. The site is a radiotherapy-specific hosting service to which user-created videos illustrating clinical or physics processes and other relevant educational material can be uploaded. Efficient navigation to the material of interest is provided through several RT specific search tools and videos can be scored by users, thus providing comprehensive peer review of the site content. The site also supports multilingual narration\\translation of videos, a quiz function for competence assessment and a library function allowing groups or institutions to define their standard operating procedures based on the video content. Results: The website went live in August 2013 and currently has over 680 registered users from 55 countries; 27.2% from the United States, 9.8% from India, 8.3% from the United Kingdom, 7.3% from Brazil, and 47.5% from other countries. The users include physicists (57.4%), Oncologists (12.5%), therapists (8.2%) and dosimetrists (4.8%). There are 75 videos to date including English, Portuguese, Mandarin, and Thai. Conclusion: Based on the initial acceptance of the site, we conclude that this open access web-based peer-to-peer tool is fulfilling an important need in radiotherapy training and education. Site functionality should expand in

  13. Writing to Learn and Learning to Write across the Disciplines: Peer-to-Peer Writing in Introductory-Level MOOCs

    Directory of Open Access Journals (Sweden)

    Denise K. Comer

    2014-11-01

    Full Text Available This study aimed to evaluate how peer-to-peer interactions through writing impact student learning in introductory-level massive open online courses (MOOCs across disciplines. This article presents the results of a qualitative coding analysis of peer-to-peer interactions in two introductory level MOOCs: English Composition I: Achieving Expertise and Introduction to Chemistry. Results indicate that peer-to-peer interactions in writing through the forums and through peer assessment enhance learner understanding, link to course learning objectives, and generally contribute positively to the learning environment. Moreover, because forum interactions and peer review occur in written form, our research contributes to open distance learning (ODL scholarship by highlighting the importance of writing to learn as a significant pedagogical practice that should be encouraged more in MOOCs across disciplines.

  14. A Liberation Health Approach to Examining Challenges and Facilitators of Peer-to-Peer Human Milk Sharing.

    Science.gov (United States)

    McCloskey, Rebecca J; Karandikar, Sharvari

    2018-04-01

    Human milk sharing between peers is a common and growing practice. Although human milk has been unequivocally established as the ideal food source for infants, much stigma surrounds the practice of human milk sharing. Furthermore, there is little research examining peer-to-peer human milk sharing. Research Aim: We used the liberation health social work model to examine the experiences of mothers who have received donated human milk from a peer. Research questions were as follows: (a) What challenges do recipient mothers experience in peer-to-peer human milk sharing? (b) What supports do recipient mothers identify in peer-to-peer human milk sharing? Researchers conducted in-depth interviews with mothers ( N = 20) in the United States and Canada who were recipients of peer-to-peer human milk sharing. Researchers independently reviewed transcripts and completed open, axial, and selective coding. The authors discussed conflicts in theme identification until agreement was reached. Challenges to peer-to-peer human milk sharing were (a) substantial effort required to secure human milk; (b) institutional barriers; (c) milk bank specific barriers; and (d) lack of societal awareness and acceptance of human milk sharing. Facilitators included (a) informed decision making and transparency and (b) support from healthcare professionals. Despite risks and barriers, participants continued to pursue peer-to-peer human milk sharing. Informed by a liberation health framework, healthcare professionals-rather than universally discouraging human milk sharing between peers-should facilitate open dialogue with parents about the pros and cons of this practice and about screening recommendations to promote safety and mitigate risk.

  15. Employing peer-to-peer software distribution in ALICE Grid Services to enable opportunistic use of OSG resources

    CERN Multimedia

    CERN. Geneva; Sakrejda, Iwona

    2012-01-01

    The ALICE Grid infrastructure is based on AliEn, a lightweight open source framework built on Web Services and a Distributed Agent Model in which job agents are submitted onto a grid site to prepare the environment and pull work from a central task queue located at CERN. In the standard configuration, each ALICE grid site supports an ALICE-specific VO box as a single point of contact between the site and the ALICE central services. VO box processes monitor site utilization and job requests (ClusterMonitor), monitor dynamic job and site properties (MonaLisa), perform job agent submission (CE) and deploy job-specific software (PackMan). In particular, requiring a VO box at each site simplifies deployment of job software, done onto a shared file system at the site, and adds redundancy to the overall Grid system. ALICE offline computing, however, has also implemented a peer-to-peer method (based on BitTorrent) for downloading job software directly onto each worker node as needed. By utilizing both this peer-...

  16. Screening in new credit markets: can individual lenders infer borrower creditworthiness in peer-to-peer lending?

    NARCIS (Netherlands)

    Iyer, R.; Khwaja, A.I.; Luttmer, E.F.P.; Shue, K.

    2009-01-01

    The current banking crisis highlights the challenges faced in the traditional lending model, particularly in terms of screening smaller borrowers. The recent growth in online peer-to-peer lending marketplaces offers opportunities to examine different lending models that rely on screening by multiple

  17. Integrating International Students into Tertiary Education Using Intercultural Peer-to-Peer Training at Jacobs University Bremen, Germany

    Science.gov (United States)

    Binder, Nadine; Schreier, Margrit; Kühnen, Ulrich; Kedzior, Karina Karolina

    2013-01-01

    Increasing internationalization of higher education raises the question of how well institutions prepare their students to integrate into and benefit from cultural diversity on any university campus. The aim of this study was to assess an intercultural peer-to-peer training at Jacobs University Bremen, Germany, that aims to facilitate the…

  18. Partnerships Enhancing Practice: A Preliminary Model of Technology-Based Peer-to-Peer Evaluations of Teaching in Higher Education

    Science.gov (United States)

    Servilio, Kathryn L.; Hollingshead, Aleksandra; Hott, Brittany L.

    2017-01-01

    In higher education, current teaching evaluation models typically involve senior faculty evaluating junior faculty. However, there is evidence that peer-to-peer junior faculty observations and feedback may be just as effective. This descriptive case study utilized an inductive analysis to examine experiences of six special education early career…

  19. Wi-Fi Walkman : A wireless handhold that shares and recommends music on peer-to-peer networks

    NARCIS (Netherlands)

    Wang, J.; Reinders, M.J.T.; Pouwelse, J.; Lagendijk, R.L.

    2005-01-01

    The Wi-Fi walkman is a mobile multimedia application that we developed to investigate the technological and usability aspects of human-computer interaction with personalized, intelligent and context-aware wearable devices in peer-to-peer wireless environments such as the future home, office, or

  20. Peer-to-peer shadowing as a technique for the development of nurse middle managers clinical leadership : an explorative study

    NARCIS (Netherlands)

    Pieterbas Lalleman; G.A.C. Smid; J. Rasiah; J. Bouma; M.J. Schuurmans

    2017-01-01

    The purpose of this study was to explore the experiences and impact of peer-to-peer shadowing as a technique to develop nurse middle managers’ clinical leadership practices. A qualitative descriptive study was conducted to gain insight into the experiences of nurse middle managers using

  1. Effects of Script Training on the Peer-to-Peer Communication of Children with Autism Spectrum Disorder

    Science.gov (United States)

    Ledbetter-Cho, Katherine; Lang, Russell; Davenport, Katy; Moore, Melissa; Lee, Allyson; Howell, Alexandria; Drew, Christine; Dawson, Dana; Charlop, Marjorie H.; Falcomata, Terry; O'Reilly, Mark

    2015-01-01

    A multiple baseline design across participants was used to demonstrate the effects of a script-training procedure on the peer-to-peer communication of 3 children with autism spectrum disorder during group play with peers. Both scripted and unscripted initiations as well as responses to peers increased for all 3 participants. Stimulus…

  2. Peer-to-peer computing for secure high performance data copying

    International Nuclear Information System (INIS)

    Hanushevsky, A.; Trunov, A.; Cottrell, L.

    2001-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model--if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, the authors present the bbcp architecture, it's various features, and the reasons for their inclusion

  3. Competitive Status Signaling in Peer-to-Peer File-Sharing Networks

    Directory of Open Access Journals (Sweden)

    Henry F. Lyle

    2007-04-01

    Full Text Available Internet peer-to-peer file sharing is a contemporary example of asymmetrical sharing in which “altruists” (file uploaders share unconditionally with non-reciprocating “free riders” (file downloaders. Those who upload digital media files over the Internet risk prosecution for copyright infringement, and are more vulnerable to computer hackers and viruses. In an analysis of file-sharing behavior among university undergraduates (N=331, we found that significantly more males than females engaged in risky file uploading. Contrary to expectations, uploaders were not concerned about their reputation online and file sharers were not interested in identifying or chatting with uploaders while online. Among uploaders, males were more likely than females to be identified as uploaders by friends, to discuss uploading and to upload in the presence of peers. We interpret these results using costly-signaling theory, and argue that uploading is a costly signal in which males engage in avoidable risk taking as a means to compete for status among peers in social contexts other than the Internet.

  4. The Benefits of Peer-to-Peer Mentoring: Lessons from The Earth Science Women's Network (ESWN)

    Science.gov (United States)

    Holloway, T.; Steiner, A.; Fiore, A.; Hastings, M.; McKinley, G.; Staudt, A.; Wiedinmyer, C.

    2007-12-01

    The Earth Science Women's Network (ESWN) is a grassroots organization that began with the meeting of six women graduate students and recent Ph.D.s at the Spring 2002 AGU meeting in Washington, DC. Since then, the group has grown to over 400 members, completely by word of mouth. We provide an informal, peer-to-peer network developed to promote and support careers of women in the Earth sciences. Through the network, women have found jobs, established research collaborations, shared strategies on work/life balance, and built a community stretching around the world. We maintain an email list for members to develop an expanded peer network outside of their own institution, and we have recently launched a co-ed jobs list to benefit the wider geoscience community. We will present a summary of strategies that have been discussed by group members on how to transition to a new faculty position, build a research group, develop new research collaborations, and balance career and family.

  5. How Online Peer-to-Peer Conversation Shapes the Effects of a Message About Healthy Sleep.

    Science.gov (United States)

    Robbins, Rebecca; Niederdeppe, Jeff

    2017-02-01

    Conversation about health messages and campaigns is common, and message-related conversations are increasingly recognized as a consequential factor in shaping message effects. The evidence base is limited, however, about the conditions under which conversation may help or hinder health communication efforts. In this study, college students (N = 301) first watched a short sleep video and were randomly assigned to either talk with a partner in an online chat conversation or proceed directly to a short survey. Unknown to participants, the chat partner was a confederate coached to say positive things about sleep and the message ('positive' chat condition), negative things ('negative' chat condition), or unrelated things ('natural' chat condition). All respondents completed a short survey on beliefs about sleep, reactions to the message, and intentions to get adequate sleep. Respondents had greater intentions to engage in healthy sleep when they engaged in positive conversation following message exposure than when they engaged in negative conversation after the message (p chat perceptions were significant predictors (p < 0.05) of intentions to achieve healthy sleep. Health message designers may benefit from understanding how messages are exchanged in peer-to-peer conversation to better predict and explain their effects.

  6. Peer-to-Peer Computing for Secure High Performance Data Copying

    International Nuclear Information System (INIS)

    2002-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model -- if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, we preset the bbcp architecture, it's various features, and the reasons for their inclusion

  7. Aorta: a management layer for mobile peer-to-peer massive multiplayer games

    Science.gov (United States)

    Edlich, Stefan; Hoerning, Henrik; Brunnert, Andreas; Hoerning, Reidar

    2005-03-01

    The development of massive multiplayer games (MMPGs) for personal computers is based on a wide range of frameworks and technologies. In contrast, MMPG development for cell phones lacks the availability of framework support. We present Aorta as a multi-purpose lightweight MIDP 2.0 framework to support the transparent and equal API usage of peer-to-peer communication via http, IP and Bluetooth. Special experiments, such as load-tests on Nokia 6600s, have been carried out with Bluetooth support in using a server-as-client architecture to create ad-hoc networks by using piconet functionalities. Additionally, scatternet functionalities, which will be supported in upcoming devices, have been tested in a simulated environment on more than 12 cell phones. The core of the Aorta framework is the Etherlobby, which manages connections, peers, the game lobby, game policies and much more. The framework itself was developed to enable the fast development of mobile games, regardless of the distance between users, which might be within the schoolyard or much further away. The earliest market-ready application shown here is a multimedia game for cell phones utilizing all of the frameworks features. This game, called Micromonster, acts as platform for developer tests, as well as providing valuable information about interface usability and user acceptance.

  8. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  9. Le Peer to Peer: Vers un Nouveau Modèle de Civilisation

    Directory of Open Access Journals (Sweden)

    Michel Bauwens

    2006-06-01

    Full Text Available Le « peer to peer » est la dynamique intersubjective caractéristique des réseaux distribués. Le but de cet essai est de montrer qu’il s’agit d’une véritable nouvelle forme d’organisation sociale, apte à produire et échanger des biens, à créer de la valeur. Celle-ci est la conséquence d’un nouvel imaginaire social, et possède le potentiel de devenir le pilier d’un nouveau mode d’économie politique, voire d’un nouveau type de civilisation. Pour cela, nous allons d’abord définir le P2P, décrire en bref ces manifestations, et le différencier d’autres modalités d’échange intersubjectif tel que le marché, la hiérarchie, l’économie du don. Comme principale modalité P2P nous distinguons: Les processus de production P2P, comme troisième mode de production, qui n’est ni géré par un mode hiérarchique ou par l’état, ni répondant à des impératifs de profit ou qui sont modulés par le biais des prix. Les processus de gouvernance P2P, qui gouverne ces processus de production. Les formes de propriété P2P, qui sont destine a empecher l’appropriation prive de cette production pour le commun. Afin d’examiner les characteristiques de cette nouvelle dynamique sociale, nous utilisons la typologie intersubjective de l’anthropologue Alan Page Fisque, qui distingue: 1. l’échange égalitaire (Equality Matching, c..a.d l’economie du don. 2. La relation d’autorité (Authority Ranking tel qu’elle s’exprime dans le mode hierarchique. 3. le marché (Market Pricing. 4. la participation commune (Communal Shareholding. En conclusion, nous examinons les possibilites d’expansion de ce nouveau mode sociale et son insertion dans l’economie capitaliste, en nous nous posons la question: le P2P peut-il etre concu comme alternative sociale et economique aux modeles existants. Abstract: “Peer to peer” is hypothesized as a new social formation with intersubjective dynamics characteristic of distributed

  10. Peer-to-peer mentoring for individuals with early inflammatory arthritis: feasibility pilot.

    Science.gov (United States)

    Sandhu, Sharron; Veinot, Paula; Embuldeniya, Gayathri; Brooks, Sydney; Sale, Joanna; Huang, Sicong; Zhao, Alex; Richards, Dawn; Bell, Mary J

    2013-03-01

    To examine the feasibility and potential benefits of early peer support to improve the health and quality of life of individuals with early inflammatory arthritis (EIA). Feasibility study using the 2008 Medical Research Council framework as a theoretical basis. A literature review, environmental scan, and interviews with patients, families and healthcare providers guided the development of peer mentor training sessions and a peer-to-peer mentoring programme. Peer mentors were trained and paired with a mentee to receive (face-to-face or telephone) support over 12 weeks. Two academic teaching hospitals in Toronto, Ontario, Canada. Nine pairs consisting of one peer mentor and one mentee were matched based on factors such as age and work status. Mentee outcomes of disease modifying antirheumatic drugs (DMARDs)/biological treatment use, self-efficacy, self-management, health-related quality of life, anxiety, coping efficacy, social support and disease activity were measured using validated tools. Descriptive statistics and effect sizes were calculated to determine clinically important (>0.3) changes. Peer mentor self-efficacy was assessed using a self-efficacy scale. Interviews conducted with participants examined acceptability and feasibility of procedures and outcome measures, as well as perspectives on the value of peer support for individuals with EIA. Themes were identified through constant comparison. Mentees experienced improvements in the overall arthritis impact on life, coping efficacy and social support (effect size >0.3). Mentees also perceived emotional, informational, appraisal and instrumental support. Mentors also reported benefits and learnt from mentees' fortitude and self-management skills. The training was well received by mentors. Their self-efficacy increased significantly after training completion. Participants' experience of peer support was informed by the unique relationship with their peer. All participants were unequivocal about the need for

  11. MATIN: a random network coding based framework for high quality peer-to-peer live video streaming.

    Science.gov (United States)

    Barekatain, Behrang; Khezrimotlagh, Dariush; Aizaini Maarof, Mohd; Ghaeini, Hamid Reza; Salleh, Shaharuddin; Quintana, Alfonso Ariza; Akbari, Behzad; Cabrera, Alicia Triviño

    2013-01-01

    In recent years, Random Network Coding (RNC) has emerged as a promising solution for efficient Peer-to-Peer (P2P) video multicasting over the Internet. This probably refers to this fact that RNC noticeably increases the error resiliency and throughput of the network. However, high transmission overhead arising from sending large coefficients vector as header has been the most important challenge of the RNC. Moreover, due to employing the Gauss-Jordan elimination method, considerable computational complexity can be imposed on peers in decoding the encoded blocks and checking linear dependency among the coefficients vectors. In order to address these challenges, this study introduces MATIN which is a random network coding based framework for efficient P2P video streaming. The MATIN includes a novel coefficients matrix generation method so that there is no linear dependency in the generated coefficients matrix. Using the proposed framework, each peer encapsulates one instead of n coefficients entries into the generated encoded packet which results in very low transmission overhead. It is also possible to obtain the inverted coefficients matrix using a bit number of simple arithmetic operations. In this regard, peers sustain very low computational complexities. As a result, the MATIN permits random network coding to be more efficient in P2P video streaming systems. The results obtained from simulation using OMNET++ show that it substantially outperforms the RNC which uses the Gauss-Jordan elimination method by providing better video quality on peers in terms of the four important performance metrics including video distortion, dependency distortion, End-to-End delay and Initial Startup delay.

  12. MATIN: a random network coding based framework for high quality peer-to-peer live video streaming.

    Directory of Open Access Journals (Sweden)

    Behrang Barekatain

    Full Text Available In recent years, Random Network Coding (RNC has emerged as a promising solution for efficient Peer-to-Peer (P2P video multicasting over the Internet. This probably refers to this fact that RNC noticeably increases the error resiliency and throughput of the network. However, high transmission overhead arising from sending large coefficients vector as header has been the most important challenge of the RNC. Moreover, due to employing the Gauss-Jordan elimination method, considerable computational complexity can be imposed on peers in decoding the encoded blocks and checking linear dependency among the coefficients vectors. In order to address these challenges, this study introduces MATIN which is a random network coding based framework for efficient P2P video streaming. The MATIN includes a novel coefficients matrix generation method so that there is no linear dependency in the generated coefficients matrix. Using the proposed framework, each peer encapsulates one instead of n coefficients entries into the generated encoded packet which results in very low transmission overhead. It is also possible to obtain the inverted coefficients matrix using a bit number of simple arithmetic operations. In this regard, peers sustain very low computational complexities. As a result, the MATIN permits random network coding to be more efficient in P2P video streaming systems. The results obtained from simulation using OMNET++ show that it substantially outperforms the RNC which uses the Gauss-Jordan elimination method by providing better video quality on peers in terms of the four important performance metrics including video distortion, dependency distortion, End-to-End delay and Initial Startup delay.

  13. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  14. Beyond Music Sharing: An Evaluation of Peer-to-Peer Data Dissemination Techniques in Large Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Ripeanu, Matei [University of British Columbia, Vancouver; Al-Kiswany, Samer [University of British Columbia, Vancouver; Iamnitchi, Adriana [University of South Florida, Tampa; Vazhkudai, Sudharshan S [ORNL

    2009-03-01

    The avalanche of data from scientific instruments and the ensuing interest from geographically distributed users to analyze and interpret it accentuates the need for efficient data dissemination. A suitable data distribution scheme will find the delicate balance between conflicting requirements of minimizing transfer times, minimizing the impact on the network, and uniformly distributing load among participants. We identify several data distribution techniques, some successfully employed by today's peer-to-peer networks: staging, data partitioning, orthogonal bandwidth exploitation, and combinations of the above. We use simulations to explore the performance of these techniques in contexts similar to those used by today's data-centric scientific collaborations and derive several recommendations for efficient data dissemination. Our experimental results show that the peer-to-peer solutions that offer load balancing and good fault tolerance properties and have embedded participation incentives lead to unjustified costs in today's scientific data collaborations deployed on over-provisioned network cores. However, as user communities grow and these deployments scale, peer-to-peer data delivery mechanisms will likely outperform other techniques.

  15. Care pathways in thrombosis management: the INNOVATE peer-to-peer educational initiative

    Directory of Open Access Journals (Sweden)

    Patel RK

    2017-03-01

    Full Text Available Raj K Patel King’s College Hospital, London, UK Context: Anticoagulant options for the management of venous thromboembolism (VTE now include the non-vitamin K antagonist oral anticoagulants (NOACs. The safe and effective integration of these agents into routine clinical practice within different health care settings presents common challenges. Bayer AG created the INternational Network fOr Venous and Arterial Thrombosis Excellence in practice (INNOVATE program as a professional education network to foster best practice in thrombosis management in the NOAC era.Concept and format: Since 2013, INNOVATE has been run as a series of educational 1.5‑day global meetings at VTE centers of excellence. The format is based on expert-led discussion rather than lectures; all participants are encouraged to share their own expertise and experience. Through peer-to-peer exchange, less experienced professionals from an array of specialties learn from others in a small-group interactive setting. This format encourages positive engagement and discussion, and the establishment of relationships between health care professionals from different countries.Expansion and localization: INNOVATE has successfully expanded to cover a broad spectrum of thromboembolic disorders in which anticoagulation with NOACs plays an important role; now including specific meetings focusing on the management of patients in the community. Local meetings are run in many countries in the local language, facilitating discussion and ensuring applicability to local or regional issues.Implementing learnings: INNOVATE delegates have provided consistently positive feedback and have used their attendance to create and improve thrombosis management pathways in their own institutions. Overseen by a Steering Committee, the program responds to feedback, evolving to meet the needs of participants.Conclusion: By showcasing best practice in the care of patients requiring anticoagulation, INNOVATE

  16. Le Peer to Peer: Vers un Nouveau Modèle de Civilization

    Directory of Open Access Journals (Sweden)

    Michel Bauwens

    2006-06-01

    Full Text Available Le « peer to peer » est la dynamique intersubjective caractéristique des réseaux distribués. Le but de cet essai est de montrer qu'il s'agit d'une véritable nouvelle forme d’organisation sociale, apte à produire et échanger des biens, à créer de la valeur. Celle-ci est la conséquence d'un nouvel imaginaire social, et possède le potentiel de devenir le pilier d'un nouveau mode d'économie politique, voire d'un nouveau type de civilisation. Pour cela, nous allons d'abord définir le P2P, décrire en bref ces manifestations, et le différencier d'autres modalités d'échange intersubjectif tel que le marché, la hiérarchie, l'économie du don.Comme principale modalité P2P nous distinguons: Les processus de production P2P, comme troisième mode de production, qui n'est ni géré par un mode hiérarchique ou par l'état, ni répondant à des impératifs de profit ou qui sont modulés par le biais des prix. Les processus de gouvernance P2P, qui gouverne ces processus de production. Les formes de propriété P2P, qui sont destine a empecher l’appropriation prive de cette production pour le commun.Afin d’examiner les characteristiques de cette nouvelle dynamique sociale, nous utilisons la typologie intersubjective de l’anthropologue Alan Page Fisque, qui distingue: 1. l'échange égalitaire (Equality Matching, c..a.d l’economie du don. 2. La relation d’autorité (Authority Ranking tel qu’elle s’exprime dans le mode hierarchique. 3. le marché (Market Pricing. 4. la participation commune (Communal Shareholding.En conclusion, nous examinons les possibilites d’expansion de ce nouveau mode sociale et son insertion dans l’economie capitaliste, en nous nous posons la question: le P2P peut-il etre concu comme alternative sociale et economique aux modeles existants.

  17. Peer-to-peer mentoring for individuals with early inflammatory arthritis: feasibility pilot

    Science.gov (United States)

    Sandhu, Sharron; Veinot, Paula; Embuldeniya, Gayathri; Brooks, Sydney; Sale, Joanna; Huang, Sicong; Zhao, Alex; Richards, Dawn; Bell, Mary J

    2013-01-01

    Objectives To examine the feasibility and potential benefits of early peer support to improve the health and quality of life of individuals with early inflammatory arthritis (EIA). Design Feasibility study using the 2008 Medical Research Council framework as a theoretical basis. A literature review, environmental scan, and interviews with patients, families and healthcare providers guided the development of peer mentor training sessions and a peer-to-peer mentoring programme. Peer mentors were trained and paired with a mentee to receive (face-to-face or telephone) support over 12 weeks. Setting Two academic teaching hospitals in Toronto, Ontario, Canada. Participants Nine pairs consisting of one peer mentor and one mentee were matched based on factors such as age and work status. Primary outcome measure Mentee outcomes of disease modifying antirheumatic drugs (DMARDs)/biological treatment use, self-efficacy, self-management, health-related quality of life, anxiety, coping efficacy, social support and disease activity were measured using validated tools. Descriptive statistics and effect sizes were calculated to determine clinically important (>0.3) changes. Peer mentor self-efficacy was assessed using a self-efficacy scale. Interviews conducted with participants examined acceptability and feasibility of procedures and outcome measures, as well as perspectives on the value of peer support for individuals with EIA. Themes were identified through constant comparison. Results Mentees experienced improvements in the overall arthritis impact on life, coping efficacy and social support (effect size >0.3). Mentees also perceived emotional, informational, appraisal and instrumental support. Mentors also reported benefits and learnt from mentees’ fortitude and self-management skills. The training was well received by mentors. Their self-efficacy increased significantly after training completion. Participants’ experience of peer support was informed by the unique

  18. Peer-to-Peer Consultations: Ancillary Services Peer Exchange with India: Experience from South Africa, Europe & the United States (Fact Sheet)

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-01

    In support of national and subnational decision makers, the 21st Century Power Partnership regularly works with country partners to organize peer-to-peer consultations on critical issues. In March 2014, 21CPP collaborated with the Regulatory Assistance Project - India to host two peer-to-peer exchanges among experts from India, South Africa, Europe, and the United States to discuss the provision of ancillary services, particularly in the context of added variability and uncertainty from renewable energy. This factsheet provides a high level summary of the peer-to-peer consultation.

  19. Peer To Peer-utlåning i Sverige : En komparativ studie mellan bankutlåning och Peer To Peer-utlåning på den svenska konsumentkreditmarknaden

    OpenAIRE

    Edman, Lars; Kaltea, Kristofer

    2015-01-01

    Background: Peer to peer lending has in recent years emerged and become a popular way to borrow money, mostly in the US and the UK. Since the first company was established in 2005, several competitors have emerged, and P2P lending has grown on average by 84 % quarterly between the second quarter year 2007 and the second quarter year 2014 in the US. Lending Club, which is the largest player within P2P-lending, has since its start in 2008 carried loans of a total value of six billions USD. Aim:...

  20. Autenticación de contenidos y control de acceso en redes peer-to-peer puras

    OpenAIRE

    Palomar González, Esther

    2011-01-01

    Esta tesis doctoral se enmarca dentro del área de investigación de la seguridad en entornos Peer-to-Peer (P2P) totalmente descentralizados (también denominados puros.) En particular, el objetivo principal de esta tesis doctoral es definir, analizar e implementar un esquema para la distribución segura de los contenidos compartidos. En este trabajo de tesis se han realizado importantes avances e innovadoras aportaciones enfocadas a garantizar que el contenido compartido es auténtico; es decir, ...

  1. The 60 Days of PVE Campaign: Lessons on Organizing an Online, Peer-to-Peer, Counter-radicalization Program

    Directory of Open Access Journals (Sweden)

    Alex Wilner

    2017-09-01

    Full Text Available Combatting violent extremism can involve organizing Peer-to-Peer (P2P preventing violent extremism (PVE programs and social media campaigns. While hundreds of PVE campaigns have been launched around the world in recent months and years, very few of these campaigns have actually been reviewed, analyzed, or assessed in any systematic way. Metrics of success and failure have yet to be fully developed, and very little is publically known as to what might differentiate a great and successful P2P campaign from a mediocre one. This article will provide first-hand insight on orchestrating a publically funded, university-based, online, peer-to-peer PVE campaign – 60 Days of PVE – based on the experience of a group of Canadian graduate students. The article provides an account of the group’s approach to PVE. It highlights the entirety of the group’s campaign, from theory and conceptualization to branding, media strategy, and evaluation, and describes the campaign’s core objectives and implementation. The article also analyzes the campaign’s digital footprint and reach using data gleamed from social media. Finally, the article discusses the challenges and difficulties the group faced in running their campaign, lessons that are pertinent for others contemplating a similar endeavour.

  2. Beauty premium: Event-related potentials evidence of how physical attractiveness matters in online peer-to-peer lending.

    Science.gov (United States)

    Jin, Jia; Fan, Bonai; Dai, Shenyi; Ma, Qingguo

    2017-02-15

    Although it is well known that attractiveness-based impressions affect the labor market, election outcomes and many other social activities, little is known about the role physical attractiveness plays in financial transactions. With the development of online finance, peer-to-peer lending has become one of the most important ways in which businesses or individuals raise capital. However, because of information asymmetry, the lender must decide whether or not to lend money to a stranger based on limited information, resulting in their decision being influenced by many other factors. In the current study, we investigated how potential borrowers' facial attractiveness influenced lenders' attitudes toward borrowers' repayment behavior at the brain level by using event-related potentials. At the priming stage, photos of attractive borrowers induced smaller N200 amplitude than photos of unattractive borrowers. Meanwhile, at the feedback stage, compared with the condition of repaying on time, breach of repayment from unattractive borrowers induced larger feedback-related negativity (FRN) amplitude, which was a frontal-central negative deflection and would be enhanced by the unexpected outcome. Furthermore, smaller P300 amplitude was also elicited by the condition of not repaying on time. These differences in the FRN and P300 amplitudes were not observed between negative and positive feedback from attractive borrowers. Therefore, our findings suggest that the beauty premium phenomenon is present in online peer-to-peer lending and that lenders were more tolerant toward attractive borrowers' dishonest behavior. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Online Peer-to-Peer Communities in the Daily Lives of People With Chronic Illness: A Qualitative Systematic Review.

    Science.gov (United States)

    Kingod, Natasja; Cleal, Bryan; Wahlberg, Ayo; Husted, Gitte R

    2017-01-01

    This qualitative systematic review investigated how individuals with chronic illness experience online peer-to-peer support and how their experiences influence daily life with illness. Selected studies were appraised by quality criteria focused upon research questions and study design, participant selection, methods of data collection, and methods of analysis. Four themes were identified: (a) illness-associated identity work, (b) social support and connectivity, (c) experiential knowledge sharing, and (d) collective voice and mobilization. Findings indicate that online peer-to-peer communities provide a supportive space for daily self-care related to chronic illness. Online communities provided a valued space to strengthen social ties and exchange knowledge that supported offline ties and patient-doctor relationships. Individuals used online communities to exchange experiential knowledge about everyday life with illness. This type of knowledge was perceived as extending far beyond medical care. Online communities were also used to mobilize and raise collective awareness about illness-specific concerns. © The Author(s) 2016.

  4. Regulating peer-to-peer network currency : Lessons from Napster and payment Systems

    NARCIS (Netherlands)

    Kasiyanto, Safari

    2015-01-01

    It was only yesterday when the central banks across the world shared a similar concerns about the rise of e-money as a ‘new’ form of money. Theoretically, e-money as a network good has the potential to achieve a position necessary to replace traditional money. If this happens, the central bank’s

  5. An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols

    Science.gov (United States)

    2009-03-01

    that they term BLINd Classification (BLINC) [KPF05]. This classification framework attempts to characterize network flows on three levels: The social...Cohen. The BitTorrent Protocol Specification, February 2008. http://www.bittorrent.org/ beps / bep 0003.html. Cor05. CounterPath Corporation. Xten

  6. Adult Willingness to Use Email and Social Media for Peer-to-Peer Cancer Screening Communication: Quantitative Interview Study.

    Science.gov (United States)

    Cutrona, Sarah L; Roblin, Douglas W; Wagner, Joann L; Gaglio, Bridget; Williams, Andrew E; Torres Stone, Rosalie; Field, Terry S; Mazor, Kathleen M

    2013-11-28

    Adults over age 40 are increasing their use of email and social media, raising interest in use of peer-to-peer Internet-based messaging to promote cancer screening. The objective of our study was to assess current practices and attitudes toward use of email and other e-communication for peer-to-peer dialogues on cancer screening. We conducted in-person interviews with 438 insured adults ages 42-73 in Georgia, Hawaii, and Massachusetts. Participants reported on use of email and other e-communication including social media to discuss with peers routine health topics including breast and colorectal cancer (CRC). We ascertained willingness to share personal CRC screening experiences via conversation, postcard, email, or other e-communication. Health literacy scores were measured. Email had been used by one-third (33.8%, 148/438) to discuss routine health topics, by 14.6% (64/438) to discuss breast cancer screening, and by 12.6% (55/438) to discuss CRC screening. Other e-communication was used to discuss routine health topics (11.6%, 51/438), screening for breast cancer (3.9%, 17/438), and CRC (2.3%, 10/438). In the preceding week, 84.5% (370/438) of participants had used email, 55.9% (245/438) had used e-communication of some type; 44.3% (194/438) text, 32.9% (144/438) Facebook, 12.3% (54/438) instant message, 7.1% (31/438) video chat, and 4.8% (21/438) Twitter. Many participants were willing to share their CRC screening experiences via email (32.4%, 142/438 might be willing; 36.3%, 159/438 very willing) and via other e-communication (15.8%, 69/438 might be willing; 14.4%, 63/438 very willing). Individuals willing to send CRC screening emails scored significantly higher on tests of health literacy compared to those willing to send only postcards (Pcommunication to promote cancer screening to peers. Optimal approaches for encouraging peer-to-peer transmission of accurate and appropriate cancer screening messages must be studied.

