WorldWideScience

Sample records for student peer-to-peer file

  1. Characteristics of file sharing and peer to peer networking | Opara ...

    African Journals Online (AJOL)

    Characteristics of file sharing and peer to peer networking. ... distributing or providing access to digitally stored information, such as computer programs, ... including in multicast systems, anonymous communications systems, and web caches.

  2. Students' use of Facebook for peer-to-peer learning

    DEFF Research Database (Denmark)

    Dalsgaard, Christian

    are using Facebook groups to help each other with all kinds of school-related matters, including issues relating directly to academic subjects. Based on the findings from the study, the paper concludes that there is an educational potential of Facebook groups in supporting peer-to-peer learning between...

  3. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  4. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  5. Telemedicine for Peer-to-Peer Psychiatry Learning between U.K. and Somaliland Medical Students

    Science.gov (United States)

    Keynejad, Roxanne; Ali, Faisal R.; Finlayson, Alexander E. T.; Handuleh, Jibriil; Adam, Gudon; Bowen, Jordan S. T.; Leather, Andrew; Little, Simon J.; Whitwell, Susannah

    2013-01-01

    Objective: The proportion of U.K. medical students applying for psychiatry training continues to decline, whereas, in Somaliland, there are no public-sector psychiatrists. This pilot study assessed the usefulness and feasibility of online, instant messenger, peer-to-peer exchange for psychiatry education between cultures. Method: Twenty medical…

  6. Competitive Status Signaling in Peer-to-Peer File-Sharing Networks

    Directory of Open Access Journals (Sweden)

    Henry F. Lyle

    2007-04-01

    Full Text Available Internet peer-to-peer file sharing is a contemporary example of asymmetrical sharing in which “altruists” (file uploaders share unconditionally with non-reciprocating “free riders” (file downloaders. Those who upload digital media files over the Internet risk prosecution for copyright infringement, and are more vulnerable to computer hackers and viruses. In an analysis of file-sharing behavior among university undergraduates (N=331, we found that significantly more males than females engaged in risky file uploading. Contrary to expectations, uploaders were not concerned about their reputation online and file sharers were not interested in identifying or chatting with uploaders while online. Among uploaders, males were more likely than females to be identified as uploaders by friends, to discuss uploading and to upload in the presence of peers. We interpret these results using costly-signaling theory, and argue that uploading is a costly signal in which males engage in avoidable risk taking as a means to compete for status among peers in social contexts other than the Internet.

  7. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  8. APPLICATION OF PEER-TO-PEER ASSESSMENT OF WRITTEN WORKS OF STUDENTS IN STREAM INTERNAL COURSES

    Directory of Open Access Journals (Sweden)

    Д А Королев

    2016-12-01

    Full Text Available At reduction of contact time in subject matters the instruments of preservation of active forms of studying for students assuming independent research work are required. One of such forms is peer-to- peer evaluation of works (peer assessment allowing to go beyond a narrow framework of automaticallychecked tests for the level of small research works. In article results of a two-year experiment on use of a piring on a stream course are given in MIEM Higher School of Economics National Research University taking into account specifics of audience rather mass online of courses.The received results and conclusions have formed a basis for modeling of ways of estimation of written works at peer-to-peer check without participation of the teacher. In an experiment schemes of estimation and motivation for management of a ratio of number of authors and reviewers have been fulfilled, and also the general questions of use of the offered system of assessment it is aware.

  9. Global health partnership for student peer-to-peer psychiatry e-learning: Lessons learned.

    Science.gov (United States)

    Keynejad, Roxanne C

    2016-12-03

    Global 'twinning' relationships between healthcare organizations and institutions in low and high-resource settings have created growing opportunities for e-health partnerships which capitalize upon expanding information technology resources worldwide. E-learning approaches to medical education are increasingly popular but remain under-investigated, whilst a new emphasis on global health teaching has coincided with university budget cuts in many high income countries. King's Somaliland Partnership (KSP) is a paired institutional partnership health link, supported by Tropical Health and Education Trust (THET), which works to strengthen the healthcare system and improve access to care through mutual exchange of skills, knowledge and experience between Somaliland and King's Health Partners, UK. Aqoon, meaning knowledge in Somali, is a peer-to-peer global mental health e-learning partnership between medical students at King's College London (KCL) and Hargeisa and Amoud Universities, Somaliland. It aims to extend the benefits of KSP's cross-cultural and global mental health education work to medical students and has reported positive results, including improved attitudes towards psychiatry in Somaliland students. The process of devising, piloting, evaluating, refining, implementing, re-evaluating and again refining the Aqoon model has identified important barriers to successful partnership. This article describes lessons learned during this process, sharing principles and recommendations for readers wishing to expand their own global health link beyond qualified clinicians, to the healthcare professionals of the future.