  7. Effective peer-to-peer support for young people with end-stage renal disease: a mixed methods evaluation of Camp COOL

    Science.gov (United States)

    2013-01-01

    Background The Camp COOL programme aims to help young Dutch people with end-stage renal disease (ESRD) develop self-management skills. Fellow patients already treated in adult care (hereafter referred to as ‘buddies’) organise the day-to-day program, run the camp, counsel the attendees, and also participate in the activities. The attendees are young people who still have to transfer to adult care. This study aimed to explore the effects of this specific form of peer-to-peer support on the self-management of young people (16–25 years) with ESRD who participated in Camp COOL (CC) (hereafter referred to as ‘participants’). Methods A mixed methods research design was employed. Semi-structured interviews (n = 19) with initiators/staff, participants, and healthcare professionals were conducted. These were combined with retrospective and pre-post surveys among participants (n = 62), and observations during two camp weeks. Results Self-reported effects of participants were: increased self-confidence, more disease-related knowledge, feeling capable of being more responsible and open towards others, and daring to stand up for yourself. According to participants, being a buddy or having one positively affected them. Self-efficacy of attendees and independence of buddies increased, while attendees’ sense of social inclusion decreased (measured as domains of health-related quality of life). The buddy role was a pro-active combination of being supervisor, advisor, and leader. Conclusions Camp COOL allowed young people to support each other in adjusting to everyday life with ESRD. Participating in the camp positively influenced self-management in this group. Peer-to-peer support through buddies was much appreciated. Support from young adults was not only beneficial for adolescent attendees, but also for young adult buddies. Paediatric nephrologists are encouraged to refer patients to CC and to facilitate such initiatives. Together with nephrologists in adult

  8. Delay-sensitive content distribution via peer-to-peer collaboration in public safety vehicular ad-hoc networks

    KAUST Repository

    Atat, Rachad; Yaacoub, Elias E.; Alouini, Mohamed-Slim; Filali, Fethi; Abu-Dayya, Adnan A.

    2014-01-01

    Delay-sensitive content distribution with peer-to-peer (P2P) cooperation in public safety vehicular networks is investigated. Two cooperative schemes are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range (LR) communications with the base station (BS) and IEEE 802.11p is considered for inter-vehicle collaboration on the short range (SR). The first scheme is shown to outperform non-cooperative unicasting and multicasting, while the second scheme outperforms non-cooperative unicasting beyond a specific number of cooperating vehicles, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2014 Elsevier B.V. All rights reserved.

  9. KaZaA and similar Peer-to-Peer (P2P) file-sharing applications

    CERN Multimedia

    2003-01-01

    Personal use of Peer-to-Peer (P2P) file sharing applications is NOT permitted at CERN. A non-exhaustive list of such applications, popular for exchanging music, videos, software etc, is: KaZaA, Napster, Gnutella, Edonkey2000, Napigator, Limewire, Bearshare, WinMX, Aimster, Morpheus, BitTorrent, ... You are reminded that use of CERN's Computing Facilities is governed by CERN's Computing Rules (Operational Circular No 5). They require that all users of CERN's Computing Facilities respect copyright, license and confidentiality agreements for data of any form (software, music, videos, etc). Sanctions are applicable in case of non-respect of the Computing Rules. Further details on restrictions for P2P applications are at: http://cern.ch/security/file-sharing CERN's Computing Rules are at: http://cern.ch/ComputingRules Denise Heagerty, CERN Computer Security Officer, Computer.Security@cern.ch

  10. Delay-sensitive content distribution via peer-to-peer collaboration in public safety vehicular ad-hoc networks

    KAUST Repository

    Atat, Rachad

    2014-05-01

    Delay-sensitive content distribution with peer-to-peer (P2P) cooperation in public safety vehicular networks is investigated. Two cooperative schemes are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range (LR) communications with the base station (BS) and IEEE 802.11p is considered for inter-vehicle collaboration on the short range (SR). The first scheme is shown to outperform non-cooperative unicasting and multicasting, while the second scheme outperforms non-cooperative unicasting beyond a specific number of cooperating vehicles, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2014 Elsevier B.V. All rights reserved.

  11. An Online, Moderated Peer-to-Peer Support Bulletin Board for Depression: User-Perceived Advantages and Disadvantages.

    Science.gov (United States)

    Griffiths, Kathleen Margaret; Reynolds, Julia; Vassallo, Sara

    2015-01-01

    Online, peer-to-peer support groups for depression are common on the World Wide Web and there is some evidence of their effectiveness. However, little is known about the mechanisms by which Internet support groups (ISGs) might work. This study aimed to investigate consumer perceptions of the benefits and disadvantages of online peer-to-peer support by undertaking a content analysis of the spontaneous posts on BlueBoard, a well-established, moderated, online depression bulletin board. The research set comprised all posts on the board (n=3645) for each of 3 months selected at 4 monthly intervals over 2011. The data were analyzed using content analysis and multiple coders. A total of 586 relevant posts were identified, 453 (77.3%) reporting advantages and 133 (22.7%) reporting disadvantages. Positive personal change (335/453, 74.0%) and valued social interactions and support (296/453, 65.3%) emerged as perceived advantages. Other identified benefits were valued opportunities to disclose/express feelings or views (29/453, 6.4%) and advantages of the BlueBoard environment (45/453, 9.9%). Disadvantages were negative personal change (50/133, 37.6%), perceived disadvantages of board rules/moderation (42/133, 31.6%), unhelpful social interactions/contact with other members (40/133, 30.1%), and technical obstacles to using the board (14/133, 10.5%). Consumers value the opportunity to participate in an online mutual support group for mental health concerns. Further research is required to better understand how and if these perceived advantages translate into positive outcomes for consumers, and whether the perceived disadvantages of such boards can be addressed without compromising the safety and positive outcomes of the board.

  12. The third-year medical student "grapevine": managing transitions between third-year clerkships using peer-to-peer handoffs.

    Science.gov (United States)

    Masters, Dylan E; O'Brien, Bridget C; Chou, Calvin L

    2013-10-01

    As third-year medical students rotate between clerkships, they experience multiple transitions across workplace cultures and shifting learning expectations. The authors explored clerkship transitions from the students' perspective by examining the advice they passed on to their peers in preparation for new clerkships. Seventy-one students from three Veterans Affairs-based clerkship rotations at the University of California, San Francisco, School of Medicine participated in a peer-to-peer handoff session from 2008 to 2011. In the handoff session, they gave tips for optimizing performance to students starting the clerkship they had just completed. The authors transcribed student comments from four handoff sessions and used qualitative content analysis to identify and compare advice across clerkships. Students shared advice about workplace culture, content learning, logistics, and work-life balance. Common themes included expectations of the rotation, workplace norms, specific tasks, learning opportunities, and learning strategies. Comments about patient care and work-life balance were rare. Students emphasized different themes for each clerkship; for example, for some clerkships, students commented heavily on tasks and content learning, while in another students focused on workplace culture and exam preparation. These findings characterize the transitions that third-year students undergo as they rotate into new clinical training environments. Students emphasized different aspects of each clerkship in the advice they passed to their peers, and their comments often describe informal norms or opportunities that official clerkship orientations may not address. Peer-to-peer handoffs may help ease transitions between clerkships with dissimilar cultures and expectations.

  13. Capturing the Flatness of a peer-to-peer lending network through random and selected perturbations

    Science.gov (United States)

    Karampourniotis, Panagiotis D.; Singh, Pramesh; Uparna, Jayaram; Horvat, Emoke-Agnes; Szymanski, Boleslaw K.; Korniss, Gyorgy; Bakdash, Jonathan Z.; Uzzi, Brian

    Null models are established tools that have been used in network analysis to uncover various structural patterns. They quantify the deviance of an observed network measure to that given by the null model. We construct a null model for weighted, directed networks to identify biased links (carrying significantly different weights than expected according to the null model) and thus quantify the flatness of the system. Using this model, we study the flatness of Kiva, a large international crownfinancing network of borrowers and lenders, aggregated to the country level. The dataset spans the years from 2006 to 2013. Our longitudinal analysis shows that flatness of the system is reducing over time, meaning the proportion of biased inter-country links is growing. We extend our analysis by testing the robustness of the flatness of the network in perturbations on the links' weights or the nodes themselves. Examples of such perturbations are event shocks (e.g. erecting walls) or regulatory shocks (e.g. Brexit). We find that flatness is unaffected by random shocks, but changes after shocks target links with a large weight or bias. The methods we use to capture the flatness are based on analytics, simulations, and numerical computations using Shannon's maximum entropy. Supported by ARL NS-CTA.

  14. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    Science.gov (United States)

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  15. EvAg: A Scalable Peer-to-Peer Evolutionary Algorithm

    NARCIS (Netherlands)

    Laredo, J.L.J.; Eiben, A.E.; van Steen, M.R.; Merelo, J.J.

    2010-01-01

    This paper studies the scalability of an Evolutionary Algorithm (EA) whose population is structured by means of a gossiping protocol and where the evolutionary operators act exclusively within the local neighborhoods. This makes the algorithm inherently suited for parallel execution in a

  16. Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables

    Science.gov (United States)

    Legtchenko, Sergey; Monnet, Sébastien; Sens, Pierre; Muller, Gilles

    DHT-based P2P systems provide a fault-tolerant and scalable mean to store data blocks in a fully distributed way. Unfortunately, recent studies have shown that if connection/disconnection frequency is too high, data blocks may be lost. This is true for most current DHT-based system's implementations. To avoid this problem, it is necessary to build really efficient replication and maintenance mechanisms. In this paper, we study the effect of churn on an existing DHT-based P2P system such as DHash or PAST. We then propose solutions to enhance churn tolerance and evaluate them through discrete event simulations.

  17. Using Social Media to Expand Peer-to-Peer Discussion in an Online Course about Regional Climate Modeling

    Science.gov (United States)

    Yarker, M. B.; Mesquita, M. D. S.

    2015-12-01

    The goal of this project is to make knowledge about regional climate modeling accessible to anyone in any location, regardless of their resources. We accomplish this through the development of a free online course, which introduces novice model users to an educational version of the Weather Research and Forecasting model (e-WRF). These courses are grounded in education theory and have been described in detail at prior AGU meetings (Kelsey et al. 2014, Walton et al. 2014, Yarker & Mesquita 2013). Research indicates that effective dialogue is an important component for successful learning to occur and displays the following elements: asking complex questions, deep discussion, and use of evidence to construct arguments (Benus et al. 2013). These can happen between the student and tutor, but peer-to-peer interaction is especially important as well as the most difficult aspect of social constructivism to meet, especially in an online setting. In our online courses, standard course forums were underutilized and generally only used to ask the tutor clarifying questions or troubleshoot error messages. To rectify this problem, we began using social media to facilitate conversation and notice vast improvement in peer-to-peer communication. Moreover, we created a community of over 700 regional climate modelers from around the world, sharing information, asking questions, and creating research projects relating to climate change. Data was gathered by qualitatively analyzing forum and Facebook posts and quantitatively analyzing survey data from participants in both courses. Facebook participants posted on the group more often about a wider variety of topics than the forum participants. Additionally, there were statistically significant increase ('student' t test and Mann-Whitney test) in the elements of effective dialogue. We conclude that social media can serve as a possible tool in the development of online learning, especially for difficult concepts like regional climate

  18. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  19. "I'm Not Here to Learn How to Mark Someone Else's Stuff": An Investigation of an Online Peer-to-Peer Review Workshop Tool

    Science.gov (United States)

    Wilson, Michael John; Diao, Ming Ming; Huang, Leon

    2015-01-01

    In this article, we explore the intersecting concepts of fairness, trust and temporality in relation to the implementation of an online peer-to-peer review Moodle Workshop tool at a Sydney metropolitan university. Drawing on qualitative interviews with unit convenors and online surveys of students using the Workshop tool, we seek to highlight a…

  20. Peer-to-Peer Human-Robot Interaction for Space Exploration

    Science.gov (United States)

    Fong, Terrence; Nourbakhsh, Illah

    2004-01-01

    NASA has embarked on a long-term program to develop human-robot systems for sustained, affordable space exploration. To support this mission, we are working to improve human-robot interaction and performance on planetary surfaces. Rather than building robots that function as glorified tools, our focus is to enable humans and robots to work as partners and peers. In this paper. we describe our approach, which includes contextual dialogue, cognitive modeling, and metrics-based field testing.

  1. The Paradoxes of Distributed Trust: Peer-to-Peer Architecture and User Confidence in Bitcoin

    OpenAIRE

    Mallard , Alexandre; Méadel , Cécile; Musiani , Francesca

    2014-01-01

    International audience; The decentralized electronic currency system Bitcoin gives the possibility to execute transactions via direct communication between users, without the need to resort to third parties entrusted with legitimizing the concerned monetary value. In its current state of development - a recent, fast-changing, volatile and highly mediatized technology - the discourses that unfold within spaces of information and discussion related to Bitcoin can be analysed in light of their a...

  2. Knowledge Transfer Project: Cultivating Smart Energy Solutions through Dynamic Peer-to-Peer Learning

    Energy Technology Data Exchange (ETDEWEB)

    2018-05-01

    As energy policy makers and professionals convene in the Oresund region for the 9th Annual Clean Energy Ministerial (CEM9), the global community is as united as ever around the common goal of accelerating the transition to global clean energy. Through sustained collective effort and thought leadership, CEM partners and stakeholders are systematically addressing the barriers to the widescale deployment of clean energy technologies. Pivotal to their progress is the efficient sharing and dissemination of knowledge. To address that need, the CEM-initiative International SmartGrid Action Network (ISGAN) launched the Knowledge Transfer Project (KTP) in March 2016 to capture, collect, and share knowledge about smart grid technologies among countries and key stakeholders. Building on ISGAN's experience with delivering deep-dive workshops, the KTP fosters meaningful international dialogue on smart grids with a focus on developing competence and building capacity. After a successful 2016 pilot project and two consecutive projects, each with a different focus and structure, the KTP has become an established practice that can support existing ISGAN or CEM initiatives. To accommodate different purposes, needs, and practical circumstances, ISGAN has adopted three basic models for delivering KTP workshops: Country-Centric, Multilateral, and Hybrid. This fact sheet describes each approach through case studies of workshops in Mexico, India, and Belgium, and invites new ideas and partners for future KTPs.

  3. Cyberbullying or Cyber Aggression?: A Review of Existing Definitions of Cyber-Based Peer-to-Peer Aggression

    Directory of Open Access Journals (Sweden)

    Lucie Corcoran

    2015-03-01

    Full Text Available Due to the ongoing debate regarding the definitions and measurement of cyberbullying, the present article critically appraises the existing literature and offers direction regarding the question of how best to conceptualise peer-to-peer abuse in a cyber context. Variations across definitions are problematic as it has been argued that inconsistencies with regard to definitions result in researchers examining different phenomena, whilst the absence of an agreed conceptualisation of the behaviour(s involved hinders the development of reliable and valid measures. Existing definitions of cyberbullying often incorporate the criteria of traditional bullying such as intent to harm, repetition, and imbalance of power. However, due to the unique nature of cyber-based communication, it can be difficult to identify such criteria in relation to cyber-based abuse. Thus, for these reasons cyberbullying may not be the most appropriate term. Rather than attempting to “shoe-horn” this abusive behaviour into the preconceived conceptual framework that provides an understanding of traditional bullying, it is timely to take an alternative approach. We argue that it is now time to turn our attention to the broader issue of cyber aggression, rather than persist with the narrow focus that is cyberbullying.

  4. A Peer-to-Peer Mentoring Program for In-Center Hemodialysis: A Patient-Centered Quality Improvement Program.

    Science.gov (United States)

    St Clair Russell, Jennifer; Southerland, Shiree; Huff, Edwin D; Thomson, Maria; Meyer, Klemens B; Lynch, Janet R

    2017-01-01

    A patient-centered quality improvement program implemented in one Virginia hemodialysis facility sought to determine if peer-to-peer (P2P) programs can assist patients on in-center hemodialysis with self-management and improve outcomes. Using a single-arm, repeatedmeasurement, quasi-experimental design, 46 patients participated in a four-month P2P intervention. Outcomes include knowledge, self-management behaviors, and psychosocial health indicators: self-efficacy, perceived social support, hemodialysis social support, and healthrelated quality of life (HRQoL). Physiological health indicators included missed and shortened treatments, arteriovenous fistula placement, interdialytic weight gain, serum phosphorus, and hospitalizations. Mentees demonstrated increased knowledge, self-efficacy, perceived social support, hemodialysis social support, and HRQoL. Missed treatments decreased. Mentors experienced increases in knowledge, self-management, and social support. A P2P mentoring program for in-center hemodialysis can benefit both mentees and mentors. Copyright© by the American Nephrology Nurses Association.

  5. Peer-to-Peer Mentoring for African American Women With Lupus: A Feasibility Pilot.

    Science.gov (United States)

    Williams, Edith M; Hyer, J Madison; Viswanathan, Ramakrishnan; Faith, Trevor D; Voronca, Delia; Gebregzaibher, Mulugeta; Oates, Jim C; Egede, Leonard

    2018-06-01

    To examine the feasibility and potential benefits of peer mentoring to improve the disease self-management and quality of life of individuals with systemic lupus erythematosus (SLE). Peer mentors were trained and paired with up to 3 mentees to receive self-management education and support by telephone over 12 weeks. This study took place at an academic teaching hospital in Charleston, South Carolina. Seven quads consisting of 1 peer mentor and 3 mentees were matched, based on factors such as age, area of residence, and marital and work status. Mentee outcomes of self-management, health-related quality of life, and disease activity were measured using validated tools at baseline, mid-intervention, and post-intervention. Descriptive statistics and effect sizes were calculated to determine clinically important (>0.3) changes from baseline. Mentees showed trends toward lower disease activity (P = 0.004) and improved health-related quality of life, in the form of decreased anxiety (P = 0.018) and decreased depression (P = 0.057). Other improvements in health-related quality of life were observed with effect sizes >0.3, but did not reach statistical significance. In addition, both mentees and mentors gave very high scores for perceived treatment credibility and service delivery. The intervention was well received. Training, the peer-mentoring program, and outcome measures were demonstrated to be feasible with modifications. This result provides preliminary support for the efficacy, acceptability, and perceived credibility of a peer-mentoring approach to improve disease self-management and health-related quality of life in African American women with SLE. Peer mentoring may augment current rheumatologic care. © 2017, American College of Rheumatology.

  6. Peer to Peer

    Science.gov (United States)

    Brown, Stephanie Willen; Hammond, Chelsea C.

    2008-01-01

    This article reports that the Scopus Student Ambassador (SAm) program, funded by Elsevier, permitted the University of Connecticut (UConn) Libraries to hire graduate students to teach citation searching, using both Scopus and Web of Science, to other graduate students. The training does not cost the libraries anything, and it is free for graduate…

  7. Problem-based, peer-to-peer global mental health e-learning between the UK and Somaliland: a pilot study.

    Science.gov (United States)

    Murphy, Roberta; Clissold, Elliot; Keynejad, Roxanne C

    2017-11-01

    WHO's mental health gap action programme intervention guide (mhGAP-IG) is an evidence-based tool aimed at front-line health workers in low-income and middle-income countries (LMICs). Its potential to improve global mental health education, especially through digital technologies, has been little studied. Problem-based learning (PBL) is usually conducted face-to-face, but its remote application could facilitate cross-cultural education. To evaluate PBL, applied to peer-to-peer global mental health e-learning (Aqoon), using mhGAP-IG. Twelve pairs of UK and Somaliland medical students completed the full programme. Participants self-directedly met online, via the low-bandwidth Medicine Africa website, for PBL-style tutorials focused on modules of the mhGAP-IG, V.2.0. Preparticipation and postparticipation surveys used mixed methods to evaluate Aqoon, including the Attitudes Toward Psychiatry (ATP-30) instrument. Median ATP-30 scores for Somaliland (82.0 vs 95.0, p=0.003) and UK students (82.0 vs 95.0, p = 0.011) improved significantly following Aqoon. Qualitative feedback showed that participants valued peer connectivity and learning about cultural and psychosocial differences in their partner's country. Somaliland students were motivated by clinical learning and UK students by global health education. Feedback on the PBL structure was positive. Digital PBL represents an innovative method to extend the benefits of mhGAP-IG beyond front-line clinical staff, to healthcare students in LMICs. Educational resource limitations in LMICs may be overcome using digital platforms and PBL. Replication with non-medical healthcare students is the next step for this model to explore Aqoon's relevance to pressing global mental health workforce challenges. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  8. Multimethod evaluation of the VA's peer-to-peer Toolkit for patient-centered medical home implementation.

    Science.gov (United States)

    Luck, Jeff; Bowman, Candice; York, Laura; Midboe, Amanda; Taylor, Thomas; Gale, Randall; Asch, Steven

    2014-07-01

    Effective implementation of the patient-centered medical home (PCMH) in primary care practices requires training and other resources, such as online toolkits, to share strategies and materials. The Veterans Health Administration (VA) developed an online Toolkit of user-sourced tools to support teams implementing its Patient Aligned Care Team (PACT) medical home model. To present findings from an evaluation of the PACT Toolkit, including use, variation across facilities, effect of social marketing, and factors influencing use. The Toolkit is an online repository of ready-to-use tools created by VA clinic staff that physicians, nurses, and other team members may share, download, and adopt in order to more effectively implement PCMH principles and improve local performance on VA metrics. Multimethod evaluation using: (1) website usage analytics, (2) an online survey of the PACT community of practice's use of the Toolkit, and (3) key informant interviews. Survey respondents were PACT team members and coaches (n = 544) at 136 VA facilities. Interview respondents were Toolkit users and non-users (n = 32). For survey data, multivariable logistic models were used to predict Toolkit awareness and use. Interviews and open-text survey comments were coded using a "common themes" framework. The Consolidated Framework for Implementation Research (CFIR) guided data collection and analyses. The Toolkit was used by 6,745 staff in the first 19 months of availability. Among members of the target audience, 80 % had heard of the Toolkit, and of those, 70 % had visited the website. Tools had been implemented at 65 % of facilities. Qualitative findings revealed a range of user perspectives from enthusiastic support to lack of sufficient time to browse the Toolkit. An online Toolkit to support PCMH implementation was used at VA facilities nationwide. Other complex health care organizations may benefit from adopting similar online peer-to-peer resource libraries.

  9. The Effect of Electronic Word of Mouth on Intention to Book Accommodation via Online Peer-to-Peer Platform: Investigation of Theory of Planned Behaviour

    OpenAIRE

    See-Kwong Goh

    2016-01-01

    The main purpose for conducting the research is to investigate whether positive eWOM received by consumers would influence their intention to book accommodation via a peer-to-peer website or mobile phone apps (such as Airbnb). The research was conducted by utilizing the Theory of Planned Behaviour which integrates the eWOM, attitude, subjective norms, perceived behavioural control and behavioural intention. A total of 226 responses had been recorded. The main findings from this research are r...

  10. A mixed methods study of peer-to-peer support in a group-based lifestyle intervention for adults with serious mental illness.

    Science.gov (United States)

    Aschbrenner, Kelly A; Naslund, John A; Bartels, Stephen J

    2016-12-01

    There is potential for peer support to enhance healthy lifestyle interventions targeting changes in body weight and fitness for adults with serious mental illness. The purpose of this study was to explore peer-to-peer support among individuals participating in a group lifestyle intervention that included social media to enhance in-person weight management sessions. A mixed methods study design was used to explore participants' perceptions and experiences of support from other group members during a 6-month group lifestyle intervention. Twenty-five individuals with serious mental illness reported their perceptions of the peer group environment and social support during the intervention. Seventeen of these individuals also participated in focus group interviews further exploring their experiences with group members. More than 80% of participants agreed that other group members were trustworthy and dependable, and 92% reported a high level of shared purpose and active participation in the group. Participants described how shared learning and group problem-solving activities fostered friendships and provided essential support for health behavior change. Sharing information, personal successes and challenges, and "being in the same boat" as other group members were key features of peer-to-peer support. Findings from this exploratory study suggest that participants enrolled in a group-based lifestyle intervention for people with serious mental illness experience peer-to-peer support in various ways that promote health behavior change. These findings highlight opportunities to enhance future lifestyle interventions with collaborative learning and social network technologies that foster peer support among participants. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  11. They all do it, will you? Event-related potential evidence of herding behavior in online peer-to-peer lending.

    Science.gov (United States)

    Yu, Haihong; Dan, MengHan; Ma, Qingguo; Jin, Jia

    2018-05-14

    As herding is a typical characteristic of human behavior, many researchers have found the existence of herding behavior in online peer-to-peer lending through empirical surveys. However, the underlying neural basis of this phenomenon is still unclear. In the current study, we studied the neural activities of herding at decision-making stage and feedback stage using event-related potentials (ERPs). Our results showed that at decision-making stage, larger error related negativity (ERN) amplitude was induced under low-proportion conditions than that of high-proportion conditions. Meanwhile, during feedback stage, negative feedback elicited larger feedback related negativity (FRN) amplitude than that of positive feedback under low-proportion conditions, however, there was no significant FRN difference under high-proportion conditions. The current study suggests that herding behavior in online peer-to-peer lending is related to individual's risk perception and is possible to avoid negative emotions brought by failed investments. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. An Agent-Based Model of Private Woodland Owner Management Behavior Using Social Interactions, Information Flow, and Peer-To-Peer Networks.

    Directory of Open Access Journals (Sweden)

    Emily Silver Huff

    Full Text Available Privately owned woodlands are an important source of timber and ecosystem services in North America and worldwide. Impacts of management on these ecosystems and timber supply from these woodlands are difficult to estimate because complex behavioral theory informs the owner's management decisions. The decision-making environment consists of exogenous market factors, internal cognitive processes, and social interactions with fellow landowners, foresters, and other rural community members. This study seeks to understand how social interactions, information flow, and peer-to-peer networks influence timber harvesting behavior using an agent-based model. This theoretical model includes forested polygons in various states of 'harvest readiness' and three types of agents: forest landowners, foresters, and peer leaders (individuals trained in conservation who use peer-to-peer networking. Agent rules, interactions, and characteristics were parameterized with values from existing literature and an empirical survey of forest landowner attitudes, intentions, and demographics. The model demonstrates that as trust in foresters and peer leaders increases, the percentage of the forest that is harvested sustainably increases. Furthermore, peer leaders can serve to increase landowner trust in foresters. Model output and equations will inform forest policy and extension/outreach efforts. The model also serves as an important testing ground for new theories of landowner decision making and behavior.

  13. Peer-to-peer nursing rounds and hospital-acquired pressure ulcer prevalence in a surgical intensive care unit: a quality improvement project.

    Science.gov (United States)

    Kelleher, Alyson Dare; Moorer, Amanda; Makic, MaryBeth Flynn

    2012-01-01

    We conducted a quality improvement project in order to evaluate the effect of nurse-to-nurse bedside "rounding" as a strategy to decrease hospital-acquired pressure ulcers (HAPU) in a surgical intensive care unit. We instituted weekly peer-to-peer bedside skin rounds in a 17-bed surgical intensive care unit. Two nurses were identified as skin champions and trained by the hospital's certified WOC nurse to conduct skin rounds. The skin champion nurses conducted weekly peer-to-peer rounds that included discussions about key elements of our patients' skin status including current Braden Scale for Pressure Sore Risk score, and implementation of specific interventions related to subscale risk assessment. If a pressure ulcer was present, the current action plan was reevaluated for effectiveness. Quarterly HAPU prevalence studies were conducted from January 2008 to December 2010. Nineteen patients experienced a HAPU: 17 were located on the coccyx and 2 on the heel. Ten ulcers were classified as stage II, 3 PU were stage IV, 5 were deemed unstageable, and 1 was classified as a deep tissue injury. The frequency of preventive interventions rose during our quality improvement project. Specifically, the use of prevention surfaces increased 92%, repositioning increased 30%, nutrition interventions increased 77%, and moisture management increased 100%. Prior to focused nursing rounds, the highest HAPU prevalence rate was 27%. After implementing focused nursing rounds, HAPU rates trended down and were 0% for 3 consecutive quarters.

  14. Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks

    Science.gov (United States)

    de Boever, Jorn; de Grooff, Dirk

    The convergence of Internet and TV, i.e., the Over-The-Top TV (OTT TV) paradigm, created opportunities for P2P content distribution as these systems reduce bandwidth expenses for media companies. This resulted in the arrival of legal, commercial P2P systems which increases the importance of studying economic aspects of these business operations. This chapter examines the value networks of three cases (Kontiki, Zattoo and bittorrent) in order to compare how different actors position and distinguish themselves from competitors by creating value in different ways. The value networks of legal systems have different compositions depending on their market orientation - Business-to-Business (B2B) and/or Businessto- Consumer (B2C). In addition, legal systems differ from illegal systems as legal companies are not inclined to grant control to users, whereas users havemost control in value networks of illegal, self-organizing file sharing communities. In conclusion, the OTT TV paradigm made P2P technology a partner for the media industry rather than an enemy. However, we argue that the lack of control granted to users will remain a seed-bed for the success of illegal P2P file sharing communities.

  15. Content-specific network analysis of peer-to-peer communication in an online community for smoking cessation.

    Science.gov (United States)

    Myneni, Sahiti; Cobb, Nathan K; Cohen, Trevor

    2016-01-01

    Analysis of user interactions in online communities could improve our understanding of health-related behaviors and inform the design of technological solutions that support behavior change. However, to achieve this we would need methods that provide granular perspective, yet are scalable. In this paper, we present a methodology for high-throughput semantic and network analysis of large social media datasets, combining semi-automated text categorization with social network analytics. We apply this method to derive content-specific network visualizations of 16,492 user interactions in an online community for smoking cessation. Performance of the categorization system was reasonable (average F-measure of 0.74, with system-rater reliability approaching rater-rater reliability). The resulting semantically specific network analysis of user interactions reveals content- and behavior-specific network topologies. Implications for socio-behavioral health and wellness platforms are also discussed.

  16. Expanding the Supply of Pasteurized Donor Milk: Understanding Why Peer-to-Peer Milk Sharers in the United States Do Not Donate to Milk Banks.

    Science.gov (United States)

    Perrin, Maryanne Tigchelaar; Goodell, L Suzanne; Fogleman, April; Pettus, Hannah; Bodenheimer, Amanda L; Palmquist, Aunchalee E L

    2016-05-01

    Lactating women in the United States have several options for what they do with excess breast milk, including donating to milk banks that serve medically fragile infants, sharing directly with families seeking milk, and selling to individuals or for-profit entities. The World Health Organization and the US Surgeon General have issued calls to increase access to pasteurized donor milk for medically fragile infants. To explore how lactating women with a surplus of breast milk come to the decision to share their milk with a peer rather than donate to a milk bank. A qualitative design using a grounded theory approach was employed. Semistructured telephone interviews were conducted with 27 women who had shared milk with a peer but not with a milk bank. Five dominant themes were identified: a strong belief in the value of breast milk, unexpected versus planned donation, sources of information regarding milk exchange, concerns and knowledge gaps about milk banks, and helping and connecting. This research offers insights into potential strategies for promoting milk bank donation among peer-to-peer milk sharers, including developing donor education campaigns focused on knowledge gaps regarding milk banks and developing health care professional referral programs that can reduce barriers associated with the convenience of milk bank donation. © The Author(s) 2016.

  17. Effectiveness of web-based self-disclosure peer-to-peer support for weight loss: randomized controlled trial.

    Science.gov (United States)

    Imanaka, Mie; Ando, Masahiko; Kitamura, Tetsuhisa; Kawamura, Takashi

    2013-07-09

    Obesity is one of the most common public health problems in the industrialized world as a cause of noncommunicable diseases. Although primarily used for one-on-one communication, email is available for uninterrupted support for weight loss, but little is known about the effects of dietitian group counseling for weight control via the Internet. We developed a Web-based self-disclosure health support (WSHS) system for weight loss. This study aims to compare the effect of weight change between those using the WSHS and those using the email health support (EHS). This study was designed as an open prospective individual randomized controlled trial. Eligible participants were aged 35 to 65 years with a body mass index (BMI) of ≥25.0 in their latest health examination. Participants were randomly assigned to either the WSHS group or the EHS group. Thirteen registered dietitians under the direction of a principal dietitian each instructed 6 to 8 participants from the respective groups. All participants in the WSHS group could receive nutritional advice and calculate their nutritive intake from a photograph of a meal on their computer screen from the Internet sent to them by their dietitian, receive supervision from the registered dietitian, and view fellow participants' weight changes and lifestyle modifications. In the EHS group, a participant could receive one-on-one nutritional advice and calculate his/her nutritive intake from the photograph of a meal on computer screen sent by email from his/her dietitian, without being able to view fellow participants' status. The follow-up period was 12 weeks for both groups. The primary outcome measure was change in body weight. The secondary outcome measure included changes in BMI and waist circumference. The intergroup comparison of the changes before and after intervention was evaluated using analysis of covariance. A total of 193 participants were randomly assigned to either the WSHS group (n=97) or the EHS group (n=96). Ten

  18. City tourism and the sharing economy – potential effects of online peer-to-peer marketplaces on urban property markets

    Directory of Open Access Journals (Sweden)

    Stefan Brauckmann

    2017-09-01

    Full Text Available Purpose – The purpose of this paper is to investigate the potential effects of the so-called sharing economy on growing city tourism as well as on urban property markets. Design/methodology/approach – Official statistical data and a geo-information system (GIS are used on a small scale in order to identify concentration processes among overnight visitors and the potential concomitant conflicts with other interest groups. Findings – Currently, the effects of the sharing economy on housing markets and city tourism are barely measurable and are limited to a few central locations. However, a growing demand can be discerned in housing-like accommodation concepts which can be operated via booking platforms. As there is likely to be strong future growth in this area, continuous market observation (monitoring is urgently advised. Research limitations/implications – Official statistics only allow an analysis of overnight guests staying with larger accommodation providers. Booking platforms for holiday homes and other temporary accommodation options have such little interest in data transparency that the overall phenomenon of city tourism can be addressed only in part. Practical implications – Associating various data within the GIS enables municipal administrators and urban planners to identify potential sources of conflict within the property markets in good time and effectively counteract these where possible. Social implications – Increases in property prices directly attributable to growing city tourism may lead to the displacement of less financially secure members of the established population as well as businesses. Originality/value – The sharing economy is a relatively new research topic which will become increasingly important in future. The identification of potential sources of conflict due to tourist accommodation has therefore not yet been comprehensively carried out on a small scale.

  19. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  20. A Unified Peer-to-Peer Database Framework for XQueries over Dynamic Distributed Content and its Application for Scalable Service Discovery

    CERN Document Server

    Hoschek, Wolfgang

    In a large distributed system spanning administrative domains such as a Grid, it is desirable to maintain and query dynamic and timely information about active participants such as services, resources and user communities. The web services vision promises that programs are made more flexible and powerful by querying Internet databases (registries) at runtime in order to discover information and network attached third-party building blocks. Services can advertise themselves and related metadata via such databases, enabling the assembly of distributed higher-level components. In support of this vision, this thesis shows how to support expressive general-purpose queries over a view that integrates autonomous dynamic database nodes from a wide range of distributed system topologies. We motivate and justify the assertion that realistic ubiquitous service and resource discovery requires a rich general-purpose query language such as XQuery or SQL. Next, we introduce the Web Service Discovery Architecture (WSDA), wh...

  1. A Testbed for Highly-Scalable Mission Critical Information Systems

    National Research Council Canada - National Science Library

    Birman, Kenneth P

    2005-01-01

    ... systems in a networked environment. Headed by Professor Ken Birman, the project is exploring a novel fusion of classical protocols for reliable multicast communication with a new style of peer-to-peer protocol called scalable "gossip...

  2. Inteligência estratégica antecipativa coletiva e crowdfunding: aplicação do método L.E.SCAnning em empresa social de economia peer-to-peer (P2P

    Directory of Open Access Journals (Sweden)

    Mery Blanck

    2014-03-01

    Full Text Available Neste artigo, apresentam-se os resultados de pesquisa qualitativa em que se objetivou investigar a aplicabilidade do método L.E.SCAnning em empresas sociais de economia peer-to-peer (P2P. A motivação partiu da ideia de a autossustentabilidade ser, a longo prazo, um dos maiores desafios das organizações, especialmente aquelas lastreadas na economia social, dentre elas, as empresas P2P. No entanto, empresas sociais são potencialmente negócios dinâmicos e progressistas com os quais o mercado empresarial poderia aprender, uma vez que experimentam e inovam. Partindo exatamente desse espírito inovador, muitas empresas sociais voltaram-se para o modelo crowdfunding de economia P2P, que se configura como tendência emergente de organização colaborativa de recursos na Web. Sob esse prisma, um dos novos desenvolvimentos em gestão que se aplicam à atividade de organizações com enfoque sistêmico é a prática da Inteligência Estratégica Antecipativa Coletiva (IEAc. Nesse sentido, no estudo de caso investigou-se a empresa social francesa Babyloan para compreender de que maneira a organização busca, monitora e utiliza a informação captada do meio externo para sua atuação, prototipando, com base nesse diagnóstico, a aplicação de um ciclo do método L.E.SCAnning. Os resultados deste estudo sugerem que o entendimento pragmático do cenário externo, por meio da IEAc, favorece decisões que trazem uma marca de empreendedorismo e inovação, e tem no universo da economia social P2P, ambiente fortemente baseado em percepção, um impacto potencial significativo.

  3. On Adding Structure to Unstructured Overlay Networks

    Science.gov (United States)

    Leitão, João; Carvalho, Nuno A.; Pereira, José; Oliveira, Rui; Rodrigues, Luís

    Unstructured peer-to-peer overlay networks are very resilient to churn and topology changes, while requiring little maintenance cost. Therefore, they are an infrastructure to build highly scalable large-scale services in dynamic networks. Typically, the overlay topology is defined by a peer sampling service that aims at maintaining, in each process, a random partial view of peers in the system. The resulting random unstructured topology is suboptimal when a specific performance metric is considered. On the other hand, structured approaches (for instance, a spanning tree) may optimize a given target performance metric but are highly fragile. In fact, the cost for maintaining structures with strong constraints may easily become prohibitive in highly dynamic networks. This chapter discusses different techniques that aim at combining the advantages of unstructured and structured networks. Namely we focus on two distinct approaches, one based on optimizing the overlay and another based on optimizing the gossip mechanism itself.

  4. Economic Models and Algorithms for Distributed Systems

    CERN Document Server

    Neumann, Dirk; Altmann, Jorn; Rana, Omer F

    2009-01-01

    Distributed computing models for sharing resources such as Grids, Peer-to-Peer systems, or voluntary computing are becoming increasingly popular. This book intends to discover fresh avenues of research and amendments to existing technologies, aiming at the successful deployment of commercial distributed systems

  5. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  6. Peer-to-Peer Learning and the Army Learning Model

    Science.gov (United States)

    2012-06-08

    education will be delivered to the current and future force. This thesis examined the salient areas proposed by the ALM and its impact on P2P learning ...The Army Learning Model is the new educational model that develops adaptive leaders in an era of persistent conflict. Life-long, individual

  7. Art-mediated peer-to-peer learning of empathy.

    Science.gov (United States)

    Potash, Jordan; Chen, Julie

    2014-08-01

    Making experiential art in a clinical clerkship offers opportunities for students to gain self-awareness and enhance their empathic understanding of patients. The student-created art can be further used as teaching material for other students. The graduating class of 2012 from Ajou University School of Medicine in South Korea was interested in learning about medical humanities initiatives at the Li Ka Shing Faculty of Medicine, University of Hong Kong (HKU), and made an educational visit in May 2012. As part of the core family medicine curriculum, third-year HKU medical students created poetry and art based on their experiences witnessing patients in pain and suffering. Twenty of the artworks and accompanying reflective writing were chosen for an exhibition. The visiting students viewed the exhibit and created their own art based on their emotional response to one piece selected from the exhibit. The combination of viewing art made by their peers and creating art in response resulted in empathic understanding of patient pain and suffering, and an appreciation of holistic care and the value of the doctor-patient relationship. Medical student-generated artwork has the potential to educate both students and professionals on humanistic aspects of medical care. © 2014 John Wiley & Sons Ltd.

  8. Peer-to-Peer Planning for Space Mission Control

    Science.gov (United States)

    Barreiro, Javier; Jones, Grailing, Jr.; Schaffer, Steve

    2009-01-01

    Planning and scheduling for space operations entails the development of applications that embed intimate domain knowledge of distinct areas of mission control, while allowing for significant collaboration among them. The separation is useful because of differences in the planning problem, solution methods, and frequencies of replanning that arise in the different disciplines. For example, planning the activities of human spaceflight crews requires some reasoning about all spacecraft resources at timescales of minutes or seconds, and is subject to considerable volatility. Detailed power planning requires managing the complex interplay of power consumption and production, involves very different classes of constraints and preferences, but once plans are generated they are relatively stable.

  9. Virtual University: A Peer to Peer Open Education Network

    Science.gov (United States)

    Razavi, Amir R.; Strommen-Bakhtiar, Abbas; Krause, Paul

    2011-01-01

    The world is currently going through a transitional period, moving from the Service era to the Information era. Rapid societal and technological innovations are changing the way we live, communicate, and work. As the rate of the technological/societal change increases, pressure on educational institutions also increases. This pressure is…

  10. Millennials, Peer-to-Peer Accommodation and the Hotel Industry

    Directory of Open Access Journals (Sweden)

    Alma Pentescu

    2016-01-01

    The aim of this paper is to present these challenges for the hotel industry, because there has notbeen significant research concerning the trends and changes this new generation / new businessmodel will bring to the hospitality industry. Finally, it suggests how hoteliers could adapt to thesenew expectations and proposes several questions for future research.

  11. Active Minds: Creating Peer-to-Peer Mental Health Awareness

    Science.gov (United States)

    Walther, Willliam A.; Abelson, Sara; Malmon, Alison

    2014-01-01

    Utilizing student peers is one vital avenue for improving the prevention, detection, and treatment of mental health disorders on college campuses (The Campus Suicide Prevention Center of Virginia, 2011). This article will briefly review research findings indicating the importance of student peers and then focus on a promising model and growing…

  12. Web-based remote video monitoring system implemented using Java technology

    Science.gov (United States)

    Li, Xiaoming

    2012-04-01

    A HTTP based video transmission system has been built upon the p2p(peer to peer) network structure utilizing the Java technologies. This makes the video monitoring available to any host which has been connected to the World Wide Web in any method, including those hosts behind firewalls or in isolated sub-networking. In order to achieve this, a video source peer has been developed, together with the client video playback peer. The video source peer can respond to the video stream request in HTTP protocol. HTTP based pipe communication model is developed to speeding the transmission of video stream data, which has been encoded into fragments using the JPEG codec. To make the system feasible in conveying video streams between arbitrary peers on the web, a HTTP protocol based relay peer is implemented as well. This video monitoring system has been applied in a tele-robotic system as a visual feedback to the operator.

  13. Handbook of research on P2P and grid systems for service-oriented computing : models, methodologies, and applications

    NARCIS (Netherlands)

    Antonopoulos, N.; Exarchakos, G.; Li, Maozhen; Liotta, A.

    2010-01-01

    Introduction: Service-oriented computing is a popular design methodology for large scale business computing systems. A significant number of companies aim to reap the benefit of cost reduction by realizing B2B and B2C processes on large-scale SOA-compliant software system platforms. Peer-to-Peer

  14. HyperPeer

    DEFF Research Database (Denmark)

    Larsen, R.D.; Bouvin, N.O.

    2004-01-01

    This paper presents HyperPeer, a framework for developing peer-to-peer based hypermedia. The distribution of hypermedia structures is handled through a peer-to-peer (P2P) network, allowing for highly scalable sharing between users. A central challenge of all decentralized systems is to locate...

  15. A DHT Key-Value Storage System with Carrier Grade Performance

    Science.gov (United States)

    Shi, Guangyu; Chen, Jian; Gong, Hao; Fan, Lingyuan; Xue, Haiqiang; Lu, Qingming; Liang, Liang

    The Peer-to-Peer (P2P) technology being widely adopted in today’s both academic research and practical service providing, has many potential advantages and achieves a great success in Information Technology scope. Recently some researchers have proposed that P2P inspired architecture also might be one choice for the telecom network evolution. Most of such works adopted structured P2P (DHT) as the basic solutions, but they seldom discussed how to eliminate the huge gap between the telecom underlay performance requirement and the performance of existed DHT which mainly originated from the Internet applications. This paper presents the design and implementation of SandStone, a DHT based key-value storage system with carrier grade performance, such as good scalability, strong consistency and high reliability, which could be deployed as the cornerstone in such new P2P inspired networking architectures.

  16. A bitcoin framework: an alternative payment system for rural areas of South Africa using low-end mobile phones

    CSIR Research Space (South Africa)

    Dlamini, NP

    2016-09-01

    Full Text Available Bitcoin is a peer-to-peer, decentralized payment system; that can be used as electronic money and as a payment method. Research done on Bitcoin has escalated due to the properties it possesses which are similar to fiat currency. Some...

  17. StreetTiVo: Using a P2P XML Database System to Manage Multimedia Data in Your Living Room

    NARCIS (Netherlands)

    Zhang, Ying; de Vries, A.P.; Boncz, P.; Hiemstra, Djoerd; Ordelman, Roeland J.F.; Li, Qing; Feng, Ling; Pei, Jian; Wang, Sean X.

    StreetTiVo is a project that aims at bringing research results into the living room; in particular, a mix of current results in the areas of Peer-to-Peer XML Database Management System (P2P XDBMS), advanced multimedia analysis techniques, and advanced information re- trieval techniques. The project

  18. Robustness of Structural Systems

    DEFF Research Database (Denmark)

    Canisius, T.D.G.; Sørensen, John Dalsgaard; Baker, J.W.

    2007-01-01

    The importance of robustness as a property of structural systems has been recognised following several structural failures, such as that at Ronan Point in 1968,where the consequenceswere deemed unacceptable relative to the initiating damage. A variety of research efforts in the past decades have...... attempted to quantify aspects of robustness such as redundancy and identify design principles that can improve robustness. This paper outlines the progress of recent work by the Joint Committee on Structural Safety (JCSS) to develop comprehensive guidance on assessing and providing robustness in structural...... systems. Guidance is provided regarding the assessment of robustness in a framework that considers potential hazards to the system, vulnerability of system components, and failure consequences. Several proposed methods for quantifying robustness are reviewed, and guidelines for robust design...

  19. Emergent Semantics Interoperability in Large-Scale Decentralized Information Systems

    CERN Document Server

    Cudré-Mauroux, Philippe

    2008-01-01

    Peer-to-peer systems are evolving with new information-system architectures, leading to the idea that the principles of decentralization and self-organization will offer new approaches in informatics, especially for systems that scale with the number of users or for which central authorities do not prevail. This book describes a new way of building global agreements (semantic interoperability) based only on decentralized, self-organizing interactions.

  20. Structures with Reconfigurable Circulatory Systems

    National Research Council Canada - National Science Library

    Clark, William W; Beckman, Eric J; Cho, Sung K; Weiland, Lisa M; Bielawski, Christopher W

    2008-01-01

    .... One trait that many biological system have that conventional structures do not is a circulatory system, which can be used for many purposes, one of which is the transport of structural material...

  1. Structural system identification: Structural dynamics model validation

    Energy Technology Data Exchange (ETDEWEB)

    Red-Horse, J.R.

    1997-04-01

    Structural system identification is concerned with the development of systematic procedures and tools for developing predictive analytical models based on a physical structure`s dynamic response characteristics. It is a multidisciplinary process that involves the ability (1) to define high fidelity physics-based analysis models, (2) to acquire accurate test-derived information for physical specimens using diagnostic experiments, (3) to validate the numerical simulation model by reconciling differences that inevitably exist between the analysis model and the experimental data, and (4) to quantify uncertainties in the final system models and subsequent numerical simulations. The goal of this project was to develop structural system identification techniques and software suitable for both research and production applications in code and model validation.

  2. System Reliability of Timber Structures

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Sørensen, John Dalsgaard

    2010-01-01

    elements, alternate load path(s) etc. in the structural design. In general these characteristics can have a positive influence on system reliability of a structure however, in Eurocodes ductility is only awarded for concrete and steel structures but not for timber structures. It is well......-know that structural systems can redistribute internal forces due to ductility of a connection, i.e. some additional loads can be carried by the structure. The same effect is also possible for reinforced concrete structures and structures of steel. However, for timber structures codes do not award that ductility......For reduction of the risk of collapse in the event of loss of structural element(s), a structural engineer may take necessary steps to design a collapse-resistant structure that is insensitive to accidental circumstances e.g. by incorporating characteristics like redundancy, ties, ductility, key...

  3. Structural design by CAD system

    International Nuclear Information System (INIS)

    Kim, Jhin Wung; Shim, Jae Ku; Kim, Sun Hoon; Kim, Dae Hong; Lee, Kyung Jin; Choi, Kyu Sup; Choi, In Kil; Lee, Dong Yong

    1988-12-01

    CAD systems are now widely used for the design of many engineering problems involving static, dynamic and thermal stress analyses of structures. In order to apply CAD systems to the structural analysis and design, the function of hardwares and softwares necessary for the CAD systems must be understood. The purpose of this study is to introduce the basic elements that are indispensible in the application of CAD systems to the analysis and design of structures and to give a thorough understanding of CAD systems to design engineers, so as to participate in the further technological developments of CAD systems. Due to the complexity and variety of the shape and size of the nowa-days structures, the need of new design technologies is growing for more efficient, accurate and economical design of structures. The application of CAD systems to structural engineering fields enables to improve structural engineering analysis and design technologies and also to obtain the standardization of the design process. An active introduction of rapidly developing CAD technologies will contribute to analyzing and designing structures more efficiently and reliably. Based on this report of the current status of the application of CAD systems to the structural analysis and design, the next goal is to develop the expert system which enables to perform the design of structures by CAD systems from the preliminary conceptual design to the final detail drawings automatically. (Author)

  4. Structural Nervous System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — GTL's SNS technology aids in the operation of new or existing structural health monitoring (SHM) systems by integrating data and power pathways into the structure....

  5. [Network structures in biological systems].

    Science.gov (United States)

    Oleskin, A V

    2013-01-01

    Network structures (networks) that have been extensively studied in the humanities are characterized by cohesion, a lack of a central control unit, and predominantly fractal properties. They are contrasted with structures that contain a single centre (hierarchies) as well as with those whose elements predominantly compete with one another (market-type structures). As far as biological systems are concerned, their network structures can be subdivided into a number of types involving different organizational mechanisms. Network organization is characteristic of various structural levels of biological systems ranging from single cells to integrated societies. These networks can be classified into two main subgroups: (i) flat (leaderless) network structures typical of systems that are composed of uniform elements and represent modular organisms or at least possess manifest integral properties and (ii) three-dimensional, partly hierarchical structures characterized by significant individual and/or intergroup (intercaste) differences between their elements. All network structures include an element that performs structural, protective, and communication-promoting functions. By analogy to cell structures, this element is denoted as the matrix of a network structure. The matrix includes a material and an immaterial component. The material component comprises various structures that belong to the whole structure and not to any of its elements per se. The immaterial (ideal) component of the matrix includes social norms and rules regulating network elements' behavior. These behavioral rules can be described in terms of algorithms. Algorithmization enables modeling the behavior of various network structures, particularly of neuron networks and their artificial analogs.

  6. Structural systems reliability analysis

    International Nuclear Information System (INIS)

    Frangopol, D.

    1975-01-01

    For an exact evaluation of the reliability of a structure it appears necessary to determine the distribution densities of the loads and resistances and to calculate the correlation coefficients between loads and between resistances. These statistical characteristics can be obtained only on the basis of a long activity period. In case that such studies are missing the statistical properties formulated here give upper and lower bounds of the reliability. (orig./HP) [de

  7. Structure of safeguards systems

    International Nuclear Information System (INIS)

    Shipley, J.P.

    1978-06-01

    An effective safeguards system for domestic nuclear fuel cycle facilities consists of several important subsystems that must coordinate their functions with plant management and process control. The safeguards system must not unnecessarily disrupt plant operations, compromise safety requirements, or infringe on employee working conditions. This report describes concepts, which have been developed with the cooperation of the nuclear industry and the safeguards community, for achieving these objectives

  8. System structures in architecture

    DEFF Research Database (Denmark)

    Vibæk, Kasper Sánchez

    2012-01-01

    Afhandlingen introducerer begrebet systemstruktur i den arkitektoniske designproces som en måde at indskyde et systemniveau i arkitektur og byggeri, der ligger mellem generel byggeteknik og specifikke arkitektoniske resultater. For at operationalisere en sådan systemstruktur udarbejdes en systems...

  9. The Structural Optimization System CAOS

    DEFF Research Database (Denmark)

    Rasmussen, John

    1990-01-01

    CAOS is a system for structural shape optimization. It is closely integrated in a Computer Aided Design environment and controlled entirely from the CAD-system AutoCAD. The mathematical foundation of the system is briefly presented and a description of the CAD-integration strategy is given together...

  10. Systems reliability/structural reliability

    International Nuclear Information System (INIS)

    Green, A.E.

    1980-01-01

    The question of reliability technology using quantified techniques is considered for systems and structures. Systems reliability analysis has progressed to a viable and proven methodology whereas this has yet to be fully achieved for large scale structures. Structural loading variants over the half-time of the plant are considered to be more difficult to analyse than for systems, even though a relatively crude model may be a necessary starting point. Various reliability characteristics and environmental conditions are considered which enter this problem. The rare event situation is briefly mentioned together with aspects of proof testing and normal and upset loading conditions. (orig.)

  11. Cooperation enhanced by indirect reciprocity in spatial prisoner's dilemma games for social P2P systems

    Science.gov (United States)

    Tian, Lin-Lin; Li, Ming-Chu; Wang, Zhen

    2016-11-01

    With the growing interest in social Peer-to-Peer (P2P) applications, relationships of individuals are further exploited to improve the performances of reputation systems. It is an on-going challenge to investigate how spatial reciprocity aids indirect reciprocity in sustaining cooperation in practical P2P environments. This paper describes the construction of an extended prisoner's dilemma game on square lattice networks with three strategies, i.e., defection, unconditional cooperation, and reciprocal cooperation. Reciprocators discriminate partners according to their reputations based on image scoring, where mistakes in judgment of reputations may occur. The independent structures of interaction and learning neighborhood are discussed, with respect to the situation in which learning environments differ from interaction networks. The simulation results have indicated that the incentive mechanism enhances cooperation better in structured peers than among a well-mixed population. Given the realistic condition of inaccurate reputation scores, defection is still successfully held down when the players interact and learn within the unified neighborhoods. Extensive simulations have further confirmed the positive impact of spatial structure on cooperation with different sizes of lattice neighborhoods. And similar conclusions can also be drawn on regular random networks and scale-free networks. Moreover, for the separated structures of the neighborhoods, the interaction network has a critical effect on the evolution dynamics of cooperation and learning environments only have weaker impacts on the process. Our findings further provide some insights concerning the evolution of collective behaviors in social systems.

  12. Synthesis for Structure Rewriting Systems

    Science.gov (United States)

    Kaiser, Łukasz

    The description of a single state of a modelled system is often complex in practice, but few procedures for synthesis address this problem in depth. We study systems in which a state is described by an arbitrary finite structure, and changes of the state are represented by structure rewriting rules, a generalisation of term and graph rewriting. Both the environment and the controller are allowed to change the structure in this way, and the question we ask is how a strategy for the controller that ensures a given property can be synthesised.

  13. Evolutionary Game Theory-Based Evaluation of P2P File-Sharing Systems in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Yusuke Matsuda

    2010-01-01

    Full Text Available Peer-to-Peer (P2P file sharing is one of key technologies for achieving attractive P2P multimedia social networking. In P2P file-sharing systems, file availability is improved by cooperative users who cache and share files. Note that file caching carries costs such as storage consumption and processing load. In addition, users have different degrees of cooperativity in file caching and they are in different surrounding environments arising from the topological structure of P2P networks. With evolutionary game theory, this paper evaluates the performance of P2P file sharing systems in such heterogeneous environments. Using micro-macro dynamics, we analyze the impact of the heterogeneity of user selfishness on the file availability and system stability. Further, through simulation experiments with agent-based dynamics, we reveal how other aspects, for example, synchronization among nodes and topological structure, affect the system performance. Both analytical and simulation results show that the environmental heterogeneity contributes to the file availability and system stability.

  14. Coherent structures and dynamical systems

    Science.gov (United States)

    Jimenez, Javier

    1987-01-01

    Any flow of a viscous fluid has a finite number of degrees of freedom, and can therefore be seen as a dynamical system. A coherent structure can be thought of as a lower dimensional manifold in whose neighborhood the dynamical system spends a substantial fraction of its time. If such a manifold exists, and if its dimensionality is substantially lower that that of the full flow, it is conceivable that the flow could be described in terms of the reduced set of degrees of freedom, and that such a description would be simpler than one in which the existence of structure was not recognized. Several examples are briefly summarized.

  15. A peer-to-peer overlay for the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.; Fleury, M.; Quadri, N.

    2012-01-01

    The growth of the Internet and its popular services are forcing telecom operators to provide advanced services to their subscribers, as traditional voice services are no longer enough to attract more customers. To enable more innovative and value-added IP services and take advantage of the services

  16. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... New marketing models are being developed and used to target mobile users. A mobile environment introduces new challenges that need to be overcome by these marketing models in order to be successful and effective...

  17. The Evolution of a Professional Practice Forum: Balancing Peer-to-Peer Learning With Course Objectives.

    Science.gov (United States)

    Janssen, Anna; Robinson, Tracy; Shaw, Tim

    2014-10-31

    The Opioid Treatment Accreditation Course (OTAC) is a mandatory accreditation requirement in New South Wales, Australia, and aims to prepare medical practitioners for the provision of safe and effective Opioid Substitution Treatment to people with opioid dependence. The course has a strong focus on safe prescribing practices and the course design includes a Professional Practice Forum that is engaging for participants and effective at imparting complex ideas and concepts that do not place additional time constraints on already time-poor health professionals. The study aimed to use participatory action research methods to develop and evaluate an online Professional Practice Forum that is a key component of the OTAC teaching and learning experience. Three evaluation cycles were implemented with three cohorts of participants (N=40) to inform the design and review of the updated OTAC course. Overall, the study relied on participatory action research methods to enhance a sense of online community and to revise the Professional Practice Forum component of the course. Findings from survey feedback and an examination of Web metrics were used to monitor participant learning and were subsequently subject to thematic analysis in order to identify key themes. The use of participatory action techniques in the redesign of the OTAC course was a successful means of engaging with participants and resulted in four revisions based on feedback from facilitators and participants. The Professional Practice Forum was rated highly and received positive feedback from both moderators and participants. The use of interactive forums in online learning in an educational module for adult learners can prove extremely valuable as a means for participants to share their expertise and improve their learning outcomes. In particular, the use of sticky and welcome threads were significant features that enhanced interactions between participants and facilitators and resulted in increased quantity and quality of postings. These findings can help inform future researchers on how to develop peer engagement modules that are amenable to assessment and that build an online sense of community.

  18. A Peer-to-Peer Support Model for Developing Graduate Students' Career and Employability Skills

    Science.gov (United States)

    Jones, Narelle; Torezani, Silvia; Luca, Joseph

    2012-01-01

    Career opportunities for Australian research graduates have expanded in recent years into areas outside academia. However, the employment market is highly competitive, and Australian universities have recognised the need to produce graduates with transferable skills across all sectors, not just academia. The need to provide an infrastructure to…

  19. Peer to peer mentoring: Outcomes of third-year midwifery students mentoring first-year students.

    Science.gov (United States)

    Hogan, Rosemarie; Fox, Deborah; Barratt-See, Georgina

    2017-06-01

    Undergraduate midwifery students commonly experience anxiety in relation to their first clinical placement. A peer mentoring program for midwifery students was implemented in an urban Australian university. The participants were first-year mentee and third-year mentor students studying a three-year Bachelor degree in midwifery. The program offered peer support to first-year midwifery students who had little or no previous exposure to hospital clinical settings. Mentors received the opportunity to develop mentoring and leadership skills. The aim was to explore the benefits, if any, of a peer mentoring program for midwifery students. The peer mentoring program was implemented in 2012. Sixty-three peer mentors and 170 mentees participated over three academic years. Surveys were distributed at the end of each academic year. Quantitative survey data were analysed descriptively and qualitative survey data were analysed thematically using NVivo 10 software. Over 80% of mentors and mentees felt that the program helped mentees adjust to their midwifery clinical placement. At least 75% of mentors benefited, in developing their communication, mentoring and leadership skills. Three themes emerged from the qualitative data, including 'Receiving start-up advice'; 'Knowing she was there' and 'Wanting more face to face time'. There is a paucity of literature on midwifery student peer mentoring. The findings of this program demonstrate the value of peer support for mentees and adds knowledge about the mentor experience for undergraduate midwifery students. The peer mentor program was of benefit to the majority of midwifery students. Copyright © 2017 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  20. Peer-to-peer session initiation protocol in highly volatile environments

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Roper, I.; Morphett, J.

    2008-01-01

    The session initiation protocol (SIP) is an IETF standardised protocol for multimedia signalling and communication over the internet. SIP has been used in many deployments in client-server architecture. However, this configuration potentially possesses various scalability and redundancy limitations

  1. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    Science.gov (United States)

    2005-01-01

    trade and commu- nication strategies, mobile electronic marketing, intelligent agents, collaborative eCommerce 1. INTRODUCTION With the explosion of...requests the promotion (since Jeff is a cof- fee drinker). MH2 signs the promotion with Susan’s eN- centive ID. At 6pm, Jeff decides to take advantage of the...to become valid, a user has a choice of remaining in his current loca- tion and being able to take advantage of the promotion. The eNcentive Ad

  2. Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies

    OpenAIRE

    Brambilla, Giacomo

    2017-01-01

    A distinctive feature of smart cities is the fruitful and effective interconnection among mobile users and resources, to support the fulfillment of sophisticated location-based services (LBSs). LBSs are increasingly taking advantage of user geographic location to provide a broad range of applications, such as traffic monitoring, social networking, emergency management and advertising. Unfortunately, most LBSs rely upon centralized infrastructures, thus raising, besides scalability and r...

  3. Peer-to-Peer Mentoring of Science Journalists in Asia and Latin ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Since 2006, IDRC has supported the Science Journalism Cooperation (SjCOOP) project in partnership with the World Federation of Science Journalists. Arguably the most ambitious project of its kind, SjCOOP's initial efforts involved promoting the development of science journalism in Africa and the Middle East through an ...

  4. Exploring Peer-to-Peer Library Content and Engagement on a Student-Run Facebook Group

    Science.gov (United States)

    van Beynen, Kaya; Swenson, Camielle

    2016-01-01

    Student-run Facebook groups offer librarians a new means of interacting with students in their native digital domain. Facebook groups, a service launched in 2010 enables university students to create a virtual forum to discuss their concerns, issues, and promote events. While still a relatively new feature, these groups are increasingly being…

  5. Remixing to Design Learning: Social Media and Peer-to-Peer Interaction

    Science.gov (United States)

    Casey, Gail; Wells, Muriel

    2015-01-01

    Social and participatory media offer opportunities to interact and share user-generated content. After some investigation and research, the authors are in their initial stages of using such media to provide a pathway for thinking about learning design in higher education. Using the concept of remixing, the authors aim to creatively blend and…

  6. Student Voices: Perspectives on Peer-to-Peer Sexual Health Education

    Science.gov (United States)

    Layzer, Carolyn; Rosapep, Lauren; Barr, Sherry

    2017-01-01

    Background: This process study is a companion to a randomized evaluation of a school-based, peer-led comprehensive sexual health education program, Teen Prevention Education Program (Teen PEP), in which 11th- and 12th-grade students are trained by school health educators to conduct informative workshops with ninth-grade peers in schools in North…

  7. Bandwidth Reduction via Localized Peer-to-Peer (P2P Video

    Directory of Open Access Journals (Sweden)

    Ken Kerpez

    2010-01-01

    Full Text Available This paper presents recent research into P2P distribution of video that can be highly localized, preferably sharing content among users on the same access network and Central Office (CO. Models of video demand and localized P2P serving areas are presented. Detailed simulations of passive optical networks (PON are run, and these generate statistics of P2P video localization. Next-Generation PON (NG-PON is shown to fully enable P2P video localization, but the lower rates of Gigabit-PON (GPON restrict performance. Results here show that nearly all of the traffic volume of unicast video could be delivered via localized P2P. Strong growth in video delivery via localized P2P could lower overall future aggregation and core network bandwidth of IP video traffic by 58.2%, and total consumer Internet traffic by 43.5%. This assumes aggressive adoption of technologies and business practices that enable highly localized P2P video.

  8. The Effect of Peer-to-Peer Training on Staff Interactions with Adults with Dual Diagnoses

    Science.gov (United States)

    Finn, Lori L.; Sturmey, Peter

    2009-01-01

    Researchers have demonstrated the importance of training behavioral skills to staff members working with consumers with developmental disabilities. A training program that does not rely solely on consultants or administrators may benefit human services agencies that have limited resources to allocate to training. In the present study, the…

  9. Student Voices: Perspectives on Peer-to-Peer Sexual Health Education.

    Science.gov (United States)

    Layzer, Carolyn; Rosapep, Lauren; Barr, Sherry

    2017-07-01

    This process study is a companion to a randomized evaluation of a school-based, peer-led comprehensive sexual health education program, Teen Prevention Education Program (Teen PEP), in which 11th- and 12th-grade students are trained by school health educators to conduct informative workshops with ninth-grade peers in schools in North Carolina. The process study was designed to understand youth participants' perspectives on the program in order to gain insight into program effectiveness. This is a mixed-methods study in 7 schools, with online surveys (N = 88) and 8 focus groups with peer educators (N = 116), end-of-program surveys (N = 1122), 8 focus groups with ninth-grade workshop participants (N = 89), and observations of the Teen PEP class and workshops during the semester of implementation in each school, 2012-2014. Both peer educators and ninth graders perceived benefits of participating in Teen PEP across a range of domains, including intentions, skills, and knowledge and that the peer education modality was important in their valuation of the experience. Our findings suggest that the peer-led comprehensive sexual health education approach embodied in Teen PEP can be an important educational mechanism for teaching students information and skills to promote sexual health. © 2017, American School Health Association.

  10. Experiences from introduction of peer-to-peer teaching methods in Advanced Biochemistry E2010

    DEFF Research Database (Denmark)

    Brodersen, Ditlev; Etzerodt, Michael; Rasmussen, Jan Trige

    2012-01-01

    During the autumn semester 2010, we experimented with a range of active teaching methods on the course, Advanced Biochemistry, at the Department of Molecular Biology and Genetics.......During the autumn semester 2010, we experimented with a range of active teaching methods on the course, Advanced Biochemistry, at the Department of Molecular Biology and Genetics....