  10. Integrating International Students into Tertiary Education Using Intercultural Peer-to-Peer Training at Jacobs University Bremen, Germany

    Science.gov (United States)

    Binder, Nadine; Schreier, Margrit; Kühnen, Ulrich; Kedzior, Karina Karolina

    2013-01-01

    Increasing internationalization of higher education raises the question of how well institutions prepare their students to integrate into and benefit from cultural diversity on any university campus. The aim of this study was to assess an intercultural peer-to-peer training at Jacobs University Bremen, Germany, that aims to facilitate the…

  11. KaZaA and similar Peer-to-Peer (P2P) file-sharing applications

    CERN Multimedia

    2003-01-01

    Personal use of Peer-to-Peer (P2P) file sharing applications is NOT permitted at CERN. A non-exhaustive list of such applications, popular for exchanging music, videos, software etc, is: KaZaA, Napster, Gnutella, Edonkey2000, Napigator, Limewire, Bearshare, WinMX, Aimster, Morpheus, BitTorrent, ... You are reminded that use of CERN's Computing Facilities is governed by CERN's Computing Rules (Operational Circular No 5). They require that all users of CERN's Computing Facilities respect copyright, license and confidentiality agreements for data of any form (software, music, videos, etc). Sanctions are applicable in case of non-respect of the Computing Rules. Further details on restrictions for P2P applications are at: http://cern.ch/security/file-sharing CERN's Computing Rules are at: http://cern.ch/ComputingRules Denise Heagerty, CERN Computer Security Officer, Computer.Security@cern.ch

  12. Peer to Peer Information Retrieval: An Overview

    NARCIS (Netherlands)

    Tigelaar, A.S.; Hiemstra, D.; Trieschnigg, D.

    2012-01-01

    Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is

  13. Peer to Peer Information Retrieval: An Overview

    NARCIS (Netherlands)

    Tigelaar, A.S.; Hiemstra, Djoerd; Trieschnigg, Rudolf Berend

    Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is

  14. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  15. The third-year medical student "grapevine": managing transitions between third-year clerkships using peer-to-peer handoffs.

    Science.gov (United States)

    Masters, Dylan E; O'Brien, Bridget C; Chou, Calvin L

    2013-10-01

    As third-year medical students rotate between clerkships, they experience multiple transitions across workplace cultures and shifting learning expectations. The authors explored clerkship transitions from the students' perspective by examining the advice they passed on to their peers in preparation for new clerkships. Seventy-one students from three Veterans Affairs-based clerkship rotations at the University of California, San Francisco, School of Medicine participated in a peer-to-peer handoff session from 2008 to 2011. In the handoff session, they gave tips for optimizing performance to students starting the clerkship they had just completed. The authors transcribed student comments from four handoff sessions and used qualitative content analysis to identify and compare advice across clerkships. Students shared advice about workplace culture, content learning, logistics, and work-life balance. Common themes included expectations of the rotation, workplace norms, specific tasks, learning opportunities, and learning strategies. Comments about patient care and work-life balance were rare. Students emphasized different themes for each clerkship; for example, for some clerkships, students commented heavily on tasks and content learning, while in another students focused on workplace culture and exam preparation. These findings characterize the transitions that third-year students undergo as they rotate into new clinical training environments. Students emphasized different aspects of each clerkship in the advice they passed to their peers, and their comments often describe informal norms or opportunities that official clerkship orientations may not address. Peer-to-peer handoffs may help ease transitions between clerkships with dissimilar cultures and expectations.