  11. Peer-to-Peer Teaching in Higher Education: A Critical Literature Review

    Science.gov (United States)

    Stigmar, Martin

    2016-01-01

    The aim of my critical literature review is to identify studies where students are engaged as partners in teaching in higher education and to analyze how tutors and tutees benefit from peer teaching. Thirty studies were included for review. Thirteen countries are represented and two thirds of the studies conducted in the United States of America…

  12. Distributed Random Process for a Large-Scale Peer-to-Peer Lottery

    OpenAIRE

    Grumbach, Stéphane; Riemann, Robert

    2017-01-01

    International audience; Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of protocols with no trusted third party. We argue that the security requirements of online lotteries are similar to those of online voting, and propose a novel distributed online lottery protocol that applies techniques dev...

  13. A Pedagogy for Outreach Activities in ICT: Promoting Peer to Peer Learning, Creativity and Experimentation

    Science.gov (United States)

    Lang, Catherine; Craig, Annemieke; Casey, Gail

    2017-01-01

    The importance of integrating technology into the classroom has become a priority at most levels of the curriculum in many countries around the world. This paper draws on the evaluation and research that informed four outreach programs. The authors acknowledge that teachers are generally time poor and often have limited information and…

  14. Peer-to-Peer Support for Science Journalism in the Developing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC has a long history of supporting the advancement of science journalism in the Third World. Since 2000, IDRC helped establish the London-based Science and Development Network (SciDev.Net) with regional nodes in developing countries and played a pivotal role in the Fourth Conference on Science Journalism ...

  15. Open knowledge coordinating knowledge sharing through peer-to-peer interaction

    NARCIS (Netherlands)

    Robertson, Dave; Giunchiglia, Fausto; Van Harmelen, Frank; Marchese, Maurizio; Sabou, Marta; Schorlemmer, Marco; Shadbolt, Nigel; Siebes, Ronnie; Sierra, Carles; Walton, Chris; Dasmahapatra, Srinandan; Dupplaw, Dave; Lewis, Paul; Yatskevich, Mikalai; Kotoulas, Spyros; De Pinninck, Adrian Perreau; Loizou, Antonis

    2008-01-01

    The drive to extend the Web by taking advantage of automated symbolic reasoning (the so-called Semantic Web) has been dominated by a traditional model of knowledge sharing, in which the focus is on task-independent standardisation of knowledge. It appears to be difficult, in practice, to standardise

  16. Integrated piping structural analysis system

    International Nuclear Information System (INIS)

    Motoi, Toshio; Yamadera, Masao; Horino, Satoshi; Idehata, Takamasa

    1979-01-01

    Structural analysis of the piping system for nuclear power plants has become larger in scale and in quantity. In addition, higher quality analysis is regarded as of major importance nowadays from the point of view of nuclear plant safety. In order to fulfill to the above requirements, an integrated piping structural analysis system (ISAP-II) has been developed. Basic philosophy of this system is as follows: 1. To apply the date base system. All information is concentrated. 2. To minimize the manual process in analysis, evaluation and documentation. Especially to apply the graphic system as much as possible. On the basis of the above philosophy four subsystems were made. 1. Data control subsystem. 2. Analysis subsystem. 3. Plotting subsystem. 4. Report subsystem. Function of the data control subsystem is to control all information of the data base. Piping structural analysis can be performed by using the analysis subsystem. Isometric piping drawing and mode shape, etc. can be plotted by using the plotting subsystem. Total analysis report can be made without the manual process through the reporting subsystem. (author)

  17. Multi-UAV Flight using Virtual Structure Combined with Behavioral Approach

    Directory of Open Access Journals (Sweden)

    Kownacki Cezary

    2016-06-01

    Full Text Available Implementations of multi-UAV systems can be divided mainly into two different approaches, centralised system that synchronises positions of each vehicle by a ground station and an autonomous system based on decentralised control, which offers more flexibility and independence. Decentralisation of multi-UAV control entails the need for information sharing between all vehicles, what in some cases could be problematic due to a significant amount of data to be sent over the wireless network. To improve the reliability and the throughput of information sharing inside the formation of UAVs, this paper proposes an approach that combines virtual structure with a leader and two flocking behaviours. Each UAV has assigned different virtual migration point referenced to the leader's position which is simultaneously the origin of a formation reference frame. All migration points create together a virtual rigid structure. Each vehicle uses local behaviours of cohesion and repulsion respectively, to track its own assigned point in the structure and to avoid a collision with the previous UAV in the structure. To calculate parameters of local behaviours, each UAV should know position and attitude of the leader to define the formation reference frame and also the actual position of the previous UAV in the structure. Hence, information sharing can be based on a chain of local peer-to-peer communication between two consecutive vehicles in the structure. In such solution, the information about the leader could be sequentially transmitted from one UAV to another. Numerical simulations were prepared and carried out to verify the effectiveness of the presented approach. Trajectories recorded during those simulations show collective, coherence and collision-free flights of the formation created with five UAVs.

  18. Comparing Pedophile Activity in Different P2P Systems

    OpenAIRE

    Raphaël Fournier; Thibault Cholez; Matthieu Latapy; Isabelle Chrisment; Clémence Magnien; Olivier Festor; Ivan Daniloff

    2014-01-01

    International audience; Peer-to-peer (P2P) systems are widely used to exchange content over the Internet. Knowledge of pedophile activity in such networks remains limited, despite having important social consequences. Moreover, though there are different P2P systems in use, previous academic works on this topic focused on one system at a time and their results are not directly comparable. We design a methodology for comparing KAD and eDonkey, two P2P systems among the most prominent ones and ...

  19. Electronic structure of spin systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha-Dasgupta, Tanusri

    2016-04-15

    Highlights: • We review the theoretical modeling of quantum spin systems. • We apply the Nth order muffin-tin orbital electronic structure method. • The method shows the importance of chemistry in the modeling. • CuTe{sub 2}O{sub 5} showed a 2-dimensional coupled spin dimer behavior. • Ti substituted Zn{sub 2}VO(PO{sub 4}){sub 2} showed spin gap behavior. - Abstract: Low-dimensional quantum spin systems, characterized by their unconventional magnetic properties, have attracted much attention. Synthesis of materials appropriate to various classes within these systems has made this field very attractive and a site of many activities. The experimental results like susceptibility data are fitted with the theoretical model to derive the underlying spin Hamiltonian. However, often such a fitting procedure which requires correct guess of the assumed spin Hamiltonian leads to ambiguity in deciding the representative model. In this review article, we will describe how electronic structure calculation within the framework of Nth order muffin-tin orbital (NMTO) based Wannier function technique can be utilized to identify the underlying spin model for a large number of such compounds. We will show examples from compounds belonging to vanadates and cuprates.

  20. An internet-based telemonitoring system of multiphysiological parameters.

    Science.gov (United States)

    Shuicai, Wu; Haomin, Li; Fangfang, Du; Yanping, Bai; Song, Zhang

    2007-08-01

    The purpose of this research was to design and realize a real-time tele-monitoring system with multiphysiological parameters using the Internet. Both the Client/Server (C/S) mode and Peer-to-Peer (P2P) mode were used in the system's network communication. The C/S mode is used to upload, retrieve, and download physiological data. The P2P mode provides realtime tele-monitoring and video chatting between doctors and patients. Experiment results show that P2P technology could efficiently improve the transmission speed of the physiological parameters. This study demonstrates an effective method of remote monitoring of physiological parameters in real time.

  1. Total Analysis System for Ship Structural Strength

    OpenAIRE

    Takuya, Yoneya; Hiroyuki, Kobayashi; Abdul M., Rahim; Yoshimichi, Sasaki; Masaki, Irisawa; Technical Investigation and Information Department, Research Center; Technical Investigation and Information Department, Research Center; Singapore Office; Technical Investigation and Information Department, Research Center; Technical Investigation and Information Department, Research Center

    2001-01-01

    This paper outlines a total analysis system for ship hull structures, which integrates a wide variety of analysis functions to realise practical applications of rational methods for assessing ship structural strength. It is based on direct calculation of wave-induced loads as well as three-dimensional structural analysis of an entire-ship or hold structure. Three major analysis functions of the total system are ship motion and wave load analysis, ship structural analysis and statistical analy...

  2. Robustness and structure of complex networks

    Science.gov (United States)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks

  3. Computerized management information systems and organizational structures

    Science.gov (United States)

    Zannetos, Z. S.; Sertel, M. R.

    1970-01-01

    The computerized management of information systems and organizational structures is discussed. The subjects presented are: (1) critical factors favoring centralization and decentralization of organizations, (2) classification of organizations by relative structure, (3) attempts to measure change in organization structure, and (4) impact of information technology developments on organizational structure changes.

  4. A Simple FSPN Model of P2P Live Video Streaming System

    OpenAIRE

    Kotevski, Zoran; Mitrevski, Pece

    2011-01-01

    Peer to Peer (P2P) live streaming is relatively new paradigm that aims at streaming live video to large number of clients at low cost. Many such applications already exist in the market, but, prior to creating such system it is necessary to analyze its performance via representative model that can provide good insight in the system’s behavior. Modeling and performance analysis of P2P live video streaming systems is challenging task which requires addressing many properties and issues of P2P s...

  5. Reliability and optimization of structural systems

    International Nuclear Information System (INIS)

    Thoft-Christensen, P.

    1987-01-01

    The proceedings contain 28 papers presented at the 1st working conference. The working conference was organized by the IFIP Working Group 7.5. The proceedings also include 4 papers which were submitted, but for various reasons not presented at the working conference. The working conference was attended by 50 participants from 18 countries. The conference was the first scientific meeting of the new IFIP Working Group 7.5 on 'Reliability and Optimization of Structural Systems'. The purpose of the Working Group 7.5 is to promote modern structural system optimization and reliability theory, to advance international cooperation in the field of structural system optimization and reliability theory, to stimulate research, development and application of structural system optimization and reliability theory, to further the dissemination and exchange of information on reliability and optimization of structural system optimization and reliability theory, and to encourage education in structural system optimization and reliability theory. (orig./HP)

  6. EPICS system: system structure and user interface

    International Nuclear Information System (INIS)

    West, R.E.; Bartlett, J.F.; Bobbitt, J.S.; Lahey, T.E.; Kramper, B.J.; MacKinnon, B.A.

    1984-02-01

    This paper present the user's view of and the general organization of the EPICS control system at Fermilab. Various subsystems of the EPICS control system are discussed. These include the user command language, software protection, the device database, remote computer interfaces, and several application utilities. This paper is related to two other papers on EPICS: an overview paper and a detailed implementation paper

  7. Reliable file sharing in distributed operating system using web RTC

    Science.gov (United States)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  8. System identification and structural health monitoring of bridge structures

    OpenAIRE

    Islami, Kleidi

    2013-01-01

    This research study addresses two issues for the identification of structural characteristics of civil infrastructure systems. The first one is related to the problem of dynamic system identification, by means of experimental and operational modal analysis, applied to a large variety of bridge structures. Based on time and frequency domain techniques and mainly with output-only acceleration, velocity or strain data, modal parameters have been estimated for suspension bridges, masonry arch bri...

  9. A Multiobjective Fuzzy Inference System based Deployment Strategy for a Distributed Mobile Sensor Network

    Directory of Open Access Journals (Sweden)

    Amol P. Bhondekar

    2010-03-01

    Full Text Available Sensor deployment scheme highly governs the effectiveness of distributed wireless sensor network. Issues such as energy conservation and clustering make the deployment problem much more complex. A multiobjective Fuzzy Inference System based strategy for mobile sensor deployment is presented in this paper. This strategy gives a synergistic combination of energy capacity, clustering and peer-to-peer deployment. Performance of our strategy is evaluated in terms of coverage, uniformity, speed and clustering. Our algorithm is compared against a modified distributed self-spreading algorithm to exhibit better performance.

  10. SecMon: End-to-End Quality and Security Monitoring System

    OpenAIRE

    Ciszkowski, Tomasz; Eliasson, Charlott; Fiedler, Markus; Kotulski, Zbigniew; Lupu, Radu; Mazurczyk, Wojciech

    2008-01-01

    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable Q...

  11. Transition-Systems, Event Structures, and Unfoldings

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Rozenberg, Grzegorz; Thiagarajan, P.S.

    1995-01-01

    systems. Here we show that by smoothly strengthening the regional axioms for elementary transition systems, one obtains a subclass called occurrence transition system. We then prove that occurrence transition systems are the transition system model of yet another basic model of concurrency, namely, prime......A subclass of transition systems called elementary transition systems can be identified with the help of axioms based on a structural notion called regions. Elementary transition systems have been shown to be the transition system model of a basic system model of net theory called elementary net...

  12. Asymptotic structure of isolated systems

    International Nuclear Information System (INIS)

    Schmidt, B.G.

    1979-01-01

    The main methods to formulate asymptotic flatness conditions are introduced and motivation and basic ideas are emphasized. Any asymptotic flatness condition proposed up to now describes space-times which behave somehow like Minkowski space, and a very explicit exposition of the structure at infinity of Minkowski space is given. This structure is used to describe the asymptotic behaviour of fields on Minkowski space in a frame-dependent way. The definition of null infinity for curved space-time according to Penrose is given and attempts to define spacelike infinity are outlined. The conformal bundle approach to the formulation of asymptotic behaviour is described and its relation to null and spacelike infinity is given, as far as known. (Auth.)

  13. Multipole structure and coordinate systems

    International Nuclear Information System (INIS)

    Burko, Lior M

    2007-01-01

    Multipole expansions depend on the coordinate system, so that coefficients of multipole moments can be set equal to zero by an appropriate choice of coordinates. Therefore, it is meaningless to say that a physical system has a nonvanishing quadrupole moment, say, without specifying which coordinate system is used. (Except if this moment is the lowest non-vanishing one.) This result is demonstrated for the case of two equal like electric charges. Specifically, an adapted coordinate system in which the potential is given by a monopole term only is explicitly found, the coefficients of all higher multipoles vanish identically. It is suggested that this result can be generalized to other potential problems, by making equal coordinate surfaces adapt to the potential problem's equipotential surfaces

  14. Structure studies of macromolecular systems

    Czech Academy of Sciences Publication Activity Database

    Hašek, Jindřich; Dohnálek, Jan; Skálová, Tereza; Dušková, Jarmila; Kolenko, Petr

    2006-01-01

    Roč. 13, č. 3 (2006), s. 136 ISSN 1211-5894. [Czech and Slovak Crystallographic Colloquium. 22.06.2006-24.06.2006, Grenoble] R&D Projects: GA AV ČR IAA4050811; GA MŠk 1K05008 Keywords : structure * X-ray diffraction * synchrotron Subject RIV: CD - Macromolecular Chemistry http://www. xray .cz/ms/default.htm

  15. Strategies for Optimal Design of Structural Systems

    DEFF Research Database (Denmark)

    Enevoldsen, I.; Sørensen, John Dalsgaard

    1992-01-01

    Reliability-based design of structural systems is considered. Especially systems where the reliability model is a series system of parallel systems are analysed. A sensitivity analysis for this class of problems is presented. Direct and sequential optimization procedures to solve the optimization...

  16. On pole structure assignment in linear systems

    Czech Academy of Sciences Publication Activity Database

    Loiseau, J.-J.; Zagalak, Petr

    2009-01-01

    Roč. 82, č. 7 (2009), s. 1179-1192 ISSN 0020-7179 R&D Projects: GA ČR(CZ) GA102/07/1596 Institutional research plan: CEZ:AV0Z10750506 Keywords : linear systems * linear state feedback * pole structure assignment Subject RIV: BC - Control Systems Theory Impact factor: 1.124, year: 2009 http://library.utia.cas.cz/separaty/2009/AS/zagalak-on pole structure assignment in linear systems.pdf

  17. Use of structural lining systems

    International Nuclear Information System (INIS)

    Walker, Roger H.; Rowley, Charles W.

    1999-01-01

    Although the application of 'inserted form' technology has been available for application to inaccessible pipe for several years, the application of sprayed form' technology in recent years has substantially reduced the cost of correcting degraded inaccessible pipe for structural strength, infiltration barrier, and corrosion/erosion resistance. In early 1999 the ASME approved a B and PV Code Section XI code case that provided the application of the 'inserted form' technology with certain requirements. The application of 'inserted form' technology for smaller pipes (less than four feet in diameter) and 'sprayed form' technology for larger pies (greater than two feet in diameter) can reduce the cost of replacing the buried pipe by a factor of three to ten. In addition the 'sprayed form' technology can be applied relatively quickly, thereby markedly reducing the out-of-service time required for the repair. (author)

  18. Symbolic aesthetics in steel structural systems

    Directory of Open Access Journals (Sweden)

    Usama Abdul-Mun'em Khuraibet

    2015-02-01

    Full Text Available The aesthetic expression and its orders are important for steel structures forming. Steel structures are a compilation of structural elements, where its shapes have standard dimensions and pre-fabricated. As the steel construction systems not only aim to achieve the functional requirements for users, but must also have the symbolic aesthetics which provides visually and cognitive expression for viewers. In this sense the research interested in expressional aesthetics in these systems and highlights the importance of attention as structural items. Therefore the visual items which related with steel structures contain some of the most powerful forms of modern architecture, steel structures with a glass cladding, agility and accuracy in manufacture of structural elements as visual items, structural interest in the forms of spaces which have long span systems or in high buildings are different forms of expression and influence. So the research focuses on the study of those expressive patterns related with the steel construction properties, including the advantages of these systems at the level of strength and firmness, flexibility and economy as well as aesthetic and expression. Accordingly, the research problem concentrated on educational shortage in the study of the structural steel system aspects concerning constructional characteristic, expressive and aesthetic features, and how to deal with them as a language bearing the symbols and meanings which have clear structural style, because it the best ways to make those systems as communication means with users, by premise that the use of expressional symbol in steel construction increases the aesthetic value. Therefore the research aims to reveal the most structural and expressive patterns by analysis the expressional means and steel structural aesthetics.

  19. Reliability analysis and assessment of structural systems

    International Nuclear Information System (INIS)

    Yao, J.T.P.; Anderson, C.A.

    1977-01-01

    The study of structural reliability deals with the probability of having satisfactory performance of the structure under consideration within any specific time period. To pursue this study, it is necessary to apply available knowledge and methodology in structural analysis (including dynamics) and design, behavior of materials and structures, experimental mechanics, and the theory of probability and statistics. In addition, various severe loading phenomena such as strong motion earthquakes and wind storms are important considerations. For three decades now, much work has been done on reliability analysis of structures, and during this past decade, certain so-called 'Level I' reliability-based design codes have been proposed and are in various stages of implementation. These contributions will be critically reviewed and summarized in this paper. Because of the undesirable consequences resulting from the failure of nuclear structures, it is important and desirable to consider the structural reliability in the analysis and design of these structures. Moreover, after these nuclear structures are constructed, it is desirable for engineers to be able to assess the structural reliability periodically as well as immediately following the occurrence of severe loading conditions such as a strong-motion earthquake. During this past decade, increasing use has been made of techniques of system identification in structural engineering. On the basis of non-destructive test results, various methods have been developed to obtain an adequate mathematical model (such as the equations of motion with more realistic parameters) to represent the structural system

  20. Reliability of structural systems subject to fatigue

    International Nuclear Information System (INIS)

    Rackwitz, R.

    1984-01-01

    Concepts and computational procedures for the reliability calculation of structural systems subject to fatigue are outlined. Systems are dealt with by approximately computing componential times to first failure. So-called first-order reliability methods are then used to formulate dependencies between componential failures and to evaluate the system failure probability. (Author) [pt

  1. LOFT system structural response during subcooled blowdown

    International Nuclear Information System (INIS)

    Martinell, J.S.

    1978-01-01

    The Loss-of-Fluid Test (LOFT) facility is a highly instrumented, pressurized water reactor test system designed to be representative of large pressurized water reactors (LPWRs) for the simulation of loss-of-coolant accidents (LOCAs). Detailed structural analysis and appropriate instrumentation (accelerometers and strain gages) on the LOFT system provided information for evaluation of the structural response of the LOFT facility for loss-of-coolant experiment (LOCE) induced loads. In general, the response of the system during subcooled blowdown was small with typical structural accelerations below 2.0 G's and dynamic strains less than 150 x 10 - 6 m/m. The accelerations measured at the steam generator and simulated steam generator flange exceeded LOCE design values; however, integration of the accelerometer data at these locations yielded displacements which were less than one half of the design values associated with a safe shutdown earthquake (SSE), which assures structural integrity for LOCE loads. The existing measurement system was adequate for evaluation of the LOFT system response during the LOCEs. The conditions affecting blowdown loads during nuclear LOCEs will be nearly the same as those experienced during the nonnuclear LOCEs, and the characteristics of the structural response data in both types of experiments are expected to be the same. The LOFT system is concluded to be adequately designed and further analysis of the LOFT system with structural codes is not required for future LOCE experiments

  2. Dynamic electronic institutions in agent oriented cloud robotic systems.

    Science.gov (United States)

    Nagrath, Vineet; Morel, Olivier; Malik, Aamir; Saad, Naufal; Meriaudeau, Fabrice

    2015-01-01

    The dot-com bubble bursted in the year 2000 followed by a swift movement towards resource virtualization and cloud computing business model. Cloud computing emerged not as new form of computing or network technology but a mere remoulding of existing technologies to suit a new business model. Cloud robotics is understood as adaptation of cloud computing ideas for robotic applications. Current efforts in cloud robotics stress upon developing robots that utilize computing and service infrastructure of the cloud, without debating on the underlying business model. HTM5 is an OMG's MDA based Meta-model for agent oriented development of cloud robotic systems. The trade-view of HTM5 promotes peer-to-peer trade amongst software agents. HTM5 agents represent various cloud entities and implement their business logic on cloud interactions. Trade in a peer-to-peer cloud robotic system is based on relationships and contracts amongst several agent subsets. Electronic Institutions are associations of heterogeneous intelligent agents which interact with each other following predefined norms. In Dynamic Electronic Institutions, the process of formation, reformation and dissolution of institutions is automated leading to run time adaptations in groups of agents. DEIs in agent oriented cloud robotic ecosystems bring order and group intellect. This article presents DEI implementations through HTM5 methodology.

  3. The structural robustness of multiprocessor computing system

    Directory of Open Access Journals (Sweden)

    N. Andronaty

    1996-03-01

    Full Text Available The model of the multiprocessor computing system on the base of transputers which permits to resolve the question of valuation of a structural robustness (viability, survivability is described.

  4. Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment

    Institute of Scientific and Technical Information of China (English)

    Yu-Feng Wang; Yoshiaki Hori; Kouichi Sakurai

    2008-01-01

    Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important information infrastructure should be multi-disciplinary research topic, and reflect certain features of our society. So, from economic and social perspective, this paper designs the incentive-compatible reputation feedback scheme based on well-known economic model, and characterizes the social features of trust network in terms of efficiency and cost. Specifically, our framework has two distinctive purposes: first, from high-level perspective, we argue trust system is a special kind of social network, and an accurate characterization of the structural properties of the network can be of fundamental importance to understand the dynamics of the system. Thus, inspired by the concept of weighted small-world, this paper proposes new measurements to characterize the social properties of trust system, that is, highg lobal and local efficiency, and low cost; then, from relative low-level perspective, we argue that reputation feedback is a special kind of information, and it is not free. So, based on economic model, VCG (Vickrey-Clarke-Grove)-like reputation remuneration mechanism is proposed to stimulate rational peers not only to provide reputation feedback, but truthfully offer feedback. Furthermore, considering that trust and reputation is subjective, we classify the trust into functional trust and referral trust, and extend the referral trust to include two factors: similarity and truthfulness, which can efficiently reduce the trust inference error. The preliminary simulation results show the benefits of our proposal and the emergence of certain social properties in trust network.

  5. Breaking Dense Structures: Proving Stability of Densely Structured Hybrid Systems

    Directory of Open Access Journals (Sweden)

    Eike Möhlmann

    2015-06-01

    Full Text Available Abstraction and refinement is widely used in software development. Such techniques are valuable since they allow to handle even more complex systems. One key point is the ability to decompose a large system into subsystems, analyze those subsystems and deduce properties of the larger system. As cyber-physical systems tend to become more and more complex, such techniques become more appealing. In 2009, Oehlerking and Theel presented a (de-composition technique for hybrid systems. This technique is graph-based and constructs a Lyapunov function for hybrid systems having a complex discrete state space. The technique consists of (1 decomposing the underlying graph of the hybrid system into subgraphs, (2 computing multiple local Lyapunov functions for the subgraphs, and finally (3 composing the local Lyapunov functions into a piecewise Lyapunov function. A Lyapunov function can serve multiple purposes, e.g., it certifies stability or termination of a system or allows to construct invariant sets, which in turn may be used to certify safety and security. In this paper, we propose an improvement to the decomposing technique, which relaxes the graph structure before applying the decomposition technique. Our relaxation significantly reduces the connectivity of the graph by exploiting super-dense switching. The relaxation makes the decomposition technique more efficient on one hand and on the other allows to decompose a wider range of graph structures.

  6. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  7. Extending Modal Transition Systems with Structured Labels

    DEFF Research Database (Denmark)

    Bauer, Sebastian S.; Juhl, Line; Larsen, Kim Guldstrand

    2012-01-01

    We introduce a novel formalism of label-structured modal transition systems that combines the classical may/must modalities on transitions with structured labels that represent quantitative aspects of the model. On the one hand, the specification formalism is general enough to include models like...... weighted modal transition systems and allows the system developers to employ more complex label refinement than in the previously studied theories. On the other hand, the formalism maintains the desirable properties required by any specification theory supporting compositional reasoning. In particular, we...

  8. A structural query system for Han characters

    DEFF Research Database (Denmark)

    Skala, Matthew

    2016-01-01

    The IDSgrep structural query system for Han character dictionaries is presented. This dictionary search system represents the spatial structure of Han characters using Extended Ideographic Description Sequences (EIDSes), a data model and syntax based on the Unicode IDS concept. It includes a query...... language for EIDS databases, with a freely available implementation and format translation from popular third-party IDS and XML character databases. The system is designed to suit the needs of font developers and foreign language learners. The search algorithm includes a bit vector index inspired by Bloom...... filters to support faster query operations. Experimental results are presented, evaluating the effect of the indexing on query performance....

  9. Probabilistic Design of Offshore Structural Systems

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    1988-01-01

    Probabilistic design of structural systems is considered in this paper. The reliability is estimated using first-order reliability methods (FORM). The design problem is formulated as the optimization problem to minimize a given cost function such that the reliability of the single elements...... satisfies given requirements or such that the systems reliability satisfies a given requirement. Based on a sensitivity analysis optimization procedures to solve the optimization problems are presented. Two of these procedures solve the system reliability-based optimization problem sequentially using quasi......-analytical derivatives. Finally an example of probabilistic design of an offshore structure is considered....

  10. Probabilistic Design of Offshore Structural Systems

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    Probabilistic design of structural systems is considered in this paper. The reliability is estimated using first-order reliability methods (FORM). The design problem is formulated as the optimization problem to minimize a given cost function such that the reliability of the single elements...... satisfies given requirements or such that the systems reliability satisfies a given requirement. Based on a sensitivity analysis optimization procedures to solve the optimization problems are presented. Two of these procedures solve the system reliability-based optimization problem sequentially using quasi......-analytical derivatives. Finally an example of probabilistic design of an offshore structure is considered....

  11. Ecosocial System: Structure, Development Laws and Functioning

    Directory of Open Access Journals (Sweden)

    E. I. Alekseev

    2004-01-01

    Full Text Available The paper substantiates necessity to develop a unified system of socio-ecological knowledge. Ecosophy being a forming component of dialectic-materialistic philosophy has been proposed as such system. Structure, development laws and functioning of eco-social system are considered as a part of ecosophy theory. Standard laws and ecological principles being widely recognized by ecologically orientated theorists are stated in the paper.

  12. Structured Performance Analysis for Component Based Systems

    OpenAIRE

    Salmi , N.; Moreaux , Patrice; Ioualalen , M.

    2012-01-01

    International audience; The Component Based System (CBS) paradigm is now largely used to design software systems. In addition, performance and behavioural analysis remains a required step for the design and the construction of efficient systems. This is especially the case of CBS, which involve interconnected components running concurrent processes. % This paper proposes a compositional method for modeling and structured performance analysis of CBS. Modeling is based on Stochastic Well-formed...

  13. Jefferson Lab Data Acquisition Run Control System

    International Nuclear Information System (INIS)

    Vardan Gyurjyan; Carl Timmer; David Abbott; William Heyes; Edward Jastrzembski; David Lawrence; Elliott Wolin

    2004-01-01

    A general overview of the Jefferson Lab data acquisition run control system is presented. This run control system is designed to operate the configuration, control, and monitoring of all Jefferson Lab experiments. It controls data-taking activities by coordinating the operation of DAQ sub-systems, online software components and third-party software such as external slow control systems. The main, unique feature which sets this system apart from conventional systems is its incorporation of intelligent agent concepts. Intelligent agents are autonomous programs which interact with each other through certain protocols on a peer-to-peer level. In this case, the protocols and standards used come from the domain-independent Foundation for Intelligent Physical Agents (FIPA), and the implementation used is the Java Agent Development Framework (JADE). A lightweight, XML/RDF-based language was developed to standardize the description of the run control system for configuration purposes

  14. Risk Informed Structural Systems Integrity Management

    DEFF Research Database (Denmark)

    Nielsen, Michael Havbro Faber

    2017-01-01

    The present paper is predominantly a conceptual contribution with an appraisal of major developments in risk informed structural integrity management for offshore installations together with a discussion of their merits and the challenges which still lie ahead. Starting point is taken in a selected...... overview of research and development contributions which have formed the basis for Risk Based Inspection Planning (RBI) as we know it today. Thereafter an outline of the methodical basis for risk informed structural systems integrity management, i.e. the Bayesian decision analysis is provided in summary....... The main focus is here directed on RBI for offshore facilities subject to fatigue damages. New ideas and methodical frameworks in the area of robustness and resilience modeling of structural systems are then introduced, and it is outlined how these may adequately be utilized to enhance Structural Integrity...

  15. Structural materials for innovative nuclear systems (SMINS)

    International Nuclear Information System (INIS)

    2008-01-01

    Structural materials research is a field of growing relevance in the nuclear sector, especially for the different innovative reactor systems being developed within the Generation IV International Forum (GIF), for critical and subcritical transmutation systems, and of interest to the Global Nuclear Energy Partnership (GNEP). Under the auspices of the NEA Nuclear Science Committee (NSC) the Workshop on Structural Materials for Innovative Nuclear Systems (SMINS) was organised in collaboration with the Forschungszentrum Karlsruhe in Germany. The objectives of the workshop were to exchange information on structural materials research issues and to discuss ongoing programmes, both experimental and in the field of advanced modelling. These proceedings include the papers and the poster session materials presented at the workshop, representing the international state of the art in this domain. (author)

  16. Reliability Based Optimization of Structural Systems

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    1987-01-01

    The optimization problem to design structural systems such that the reliability is satisfactory during the whole lifetime of the structure is considered in this paper. Some of the quantities modelling the loads and the strength of the structure are modelled as random variables. The reliability...... is estimated using first. order reliability methods ( FORM ). The design problem is formulated as the optimization problem to minimize a given cost function such that the reliability of the single elements satisfies given requirements or such that the systems reliability satisfies a given requirement....... For these optimization problems it is described how a sensitivity analysis can be performed. Next, new optimization procedures to solve the optimization problems are presented. Two of these procedures solve the system reliability based optimization problem sequentially using quasi-analytical derivatives. Finally...

  17. Reliability assessment of nuclear structural systems

    International Nuclear Information System (INIS)

    Reich, M.; Hwang, H.

    1983-01-01

    Reliability assessment of nuclear structural systems has been receiving more emphasis over the last few years. This paper deals with the recent progress made by the Structural Analysis Division of Brookhaven National Laboratory (BNL), in the development of a probability-based reliability analysis methodology for safety evaluation of reactor containments and other seismic category I structures. An important feature of this methodology is the incorporation of finite element analysis and random vibration theory. By utilizing this method, it is possible to evaluate the safety of nuclear structures under various static and dynamic loads in terms of limit state probability. Progress in other related areas, such as the establishment of probabilistic characteristics for various loads and structural resistance, are also described. Results of an application of the methodology to a realistic reinforced concrete containment subjected to dead and live loads, accidental internal pressures and earthquake ground accelerations are presented

  18. Structural materials for fusion reactor blanket systems

    International Nuclear Information System (INIS)

    Bloom, E.E.; Smith, D.L.

    1984-01-01

    Consideration of the required functions of the blanket and the general chemical, mechanical, and physical properties of candidate tritium breeding materials, coolants, structural materials, etc., leads to acceptable or compatible combinations of materials. The presently favored candidate structural materials are the austenitic stainless steels, martensitic steels, and vanadium alloys. The characteristics of these alloy systems which limit their application and potential performance as well as approaches to alloy development aimed at improving performance (temperature capability and lifetime) will be described. Progress towards understanding and improving the performance of structural materials has been substantial. It is possible to develop materials with acceptable properties for fusion applications

  19. Planetary ring systems properties, structures, and evolution

    CERN Document Server

    Murray, Carl D

    2018-01-01

    Planetary rings are among the most intriguing structures of our solar system and have fascinated generations of astronomers. Collating emerging knowledge in the field, this volume reviews our current understanding of ring systems with reference to the rings of Saturn, Uranus, Neptune, and more. Written by leading experts, the history of ring research and the basics of ring–particle orbits is followed by a review of the known planetary ring systems. All aspects of ring system science are described in detail, including specific dynamical processes, types of structures, thermal properties and their origins, and investigations using computer simulations and laboratory experiments. The concluding chapters discuss the prospects of future missions to planetary rings, the ways in which ring science informs and is informed by the study of other astrophysical disks, and a perspective on the field's future. Researchers of all levels will benefit from this thorough and engaging presentation.

  20. Local Farmers' Organisations: A Space for Peer-to-Peer Learning? The Case of Milk Collection Cooperatives in Morocco

    Science.gov (United States)

    Faysse, Nicolas; Srairi, Mohamed Taher; Errahj, Mostafa

    2012-01-01

    Purpose: The study investigated to what extent local farmers' organisations are spaces where farmers discuss, learn and innovate. Design/methodology/approach: Two milk collection cooperatives in Morocco were studied. The study analysed the discussion networks, their impacts on farmers' knowledge and innovation, and the performance of collective…

  1. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    Science.gov (United States)

    Faruq Ibn Ibrahimy, Abdullah; Rafiqul, Islam Md; Anwar, Farhat; Ibn Ibrahimy, Muhammad

    2013-12-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper.

  2. The Contribution of Online Peer-to-Peer Communication Among Patients With Adrenal Disease to Patient-Centered Care

    NARCIS (Netherlands)

    Kauw, D.; Repping-Wuts, H.; Noordzij, A.; Stikkelbroeck, N.; Hermus, A.R.; Faber, M.J.

    2015-01-01

    BACKGROUND: Addison's disease and Cushing's syndrome are rare. The Dutch Adrenal Society offers an online forum for Dutch adrenal patients to meet and communicate. However, little is known about the added value such a forum has for the delivery of patient-centered care. OBJECTIVE: Our aim was to

  3. Help&Learn: A peer-to-peer architecture to support knowledge management in collaborative learning communities

    NARCIS (Netherlands)

    Guizzardi-Silva Souza, R.; Aroyo, L.M.; Wagner, G.

    Collaborative learning motivates active participation of individuals in their learning process, which often results in the attaining of creative and critical thinking skills. This way, students and teachers are viewed as both providers and consumers of knowledge gathered in environments where

  4. The contribution of online peer-to-peer communication among patients with adrenal disease to patient-centered care.

    Science.gov (United States)

    Kauw, Dirkjan; Repping-Wuts, Han; Noordzij, Alida; Stikkelbroeck, Nike; Hermus, Ad; Faber, Marjan

    2015-02-25

    Addison's disease and Cushing's syndrome are rare. The Dutch Adrenal Society offers an online forum for Dutch adrenal patients to meet and communicate. However, little is known about the added value such a forum has for the delivery of patient-centered care. Our aim was to analyze the purposes of online patient-to-patient forum conversations, within the context of patient-centered care. For this study a consecutive sample of 300 questions ("threads") from the past 3.5 years was selected from the forum. The content of these patient-driven questions was analyzed based on the dimensions of patient-centeredness of the Picker Institute. This analysis was performed using ATLAS.ti. From the 390 questions analyzed, 80.8% (N=315) were intended to gain more information about the disease, the treatment, and to verify if other patients had similar complaints. To a much lesser extent (38/390, 9.7%), questions expressed a call for emotional support. Patients answered primarily by giving practical tips to fellow patients and to share their own experiences. On an online patient forum for Cushing's syndrome and Addison's disease, patients appear to primarily gain knowledge and, to a lesser extent, emotional support from their peers. This experience-based knowledge has become a very important information source. As such, patients can make a substantial contribution to the creation of patient-centered care if this knowledge is integrated into the care provided by health care professionals.

  5. Investigating the Effects of Peer to Peer Prompts on Collaborative Argumentation, Consensus and Perceived Efficacy in Collaborative Learning

    Science.gov (United States)

    Harney, Owen M.; Hogan, Michael J.; Quinn, Sarah

    2017-01-01

    In a society which is calling for more productive modes of collaboration to address increasingly complex scientific and social issues, greater involvement of students in dialogue, and increased emphasis on collaborative discourse and argumentation, become essential modes of engagement and learning. This paper investigates the effects of…

  6. Peer-to-Peer JXTA Architecture for Continuing Mobile Medical Education Incorporated in Rural Public Health Centers

    OpenAIRE

    Rajasekaran, Rajkumar; Sriman Narayana Iyengar, Nallani Chackravatula

    2013-01-01

    Objectives: Mobile technology helps to improve continuing medical education; this includes all aspects of public health care as well as keeping one?s knowledge up-to-date. The program of continuing medical and health education is intertwined with mobile health technology, which forms an imperative component of national strategies in health. Continuing mobile medical education (CMME) programs are designed to ensure that all medical and health-care professionals stay up-to-date with the knowled...

  7. Advice on Life? Online Fan Forums as a Space for Peer-to-Peer Sex and Relationships Education

    Science.gov (United States)

    Masanet, Maria-Jose; Buckingham, David

    2015-01-01

    Previous research has pointed to the potential of entertainment media as a source of informal sex education for young people. New social media may offer additional potential in this respect. In this paper, we consider the pedagogical possibilities and limitations of online fan forums, via a case study of the forums of the controversial British…

  8. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  9. The Opportunity in Higher Education: How Open Education and Peer-to-Peer Networks Are Essential for Higher Education

    Science.gov (United States)

    Ondercin, David J.

    2010-01-01

    The university's role in the nation's economy is to increase its ability to transfer research to industry, generate new inventions and patents, and spin-off its technology in the form of startup companies. As such, there has been a movement in the USA and around the world to make universities "engines of innovation", and to enhance their ability…

  10. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    International Nuclear Information System (INIS)

    Ibrahimy, Abdullah Faruq Ibn; Rafiqul, Islam Md; Anwar, Farhat; Ibrahimy, Muhammad Ibn

    2013-01-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper

  11. What makes a sustainable business model successful? : An empirical comparison of two peer-to-peer goods-sharing platforms

    NARCIS (Netherlands)

    Piscicelli, Laura; Ludden, Geke D.S.; Cooper, Tim

    2018-01-01

    Sustainable business models are intended to create economic value while benefitting the environment and society. Their wider adoption and diffusion is necessary to tackle pressing societal problems. How they are implemented and what determines their success (or lack thereof) in the market is not yet

  12. MOBI-DIC: MOBIle DIssemination of loCal information in Peer-to-Peer Wireless Networks, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Information Technology (IT) is a key element in the successful achievement of NASA's strategic goals. Modern IT tools and techniques have the capability to redefine...

  13. Personal Competencies/Personalized Learning: Reflection on Instruction. A Peer-to-Peer Learning and Observation Tool

    Science.gov (United States)

    Twyman, Janet; Redding, Sam

    2015-01-01

    This publication and its companion, "Personal Competencies/Personalized Learning: Lesson Plan Reflection Guide," were created in response to a request for further development of the practical application of personalized learning concepts by teachers. Personalized learning varies the time, place, and pace of learning for each student, and…

  14. Distributed Identification of Top-l Inner Product Elements and its Application in a Peer-to-Peer Network

    Data.gov (United States)

    National Aeronautics and Space Administration — Inner product computation is an important primitive used in many techniques for feature dependency detection, distance computation, clustering and correlation...

  15. Hamiltonian structure for rescaled integrable Lorenz systems

    International Nuclear Information System (INIS)

    Haas, F.; Goedert, J.

    1993-01-01

    It is shown that three among the known invariants for the Lorenz system recast the original equations into a Hamiltonian form. This is made possible by an appropriate time-dependent rescaling and the use of a generalized formalism with non-trivial structure functions. (author)

  16. Phase structure rewrite systems in information retrieval

    Science.gov (United States)

    Klingbiel, P. H.

    1985-01-01

    Operational level automatic indexing requires an efficient means of normalizing natural language phrases. Subject switching requires an efficient means of translating one set of authorized terms to another. A phrase structure rewrite system called a Lexical Dictionary is explained that performs these functions. Background, operational use, other applications and ongoing research are explained.

  17. Designing complex systems - a structured activity

    NARCIS (Netherlands)

    van der Veer, Gerrit C.; van Vliet, Johannes C.; Lenting, Bert; Olson, Gary M.; Schuon, Sue

    1995-01-01

    This paper concerns the development of complex systems from the point of view of design as a structure of activities, related both to the clients and the users. Several modeling approaches will be adopted for different aspects of design, and several views on design will be integrated. The proposed

  18. System reliability developments in structural engineering

    International Nuclear Information System (INIS)

    Moses, F.

    1982-01-01

    Two major limitations occur in present structural design code developments utilizing reliability theory. The notional system reliabilities may differ significantly from calibrated component reliabilities. Secondly, actual failures are often due to gross errors not reflected in most present code formats. A review is presented of system reliability methods and further new concepts are developed. The incremental load approach for identifying and expressing collapse modes is expanded by employing a strategy to identify and enumerate the significant structural collapse modes. It further isolates the importance of critical components in the system performance. Ductile and brittle component behavior and strength correlation is reflected in the system model and illustrated in several examples. Modal combinations for the system reliability are also reviewed. From these developments a system factor can be addended to component safety checking equations. Values may be derived from system behavior by substituting in a damage model which accounts for the response range from component failure to collapse. Other strategies are discussed which emphasize quality assurance during design and in-service inspection for components whose behavior is critical to the system reliability. (Auth.)

  19. Cold Climate Structural Fire Danger Rating System?

    Directory of Open Access Journals (Sweden)

    Maria-Monika Metallinou

    2018-03-01

    Full Text Available Worldwide, fires kill 300,000 people every year. The fire season is usually recognized to be in the warmer periods of the year. Recent research has, however, demonstrated that the colder season also has major challenges regarding severe fires, especially in inhabited (heated wood-based structures in cold-climate areas. Knowledge about the effect of dry cellulose-based materials on fire development, indoor and outdoor, is a motivation for monitoring possible changes in potential fire behavior and associated fire risk. The effect of wind in spreading fires to neighboring structures points towards using weather forecasts as information on potential fire spread behavior. As modern weather forecasts include temperature and relative humidity predictions, there may already be sufficient information available to develop a structural fire danger rating system. Such a system may include the following steps: (1 Record weather forecasts and actual temperature and relative humidity inside and outside selected structures; (2 Develop a meteorology-data-based model to predict indoor relative humidity levels; (3 Perform controlled drying chamber experiments involving typical hygroscopic fire fuel; (4 Compare the results to the recorded values in selected structures; and (5 Develop the risk model involving the results from drying chamber experiments, weather forecasts, and separation between structures. Knowledge about the structures at risk and their use is also important. The benefits of an automated fire danger rating system would be that the society can better plan for potentially severe cold-climate fires and thereby limit the negative impacts of such fires.

  20. System Reduction and Damping of Flexible Structures

    DEFF Research Database (Denmark)

    Høgsberg, Jan Riess; Krenk, Steen

    2007-01-01

    An increasing number of flexible structures such as cable-stayed bridges, pedestrian bridges and high-rise buildings are fitted with local dampers to mitigate vibration problems. In principle the effect of local dampers can be analyzed by use of complex modes, e.g. in conjunction with an averaging...... technique for local linearization of the damper characteristics. However, the complex mode shapes and frequencies depend on the magnitude of the damper and therefore are less suitable for design of the damper system. An efficient alternative consists in the use of a two-component representation...... of the damped modes of the structure. The idea is to represent the damped mode as a linear combination of the modes that occur in two distinctly different situations representing extreme conditions: the mode shape of the structure without the damper(s), and the mode shape of the structure, when the damper...

  1. FINANCIAL SYSTEM STRUCTURE AND STABILITY DURING TRANSITION

    Directory of Open Access Journals (Sweden)

    Firtescu Bogdan

    2012-07-01

    Full Text Available The process of transition from socialist economy to market economy was not considered an end in itself, but a necessity, and standing proof to achieve high levels of sustainable development. All former socialist countries are characterized by an early transition recession transformation result of the restructuring, loss of markets, tough competition from foreign products, best quality, or in other cases cheaper. To express the financial system structure in transition we take into discussion data that reflects representatives mutations and restructuring in Central and Eastern European countries, such Bulgaria, Czech Republic, Hungary, Poland and Romania. For all countries we show some important changes of financial system during transition and construct an image matrix that illustrates important indicators of financial system structure and their adjustment.

  2. Structural Control Systems Implemented in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Cristian Pastia

    2005-01-01

    Full Text Available Over the past three decades, a great interest has been generated by the use of protection systems to mitigate the effects of dynamic environmental hazards on civil engineering structures, such as earthquakes and strong wind. These control systems develop controllable forces to add or dissipate energy in a structure, or both, due to specific devices integrated with sensors, controllers and real – time process to operate. The paper includes the advantages of these technologies consisting of the following sections: 1 represents an introduction, 2 deals with passive control system, 3 regards some control techniques, 4 concerns hybrid control techniques, 5 contains semi – active control techniques, and 6 is dedicated to general conclusions.

  3. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  4. Advanced technologies for intelligent transportation systems

    CERN Document Server

    Picone, Marco; Amoretti, Michele; Zanichelli, Francesco; Ferrari, Gianluigi

    2015-01-01

    This book focuses on emerging technologies in the field of Intelligent Transportation Systems (ITSs) namely efficient information dissemination between vehicles, infrastructures, pedestrians and public transportation systems. It covers the state-of-the-art of Vehicular Ad-hoc Networks (VANETs), with centralized and decentralized (Peer-to-Peer) communication architectures, considering several application scenarios. With a detailed treatment of emerging communication paradigms, including cross networking  and distributed algorithms. Unlike most of the existing books, this book presents a multi-layer overview of information dissemination systems, from lower layers (MAC) to high layers (applications). All those aspects are investigated considering the use of mobile devices, such as smartphones/tablets and embedded systems, i.e. technologies that during last years completely changed the current market, the user expectations, and communication networks. The presented networking paradigms are supported and validate...

  5. Fluid structure interaction in piping systems

    Energy Technology Data Exchange (ETDEWEB)

    Svingen, Bjoernar

    1996-12-31

    The Dr. ing. thesis relates to an analysis of fluid structure interaction in piping systems in the frequency domain. The governing equations are the water hammer equations for the liquid, and the beam-equations for the structure. The fluid and structural equations are coupled through axial stresses and fluid continuity relations controlled by the contraction factor (Poisson coupling), and continuity and force relations at the boundaries (junction coupling). A computer program has been developed using the finite element method as a discretization technique both for the fluid and for the structure. This is made for permitting analyses of large systems including branches and loops, as well as including hydraulic piping components, and experiments are executed. Excitations are made in a frequency range from zero Hz and up to at least one thousand Hz. Frequency dependent friction is modelled as stiffness proportional Rayleigh damping both for the fluid and for the structure. With respect to the water hammer equations, stiffness proportional damping is seen as an artificial (bulk) viscosity term. A physical interpretation of this term in relation to transient/oscillating hydraulic pipe-friction is given. 77 refs., 72 figs., 4 tabs.

  6. DYNAMIC PARTICLE SYSTEMS FOR OBJECT STRUCTURE EXTRACTION

    Directory of Open Access Journals (Sweden)

    Olivier Lavialle

    2011-05-01

    Full Text Available A new deformable model based on the use of a particle system is introduced. By defining the local behavior of each particle, the system behaves as an active contour model showing a variable topology and regularization properties. The efficiency of the particle system is illustrated by two applications: the first one concerns the use of the system as a skeleton extractor based on the propagation of particles inside a treeshaped object. Using this method, it is possible to generate a cartography of structures such as veins or channels. In a second illustration, the system avoids the problem of initialization of a piecewise cubic Bspline network used to straighten curved text lines.

  7. Many Body Structure of Strongly Interacting Systems

    CERN Document Server

    Arenhövel, Hartmuth; Drechsel, Dieter; Friedrich, Jörg; Kaiser, Karl-Heinz; Walcher, Thomas; Symposium on 20 Years of Physics at the Mainz Microtron MAMI

    2006-01-01

    This carefully edited proceedings volume provides an extensive review and analysis of the work carried out over the past 20 years at the Mainz Microtron (MAMI). This research centered around the application of Quantum Chromodynamics in the strictly nonperturbative regime at hadronic scales of about 1 fm. Due to the many degrees of freedom in hadrons at this scale the leitmotiv of this research is "Many body structure of strongly interacting systems". Further, an outlook on the research with the forthcoming upgrade of MAMI is given. This volume is an authoritative source of reference for everyone interested in the field of the electro-weak probing of the structure of hadrons.

  8. Development in structural systems reliability theory

    International Nuclear Information System (INIS)

    Murotsu, Y.

    1986-01-01

    This paper is concerned with two topics on structural systems reliability theory. One covers automatic generation of failure mode equations, identifications of stochastically dominant failure modes, and reliability assessment of redundant structures. Reduced stiffness matrixes and equivalent nodal forces representing the failed elements are introduced for expressing the safety of the elements, using a matrix method. Dominant failure modes are systematically selected by a branch-and-bound technique and heuristic operations. The other discusses the various optimum design problems based on reliability concept. Those problems are interpreted through a solution to a multi-objective optimization problem. (orig.)

  9. Development in structural systems reliability theory

    Energy Technology Data Exchange (ETDEWEB)

    Murotsu, Y

    1986-07-01

    This paper is concerned with two topics on structural systems reliability theory. One covers automatic generation of failure mode equations, identifications of stochastically dominant failure modes, and reliability assessment of redundant structures. Reduced stiffness matrixes and equivalent nodal forces representing the failed elements are introduced for expressing the safety of the elements, using a matrix method. Dominant failure modes are systematically selected by a branch-and-bound technique and heuristic operations. The other discusses the various optimum design problems based on reliability concept. Those problems are interpreted through a solution to a multi-objective optimization problem.

  10. Structural dynamics of electronic and photonic systems

    CERN Document Server

    Suhir, Ephraim; Steinberg, David S

    2011-01-01

    The proposed book will offer comprehensive and versatile methodologies and recommendations on how to determine dynamic characteristics of typical micro- and opto-electronic structural elements (printed circuit boards, solder joints, heavy devices, etc.) and how to design a viable and reliable structure that would be able to withstand high-level dynamic loading. Particular attention will be given to portable devices and systems designed for operation in harsh environments (such as automotive, aerospace, military, etc.)  In-depth discussion from a mechanical engineer's viewpoint will be conducte

  11. Structural Materials for Efficient Energy Production Systems

    International Nuclear Information System (INIS)

    Gomez Briceno, D.

    2009-01-01

    Increasing the efficiency of electric power production systems implies increasing the operating temperature above those of systems currently in operation. The viability of new systems depends completely on the availability of structural materials that withstand the operating conditions specified in the design: adequate features under mechanical stress at high temperatures and compatibility with the medium. In the case of nuclear systems (fission, fusion), an important requirement is their response to irradiation induced damage. In spite of the significant differences that exist in the design of nuclear power plants, fusion reactors, innovative fission systems, supercritical fossil plants, biomass plants, solar concentration thermal plants, etc., all of them have as a common characteristic the use of resistant materials at high temperatures. The qualification of existing materials for the new and more demanding operating conditions and the development of new materials is one of the challenges faced by the electric power production industry. The science of materials and the understanding of the basic processes that take place in structural materials on exposure to the operating conditions of energy production systems are the tools that are available to obtain safe and economically viable solutions. (Authors) 4 refs.

  12. Differential Measurement Periodontal Structures Mapping System

    Science.gov (United States)

    Companion, John A. (Inventor)

    1998-01-01

    This invention relates to a periodontal structure mapping system employing a dental handpiece containing first and second acoustic sensors for locating the Cemento-Enamel Junction (CEJ) and measuring the differential depth between the CEJ and the bottom of the periodontal pocket. Measurements are taken at multiple locations on each tooth of a patient, observed, analyzed by an optical analysis subsystem, and archived by a data storage system for subsequent study and comparison with previous and subsequent measurements. Ultrasonic transducers for the first and second acoustic sensors are contained within the handpiece and in connection with a control computer. Pressurized water is provided for the depth measurement sensor and a linearly movable probe sensor serves as the sensor for the CEJ finder. The linear movement of the CEJ sensor is obtained by a control computer actuated by the prober. In an alternate embodiment, the CEJ probe is an optical fiber sensor with appropriate analysis structure provided therefor.

  13. Manipulating Scrip Systems: Sybils and Collusion

    Science.gov (United States)

    Kash, Ian A.; Friedman, Eric J.; Halpern, Joseph Y.

    Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strategic behavior involving more than one agent. We examine the effects of two types of strategic behavior involving more than one agent, sybils and collusion, in the context of scrip systems where agents provide each other with service in exchange for scrip. Sybils make an agent more likely to be chosen to provide service, which generally makes it harder for agents without sybils to earn money and decreases social welfare. Surprisingly, in certain circumstances it is possible for sybils to make all agents better off. While collusion is generally bad, in the context of scrip systems it actually tends to make all agents better off, not merely those who collude. These results also provide insight into the effects of allowing agents to advertise and loan money.

  14. Fuzzy logic for structural system control

    Directory of Open Access Journals (Sweden)

    Herbert Martins Gomes

    Full Text Available This paper provides some information and numerical tests that aims to investigate the use of a Fuzzy Controller applied to control systems. Some advantages are reported regarding the use of this controller, such as the characteristic ease of implementation due to its semantic feature in the statement of the control rules. On the other hand, it is also hypothesized that these systems have a lower performance loss when the system to be controlled is nonlinear or has time varying parameters. Numerical tests are performed using modal LQR optimal control and Fuzzy control of non-collocated systems with full state feedback in a two-dimensional structure. The paper proposes a way of designing a controller that may be a supervisory Fuzzy controller for a traditional controller or even a fuzzy controller independent from the traditional control, consisting on individual mode controllers. Some comments are drawn regarding the performance of these proposals in a number of arrangements.

  15. Reliability Analysis of Structural Timber Systems

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard; Hoffmeyer, P.

    2000-01-01

    Structural systems like timber trussed rafters and roof elements made of timber can be expected to have some degree of redundancy and nonlinear/plastic behaviour when the loading consists of for example snow or imposed load. In this paper this system effect is modelled and the statistic...... of variation. In the paper a stochastic model is described for the strength of a single piece of timber taking into account the stochastic variation of the strength and stiffness with length. Also stochastic models for different types of loads are formulated. First, simple representative systems with different...... types of redundancy and non-linearity are considered. The statistical characteristics of the load bearing capacity are determined by reliability analysis. Next, more complex systems are considered modelling the mechanical behaviour of timber roof elements I stressed skin panels made of timber. Using...

  16. Structural Identifiability of Dynamic Systems Biology Models.

    Science.gov (United States)

    Villaverde, Alejandro F; Barreiro, Antonio; Papachristodoulou, Antonis

    2016-10-01

    A powerful way of gaining insight into biological systems is by creating a nonlinear differential equation model, which usually contains many unknown parameters. Such a model is called structurally identifiable if it is possible to determine the values of its parameters from measurements of the model outputs. Structural identifiability is a prerequisite for parameter estimation, and should be assessed before exploiting a model. However, this analysis is seldom performed due to the high computational cost involved in the necessary symbolic calculations, which quickly becomes prohibitive as the problem size increases. In this paper we show how to analyse the structural identifiability of a very general class of nonlinear models by extending methods originally developed for studying observability. We present results about models whose identifiability had not been previously determined, report unidentifiabilities that had not been found before, and show how to modify those unidentifiable models to make them identifiable. This method helps prevent problems caused by lack of identifiability analysis, which can compromise the success of tasks such as experiment design, parameter estimation, and model-based optimization. The procedure is called STRIKE-GOLDD (STRuctural Identifiability taKen as Extended-Generalized Observability with Lie Derivatives and Decomposition), and it is implemented in a MATLAB toolbox which is available as open source software. The broad applicability of this approach facilitates the analysis of the increasingly complex models used in systems biology and other areas.

  17. Structure health assessment and warning system (SHAWS)

    Science.gov (United States)

    Bock, Daniel M.; Kim, Keehoon; Mapar, Jalal

    2008-03-01

    We are developing a Structure Health Assessment and Warning System (SHAWS) based on building displacement measurements and wireless communication. SHAWS will measure and predict the stability/instability of a building, determine whether it is safe for emergency responders to enter during an emergency, and provide individual warnings on the condition of the structure. SHAWS incorporates remote sensing nodes (RSNs) installed on the exterior frame of a building. Each RSN includes a temperature sensor, a three-axis accelerometer making static-acceleration measurements, and a ZigBee wireless system (IEEE 802.15.4). The RSNs will be deployed remotely using an air cannon delivery system, with each RSN having an innovative adhesive structure for fast (<10 min) and strong installation under emergency conditions. Once the building has moved past a threshold (~0.25 in./building story), a warning will be issued to emergency responders. In addition to the RSNs, SHAWS will include a base station located on an emergency responder's primary vehicle, a PDA for mobile data display to guide responders, and individual warning modules that can be worn by each responder. The individual warning modules will include visual and audio indicators with a ZigBee receiver to provide the proper degree of warning to each responder.

  18. Sensitivity of system stability to model structure

    Science.gov (United States)

    Hosack, G.R.; Li, H.W.; Rossignol, P.A.

    2009-01-01

    A community is stable, and resilient, if the levels of all community variables can return to the original steady state following a perturbation. The stability properties of a community depend on its structure, which is the network of direct effects (interactions) among the variables within the community. These direct effects form feedback cycles (loops) that determine community stability. Although feedback cycles have an intuitive interpretation, identifying how they form the feedback properties of a particular community can be intractable. Furthermore, determining the role that any specific direct effect plays in the stability of a system is even more daunting. Such information, however, would identify important direct effects for targeted experimental and management manipulation even in complex communities for which quantitative information is lacking. We therefore provide a method that determines the sensitivity of community stability to model structure, and identifies the relative role of particular direct effects, indirect effects, and feedback cycles in determining stability. Structural sensitivities summarize the degree to which each direct effect contributes to stabilizing feedback or destabilizing feedback or both. Structural sensitivities prove useful in identifying ecologically important feedback cycles within the community structure and for detecting direct effects that have strong, or weak, influences on community stability. The approach may guide the development of management intervention and research design. We demonstrate its value with two theoretical models and two empirical examples of different levels of complexity. ?? 2009 Elsevier B.V. All rights reserved.

  19. Structural analysis of fuel handling systems

    Energy Technology Data Exchange (ETDEWEB)

    Lee, L S.S. [Atomic Energy of Canada Ltd., Mississauga, ON (Canada)

    1997-12-31

    The purpose of this paper has three aspects: (i) to review `why` and `what` types of structural analysis, testing and report are required for the fuel handling systems according to the codes, or needed for design of a product, (ii) to review the input requirements for analysis and the analysis procedures, and (iii) to improve the communication between the analysis and other elements of the product cycle. The required or needed types of analysis and report may be categorized into three major groups: (i) Certified Stress Reports for design by analysis, (ii) Design Reports not required for certification and registration, but are still required by codes, and (iii) Design Calculations required by codes or needed for design. Input requirements for structural analysis include: design, code classification, loadings, and jurisdictionary boundary. Examples of structural analysis for the fueling machine head and support structure are given. For improving communication between the structural analysis and the other elements of the product cycle, some areas in the specification of design requirements and load rating are discussed. (author). 6 refs., 1 tab., 4 figs.

  20. Structural analysis of fuel handling systems

    International Nuclear Information System (INIS)

    Lee, L.S.S.

    1996-01-01

    The purpose of this paper has three aspects: (i) to review 'why' and 'what' types of structural analysis, testing and report are required for the fuel handling systems according to the codes, or needed for design of a product, (ii) to review the input requirements for analysis and the analysis procedures, and (iii) to improve the communication between the analysis and other elements of the product cycle. The required or needed types of analysis and report may be categorized into three major groups: (i) Certified Stress Reports for design by analysis, (ii) Design Reports not required for certification and registration, but are still required by codes, and (iii) Design Calculations required by codes or needed for design. Input requirements for structural analysis include: design, code classification, loadings, and jurisdictionary boundary. Examples of structural analysis for the fueling machine head and support structure are given. For improving communication between the structural analysis and the other elements of the product cycle, some areas in the specification of design requirements and load rating are discussed. (author). 6 refs., 1 tab., 4 figs

  1. Model reduction of port-Hamiltonian systems as structured systems

    NARCIS (Netherlands)

    Polyuga, R.V.; Schaft, van der A.J.

    2010-01-01

    The goal of this work is to demonstrate that a specific projection-based model reduction method, which provides an H2 error bound, turns out to be applicable to port-Hamiltonian systems, preserving the port-Hamiltonian structure for the reduced order model, and, as a consequence, passivity.

  2. Band structure studies of actinide systems

    International Nuclear Information System (INIS)

    Koelling, D.D.

    1976-01-01

    The nature of the f-orbitals in an actinide system plays a crucial role in determining the electronic properties. It has long been realized that when the actinide separation is small enough for the f-orbitals to interact directly, the system will exhibit itinerant electron properties: an absence of local moment due to the f-orbitals and sometimes even superconductivity. However, a number of systems with the larger actinide separation that should imply local moment behavior also exhibit intinerant properties. Such systems (URh 3 , UIr 3 , UGe 3 , UC) were examined to learn something about the other f-interactions. A preliminary observation made is that there is apparently a very large and ansiotropic mass enhancement in these systems. There is very good reason to believe that this is not solely due to large electron--electron correlations but to a large electron--phonon interaction as well. These features of the ''non-magnetic'', large actinide separation systems are discussed in light of our results to date. Finally, the results of some recent molecular calculations on actinide hexafluorides are used to illustrate the shielding effects on the intra-atomic Coulomb term U/sub f-f/ which would appear in any attempt to study the formation of local moments. As one becomes interested in materials for which a band structure is no longer an adequate model, this screened U/sub ff/ is the significant parameter and efforts must be made to evaluate it in solid state systems

  3. Structural equation modeling and natural systems

    Science.gov (United States)

    Grace, James B.

    2006-01-01

    This book, first published in 2006, presents an introduction to the methodology of structural equation modeling, illustrates its use, and goes on to argue that it has revolutionary implications for the study of natural systems. A major theme of this book is that we have, up to this point, attempted to study systems primarily using methods (such as the univariate model) that were designed only for considering individual processes. Understanding systems requires the capacity to examine simultaneous influences and responses. Structural equation modeling (SEM) has such capabilities. It also possesses many other traits that add strength to its utility as a means of making scientific progress. In light of the capabilities of SEM, it can be argued that much of ecological theory is currently locked in an immature state that impairs its relevance. It is further argued that the principles of SEM are capable of leading to the development and evaluation of multivariate theories of the sort vitally needed for the conservation of natural systems.

  4. Structured analysis and modeling of complex systems

    Science.gov (United States)

    Strome, David R.; Dalrymple, Mathieu A.

    1992-01-01

    The Aircrew Evaluation Sustained Operations Performance (AESOP) facility at Brooks AFB, Texas, combines the realism of an operational environment with the control of a research laboratory. In recent studies we collected extensive data from the Airborne Warning and Control Systems (AWACS) Weapons Directors subjected to high and low workload Defensive Counter Air Scenarios. A critical and complex task in this environment involves committing a friendly fighter against a hostile fighter. Structured Analysis and Design techniques and computer modeling systems were applied to this task as tools for analyzing subject performance and workload. This technology is being transferred to the Man-Systems Division of NASA Johnson Space Center for application to complex mission related tasks, such as manipulating the Shuttle grappler arm.

  5. ICI system for protecting underwater structures

    Energy Technology Data Exchange (ETDEWEB)

    1977-10-14

    The new ICI Offshore product consists of polypropylene fibers about 4.4 m long, and with a density lower than that of sea water and thus a good buoyancy coefficient. Bundles of the fibers are passed through a braided mat of polyester, ''Paraweb'', which is weighted in accordance with the density of the entire system. The system is installed at the foot of platform legs and axially along pipelines to prevent scouring by ocean currents. The system has been installed in 144.8 m of water along the pipeline linking the Piper field to the Flotta terminal in the Orkney Islands. By reducing the velocity of the marine currents, the system causes sand and other material to be deposited along the fibers, forming a protective ''talus'' cone at first, then completely covering the structure. A sizable sand deposit had accumulated along the test segment of the pipeline less than one month after installation of the system. Use of the system on the Ekofisk-Emden gas pipeline where it is uncovered in the Danish North Sea sector is proposed.

  6. A remote instruction system empowered by tightly shared haptic sensation

    Science.gov (United States)

    Nishino, Hiroaki; Yamaguchi, Akira; Kagawa, Tsuneo; Utsumiya, Kouichi

    2007-09-01

    We present a system to realize an on-line instruction environment among physically separated participants based on a multi-modal communication strategy. In addition to visual and acoustic information, commonly used communication modalities in network environments, our system provides a haptic channel to intuitively conveying partners' sense of touch. The human touch sensation, however, is very sensitive for delays and jitters in the networked virtual reality (NVR) systems. Therefore, a method to compensate for such negative factors needs to be provided. We show an NVR architecture to implement a basic framework that can be shared by various applications and effectively deals with the problems. We take a hybrid approach to implement both data consistency by client-server and scalability by peer-to-peer models. As an application system built on the proposed architecture, a remote instruction system targeted at teaching handwritten characters and line patterns on a Korea-Japan high-speed research network also is mentioned.

  7. Modelling structural systems for transient response analysis

    International Nuclear Information System (INIS)

    Melosh, R.J.

    1975-01-01

    This paper introduces and reports success of a direct means of determining the time periods in which a structural system behaves as a linear system. Numerical results are based on post fracture transient analyses of simplified nuclear piping systems. Knowledge of the linear response ranges will lead to improved analysis-test correlation and more efficient analyses. It permits direct use of data from physical tests in analysis and simplication of the analytical model and interpretation of its behavior. The paper presents a procedure for deducing linearity based on transient responses. Given the forcing functions and responses of discrete points of the system at various times, the process produces evidence of linearity and quantifies an adequate set of equations of motion. Results of use of the process with linear and nonlinear analyses of piping systems with damping illustrate its success. Results cover the application to data from mathematical system responses. The process is successfull with mathematical models. In loading ranges in which all modes are excited, eight digit accuracy of predictions are obtained from the equations of motion deduced. Small changes (less than 0.01%) in the norm of the transfer matrices are produced by manipulation errors for linear systems yielding evidence that nonlinearity is easily distinguished. Significant changes (greater than five %) are coincident with relatively large norms of the equilibrium correction vector in nonlinear analyses. The paper shows that deducing linearity and, when admissible, quantifying linear equations of motion from transient response data for piping systems can be achieved with accuracy comparable to that of response data

  8. Network versus portfolio structure in financial systems

    Science.gov (United States)

    Kobayashi, Teruyoshi

    2013-10-01

    The question of how to stabilize financial systems has attracted considerable attention since the global financial crisis of 2007-2009. Recently, Beale et al. [Proc. Natl. Acad. Sci. USA 108, 12647 (2011)] demonstrated that higher portfolio diversity among banks would reduce systemic risk by decreasing the risk of simultaneous defaults at the expense of a higher likelihood of individual defaults. In practice, however, a bank default has an externality in that it undermines other banks’ balance sheets. This paper explores how each of these different sources of risk, simultaneity risk and externality, contributes to systemic risk. The results show that the allocation of external assets that minimizes systemic risk varies with the topology of the financial network as long as asset returns have negative correlations. In the model, a well-known centrality measure, PageRank, reflects an appropriately defined “infectiveness” of a bank. An important result is that the most infective bank needs not always to be the safest bank. Under certain circumstances, the most infective node should act as a firewall to prevent large-scale collective defaults. The introduction of a counteractive portfolio structure will significantly reduce systemic risk.

  9. Advanced Deployable Structural Systems for Small Satellites

    Science.gov (United States)

    Belvin, W. Keith; Straubel, Marco; Wilkie, W. Keats; Zander, Martin E.; Fernandez, Juan M.; Hillebrandt, Martin F.

    2016-01-01

    One of the key challenges for small satellites is packaging and reliable deployment of structural booms and arrays used for power, communication, and scientific instruments. The lack of reliable and efficient boom and membrane deployment concepts for small satellites is addressed in this work through a collaborative project between NASA and DLR. The paper provides a state of the art overview on existing spacecraft deployable appendages, the special requirements for small satellites, and initial concepts for deployable booms and arrays needed for various small satellite applications. The goal is to enhance deployable boom predictability and ground testability, develop designs that are tolerant of manufacturing imperfections, and incorporate simple and reliable deployment systems.

  10. 46 CFR 154.178 - Contiguous hull structure: Heating system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Contiguous hull structure: Heating system. 154.178... Equipment Hull Structure § 154.178 Contiguous hull structure: Heating system. The heating system for transverse and longitudinal contiguous hull structure must: (a) Be shown by a heat load calculation to have...

  11. Mixed basin boundary structures of chaotic systems

    International Nuclear Information System (INIS)

    Rosa, E. Jr.; Ott, E.

    1999-01-01

    Motivated by recent numerical observations on a four-dimensional continuous-time dynamical system, we consider different types of basin boundary structures for chaotic systems. These general structures are essentially mixtures of the previously known types of basin boundaries where the character of the boundary assumes features of the previously known boundary types at different points arbitrarily finely interspersed in the boundary. For example, we discuss situations where an everywhere continuous boundary that is otherwise smooth and differentiable at almost every point has an embedded uncountable, zero Lebesgue measure set of points at which the boundary curve is nondifferentiable. Although the nondifferentiable set is only of zero Lebesgue measure, the curve close-quote s fractal dimension may (depending on parameters) still be greater than one. In addition, we discuss bifurcations from such a mixed boundary to a 'pure' boundary that is a fractal nowhere differentiable curve or surface and to a pure nonfractal boundary that is everywhere smooth. copyright 1999 The American Physical Society

  12. Structural materials challenges for fusion power systems

    International Nuclear Information System (INIS)

    Kurtz, Richard J.

    2009-01-01

    Full text: Structural materials in a fusion power system must function in an extraordinarily demanding environment that includes various combinations of high temperatures, reactive chemicals, time-dependent thermal and mechanical stresses, and intense damaging radiation. The fusion neutron environment produces displacement damage equivalent to displacing every atom in the material about 150 times during its expected service life, and changes in chemical composition by transmutation reactions, which includes creation of reactive and insoluble gases. Fundamental materials challenges that must be resolved to effectively harness fusion power include (1) understanding the relationships between material strength, ductility and resistance to cracking, (2) development of materials with extraordinary phase stability, high-temperature strength and resistance to radiation damage, (3) establishment of the means to control corrosion of materials exposed to aggressive environments, (4) development of technologies for large-scale fabrication and joining, and (5) design of structural materials that provide for an economically attractive fusion power system while simultaneously achieving safety and environmental acceptability goals. The most effective approach to solve these challenges is a science-based effort that couples development of physics-based, predictive models of materials behavior with key experiments to validate the models. The U.S. Fusion Materials Sciences program is engaged in an integrated effort of theory, modeling and experiments to develop structural materials that will enable fusion to reach its safety, environmental and economic competitiveness goals. In this presentation, an overview of recent progress on reduced activation ferritic/martensitic steels, nanocomposited ferritic alloys, and silicon carbide fiber reinforced composites for fusion applications will be given

  13. Structured automated code checking through structural components and systems engineering

    NARCIS (Netherlands)

    Coenders, J.L.; Rolvink, A.

    2014-01-01

    This paper presents a proposal to employ the design computing methodology proposed as StructuralComponents (Rolvink et al [6] and van de Weerd et al [7]) as a method to perform a digital verification process to fulfil the requirements related to structural design and engineering as part of a

  14. Modules program structures and the structuring of operating systems

    NARCIS (Netherlands)

    Bron, C.; Duijvestijn, W.; Lockemann, P.C.

    1981-01-01

    In this paper some views are presented on the way in which complex systems, such as Operating Systems and the programs to be interfaced with them can be constructed, and how such systems may become heavily library oriented. Although such systems have a dynamic nature, all interfacing within and

  15. Dynamic Business Networks: A Headache for Sustainable Systems Interoperability

    Science.gov (United States)

    Agostinho, Carlos; Jardim-Goncalves, Ricardo

    Collaborative networked environments emerged with the spread of the internet, contributing to overcome past communication barriers, and identifying interoperability as an essential property. When achieved seamlessly, efficiency is increased in the entire product life cycle. Nowadays, most organizations try to attain interoperability by establishing peer-to-peer mappings with the different partners, or in optimized networks, by using international standard models as the core for information exchange. In current industrial practice, mappings are only defined once, and the morphisms that represent them, are hardcoded in the enterprise systems. This solution has been effective for static environments, where enterprise and product models are valid for decades. However, with an increasingly complex and dynamic global market, models change frequently to answer new customer requirements. This paper draws concepts from the complex systems science and proposes a framework for sustainable systems interoperability in dynamic networks, enabling different organizations to evolve at their own rate.

  16. Feasibility study of P2P-type system architecture with 3D medical image data support for medical integrated network systems

    International Nuclear Information System (INIS)

    Noji, Tamotsu; Arino, Masashi; Suto, Yasuzo

    2010-01-01

    We are investigating an integrated medical network system with an electronic letter of introduction function and a 3D image support function operating in the Internet environment. However, the problems with current C/S (client/server)-type systems are inadequate security countermeasures and insufficient transmission availability. In this report, we propose a medical information cooperation system architecture that employs a P2P (peer-to-peer)-type communication method rather than a C/S-type method, which helps to prevent a reduction in processing speed when large amounts of data (such as 3D images) are transferred. In addition, a virtual clinic was created and a feasibility study was conducted to evaluate the P2P-type system. The results showed that efficiency was improved by about 77% in real-time transmission, suggesting that this system may be suitable for practical application. (author)

  17. Mathematical Structure in Quantum Systems and applications

    International Nuclear Information System (INIS)

    Cavero-Pelaez, I.; Clemente-Gallardo, J.; Marmo, G.; Muñoz--Castañeda, J.M.

    2013-01-01

    This volume contains most of the contributions presented at the Conference 'Mathematical Structures in Quantum Systems and applications', held at the Centro de Ciencias de Benasque 'Pedro Pascual', Benasque (Spain) from 8-14 July 2012. The aim of the Conference was to bring together physicists working on different applications of mathematical methods to quantum systems in order to enable the different communities to become acquainted with other approaches and techniques that could be used in their own fields of expertise. We concentrated on three main subjects: – the geometrical description of Quantum Mechanics; – the Casimir effect and its mathematical implications; – the Quantum Zeno Effect and Open system dynamics. Each of these topics had a set of general lectures, aimed at presenting a global view on the subject, and other more technical seminars. We would like to thank all participants for their contribution to creating a wonderful scientific atmosphere during the Conference. We would especially like to thank the speakers and the authors of the papers contained in this volume, the members of the Scientific Committee for their guidance and support and, of course, the referees for their generous work. Special thanks are also due to the staff of the Centro de Ciencias de Benasque 'Pedro Pascual' who made this successful meeting possible. On behalf of the organising committee and the authors we would also like to acknowledge the partial support provided by the ESF-CASIMIR network ('New Trends and Applications of the Casimir Effect'), the QUITEMAD research Project (“Quantum technologies at Madrid”, Ref. Comunidad de Madrid P2009/ESP-1594), the MICINN Project (MTM2011-16027-E) and the Government from Arag´on (DGA) (DGA, Department of Industry and Innovation and the European Social Fund, DGA-Grant 24/1) who made the Conference and this Proceedings volume possible.

  18. Cellular structures in a system of interacting particles

    International Nuclear Information System (INIS)

    Lev, B.I.

    2009-01-01

    The general description of the formation of a cellular structure in the system of interacting particles is proposed. The analytical results for possible cellular structures in the usual colloidal systems, systems of particles immersed in a liquid crystal, and gravitational systems have been presented. It is shown that the formation of a cellular structure in all systems of interacting particles at different temperatures and concentrations of particles has the same physical nature

  19. Building Flexible Manufacturing Systems Based on Peer-Its

    Directory of Open Access Journals (Sweden)

    M. Hechinger

    2008-02-01

    Full Text Available Peer-to-peer computing principles have started to pervade into mechanical control systems, inducing a paradigm shift from centralized to autonomic control. We have developed a self-contained, miniaturized, universal and scalable peer-to-peer based hardware-software system, the peer-it platform, to serve as a stick-on computer solution to raise real-world artefacts like, for example, machines, tools, or appliances towards technology-rich, autonomous, self-induced, and context-aware peers, operating as spontaneously interacting ensembles. The peer-it platform integrates sensor, actuator, and wireless communication facilities on the hardware level, with an object-oriented, component-based coordination framework at the software level, thus providing a generic platform for sensing, computing, controlling, and communication on a large scale. The physical appearance of a peer-it supports pinning it to real-world artefacts, while at the same time integrating those artefacts into a mobile ad hoc network of peers. Peer-it networks thus represent ensembles of coordinated artefacts, exhibiting features of autonomy like self-management at the node level and self-organization at the network level. We demonstrate how the peer-it system implements the desired flexibility in automated manufacturing systems to react in the case of changes, whether intended or unexpectedly occuring. The peer-it system enables machine flexibility in that it adapts production facilities to produce new types of products, or change the order of operation executed on parts instantaneously. Secondly, it enables routing flexibility, that is, the ability to use multiple machines to spontaneously perform the same operation on one part alternatively (to implement autonomic fault tolerance or to absorb large-scale changes in volume, capacity, or capability (to implement autonomic scalability.

  20. Building Flexible Manufacturing Systems Based on Peer-Its

    Directory of Open Access Journals (Sweden)

    dos Santos Rocha M

    2008-01-01

    Full Text Available Abstract Peer-to-peer computing principles have started to pervade into mechanical control systems, inducing a paradigm shift from centralized to autonomic control. We have developed a self-contained, miniaturized, universal and scalable peer-to-peer based hardware-software system, the peer-it platform, to serve as a stick-on computer solution to raise real-world artefacts like, for example, machines, tools, or appliances towards technology-rich, autonomous, self-induced, and context-aware peers, operating as spontaneously interacting ensembles. The peer-it platform integrates sensor, actuator, and wireless communication facilities on the hardware level, with an object-oriented, component-based coordination framework at the software level, thus providing a generic platform for sensing, computing, controlling, and communication on a large scale. The physical appearance of a peer-it supports pinning it to real-world artefacts, while at the same time integrating those artefacts into a mobile ad hoc network of peers. Peer-it networks thus represent ensembles of coordinated artefacts, exhibiting features of autonomy like self-management at the node level and self-organization at the network level. We demonstrate how the peer-it system implements the desired flexibility in automated manufacturing systems to react in the case of changes, whether intended or unexpectedly occuring. The peer-it system enables machine flexibility in that it adapts production facilities to produce new types of products, or change the order of operation executed on parts instantaneously. Secondly, it enables routing flexibility, that is, the ability to use multiple machines to spontaneously perform the same operation on one part alternatively (to implement autonomic fault tolerance or to absorb large-scale changes in volume, capacity, or capability (to implement autonomic scalability.

  1. System Reliability of Timber Structures with Ductile Behaviour

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Sørensen, John Dalsgaard; Čizmar, Dean

    2011-01-01

    The present paper considers the evaluation of timber structures with the focus on robustness due to connection ductility. The robustness analysis is based on the structural reliability framework applied to a simplified mechanical system. The structural timber system is depicted as a parallel system....... An evaluation method of the ductile behaviour is introduced. For different ductile behaviours, the system reliability is estimated based on Monte Carlo simulation. A correlation between the strength of the structural elements is introduced. The results indicate that the reliability of a structural timber system...

  2. COMPASS magnetic field coils and structure systems

    International Nuclear Information System (INIS)

    Crossland, R.T.; Booth, J.A.; Hayward, R.J.; Keogh, P.; Pratt, A.P.

    1987-01-01

    COMPASS is a new experimental toroidal assembly of compact design and with a wide range of physics objectives. It is required to operate either as a Tokamak or as a Reversed Field Pinch with interchangeable circular and dee-section vacuum vessels. The Toroidal field is produced by 16 rectangular coils of 4 turns with tapered conductors on the inside which nest together to form a vault to resist the centering forces. The coils are designed to produce a maximum field on axis of 2.1T which requires a current of 91 kA per turn. Two central solenoids and five pairs of coils symmetrically positioned above and below the machine equator provide the poloidal field. Both coil systems are supported form a mechanical support structure which surrounds the machine. This is primarily designed to resist out-of-plane forces on the TF coils but also acts as the base support for the PF coils and vacuum vessels. An illustration of the COMPASS Load Assembly is given and shows the D-shaped vacuum vessel, the major components and the various field windings

  3. Efficiency criteria for high reliability measured system structures

    International Nuclear Information System (INIS)

    Sal'nikov, N.L.

    2012-01-01

    The procedures of structural redundancy are usually used to develop high reliability measured systems. To estimate efficiency of such structures the criteria to compare different systems has been developed. So it is possible to develop more exact system by inspection of redundant system data unit stochastic characteristics in accordance with the developed criteria [ru

  4. A corrosion monitoring system for existing reinforced concrete structures.

    Science.gov (United States)

    2015-05-01

    This study evaluated a multi-parameter corrosion monitoring system for existing reinforced concrete structures in chloride-laden service environments. The system was fabricated based on a prototype concrete corrosion measurement system that : had bee...

  5. P2P-Based Data System for the EAST Experiment

    Science.gov (United States)

    Shu, Yantai; Zhang, Liang; Zhao, Weifeng; Chen, Haiming; Luo, Jiarong

    2006-06-01

    A peer-to-peer (P2P)-based EAST Data System is being designed to provide data acquisition and analysis support for the EAST superconducting tokamak. Instead of transferring data to the servers, all collected data are stored in the data acquisition subsystems locally and the PC clients can access the raw data directly using the P2P architecture. Both online and offline systems are based on Napster-like P2P architecture. This allows the peer (PC) to act both as a client and as a server. A simulation-based method and a steady-state operational analysis technique are used for performance evaluation. These analyses show that the P2P technique can significantly reduce the completion time of raw data display and real-time processing on the online system, and raise the workload capacity and reduce the delay on the offline system.

  6. Structural health monitoring system/method using electroactive polymer fibers

    Science.gov (United States)

    Scott-Carnell, Lisa A. (Inventor); Siochi, Emilie J. (Inventor)

    2013-01-01

    A method for monitoring the structural health of a structure of interest by coupling one or more electroactive polymer fibers to the structure and monitoring the electroactive responses of the polymer fiber(s). Load changes that are experienced by the structure cause changes in the baseline responses of the polymer fiber(s). A system for monitoring the structural health of the structure is also provided.

  7. Reliability of redundant structures of nuclear reactor protection systems

    International Nuclear Information System (INIS)

    Vojnovic, B.

    1983-01-01

    In this paper, reliability of various redundant structures of PWR protection systems has been analysed. Structures of reactor tip systems as well as the systems for activation of safety devices have been presented. In all those systems redundancy is achieved by means of so called majority voting logic ('r out of n' structures). Different redundant devices have been compared, concerning probability of occurrence of safe as well as unsafe failures. (author)

  8. P2P-based botnets: structural analysis, monitoring, and mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Ha, Duc T [UNIV AT BUFFALO; Ngo, Hung Q [UNIV AT BUFFALO

    2008-01-01

    Botnets, which are networks of compromised machines that are controlled by one or a group of attackers, have emerged as one of the most serious security threats on the Internet. With an army of bots at the scale of tens of thousands of hosts or even as large as 1.5 million PCs, the computational power of botnets can be leveraged to launch large-scale DDoS (Distributed Denial of Service) attacks, sending spamming emails, stealing identities and financial information, etc. As detection and mitigation techniques against botnets have been stepped up in recent years, attackers are also constantly improving their strategies to operate these botnets. The first generation of botnets typically employ IRC (Internet Relay Chat) channels as their command and control (C&C) centers. Though simple and easy to deploy, the centralized C&C mechanism of such botnets has made them prone to being detected and disabled. Against this backdrop, peer-to-peer (P2P) based botnets have emerged as a new generation of botnets which can conceal their C&C communication. Recently, P2P networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to communicate easily while protecting the botmaster from being discovered. Existing work on P2P-based hotnets mainly focuses on measurement of botnet sizes. In this work, through simulation, we study extensively the structure of P2P networks running Kademlia, one of a few widely used P2P protocols in practice. Our simulation testbed incorporates the actual code of a real Kademlia client software to achieve great realism, and distributed event-driven simulation techniques to achieve high scalability. Using this testbed, we analyze the scaling, reachability, clustering, and centrality properties of P2P-based botnets from a graph-theoretical perspective. We further demonstrate experimentally and theoretically that monitoring bot activities in a P2P network is difficult

  9. Optimization of Large-Scale Structural Systems

    DEFF Research Database (Denmark)

    Jensen, F. M.

    solutions to small problems with one or two variables to the optimization of large structures such as bridges, ships and offshore structures. The methods used for salving these problems have evolved from being classical differential calculus and calculus of variation to very advanced numerical techniques...

  10. Reliability of Elasto-Plastic Structural Systems

    DEFF Research Database (Denmark)

    Delmar, M. V.; Sørensen, John Dalsgaard

    1990-01-01

    This paper proposes a method for generating safety margins and failure mode equations for elasto-plastic structures where interaction of load effects is taken into account. Structural failure is defined by large nodal displacements or plastic collapse. A branch-and-bound technique is used...

  11. Integrated seismic design of structure and control systems

    CERN Document Server

    Castaldo, Paolo

    2014-01-01

    The structural optimization procedure presented in this book makes it possible to achieve seismic protection through integrated structural/control system design. In particular, it is explained how slender structural systems with a high seismic performance can be achieved through inclusion of viscous and viscoelastic dampers as an integral part of the system. Readers are provided with essential introductory information on passive structural control and passive energy dissipation systems. Dynamic analyses of both single and multiple degree of freedom systems are performed in order to verify the achievement of pre-assigned performance targets, and it is explained how the optimal integrated design methodology, also relevant to retrofitting of existing buildings, should be applied. The book illustrates how structural control research is opening up new possibilities in structural forms and configurations without compromising structural performance.

  12. Semiclassical shell structure in rotating Fermi systems

    International Nuclear Information System (INIS)

    Magner, A. G.; Sitdikov, A. S.; Khamzin, A. A.; Bartel, J.

    2010-01-01

    The collective moment of inertia is derived analytically within the cranking model for any rotational frequency of the harmonic-oscillator potential well and at a finite temperature. Semiclassical shell-structure components of the collective moment of inertia are obtained for any potential by using the periodic-orbit theory. We found semiclassically their relation to the free-energy shell corrections through the shell-structure components of the rigid-body moment of inertia of the statistically equilibrium rotation in terms of short periodic orbits. The shell effects in the moment of inertia exponentially disappear with increasing temperature. For the case of the harmonic-oscillator potential, one observes a perfect agreement of the semiclassical and quantum shell-structure components of the free energy and the moment of inertia for several critical bifurcation deformations and several temperatures.

  13. SNMS: an intelligent transportation system network architecture based on WSN and P2P network

    Institute of Scientific and Technical Information of China (English)

    LI Li; LIU Yuan-an; TANG Bi-hua

    2007-01-01

    With the development of city road networks, the question of how to obtain information about the roads is becoming more and more important. In this article, sensor network with mobile station (SNMS), a novel two-tiered intelligent transportation system (ITS) network architecture based on wireless sensor network (WSN) and peer-to-peer (P2P) network, is proposed to provide significant traffic information about the road and thereby, assist travelers to take optimum decisions when they are driving. A detailed explanation with regard to the strategy of each level as well as the design of two main components in the network, sensor unit (SU) and mobile station (MS), is presented. Finally, a representative scenario is described to display the operation of the system.

  14. Hierarchically Structured Recommender System for Improving NPS

    Science.gov (United States)

    Kuang, Jieyan

    2016-01-01

    Net Promoter System (NPS) is well known as an evaluation measure of the growth engine of big companies in the business area. The ultimate goal of my research is to build an action rules and meta-actions based recommender system for improving NPS scores of 34 companies (clients) dealing with similar businesses in the US and Canada. With the given…

  15. Structured Light-Based 3D Reconstruction System for Plants

    OpenAIRE

    Nguyen, Thuy Tuong; Slaughter, David C.; Max, Nelson; Maloof, Julin N.; Sinha, Neelima

    2015-01-01

    Camera-based 3D reconstruction of physical objects is one of the most popular computer vision trends in recent years. Many systems have been built to model different real-world subjects, but there is lack of a completely robust system for plants. This paper presents a full 3D reconstruction system that incorporates both hardware structures (including the proposed structured light system to enhance textures on object surfaces) and software algorithms (including the proposed 3D point cloud regi...

  16. Quantification of the Value of Structural Health Monitoring Information for Fatigue Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Thöns, Sebastian; Schneider, Ronald; Faber, Michael Havbro

    2015-01-01

    This paper addresses the quantification of the value of structural health monitoring (SHM) before its implementation for structural systems on the basis of its Value of Information (VoI). The value of SHM is calculated utilizing the Bayesian pre-posterior decision analysis modelling the structural...... life cycle performance, the integrity management and the structural risks. The relevance and precision of SHM information for the reduction of the structural system risks and the expected cost of the structural integrity management throughout the life cycle constitutes the value of SHM...... and is quantified with this framework. The approach is focused on fatigue deteriorating structural steel systems for which a continuous resistance deterioration formulation is introduced. In a case study, the value of SHM for load monitoring is calculated for a Daniels system subjected to fatigue deterioration...

  17. Automatic Sensor-Fault Detection System for Comprehensive Structural Health Monitoring System

    National Research Council Canada - National Science Library

    Chan, Hian-Leng; Zhang, Chang; Qing, Peter X; Ooi, Teng K; Marotta, Steve A

    2005-01-01

    Structural health monitoring systems are viewed as viable means to reduce life-cycle costs, increase structural reliability, and extend the operational hours for a wide variety of composite structures...

  18. The structure of nuclear safeguards systems

    International Nuclear Information System (INIS)

    Coulter, C.A.

    1989-01-01

    Safeguards systems for facilities that handle special nuclear material combine procedural, protective, and materials accounting elements to prevent and/or detect sabotage and diversion or theft of material. Because most of the discussion in this course is devoted to materials accounting topics only, this chapter provides a brief introduction to some of the procedural and protective elements of safeguards systems, placing the materials accounting system in its proper context. The chapter begins by reviewing certain pertinent DOE definitions and then surveys some protection requirements and technology - protective personnel, personnel identification systems, barriers, detectors, and communication systems. Considered next are the procedures of personnel selection and monitoring, definition and division of job functions, and operation. The chapter then describes the way the procedural, protective, and materials accounting elements can be combined, becoming a total safeguards system. Although such a system necessarily requires elements of procedure, protection, and materials accounting, only the materials accounting gives positive assurance that nuclear material is not diverted or stolen

  19. Conservation-dissipation structure of chemical reaction systems.

    Science.gov (United States)

    Yong, Wen-An

    2012-12-01

    In this Brief Report, we show that balanced chemical reaction systems governed by the law of mass action have an elegant conservation-dissipation structure. From this structure a number of important conclusions can be easily deduced. In particular, with the help of this structure we can rigorously justify the classical partial equilibrium approximation in chemical kinetics.

  20. Geographic Names Information System (GNIS) Structures

    Data.gov (United States)

    Department of Homeland Security — The Geographic Names Information System (GNIS) is the Federal standard for geographic nomenclature. The U.S. Geological Survey developed the GNIS for the U.S. Board...

  1. Individual capacity-building approaches in a global pharmaceutical systems strengthening program: a selected review.

    Science.gov (United States)

    Konduri, Niranjan; Rauscher, Megan; Wang, Shiou-Chu Judy; Malpica-Llanos, Tanya

    2017-01-01

    . Peer-to-peer learning mechanisms than traditional didactic methods was a preferred intervention among high level government officials both within country and between countries. Interventions must involve local institutions in the design and delivery of content for both pre-service and in-service training as well as web-based methods where feasible. Such efforts would meet the changing demand in the pharmaceutical system, and promote the ownership of the human capacity development interventions. The cost-effective partnership with universities demonstrate that competency based pre-service training will prepare the future pharmaceutical workforce with a critical foundation of knowledge and skills required to meet the growing demand for patient-centered pharmaceutical services in resource-constrained countries.

  2. Reliability of Structural Systems with Correlated Elements

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Sørensen, John Dalsgaard

    1982-01-01

    Calculation of the probability of failure of a system with correlation members is usually a difficult and time-consuming numerical problem. However, for some types of systems with equally correlated elements this calculation can be performed in a simple way. This has suggested two new methods bas...... on so-called average and equivalent correlation coefficients. By using these methods approximate values for the probability of failure can easily be calculated. The accuracy of these methods is illustrated with examples....

  3. Structural Systems Biology Evaluation of Metabolic Thermotolerance in Escherichia coli

    DEFF Research Database (Denmark)

    Chang, Roger L.; Andrews, Kathleen; Kim, Donghyuk

    2013-01-01

    Improve the System A "systems biology" approach may clarify, for example, how particular proteins determine sensitivity of bacteria to extremes of temperature. Chang et al. (p. 1220) integrated information on protein structure with a model of metabolism, thus associating the protein structure of ...

  4. Natural circulating passive cooling system for nuclear reactor containment structure

    Science.gov (United States)

    Gou, Perng-Fei; Wade, Gentry E.

    1990-01-01

    A passive cooling system for the contaminant structure of a nuclear reactor plant providing protection against overpressure within the containment attributable to inadvertent leakage or rupture of the system components. The cooling system utilizes natural convection for transferring heat imbalances and enables the discharge of irradiation free thermal energy to the atmosphere for heat disposal from the system.

  5. Passive cooling system for nuclear reactor containment structure

    Science.gov (United States)

    Gou, Perng-Fei; Wade, Gentry E.

    1989-01-01

    A passive cooling system for the contaminant structure of a nuclear reactor plant providing protection against overpressure within the containment attributable to inadvertent leakage or rupture of the system components. The cooling system utilizes natural convection for transferring heat imbalances and enables the discharge of irradiation free thermal energy to the atmosphere for heat disposal from the system.

  6. Structure of a traditional baseline data system

    Energy Technology Data Exchange (ETDEWEB)

    1976-12-01

    Research was conducted to determine whether appropriate data exist for the development of a comprehensive statistical baseline data system on the human environment in the Athabasca oil sands region of Alberta. The existing data sources pertinent to the target area were first reviewed and discussed. Criteria were selected to assist the evaluation of data, including type of data collected, source, degree of detail, geographic identification, accessibility, and time frame. These criteria allowed assessing whether the data would be amenable to geographically-coded, continuous monitoring systems. It was found that the Statistics Canada Census provided the most detail, the most complete coverage of the target area, the smallest statistical areas, the greatest consistency in data and data collection, and the most regular collection. The local agency collection efforts were generally oriented toward specific goals and the data intended primarily for intra-agency use. The smallest statistical units in these efforts may be too large to be of value to a common small-area system, and data collection agencies did not generally use coterminous boundaries. Recommendations were made to give primary consideration to Statistics Canada data in the initial development of the baseline data system. Further development of such a system depends on the adoption by local agencies of a common small-area system for data collection. 38 refs., 6 figs.

  7. Safety classification of nuclear power plant systems, structures and components

    International Nuclear Information System (INIS)

    1992-01-01

    The Safety Classification principles used for the systems, structures and components of a nuclear power plant are detailed in the guide. For classification, the nuclear power plant is divided into structural and operational units called systems. Every structure and component under control is included into some system. The Safety Classes are 1, 2 and 3 and the Class EYT (non-nuclear). Instructions how to assign each system, structure and component to an appropriate safety class are given in the guide. The guide applies to new nuclear power plants and to the safety classification of systems, structures and components designed for the refitting of old nuclear power plants. The classification principles and procedures applying to the classification document are also given

  8. Systemically induced changes in skeletal structure

    International Nuclear Information System (INIS)

    Van Derslice, R.

    1989-01-01

    The number of systemic designs leading the radiographically detectable bone and joint changes is legion. Some disorders (notably the arthridites), while qualifying as diseases with protean systemic manifestations are discussed elsewhere in this book. Other disorders (e.g., achondroplasia), while not representing diseases per se, are included in this chapter for the sake of completeness and due to their relative frequency and their interesting radiographic characteristics. The author focuses on a number of selected conditions, some commonly seen and some relatively infrequently encountered. They are classified into he following categories: endocrinologic; metabolic; hematologic and reticuloendothelial; and dysplastic

  9. Some aspects of the interaction between systems- and structural reliability

    International Nuclear Information System (INIS)

    Schueller, G.K.; Schmitt, W.

    1979-01-01

    The purpose of this paper is to study the interaction between systems- and structural reliability analysis with reference to the design of structural components of LWR. Presently the evaluation of systems reliability is carried out apart from structural reliability analysis. Moreover, two basically different methodologies are used for analysis. While in systems analysis the simplified binary approach is still generally accepted, in structural reliability one has to resort to more sophisticated procedures to obtain realistic results. The interactive effect may be illustrated as follows: For example, the integrity of the primary circuit interacts with the integrity of the containment structure. This means that the probability of occurrence of the pipe rupture which may cause a LOCA and consequently leads to a build-up of temperature and pressure within the containment affects directly its structural reliability. The piping system, particularly the primary piping, in turn interacts with the protective system, which is part of the safety system. This piping structure is also subjected to various operational loading conditions. In a numerical example dealing with leakage probabilities of pipes it is shown how methods of structural reliability may be used to gain more insight in the estimation of failure rates of system components. (orig.)

  10. The Similar Structures and Control Problems of Complex Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In this paper, the naturally evolving complex systems, such as biotic and social ones, are considered. Focusing on their structures, a feature is noteworthy, i.e., the similarity in structures. The relations between the functions and behaviors of these systems and their similar structures will be studied. Owing to the management of social systems and the course of evolution of biotic systems may be regarded as control processes, the researches will be within the scope of control problems. Moreover, since it is difficult to model for biotic and social systems, it will start with the control problems of complex systems, possessing similar structures, in engineering.The obtained results show that for either linear or nonlinear systems and for a lot of control problemssimilar structures lead to a series of simplifications. In general, the original system may be decomposed into reduced amount of subsystems with lower dimensions and simpler structures. By virtue of such subsystems, the control problems of original system can be solved more simply.At last, it turns round to observe the biotic and social systems and some analyses are given.

  11. Optimal inspection strategies for offshore structural systems

    DEFF Research Database (Denmark)

    Faber, M. H.; Sorensen, J. D.; Kroon, I. B.

    1992-01-01

    a mathematical framework for the estimation of the failure and repair costs a.ssociated with systems failure. Further a strategy for selecting the components to inspect based on decision tree analysis is suggested. Methods and analysis schemes are illustrated by a simple example....

  12. Application of structured analysis to a telerobotic system

    Science.gov (United States)

    Dashman, Eric; Mclin, David; Harrison, F. W.; Soloway, Donald; Young, Steven

    1990-01-01

    The analysis and evaluation of a multiple arm telerobotic research and demonstration system developed by the NASA Intelligent Systems Research Laboratory (ISRL) is described. Structured analysis techniques were used to develop a detailed requirements model of an existing telerobotic testbed. Performance models generated during this process were used to further evaluate the total system. A commercial CASE tool called Teamwork was used to carry out the structured analysis and development of the functional requirements model. A structured analysis and design process using the ISRL telerobotic system as a model is described. Evaluation of this system focused on the identification of bottlenecks in this implementation. The results demonstrate that the use of structured methods and analysis tools can give useful performance information early in a design cycle. This information can be used to ensure that the proposed system meets its design requirements before it is built.

  13. Structure Learning in Stochastic Non-linear Dynamical Systems

    Science.gov (United States)

    Morris, R. D.; Smelyanskiy, V. N.; Luchinsky, D. G.

    2005-12-01

    A great many systems can be modeled in the non-linear dynamical systems framework, as x˙ = f(x) + ξ(t), where f(x) is the potential function for the system, and ξ(t) is the driving noise. Modeling the potential using a set of basis functions, we derive the posterior for the basis coefficients. A more challenging problem is to determine the set of basis functions that are required to model a particular system. We show that using the Bayesian Information Criteria (BIC) to rank models, and the beam search technique, that we can accurately determine the structure of simple non-linear dynamical system models, and the structure of the coupling between non-linear dynamical systems where the individual systems are known. This last case has important ecological applications, for example in predator-prey systems, where the very structure of the coupling between predator-prey pairs can have great ecological significance.

  14. A STRUCTURAL MODEL OF AN EXCAVATOR WORKFLOW CONTROL SYSTEM

    Directory of Open Access Journals (Sweden)

    A. Gurko

    2016-12-01

    Full Text Available Earthwork improving is connected with excavators automation. In this paper, on the basis of the analysis of problems that a hydraulic excavator control system have to solve, the hierarchical structure of a control system have been proposed. The decomposition of the control process had been executed that allowed to develop the structural model which reflects the characteristics of a multilevel space-distributed control system of an excavator workflow.

  15. Prototype Software for Automated Structural Analysis of Systems

    DEFF Research Database (Denmark)

    Jørgensen, A.; Izadi-Zamanabadi, Roozbeh; Kristensen, M.

    2004-01-01

    In this paper we present a prototype software tool that is developed to analyse the structural model of automated systems in order to identify redundant information that is hence utilized for Fault detection and Isolation (FDI) purposes. The dedicated algorithms in this software tool use a tri......-partite graph that represents the structural model of the system. A component-based approach has been used to address issues such as system complexity and recon¯gurability possibilities....

  16. Prototype Software for Automated Structural Analysis of Systems

    DEFF Research Database (Denmark)

    Jørgensen, A.; Izadi-Zamanabadi, Roozbeh; Kristensen, M.

    2004-01-01

    In this paper we present a prototype software tool that is developed to analyse the structural model of automated systems in order to identify redundant information that is hence utilized for Fault detection and Isolation (FDI) purposes. The dedicated algorithms in this software tool use a tri......-partite graph that represents the structural model of the system. A component-based approach has been used to address issues such as system complexity and reconfigurability possibilities....

  17. Spatial Structures and Regulation in Biological Systems

    DEFF Research Database (Denmark)

    Yde, Pernille

    , and the other is the spatial regulation of biological systems, here related to different aspects of the inflammatory response. All systems are studied using computational modelling and mathematical analysis. The first part of the thesis explores different protein aggregation scenarios. In Chapter 1, we consider...... a previously studied and very general aggregation model describing frangible linear filaments. This model is especially relevant for the growth of amyloid fibres, that have been related to a number of serious human diseases, and which are known to grow in an accelerated self-enhanced manner.We derive...... model of the tissue and show how coupled cells are able to function as an excitable medium and propagate waves of high cytokine concentration through the tissue. If the internal regulation in the cells is over-productive, the model predicts a continuous amplification of cytokines, which spans the entire...

  18. Optimal Inspection and Repair Strategies for Structural Systems

    DEFF Research Database (Denmark)

    Sommer, A. M.; Nowak, A. S.; Thoft-Christensen, Palle

    1992-01-01

    and a design variable as optimization variables. A model for estimating the total expected costs for structural systems is given including the costs associated with the loss of individual structural members as well as the costs associated with the loss of at least one element of a particular group......A model for reliability-based repair and maintenance strategies of structural systems is described. The total expected costs in the lifetime of the structure are minimized with the number of inspections, the number and positions of the inspected points, the inspection efforts, the repair criteria...... of structural members and the costs associated with the simultaneous loss of all members of a specific group of structural members. The approach is based on the pre-posteriori analysis from the classical decision theory. Special emphasis is given to the problem of selecting the number of points in the structure...

  19. Structural biology at York Structural Biology Laboratory; laboratory information management systems for structural genomics

    Czech Academy of Sciences Publication Activity Database

    Dohnálek, Jan

    2005-01-01

    Roč. 12, č. 1 (2005), s. 3 ISSN 1211-5894. [Meeting of Structural Biologists /4./. 10.03.2005-12.03.2005, Nové Hrady] R&D Projects: GA MŠk(CZ) 1K05008 Keywords : structural biology * LIMS * structural genomics Subject RIV: CD - Macromolecular Chemistry

  20. Topics in the structure of hadronic systems

    International Nuclear Information System (INIS)

    Lebed, R.F.; Lawrence Berkeley Lab., CA

    1994-04-01

    In this dissertation the author examines a variety of different problems in the physics of strongly-bound systems. Each is elucidated by a different standard method of analysis developed to probe the properties of such systems. He begins with an examination of the properties and consequences of the current algebra of weak currents in the limit of heavy quark spin-flavor symmetry. In particular, he examines the assumptions in the proof of the Ademollo-Gatto theorem in general and for spin-flavor symmetry, and exhibit the constraints imposed upon matrix elements by this theorem. Then he utilizes the renormalization-group method to create composite fermions in a three-generation electroweak model. Such a model is found to reproduce the same low energy behavior as the top-condensate electroweak model, although in general it may have strong constraints upon its Higgs sector. Next he uncovers subtleties in the nonrelativistic quark model that drastically alter the picture of the physical origins of meson electromagnetic and hyperfine mass splittings; in particular, the explicit contributions due to (m d -m u ) and electrostatic potentials may be overwhelmed by other effects. Such novel effects are used to explain the anomalous pattern of mass splittings recently measured in bottom mesons. Finally, he considers the topic of baryon masses in heavy fermion chiral perturbation theory, including both tree-level and loop effects

  1. Organizational Structure and Management in Romanian Health System

    OpenAIRE

    Boldureanu Daniel; Boldureanu Gabriela

    2010-01-01

    The health system in Romania in a continuous transformation from a centralized system (type Semashko) exists before 1989 year to one based on social health insurance (type Bismark). This paper examines the management and the organizational structure of the health system in Romania, and the relations between them in the context of the Health Reform Law.

  2. Designing socio-technical systems : Structures and processes

    NARCIS (Netherlands)

    Bots, P.W.G.; Van Daalen, C.

    2012-01-01

    The Systems Engineering, Policy Analysis and Management (SEPAM) MSc curriculum taught at Delft University of Technology focuses on the design of socio-technical systems (STS). We teach our students to structure design activities by considering what we call the TIP aspects: Technical systems,

  3. Generic structural mechanics aspects of fusion magnet systems

    International Nuclear Information System (INIS)

    Reich, M.; Powell, J.R.

    1980-01-01

    Structural mechanic requirements for future large superconducting fusion magnets are assessed. Current structural analysis methods and standards do not yet appear sufficient for a complete evaluation of such systems, under all potential operating and accident conditions. Recommendations are made for development of needed structural methods and specialized standards for fusion magnets. These include, among others, better composite structural methods with various failure criteria for metallic, as well as non-metallic materials, coupled thermal-electrical-structural codes, incorporating winding and fabrication effects, and use of probabilistic methods for life prediction. In order to help meet program goals for fusion commericialization, it is recommended that such work be initiated relatively soon. (orig.)

  4. Development of Hybrid Product Breakdown Structure for NASA Ground Systems

    Science.gov (United States)

    Monaghan, Mark W.; Henry, Robert J.

    2013-01-01

    The Product Breakdown Structure is traditionally a method of identification of the products of a project in a tree structure. It is a tool used to assess, plan, document, and display the equipment requirements for a project. It is part of a product based planning technique, and attempts to break down all components of a project in as much detail as possible, so that nothing is overlooked. The PBS for ground systems at the Kennedy Space Center is being developed to encompass the traditional requirements including the alignment of facility, systems, and components to the organizational hierarchy. The Ground Operations Product Breakdown Structure is a hybrid in nature in that some aspects of a work breakdown structure will be incorporated and merged with the Architecture Concept of Operations, Master Subsystem List, customer interface, and assigned management responsibility. The Ground Operations Product Breakdown Structure needs to be able to identify the flexibility of support differing customers (internal and external) usage of ground support equipment within the Kennedy Space Center launch and processing complex. The development of the Product Breakdown Structure is an iterative activity Initially documenting the organization hierarchy structure and relationships. The Product Breakdown Structure identifies the linkage between the customer program requirements, allocation of system resources, development of design goals, and identification logistics products. As the Product Breakdown Structure progresses the incorporation of the results of requirement planning for the customer occurs identifying facility needs and systems. The mature Product Breakdown Structure is baselined with a hierarchical drawing, the Product Breakdown Structure database, and an associated document identifying the verification of the data through the life cycle of the program/product line. This paper will document, demonstrate, and identify key aspects of the life cycle of a Hybrid Product

  5. Nuclear molecular structure in heavy mass systems

    International Nuclear Information System (INIS)

    Arctaedius, T.; Bargholtz, C.

    1989-04-01

    A study is made of nuclear molecular configurations involving one heavy mass partner. The stability of these configurations to mass flow and to fission is investigated as well as their population in fusion reactions. It is concluded that shell effects in combination with the effects of angular momentum may be important in stabilizing certain configurations. A possible relation of these configurations to the so called superdeformed states is pointed out. The spectrum of rotational and vibrational trasitions within molecular configurations is investigated. For sufficiently mass-asymmetric systems the engergies of vibrational transitions are comparable to the neutron separation energy. Gamma radiation from such transitions may then be observable above the background of statistical transitions. The gamma spectrum and the directional distribution of the radioation following fusion reactions with 12 C and 16 O are calculated. (authors)

  6. On the structure of quantal proposition systems

    Science.gov (United States)

    Bub, Jeffrey

    1994-09-01

    I define sublaltices of quantum propositions that can be taken as having determinate (but perhaps unknown) truth values for a given quantum state, in the sense that sufficiently many two-valued maps satisfying a Boolean homomorphism condition exist on each determinate sublattice to generate a Kolmogorov probability space for the probabilities defined by the slate. I show that these sublattices are maximal, subject to certain constraints, from which it follows easily that they are unique. I discuss the relevance of this result for the measurement problem, relating it to an early proposal by Jauch and Piron for defining a new notion of state for quantum systems, to a recent uniqueness proof by Clifton for the sublattice of propositions specified as determinate by modal interpretations of quantum mechanics that exploit the polar decompostion theorem, and to my own previous suggestions for interpreting quantum mechanics without the projection postulate.

  7. Structure health monitoring system using internet and database technologies

    International Nuclear Information System (INIS)

    Kwon, Il Bum; Kim, Chi Yeop; Choi, Man Yong; Lee, Seung Seok

    2003-01-01

    Structural health monitoring system should developed to be based on internet and database technology in order to manage efficiently large structures. This system is operated by internet connected with the side of structures. The monitoring system has some functions: self monitoring, self diagnosis, and self control etc. Self monitoring is the function of sensor fault detection. If some sensors are not normally worked, then this system can detect the fault sensors. Also Self diagnosis function repair the abnormal condition of sensors. And self control is the repair function of the monitoring system. Especially, the monitoring system can identify the replacement of sensors. For further study, the real application test will be performed to check some unconvince.

  8. Structural health monitoring system using internet and database technologies

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Chi Yeop; Choi, Man Yong; Kwon, Il Bum; Lee, Seung Seok [Nonstructive Measurment Lab., KRISS, Daejeon (Korea, Republic of)

    2003-07-01

    Structure health monitoring system should develope to be based on internet and database technology in order to manage efficiency large structures. This system is operated by internet connected with the side of structures. The monitoring system has some functions: self monitoring, self diagnosis, and self control etc. Self monitoring is the function of sensor fault detection. If some sensors are not normally worked, then this system can detect the fault sensors. Also Self diagnosis function repair the abnormal condition of sensors. And self control is the repair function of the monitoring system. Especially, the monitoring system can identify the replacement of sensors. For further study, the real application test will be performed to check some unconviniences.

  9. Structure health monitoring system using internet and database technologies

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Il Bum; Kim, Chi Yeop; Choi, Man Yong; Lee, Seung Seok [Smart Measurment Group. Korea Resarch Institute of Standards and Science, Saejeon (Korea, Republic of)

    2003-05-15

    Structural health monitoring system should developed to be based on internet and database technology in order to manage efficiently large structures. This system is operated by internet connected with the side of structures. The monitoring system has some functions: self monitoring, self diagnosis, and self control etc. Self monitoring is the function of sensor fault detection. If some sensors are not normally worked, then this system can detect the fault sensors. Also Self diagnosis function repair the abnormal condition of sensors. And self control is the repair function of the monitoring system. Especially, the monitoring system can identify the replacement of sensors. For further study, the real application test will be performed to check some unconvince.

  10. Structural health monitoring system using internet and database technologies

    International Nuclear Information System (INIS)

    Kim, Chi Yeop; Choi, Man Yong; Kwon, Il Bum; Lee, Seung Seok

    2003-01-01

    Structure health monitoring system should develope to be based on internet and database technology in order to manage efficiency large structures. This system is operated by internet connected with the side of structures. The monitoring system has some functions: self monitoring, self diagnosis, and self control etc. Self monitoring is the function of sensor fault detection. If some sensors are not normally worked, then this system can detect the fault sensors. Also Self diagnosis function repair the abnormal condition of sensors. And self control is the repair function of the monitoring system. Especially, the monitoring system can identify the replacement of sensors. For further study, the real application test will be performed to check some unconviniences.

  11. Probabilistic structural analysis methods for select space propulsion system components

    Science.gov (United States)

    Millwater, H. R.; Cruse, T. A.

    1989-01-01

    The Probabilistic Structural Analysis Methods (PSAM) project developed at the Southwest Research Institute integrates state-of-the-art structural analysis techniques with probability theory for the design and analysis of complex large-scale engineering structures. An advanced efficient software system (NESSUS) capable of performing complex probabilistic analysis has been developed. NESSUS contains a number of software components to perform probabilistic analysis of structures. These components include: an expert system, a probabilistic finite element code, a probabilistic boundary element code and a fast probability integrator. The NESSUS software system is shown. An expert system is included to capture and utilize PSAM knowledge and experience. NESSUS/EXPERT is an interactive menu-driven expert system that provides information to assist in the use of the probabilistic finite element code NESSUS/FEM and the fast probability integrator (FPI). The expert system menu structure is summarized. The NESSUS system contains a state-of-the-art nonlinear probabilistic finite element code, NESSUS/FEM, to determine the structural response and sensitivities. A broad range of analysis capabilities and an extensive element library is present.

  12. Detection and Location of Structural Degradation in Mechanical Systems

    International Nuclear Information System (INIS)

    Blakeman, E.D.; Damiano, B.; Phillips, L.D.

    1999-01-01

    The investigation of a diagnostic method for detecting and locating the source of structural degradation in a mechanical system is described in this paper. The diagnostic method uses a mathematical model of the mechanical system to determine relationships between system parameters and measurable spectral features. These relationships are incorporated into a neural network, which associates measured spectral features with system parameters. Condition diagnosis is performed by presenting the neural network with measured spectral features and comparing the system parameters estimated by the neural network to previously estimated values. Changes in the estimated system parameters indicate the location and severity of degradation in the mechanical system

  13. Algebraic structure of a generalized coupled dispersionless system

    International Nuclear Information System (INIS)

    Victor, Kuetche Kamgang; Thomas, Bouetou Bouetou; Kofane, Timoleon Crepin

    2006-01-01

    We study a physical model of the O(3)-invariant coupled integrable dispersionless equations that describes the dynamic of a focused system within the background of a plane gravitational field. The investigation is carried out both numerically and analytically, and realized beneath some assumptions superseding the structure constant with the structure function implemented in Lie algebra and quasigroup theory, respectively. The energy density and topological structures such as loop soliton are examined

  14. Implementing a structured triage system at a community health ...

    African Journals Online (AJOL)

    Implementing a structured triage system at a community health centre using Kaizen. ... and a resultant increased workload for doctors; management is concerned ... Aim: We set out to standardise the triage process and to manage unbooked ...

  15. Diaphragm Effect of Steel Space Roof Systems in Hall Structures

    Directory of Open Access Journals (Sweden)

    Mehmet FENKLİ

    2015-09-01

    Full Text Available Hall structures have been used widely for different purposes. They have are reinforced concrete frames and shear wall with steel space roof systems. Earthquake response of hall structures is different from building type structures. One of the most critical nodes is diaphragm effect of steel space roof on earthquake response of hall structures. Diaphragm effect is depending on lateral stiffness capacity of steel space roof system. Lateral stiffness of steel space roof system is related to modulation geometry, support conditions, selected sections and system geometry. In current paper, three representative models which are commonly used in Turkey were taken in to account for investigation. Results of numerical tests were present comparatively

  16. Quantifiable and Reliable Structural Health Management Systems, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Major concerns for implementing a practical built-in structural health monitoring system are prediction accuracy and data reliability. It is proposed to develop...

  17. Probabilistic structural analysis methods for space transportation propulsion systems

    Science.gov (United States)

    Chamis, C. C.; Moore, N.; Anis, C.; Newell, J.; Nagpal, V.; Singhal, S.

    1991-01-01

    Information on probabilistic structural analysis methods for space propulsion systems is given in viewgraph form. Information is given on deterministic certification methods, probability of failure, component response analysis, stress responses for 2nd stage turbine blades, Space Shuttle Main Engine (SSME) structural durability, and program plans. .

  18. Foundations of organizational structure in multi-agent systems

    NARCIS (Netherlands)

    Grossi, D.; Royakkers, L.M.M.; Dignum, F.P.M.; Dastani, M.

    2005-01-01

    We analyze the notion of organizational structure in multiagent systems and explain the precise added value and the effects of such organizational structure on the involved agents. To pursue this aim, contributions from social and organization theory are considered which provide a solid theoretical

  19. Variables and equations in hybrid systems with structural changes

    NARCIS (Netherlands)

    Beek, van D.A.

    2001-01-01

    In many models of physical systems, structural changes are common. Such structural changes may cause a variable to change from a differential variable to an algebraic variable, or to a variable that is not defined by an equation at all. Most hybrid modelling languages either restrict the kind of

  20. An expert system for integrated structural analysis and design optimization for aerospace structures

    Science.gov (United States)

    1992-04-01

    The results of a research study on the development of an expert system for integrated structural analysis and design optimization is presented. An Object Representation Language (ORL) was developed first in conjunction with a rule-based system. This ORL/AI shell was then used to develop expert systems to provide assistance with a variety of structural analysis and design optimization tasks, in conjunction with procedural modules for finite element structural analysis and design optimization. The main goal of the research study was to provide expertise, judgment, and reasoning capabilities in the aerospace structural design process. This will allow engineers performing structural analysis and design, even without extensive experience in the field, to develop error-free, efficient and reliable structural designs very rapidly and cost-effectively. This would not only improve the productivity of design engineers and analysts, but also significantly reduce time to completion of structural design. An extensive literature survey in the field of structural analysis, design optimization, artificial intelligence, and database management systems and their application to the structural design process was first performed. A feasibility study was then performed, and the architecture and the conceptual design for the integrated 'intelligent' structural analysis and design optimization software was then developed. An Object Representation Language (ORL), in conjunction with a rule-based system, was then developed using C++. Such an approach would improve the expressiveness for knowledge representation (especially for structural analysis and design applications), provide ability to build very large and practical expert systems, and provide an efficient way for storing knowledge. Functional specifications for the expert systems were then developed. The ORL/AI shell was then used to develop a variety of modules of expert systems for a variety of modeling, finite element analysis, and

  1. Structures of two-dimensional three-body systems

    International Nuclear Information System (INIS)

    Ruan, W.Y.; Liu, Y.Y.; Bao, C.G.

    1996-01-01

    Features of the structure of L = 0 states of a two-dimensional three-body model system have been investigated. Three types of permutation symmetry of the spatial part, namely symmetric, antisymmetric, and mixed, have been considered. A comparison has been made between the two-dimensional system and the corresponding three-dimensional one. The effect of symmetry on microscopic structures is emphasized. (author)

  2. GENERIC Integrators: Structure Preserving Time Integration for Thermodynamic Systems

    Science.gov (United States)

    Öttinger, Hans Christian

    2018-04-01

    Thermodynamically admissible evolution equations for non-equilibrium systems are known to possess a distinct mathematical structure. Within the GENERIC (general equation for the non-equilibrium reversible-irreversible coupling) framework of non-equilibrium thermodynamics, which is based on continuous time evolution, we investigate the possibility of preserving all the structural elements in time-discretized equations. Our approach, which follows Moser's [1] construction of symplectic integrators for Hamiltonian systems, is illustrated for the damped harmonic oscillator. Alternative approaches are sketched.

  3. A computer graphics program system for protein structure representation.

    Science.gov (United States)

    Ross, A M; Golub, E E

    1988-01-01

    We have developed a computer graphics program system for the schematic representation of several protein secondary structure analysis algorithms. The programs calculate the probability of occurrence of alpha-helix, beta-sheet and beta-turns by the method of Chou and Fasman and assign unique predicted structure to each residue using a novel conflict resolution algorithm based on maximum likelihood. A detailed structure map containing secondary structure, hydrophobicity, sequence identity, sequence numbering and the location of putative N-linked glycosylation sites is then produced. In addition, helical wheel diagrams and hydrophobic moment calculations can be performed to further analyze the properties of selected regions of the sequence. As they require only structure specification as input, the graphics programs can easily be adapted for use with other secondary structure prediction schemes. The use of these programs to analyze protein structure-function relationships is described and evaluated. PMID:2832829

  4. Influence of seismic isolation systems and soil-structure interaction on the response of structures

    Directory of Open Access Journals (Sweden)

    Samah Hasrouri

    2018-01-01

    Full Text Available The reduction of cyclic loading triggering major damage in urban areas is a major challenge in earthquake engineering. The processes of structural control especially control structures for passive isolation systems and earthquake sinks of energy, which consists in superimposing on the structure a device which modifies the rigidity or the damping of the structural system without the demand for an external energy source and without introducing energy for its operation, these devices with taking account the effect of soilstructure interaction are currently regarded as effective solutions to these problem by reducing the level of acceleration imposed on the structure and consequently forces shear and the relative displacements in the superstructure. This reduction of shear forces and displacements will limit the structural damage.

  5. Modeling structural change in spatial system dynamics: A Daisyworld example.

    Science.gov (United States)

    Neuwirth, C; Peck, A; Simonović, S P

    2015-03-01

    System dynamics (SD) is an effective approach for helping reveal the temporal behavior of complex systems. Although there have been recent developments in expanding SD to include systems' spatial dependencies, most applications have been restricted to the simulation of diffusion processes; this is especially true for models on structural change (e.g. LULC modeling). To address this shortcoming, a Python program is proposed to tightly couple SD software to a Geographic Information System (GIS). The approach provides the required capacities for handling bidirectional and synchronized interactions of operations between SD and GIS. In order to illustrate the concept and the techniques proposed for simulating structural changes, a fictitious environment called Daisyworld has been recreated in a spatial system dynamics (SSD) environment. The comparison of spatial and non-spatial simulations emphasizes the importance of considering spatio-temporal feedbacks. Finally, practical applications of structural change models in agriculture and disaster management are proposed.

  6. Maturation of Structural Health Management Systems for Solid Rocket Motors

    Science.gov (United States)

    Quing, Xinlin; Beard, Shawn; Zhang, Chang

    2011-01-01

    Concepts of an autonomous and automated space-compliant diagnostic system were developed for conditioned-based maintenance (CBM) of rocket motors for space exploration vehicles. The diagnostic system will provide real-time information on the integrity of critical structures on launch vehicles, improve their performance, and greatly increase crew safety while decreasing inspection costs. Using the SMART Layer technology as a basis, detailed procedures and calibration techniques for implementation of the diagnostic system were developed. The diagnostic system is a distributed system, which consists of a sensor network, local data loggers, and a host central processor. The system detects external impact to the structure. The major functions of the system include an estimate of impact location, estimate of impact force at impacted location, and estimate of the structure damage at impacted location. This system consists of a large-area sensor network, dedicated multiple local data loggers with signal processing and data analysis software to allow for real-time, in situ monitoring, and longterm tracking of structural integrity of solid rocket motors. Specifically, the system could provide easy installation of large sensor networks, onboard operation under harsh environments and loading, inspection of inaccessible areas without disassembly, detection of impact events and impact damage in real-time, and monitoring of a large area with local data processing to reduce wiring.

  7. Parameter and Structure Inference for Nonlinear Dynamical Systems

    Science.gov (United States)

    Morris, Robin D.; Smelyanskiy, Vadim N.; Millonas, Mark

    2006-01-01

    A great many systems can be modeled in the non-linear dynamical systems framework, as x = f(x) + xi(t), where f() is the potential function for the system, and xi is the excitation noise. Modeling the potential using a set of basis functions, we derive the posterior for the basis coefficients. A more challenging problem is to determine the set of basis functions that are required to model a particular system. We show that using the Bayesian Information Criteria (BIC) to rank models, and the beam search technique, that we can accurately determine the structure of simple non-linear dynamical system models, and the structure of the coupling between non-linear dynamical systems where the individual systems are known. This last case has important ecological applications.

  8. Epidemics and rumours in complex networks

    CERN Document Server

    Draief, Moez

    2009-01-01

    Information propagation through peer-to-peer systems, online social systems, wireless mobile ad hoc networks and other modern structures can be modelled as an epidemic on a network of contacts. Understanding how epidemic processes interact with network topology allows us to predict ultimate course, understand phase transitions and develop strategies to control and optimise dissemination. This book is a concise introduction for applied mathematicians and computer scientists to basic models, analytical tools and mathematical and algorithmic results. Mathematical tools introduced include coupling

  9. Substantiation of Structure of Adaptive Control Systems for Motor Units

    Science.gov (United States)

    Ovsyannikov, S. I.

    2018-05-01

    The article describes the development of new electronic control systems, in particular motor units, for small-sized agricultural equipment. Based on the analysis of traffic control systems, the main course of development of the conceptual designs of motor units has been defined. The systems aimed to control the course motion of the motor unit in automatic mode using the adaptive systems have been developed. The article presents structural models of the conceptual motor units based on electrically controlled systems by the operation of drive motors and adaptive systems that make the motor units completely automated.

  10. Accuracy Enhanced Stability and Structure Preserving Model Reduction Technique for Dynamical Systems with Second Order Structure

    DEFF Research Database (Denmark)

    Tahavori, Maryamsadat; Shaker, Hamid Reza

    A method for model reduction of dynamical systems with the second order structure is proposed in this paper. The proposed technique preserves the second order structure of the system, and also preserves the stability of the original systems. The method uses the controllability and observability...... gramians within the time interval to build the appropriate Petrov-Galerkin projection for dynamical systems within the time interval of interest. The bound on approximation error is also derived. The numerical results are compared with the counterparts from other techniques. The results confirm...

  11. Anti-correlation and subsector structure in financial systems

    Science.gov (United States)

    Jiang, X. F.; Zheng, B.

    2012-02-01

    With the random matrix theory, we study the spatial structure of the Chinese stock market, the American stock market and global market indices. After taking into account the signs of the components in the eigenvectors of the cross-correlation matrix, we detect the subsector structure of the financial systems. The positive and negative subsectors are anti-correlated with respect to each other in the corresponding eigenmode. The subsector structure is strong in the Chinese stock market, while somewhat weaker in the American stock market and global market indices. Characteristics of the subsector structures in different markets are revealed.

  12. Limitations and corrections in measuring dynamic characteristics of structural systems

    International Nuclear Information System (INIS)

    Walter, P.L.

    1978-10-01

    The work deals with limitations encountered in measuring the dynamic characteristics of structural systems. Structural loading and response are measured by transducers possessing multiple resonant frequencies in their transfer function. In transient environments, the resultant signals from these transducers are shown to be analytically unpredictable in amplitude level and frequency content. Data recorded during nuclear effects simulation testing on structures are analyzed. Results of analysis can be generalized to any structure which encounters dynamic loading. Methods to improve the recorded data are described which can be implemented on a frequency selective basis during the measurement process. These improvements minimize data distortion attributable to the transfer characteristics of the measuring transducers

  13. Selective maintenance of multi-state systems with structural dependence

    International Nuclear Information System (INIS)

    Dao, Cuong D.; Zuo, Ming J.

    2017-01-01

    This paper studies the selective maintenance problem for multi-state systems with structural dependence. Each component can be in one of multiple working levels and several maintenance actions are possible to a component in a maintenance break. The components structurally form multiple hierarchical levels and dependence groups. A directed graph is used to represent the precedence relations of components in the system. A selective maintenance optimization model is developed to maximize the system reliability in the next mission under time and cost constraints. A backward search algorithm is used to determine the assembly sequence for a selective maintenance scenario. The maintenance model helps maintenance managers in determining the best combination of maintenance activities to maximize the probability of successfully completing the next mission. Examples showing the use of the proposed method are presented. - Highlights: • A selective maintenance model for multi-state systems is proposed considering both economic and structural dependence. • Structural dependence is modeled as precedence relationship when disassembling components for maintenance. • Resources for disassembly and maintenance are evaluated using a backward search algorithm. • Maintenance strategies with and without structural dependence are analyzed. • Ignoring structural dependence may lead to over-estimation of system reliability.

  14. Poisson structure of dynamical systems with three degrees of freedom

    Science.gov (United States)

    Gümral, Hasan; Nutku, Yavuz

    1993-12-01

    It is shown that the Poisson structure of dynamical systems with three degrees of freedom can be defined in terms of an integrable one-form in three dimensions. Advantage is taken of this fact and the theory of foliations is used in discussing the geometrical structure underlying complete and partial integrability. Techniques for finding Poisson structures are presented and applied to various examples such as the Halphen system which has been studied as the two-monopole problem by Atiyah and Hitchin. It is shown that the Halphen system can be formulated in terms of a flat SL(2,R)-valued connection and belongs to a nontrivial Godbillon-Vey class. On the other hand, for the Euler top and a special case of three-species Lotka-Volterra equations which are contained in the Halphen system as limiting cases, this structure degenerates into the form of globally integrable bi-Hamiltonian structures. The globally integrable bi-Hamiltonian case is a linear and the SL(2,R) structure is a quadratic unfolding of an integrable one-form in 3+1 dimensions. It is shown that the existence of a vector field compatible with the flow is a powerful tool in the investigation of Poisson structure and some new techniques for incorporating arbitrary constants into the Poisson one-form are presented herein. This leads to some extensions, analogous to q extensions, of Poisson structure. The Kermack-McKendrick model and some of its generalizations describing the spread of epidemics, as well as the integrable cases of the Lorenz, Lotka-Volterra, May-Leonard, and Maxwell-Bloch systems admit globally integrable bi-Hamiltonian structure.

  15. Research and Development of Rapid Design Systems for Aerospace Structure

    Science.gov (United States)

    Schaeffer, Harry G.

    1999-01-01

    This report describes the results of research activities associated with the development of rapid design systems for aerospace structures in support of the Intelligent Synthesis Environment (ISE). The specific subsystems investigated were the interface between model assembly and analysis; and, the high performance NASA GPS equation solver software system in the Windows NT environment on low cost high-performance PCs.

  16. Improved Stochastic Subspace System Identification for Structural Health Monitoring

    Science.gov (United States)

    Chang, Chia-Ming; Loh, Chin-Hsiung

    2015-07-01

    Structural health monitoring acquires structural information through numerous sensor measurements. Vibrational measurement data render the dynamic characteristics of structures to be extracted, in particular of the modal properties such as natural frequencies, damping, and mode shapes. The stochastic subspace system identification has been recognized as a power tool which can present a structure in the modal coordinates. To obtain qualitative identified data, this tool needs to spend computational expense on a large set of measurements. In study, a stochastic system identification framework is proposed to improve the efficiency and quality of the conventional stochastic subspace system identification. This framework includes 1) measured signal processing, 2) efficient space projection, 3) system order selection, and 4) modal property derivation. The measured signal processing employs the singular spectrum analysis algorithm to lower the noise components as well as to present a data set in a reduced dimension. The subspace is subsequently derived from the data set presented in a delayed coordinate. With the proposed order selection criteria, the number of structural modes is determined, resulting in the modal properties. This system identification framework is applied to a real-world bridge for exploring the feasibility in real-time applications. The results show that this improved system identification method significantly decreases computational time, while qualitative modal parameters are still attained.

  17. Interactive physically-based structural modeling of hydrocarbon systems

    International Nuclear Information System (INIS)

    Bosson, Mael; Grudinin, Sergei; Bouju, Xavier; Redon, Stephane

    2012-01-01

    Hydrocarbon systems have been intensively studied via numerical methods, including electronic structure computations, molecular dynamics and Monte Carlo simulations. Typically, these methods require an initial structural model (atomic positions and types, topology, etc.) that may be produced using scripts and/or modeling tools. For many systems, however, these building methods may be ineffective, as the user may have to specify the positions of numerous atoms while maintaining structural plausibility. In this paper, we present an interactive physically-based modeling tool to construct structural models of hydrocarbon systems. As the user edits the geometry of the system, atomic positions are also influenced by the Brenner potential, a well-known bond-order reactive potential. In order to be able to interactively edit systems containing numerous atoms, we introduce a new adaptive simulation algorithm, as well as a novel algorithm to incrementally update the forces and the total potential energy based on the list of updated relative atomic positions. The computational cost of the adaptive simulation algorithm depends on user-defined error thresholds, and our potential update algorithm depends linearly with the number of updated bonds. This allows us to enable efficient physically-based editing, since the computational cost is decoupled from the number of atoms in the system. We show that our approach may be used to effectively build realistic models of hydrocarbon structures that would be difficult or impossible to produce using other tools.

  18. Variable structure control of complex systems analysis and design

    CERN Document Server

    Yan, Xing-Gang; Edwards, Christopher

    2017-01-01

    This book systematizes recent research work on variable-structure control. It is self-contained, presenting necessary mathematical preliminaries so that the theoretical developments can be easily understood by a broad readership. The text begins with an introduction to the fundamental ideas of variable-structure control pertinent to their application in complex nonlinear systems. In the core of the book, the authors lay out an approach, suitable for a large class of systems, that deals with system uncertainties with nonlinear bounds. Its treatment of complex systems in which limited measurement information is available makes the results developed convenient to implement. Various case-study applications are described, from aerospace, through power systems to river pollution control with supporting simulations to aid the transition from mathematical theory to engineering practicalities. The book addresses systems with nonlinearities, time delays and interconnections and considers issues such as stabilization, o...

  19. PWL approximation of nonlinear dynamical systems, part I: structural stability

    International Nuclear Information System (INIS)

    Storace, M; De Feo, O

    2005-01-01

    This paper and its companion address the problem of the approximation/identification of nonlinear dynamical systems depending on parameters, with a view to their circuit implementation. The proposed method is based on a piecewise-linear approximation technique. In particular, this paper describes the approximation method and applies it to some particularly significant dynamical systems (topological normal forms). The structural stability of the PWL approximations of such systems is investigated through a bifurcation analysis (via continuation methods)

  20. Structural properties of the material control and accounting system

    International Nuclear Information System (INIS)

    1978-12-01

    A unified digraph approach is proposed for the assessment of the structure of the MC and A System. The approach emphasizes the two structural aspects of the system: vulnerability and reliability. Vulnerability is defined as a possibility of loosing connectedness in a given structure due to line and/or node removals. It is purely deterministic notion which leads to a qualitative analysis of redundancy of connections in the corresponding system. Reliability of the MC and A System structure provides a more quantitative way of assessing how safe the system is to random failures of the links representing lines of communication, material paths, monitors, and the components of the power supply network. By assigning probabilities to the lines and nodes of the corresponding digraph, the least reliable path can be used as a measure of the goodness of the system, which can be computed by efficient shortest path algorithms. Both vulnerability and reliability considerations are important in determining the effect of tampering of an adversary with the elements of the MC and M System

  1. Structuralism.

    Science.gov (United States)

    Piaget, Jean

    Provided is an overview of the analytical method known as structuralism. The first chapter discusses the three key components of the concept of a structure: the view of a system as a whole instead of so many parts; the study of the transformations in the system; and the fact that these transformations never lead beyond the system but always…

  2. Peer-Assisted Content Distribution with Random Linear Network Coding

    DEFF Research Database (Denmark)

    Hundebøll, Martin; Ledet-Pedersen, Jeppe; Sluyterman, Georg

    2014-01-01

    Peer-to-peer networks constitute a widely used, cost-effective and scalable technology to distribute bandwidth-intensive content. The technology forms a great platform to build distributed cloud storage without the need of a central provider. However, the majority of todays peer-to-peer systems...

  3. Applications of Coding in Network Communications

    Science.gov (United States)

    Chang, Christopher SungWook

    2012-01-01

    This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…

  4. The ABC Adaptive Fusion Architecture

    DEFF Research Database (Denmark)

    Bunde-Pedersen, Jonathan; Mogensen, Martin; Bardram, Jakob Eyvind

    2006-01-01

    Contemporary distributed collaborative systems tend to utilizeeither a client-server or a pure peer-to-peer paradigm. Aclient-server solution may potentially spawn direct connectionsbetween the clients to offload the server thereby creatinga hybrid architecture. A pure peer-to-peer paradigmmay on...

  5. EDUCATION SYSTEM OF UKRAINE AS AN OBJECT OF INFORMATIZATION: STRUCTURE OF THE EDUCATION SYSTEM

    OpenAIRE

    Anatolii Yu. Pylypchuk

    2010-01-01

    The structure of an education system and kinds of activities which are being carried out in it, belongs to the major parameters of the education system characterizing it as an object of informatization. In the paper there is considered the structure of the education system in Ukraine, its components and their dependence. These researches as well as the researches of kinds of activity are necessary for the creation of effective systems of informatization both separate objects, and an education...

  6. ESSENCE, STRUCTURE AND FUNCTIONS OF THE REGIONAL FINANCIAL SYSTEM

    Directory of Open Access Journals (Sweden)

    A. V. Milenkov

    2015-01-01

    Full Text Available The scientific themes of the article is relevant, as in the domestic and foreign economic literature, the term "financial system" does not comply with the fundamental theory of systems in which the system views revealed as a set of interrelated and interacting elements in accordance with the set to achieve the goal. Each of the elements of multi-level financial system has its own organizational structure, consisting of institutions and organizations within the jurisdiction of the entity government. In the article the author's interpretation of the concepts of "institutional framework," "organizational structure" of the regional financial system, defined the task of the financial system was to create rules and regulations of its operation, set out the basic functions of the institutions and organizations of the regional financial system, analyzes the external communication of the financial system, the implementation of which is one of the basic conditions for the effective functioning of the financial system in the region due to its inclusion in the federal and international financial sector. The contribution of the author in the development of the theme of the article is to specify and clarify the concepts of "the financial system", "institutional and organizational structure of the regional financial system," the development of methodological approaches to the formulation and use of methods of solving the institutional and organizational problems of the financial system in the region, the rationalization of the rules and regulations it current operation and future development, the definition of the composition of the basic functions that are adequate specialization and features of the institutes and organizations of the regional financial system.

  7. Reliability of Structural Systems with regard to Permanent Displacements

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard; Thoft-Christensen, Palle

    1991-01-01

    approach - a differential equation approach - a superposition approach - the simple method These three approaches are described in Sørensen & Thoft-Christensen [5], Sørensen et al. [6] and Sørensen & Thoft-Christensen [7]. It is assumed that the structural system can be modelled by a multi-linear elastic......In this paper the problem of estimating the accumulated permanent displacements of an offshore platform during one storm is considered. For dynamically sensitive structural systems subjected to wave loads this problem is generally very difficult. However, for dynamic insensitive systems some...... methods/experience related to permanent deformations are described in Grinda et al. [1] and Papadrakakis & Loukakis [2]. For general dynamic systems modelled by one-degree-of-freedom (and two-degrees-of freedom) systems a number of methods exist, see e.g. Nielsen et al. [3] and Toro & Cornell [4]. However...

  8. Structure-rheology relations in sodium caseinate containing systems

    OpenAIRE

    Ruis, H.G.M.

    2007-01-01

    The general aim of the work described in this thesis was to investigate structure-rheologyrelations for dairy related products, focusing on model systems containing sodium caseinate. The acid inducedgelationof sodium caseinate, of sodium caseinate stabilized emulsions, and the effect of shear on the structure formation was characterized. Special attention was given to the sol-gel transition point, which was defined by a frequency independent loss tangent. It was shown that the sol-gel transit...

  9. Structured Control of Affine Linear Parameter Varying Systems

    DEFF Research Database (Denmark)

    Adegas, Fabiano Daher; Stoustrup, Jakob

    2011-01-01

    This paper presents a new procedure to design structured controllers for discrete-time affine linear parametervarying systems (A LPV). The class of control structures includes decentralized of any order, fixed order output feedback, simultaneous plant-control design, among others. A parametervarying...... non-convex condition for an upper bound on the induced L2-norm performance is solved by an iterative linear matrix inequalities (LMI) optimization algorithm. Numerical examples demostrate the effectiveness of the proposed approach....

  10. Path Integration Applied to Structural Systems with Uncertain Properties

    DEFF Research Database (Denmark)

    Nielsen, Søren R.K.; Köylüoglu, H. Ugur

    Path integration (cell-to-cell mapping) method is applied to evaluate the joint probability density function (jpdf) of the response of the structural systems, with uncertain properties, subject to white noise excitation. A general methodology to deal with uncertainties is outlined and applied...... to the friction controlled slip of a structure on a foundation where the friction coefficient is modelled as a random variable. Exact results derived using the total probability theorem are compared to the ones obtained via path integration....

  11. STRUCTURAL AND DESIGN SPECIFICS OF SPACE GRID SYSTEMS

    Directory of Open Access Journals (Sweden)

    G. M. Gasii

    2017-01-01

    Full Text Available The aim of the study is to identify main trends in the development of space grid structures. In order to reach the purpose it is necessary to conduct a review of the known structural concepts, nodal connections and specifics of the space grid structures and to make conclusions on feasibility improvement of the considered structural concepts that make it possible to develop new solutions without disadvantages residing in the analogues. Analysis of papers written by foreign and national scientists and devoted to theoretical, numerical and experimental studies of stress-strain state, influence of different factors on it and geometrical optimization and designing of space grid structures has been conducted in order to achieve the objectives. Space grid structures and, in particular, flat double-layer grid and most frequent nodes have been studied in the paper. The paper contains a short review of the history on development of space grid structures. It has been found that a rapid development of structural designs was caused by scientific and technical progress and, in particular, improvement of physical and mechanical properties of materials, development of calculation methods, application of software systems for simulating behavior of the structure under load, which significantly increased the calculation accuracy and reduced complexity of design. It has been also established that main parameters that have influence on effectiveness of a structural design are geometric dimensions of its modular elements, ratio of its depth to the span. The world experience on development of connection components has been studied in the paper. The paper presents general classification of nodal connections. Main advantages and disadvantages of existing space grid structures are highlighted and it allows to determine possible methods for their improvement. Theoretical research has permitted to establish that the main direction of spatial grid structures improvement

  12. On-line system for investigation of atomic structure

    International Nuclear Information System (INIS)

    Amus'ya, M.Ya.; Chernysheva, L.V.

    1983-01-01

    A description of the on-line ATOM system is presented that enables to investigate the structure of atomic electron shells and their interactions with different scattering particles-electrons, positronse photons, mesons - with the use of computerized numerical solutions. The problem is stated along with mathematical description of atomic properties including theoretical and numerical models for each investigated physical process. The ATOM system structure is considered. The Hartree-Fock method is used to determine the wave functions of the ground and excited atomic states. The programs are written in the ALGOL langauge. Different atomic characteristics were possible to be calculated for the first time with an accuracy exceeding an experimental one

  13. Dependent systems reliability estimation by structural reliability approach

    DEFF Research Database (Denmark)

    Kostandyan, Erik; Sørensen, John Dalsgaard

    2014-01-01

    Estimation of system reliability by classical system reliability methods generally assumes that the components are statistically independent, thus limiting its applicability in many practical situations. A method is proposed for estimation of the system reliability with dependent components, where...... the leading failure mechanism(s) is described by physics of failure model(s). The proposed method is based on structural reliability techniques and accounts for both statistical and failure effect correlations. It is assumed that failure of any component is due to increasing damage (fatigue phenomena...... identification. Application of the proposed method can be found in many real world systems....

  14. Challenges in parameter identification of large structural dynamic systems

    International Nuclear Information System (INIS)

    Koh, C.G.

    2001-01-01

    In theory, it is possible to determine the parameters of a structural or mechanical system by subjecting it to some dynamic excitation and measuring the response. Considerable research has been carried out in this subject area known as the system identification over the past two decades. Nevertheless, the challenges associated with numerical convergence are still formidable when the system is large in terms of the number of degrees of freedom and number of unknowns. While many methods work for small systems, the convergence becomes difficult, if not impossible, for large systems. In this keynote lecture, both classical and non-classical system identification methods for dynamic testing and vibration-based inspection are discussed. For classical methods, the extended Kalman filter (EKF) approach is used. On this basis, a substructural identification method has been developed as a strategy to deal with large structural systems. This is achieved by reducing the problem size, thereby significantly improving the numerical convergence and efficiency. Two versions of this method are presented each with its own merits. A numerical example of frame structure with 20 unknown parameters is illustrated. For non-classical methods, the Genetic Algorithm (GA) is shown to be applicable with relative ease due to its 'forward analysis' nature. The computational time is, however, still enormous for large structural systems due to the combinatorial explosion problem. A model GA method has been developed to address this problem and tested with considerable success on a relatively large system of 50 degrees of freedom, accounting for input and output noise effects. An advantages of this GA-based identification method is that the objective function can be defined in response measured. Numerical studies show that the method is relatively robust, as it does in response measured. Numerical studies show that the method is relatively robust, as it dos not require good initial guess and the

  15. Nonlinear system identification of smart structures under high impact loads

    Science.gov (United States)

    Sarp Arsava, Kemal; Kim, Yeesock; El-Korchi, Tahar; Park, Hyo Seon

    2013-05-01

    The main purpose of this paper is to develop numerical models for the prediction and analysis of the highly nonlinear behavior of integrated structure control systems subjected to high impact loading. A time-delayed adaptive neuro-fuzzy inference system (TANFIS) is proposed for modeling of the complex nonlinear behavior of smart structures equipped with magnetorheological (MR) dampers under high impact forces. Experimental studies are performed to generate sets of input and output data for training and validation of the TANFIS models. The high impact load and current signals are used as the input disturbance and control signals while the displacement and acceleration responses from the structure-MR damper system are used as the output signals. The benchmark adaptive neuro-fuzzy inference system (ANFIS) is used as a baseline. Comparisons of the trained TANFIS models with experimental results demonstrate that the TANFIS modeling framework is an effective way to capture nonlinear behavior of integrated structure-MR damper systems under high impact loading. In addition, the performance of the TANFIS model is much better than that of ANFIS in both the training and the validation processes.

  16. Improvement of Structural Life Management System(SLMS) for N.P.P. Structures

    International Nuclear Information System (INIS)

    Cho, Myung Sug; Noh, Jae Myung; Lee, Jong Suk; Kim, Do Gyeum

    2009-01-01

    The first investigation on the degradation mechanism and establishment of systematic inspection procedure for nuclear power plant (NPP) structures in Korea were conducted through a research project performed from 1993 to 19961). Accordingly, the Structural Life Management System (SLMS) was developed in 1998. Currently, SLMS is still operating for the lifetime management of NPP structures. However, the function of currently operating SLMS is focusing essentially on the management of degradation data detected during periodical inspections. Such limited function is today stressing the necessity to supplement its functions by improving the inefficiency of D/B due to the huge volume of data as well as by reflecting additional requirements. Accordingly, this research intends to develop a system improving the former SLMS so as to accommodate to the various demands of the users like integrated D/B system exploiting web-server, integrity assessment and durability management

  17. Performance Spread of Re-entrant System Structures

    DEFF Research Database (Denmark)

    Nielsen, Erland Hejn

    2001-01-01

    -to-day operations. It might well be the case that those badly behaving systems merely constitute a set with a measure of almost zero. The key parameters that determine whether a re-entrant system is one of the badly behaving ones are essentially flow-structure, processing times and rules of priority between...... satisfactory. They are all vulnerable to certain job flow patterns and process time settings to a significant degree. The LBFS priority policy therefore presents itself not only as a stable, but also the safe and robust choice par excellence in relation to the control of re-entrant systems....... different job-classes on specific machines. Let us therefore face a re-entrant flow-shop production set-up in an order-driven production system, by which I mean that the flow structure relative to each production-batch shows great variability and where the size of the individual batches is quite large. One...

  18. An Automatic Control System for Conditioning 30 GHz Accelerating Structures

    CERN Document Server

    Dubrovskiy, A

    2008-01-01

    A software application programme has been developed to allow fast and automatic high-gradient conditioning of accelerating structures at 30 GHz in CTF3. The specificity of the application is the ability to control the high-power electron beam which produces the 30 GHz RF power used to condition the accelerating structures. The programme permits operation round the clock with minimum manpower requirements. In this paper the fast control system, machine control system, logging system, graphical user control interface and logging data visualization are described. An outline of the conditioning control system itself and of the feedback controlling peak power and pulse length is given. The software allows different types of conditioning strategies to be programmed

  19. Structural and practical identifiability analysis of S-system.

    Science.gov (United States)

    Zhan, Choujun; Li, Benjamin Yee Shing; Yeung, Lam Fat

    2015-12-01

    In the field of systems biology, biological reaction networks are usually modelled by ordinary differential equations. A sub-class, the S-systems representation, is a widely used form of modelling. Existing S-systems identification techniques assume that the system itself is always structurally identifiable. However, due to practical limitations, biological reaction networks are often only partially measured. In addition, the captured data only covers a limited trajectory, therefore data can only be considered as a local snapshot of the system responses with respect to the complete set of state trajectories over the entire state space. Hence the estimated model can only reflect partial system dynamics and may not be unique. To improve the identification quality, the structural and practical identifiablility of S-system are studied. The S-system is shown to be identifiable under a set of assumptions. Then, an application on yeast fermentation pathway was conducted. Two case studies were chosen; where the first case is based on a larger state trajectories and the second case is based on a smaller one. By expanding the dataset which span a relatively larger state space, the uncertainty of the estimated system can be reduced. The results indicated that initial concentration is related to the practical identifiablity.

  20. Updating a Strategic Highway Safety Plan : Learning from the Idaho Transportation Department (ITD) - Proceedings from the Federal Highway Administration's (FHWA) Highway Safety Peer-to-Peer Exchange Program

    Science.gov (United States)

    2009-10-01

    On November 4, 2009, ITDs Office of Highway Operations and Safety partnered with the FHWA Office of Safety to host a one-day peer exchange. This event focused on the update of Idahos Strategic Highway Safety Plan (SHSP), entitled Toward Zero...

  1. Integrating Metropolitan Planning Organizations into the State's Highway Safety Improvement Program (HSIP) : Proceedings from the Federal Highway Administration's Peer-to-Peer Exchange Program

    Science.gov (United States)

    2010-06-01

    This report provides a summary of a peer exchange sponsored by the Association of New York State Metropolitan Planning Organizations (NYSMPO) and the New York State Department of Transportation (NYSDOT). It also includes proposed next steps developed...

  2. Characterization of Temporal Semantic Shifts of Peer-to-Peer Communication in a Health-Related Online Community: Implications for Data-driven Health Promotion.

    Science.gov (United States)

    Sridharan, Vishnupriya; Cohen, Trevor; Cobb, Nathan; Myneni, Sahiti

    2016-01-01

    With online social platforms gaining popularity as venues of behavior change, it is important to understand the ways in which these platforms facilitate peer interactions. In this paper, we characterize temporal trends in user communication through mapping of theoretically-linked semantic content. We used qualitative coding and automated text analysis to assign theoretical techniques to peer interactions in an online community for smoking cessation, subsequently facilitating temporal visualization of the observed techniques. Results indicate manifestation of several behavior change techniques such as feedback and monitoring' and 'rewards'. Automated methods yielded reasonable results (F-measure=0.77). Temporal trends among relapsers revealed reduction in communication after a relapse event. This social withdrawal may be attributed to failure guilt after the relapse. Results indicate significant change in thematic categories such as 'social support', 'natural consequences', and 'comparison of outcomes' pre and post relapse. Implications for development of behavioral support technologies that promote long-term abstinence are discussed.

  3. Social interaction in type 2 diabetes computer-mediated environments: How inherent features of the channels influence peer-to-peer interaction.

    Science.gov (United States)

    Lewinski, Allison A; Fisher, Edwin B

    2016-06-01

    Interventions via the internet provide support to individuals managing chronic illness. The purpose of this integrative review was to determine how the features of a computer-mediated environment influence social interactions among individuals with type 2 diabetes. A combination of MeSH and keyword terms, based on the cognates of three broad groupings: social interaction, computer-mediated environments, and chronic illness, was used to search the PubMed, PsychInfo, Sociology Research Database, and Cumulative Index to Nursing and Allied Health Literature databases. Eleven articles met the inclusion criteria. Computer-mediated environments enhance an individual's ability to interact with peers while increasing the convenience of obtaining personalized support. A matrix, focused on social interaction among peers, identified themes across all articles, and five characteristics emerged: (1) the presence of synchronous and asynchronous communication, (2) the ability to connect with similar peers, (3) the presence or absence of a moderator, (4) personalization of feedback regarding individual progress and self-management, and (5) the ability of individuals to maintain choice during participation. Individuals interact with peers to obtain relevant, situation-specific information and knowledge about managing their own care. Computer-mediated environments facilitate the ability of individuals to exchange this information despite temporal or geographical barriers that may be present, thus improving T2D self-management. © The Author(s) 2015.

  4. Togetherness, coexistence or confrontation : the impact of school climate and culture on peer-to-peer social relations in Catalonia, Spain

    OpenAIRE

    Ponferrada-Arteaga, Maribel; Carrasco-Pons, Silvia

    2010-01-01

    This paper presents some of the results of the study ‘Coexistence and Confrontation among Peers in Secondary Schools in Catalonia’ commissioned by the Ombudsman’s Office of the Catalan government and carried out at the Institute of Childhood and the Urban World (CIIMU) in Barcelona, Spain, in 2005-2006. It offers a description of the indicators of malaise and exclusion among students at nine public and private secondary schools serving varying social environments in Cataloni...

  5. Modelos peer-to-peer aplicados a sistemas de comunicação multimédia móveis

    OpenAIRE

    Urbano, António Carlos Alves

    2006-01-01

    Mestrado em Sistemas de Informação É sobejamente conhecido o impacto das TICs (Tecnologias de Informação e Comunicação) no dia-a-dia das sociedades modernas e industrializadas. A adesão maciça à comunicação móvel de voz, que (ainda) está a decorrer e que teve o seu início no final dos anos 80, levou a uma nova área de pesquisa aplicada nas TICs: a comunicação móvel de dados. Desde então, surgiram variadíssimos conceitos, tecnologias e standards de comunicação, como por exemplo,...

  6. Canonical symplectic structure and structure-preserving geometric algorithms for Schrödinger-Maxwell systems

    Science.gov (United States)

    Chen, Qiang; Qin, Hong; Liu, Jian; Xiao, Jianyuan; Zhang, Ruili; He, Yang; Wang, Yulei

    2017-11-01

    An infinite dimensional canonical symplectic structure and structure-preserving geometric algorithms are developed for the photon-matter interactions described by the Schrödinger-Maxwell equations. The algorithms preserve the symplectic structure of the system and the unitary nature of the wavefunctions, and bound the energy error of the simulation for all time-steps. This new numerical capability enables us to carry out first-principle based simulation study of important photon-matter interactions, such as the high harmonic generation and stabilization of ionization, with long-term accuracy and fidelity.

  7. SABATPG-A Structural Analysis Based Automatic Test Generation System

    Institute of Scientific and Technical Information of China (English)

    李忠诚; 潘榆奇; 闵应骅

    1994-01-01

    A TPG system, SABATPG, is given based on a generic structural model of large circuits. Three techniques of partial implication, aftereffect of identified undetectable faults and shared sensitization with new concepts of localization and aftereffect are employed in the system to improve FAN algorithm. Experiments for the 10 ISCAS benchmark circuits show that the computing time of SABATPG for test generation is 19.42% less than that of FAN algorithm.

  8. A Critical Systems Metamethodology for Problem Situation Structuring

    OpenAIRE

    Slavica P. Petrovic

    2012-01-01

    The increasing complexity and diversity of management problem situations in organizations, as well as the increasing variety of theories, methodologies, methods, techniques, and models that can be employed in problem situation structuring and solving, must be considered as relevant aspects of management process in contemporary circumstances. Creative holism in management problem situations in organizations is enabled by means of Critical Systems Thinking (CST) as well as Critical Systems Prac...

  9. Influence of foundation layering on soil-structure system motion

    International Nuclear Information System (INIS)

    Philippacopoulos, A.J.

    1985-01-01

    This paper is concerned with effects on structural motion due to layering of the foundation. Impedance functions for foundations which consist of a layer resting on a viscoelastic half-space are used on a simple 3-dof SSI system and transfer functions are generated. It is shown that the layering of the foundation effects the motion of the SSI system. These effects are more pronounced for shallow layers with large difference in shear wave velocity from the underlying half-space. (orig.)

  10. Global structure of a polynomial autonomous system on the plane

    International Nuclear Information System (INIS)

    Nguyen Van Chau.

    1991-10-01

    This note is to study the global behaviour of a polynomial autonomous system on the plane with divergence non-positive outside a bounded set. It is shown that in some certain conditions the global structure of such system can be simple. The main result here can be seen as an improvement of the result of Olech and Meister concerning with the global asymptotical stable conjecture of Markur and Yamable and the Jacobian Conjecture. (author). 13 refs

  11. Wireless Zigbee strain gage sensor system for structural health monitoring

    Science.gov (United States)

    Ide, Hiroshi; Abdi, Frank; Miraj, Rashid; Dang, Chau; Takahashi, Tatsuya; Sauer, Bruce

    2009-05-01

    A compact cell phone size radio frequency (ZigBee) wireless strain measurement sensor system to measure the structural strain deformation was developed. The developed system provides an accurate strain measurement data stream to the Internet for further Diagnostic and Prognostic (DPS) correlation. Existing methods of structural measurement by strain sensors (gauges) do not completely satisfy problems posed by continuous structural health monitoring. The need for efficient health monitoring methods with real-time requirements to bidirectional data flow from sensors and to a commanding device is becoming critical for keeping our daily life safety. The use of full-field strain measurement techniques could reduce costly experimental programs through better understanding of material behavior. Wireless sensor-network technology is a monitoring method that is estimated to grow rapidly providing potential for cost savings over traditional wired sensors. The many of currently available wireless monitoring methods have: the proactive and constant data rate character of the data streams rather than traditional reactive, event-driven data delivery; mostly static node placement on structures with limited number of nodes. Alpha STAR Electronics' wireless sensor network system, ASWN, addresses some of these deficiencies, making the system easier to operate. The ASWN strain measurement system utilizes off-the-shelf sensors, namely strain gauges, with an analog-to-digital converter/amplifier and ZigBee radio chips to keep cost lower. Strain data is captured by the sensor, converted to digital form and delivered to the ZigBee radio chip, which in turn broadcasts the information using wireless protocols to a Personal Data Assistant (PDA) or Laptop/Desktop computers. From here, data is forwarded to remote computers for higher-level analysis and feedback using traditional cellular and satellite communication or the Ethernet infrastructure. This system offers a compact size, lower cost

  12. The structure of the clouds distributed operating system

    Science.gov (United States)

    Dasgupta, Partha; Leblanc, Richard J., Jr.

    1989-01-01

    A novel system architecture, based on the object model, is the central structuring concept used in the Clouds distributed operating system. This architecture makes Clouds attractive over a wide class of machines and environments. Clouds is a native operating system, designed and implemented at Georgia Tech. and runs on a set of generated purpose computers connected via a local area network. The system architecture of Clouds is composed of a system-wide global set of persistent (long-lived) virtual address spaces, called objects that contain persistent data and code. The object concept is implemented at the operating system level, thus presenting a single level storage view to the user. Lightweight treads carry computational activity through the code stored in the objects. The persistent objects and threads gives rise to a programming environment composed of shared permanent memory, dispensing with the need for hardware-derived concepts such as the file systems and message systems. Though the hardware may be distributed and may have disks and networks, the Clouds provides the applications with a logically centralized system, based on a shared, structured, single level store. The current design of Clouds uses a minimalist philosophy with respect to both the kernel and the operating system. That is, the kernel and the operating system support a bare minimum of functionality. Clouds also adheres to the concept of separation of policy and mechanism. Most low-level operating system services are implemented above the kernel and most high level services are implemented at the user level. From the measured performance of using the kernel mechanisms, we are able to demonstrate that efficient implementations are feasible for the object model on commercially available hardware. Clouds provides a rich environment for conducting research in distributed systems. Some of the topics addressed in this paper include distributed programming environments, consistency of persistent data

  13. Analysis of complete logical structures in system reliability assessment

    International Nuclear Information System (INIS)

    Amendola, A.; Clarotti, C.A.; Contini, S.; Spizzichino, F.

    1980-01-01

    The application field of the fault-tree techniques has been explored in order to assess whether the AND-OR structures covered all possible actual binary systems. This resulted in the identification of various situations requiring the complete AND-OR-NOT structures for their analysis. We do not use the term non-coherent for such cases, since the monotonicity or not of a structure function is not a characteristic of a system, but of the particular top event being examined. The report presents different examples of complete fault-trees, which can be examined according to different degrees of approximation. In fact, the exact analysis for the determination of the smallest irredundant bases is very time consuming and actually necessary only in some particular cases (multi-state systems, incidental situations). Therefore, together with the exact procedure, the report shows two different methods of logical analysis that permit the reduction of complete fault-trees to AND-OR structures. Moreover, it discusses the problems concerning the evaluation of the probability distribution of the time to first top event occurrence, once the hypothesis of structure function monotonicity is removed

  14. Probabilistic frequency variations of structure-soil systems

    International Nuclear Information System (INIS)

    Hamilton, C.W.; Hadjian, A.H.

    1976-01-01

    During earthquakes, structure-soil systems act as filters greatly amplifying the response of equipment whose frequencies are at or near their natural frequencies. Thus, the estimation of these structure-soil system frequencies assumes significant importance both for safety and cost. Actual in-situ frequencies of structures differ from calculated frequencies due both to variations in mathematical modelling techniques and to variations of material properties. This paper studies the second source only. This variability is usually gauged by the 'worst case' analyses technique in which extreme high- and low- parameter values are assumed and the associated frequencies are used as upper and lower bounds. This approach is not entirely satisfactory because it does not provide any indication of the probability of these limits being exceeded, of the distribution between these limits, or of the level of conservation introduced into the design process. The present approach provides this additional information. The emphasis in this part is both on developing the methodology and on the results obtained. It covers both the fixed-base structure and the effects of soil-structure interaction. Empirical data on concrete proerties were obtained from previously published results. Much less is known about variability of soil properties, so the soil structure interaction coefficients are assumed to be normally distributed. As data on the variation of soil properties become available, they can be readily incorporated via the methodology developed here. (Auth.)

  15. Poisson structures for reduced non-holonomic systems

    International Nuclear Information System (INIS)

    Ramos, Arturo

    2004-01-01

    Borisov, Mamaev and Kilin have recently found certain Poisson structures with respect to which the reduced and rescaled systems of certain non-holonomic problems, involving rolling bodies without slipping, become Hamiltonian, the Hamiltonian function being the reduced energy. We study further the algebraic origin of these Poisson structures, showing that they are of rank 2 and therefore the mentioned rescaling is not necessary. We show that they are determined, up to a non-vanishing factor function, by the existence of a system of first-order differential equations providing two integrals of motion. We generalize the form of the Poisson structures and extend their domain of definition. We apply the theory to the rolling disc, the Routh's sphere, the ball rolling on a surface of revolution, and its special case of a ball rolling inside a cylinder

  16. Sensor Systems for Corrosion Monitoring in Concrete Structures

    Directory of Open Access Journals (Sweden)

    K.Kumar

    2006-05-01

    Full Text Available It is a need of permanently embedded corrosion monitoring devices to monitor the progress of corrosion problems on a new or existing reinforced concrete structures before embarking on repair or rehabilitation of the structures. Numerous devices are available for investigating corrosion problems, because no single technique exists which tells an engineer what he needs to know, namely how much damage there is on a structure now and how rapidly the damage will grow with time. In this investigation the studies on the sensors systems based on the measurements of half cell potential of rebars inside the concrete, resistivity of concrete, corrosion rate of rebars by eddy current measurements and sensing of chloride ions are reported. An integrated system consists of above sensors are fabricated and embedded into concrete. The response from each sensor was acquired and analyzed by NI hardware through LabVIEW software.

  17. Coherent Structures and Entropy in Constrained, Modulationally Unstable, Nonintegrable Systems

    International Nuclear Information System (INIS)

    Rumpf, Benno; Newell, Alan C.

    2001-01-01

    Many studies have shown that nonintegrable systems with modulational instabilities constrained by more than one conservation law exhibit universal long time behavior involving large coherent structures in a sea of small fluctuations. We show how this behavior can be explained in detail by simple thermodynamic arguments

  18. The Structure of the Managerial System of Higher Education's Development

    Science.gov (United States)

    Levina, Elena Y.; Kutuev, Ruslan A.; Balakhnina, Lidia V.; Tumarov, Konstantin B.; Chudnovskiy, Alexey D.; Shagiev, ?ulat V.

    2016-01-01

    The research urgency is caused by necessity of planning regulation of higher education development at all levels of management. The purpose of this article is to develop the structure of a control system of higher education development, the Foundation of which is understanding of the quality of higher education as factor for development of the…

  19. Gauge-invariant cosmic structures---A dynamic systems approach

    International Nuclear Information System (INIS)

    Woszczyna, A.

    1992-01-01

    Gravitational instability is expressed in terms of the dynamic systems theory. The gauge-invariant Ellis-Bruni equation and Bardeen's equation are discussed in detail. It is shown that in an open universe filled with matter of constant sound velocity the Jeans criterion does not adequately define the length scale of the gravitational structure

  20. Computational Structures Technology for Airframes and Propulsion Systems

    International Nuclear Information System (INIS)

    Noor, A.K.; Housner, J.M.; Starnes, J.H. Jr.; Hopkins, D.A.; Chamis, C.C.

    1992-05-01

    This conference publication contains the presentations and discussions from the joint University of Virginia (UVA)/NASA Workshops. The presentations included NASA Headquarters perspectives on High Speed Civil Transport (HSCT), goals and objectives of the UVA Center for Computational Structures Technology (CST), NASA and Air Force CST activities, CST activities for airframes and propulsion systems in industry, and CST activities at Sandia National Laboratory