  16. Peer to peer mentoring: Outcomes of third-year midwifery students mentoring first-year students.

    Science.gov (United States)

    Hogan, Rosemarie; Fox, Deborah; Barratt-See, Georgina

    2017-06-01

    Undergraduate midwifery students commonly experience anxiety in relation to their first clinical placement. A peer mentoring program for midwifery students was implemented in an urban Australian university. The participants were first-year mentee and third-year mentor students studying a three-year Bachelor degree in midwifery. The program offered peer support to first-year midwifery students who had little or no previous exposure to hospital clinical settings. Mentors received the opportunity to develop mentoring and leadership skills. The aim was to explore the benefits, if any, of a peer mentoring program for midwifery students. The peer mentoring program was implemented in 2012. Sixty-three peer mentors and 170 mentees participated over three academic years. Surveys were distributed at the end of each academic year. Quantitative survey data were analysed descriptively and qualitative survey data were analysed thematically using NVivo 10 software. Over 80% of mentors and mentees felt that the program helped mentees adjust to their midwifery clinical placement. At least 75% of mentors benefited, in developing their communication, mentoring and leadership skills. Three themes emerged from the qualitative data, including 'Receiving start-up advice'; 'Knowing she was there' and 'Wanting more face to face time'. There is a paucity of literature on midwifery student peer mentoring. The findings of this program demonstrate the value of peer support for mentees and adds knowledge about the mentor experience for undergraduate midwifery students. The peer mentor program was of benefit to the majority of midwifery students. Copyright © 2017 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  17. Exploring Peer-to-Peer Library Content and Engagement on a Student-Run Facebook Group

    Science.gov (United States)

    van Beynen, Kaya; Swenson, Camielle

    2016-01-01

    Student-run Facebook groups offer librarians a new means of interacting with students in their native digital domain. Facebook groups, a service launched in 2010 enables university students to create a virtual forum to discuss their concerns, issues, and promote events. While still a relatively new feature, these groups are increasingly being…

  18. Student Voices: Perspectives on Peer-to-Peer Sexual Health Education

    Science.gov (United States)

    Layzer, Carolyn; Rosapep, Lauren; Barr, Sherry

    2017-01-01

    Background: This process study is a companion to a randomized evaluation of a school-based, peer-led comprehensive sexual health education program, Teen Prevention Education Program (Teen PEP), in which 11th- and 12th-grade students are trained by school health educators to conduct informative workshops with ninth-grade peers in schools in North…

  19. Student Voices: Perspectives on Peer-to-Peer Sexual Health Education.

    Science.gov (United States)

    Layzer, Carolyn; Rosapep, Lauren; Barr, Sherry

    2017-07-01

    This process study is a companion to a randomized evaluation of a school-based, peer-led comprehensive sexual health education program, Teen Prevention Education Program (Teen PEP), in which 11th- and 12th-grade students are trained by school health educators to conduct informative workshops with ninth-grade peers in schools in North Carolina. The process study was designed to understand youth participants' perspectives on the program in order to gain insight into program effectiveness. This is a mixed-methods study in 7 schools, with online surveys (N = 88) and 8 focus groups with peer educators (N = 116), end-of-program surveys (N = 1122), 8 focus groups with ninth-grade workshop participants (N = 89), and observations of the Teen PEP class and workshops during the semester of implementation in each school, 2012-2014. Both peer educators and ninth graders perceived benefits of participating in Teen PEP across a range of domains, including intentions, skills, and knowledge and that the peer education modality was important in their valuation of the experience. Our findings suggest that the peer-led comprehensive sexual health education approach embodied in Teen PEP can be an important educational mechanism for teaching students information and skills to promote sexual health. © 2017, American School Health Association.

  20. Author's rights in the digital age: how Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs

    Directory of Open Access Journals (Sweden)

    Milijana Micunovic

    2016-01-01

    Full Text Available Author's rights and copyright law have gone through quite a few changes in the 'post-print' culture of binary systems, digital formations and techno-practices. Technological development supports new concept of author's rights by promoting free internet and digital market, as well as new contemporary experience of culture that is being rooted in digital technology, mass communication and the world of multimedia and virtuality. Though computer and digital technology have served both authors and users in various ways, they have also served as a very fertile ground for sharing copyrighted content thus leading to numerous copyright infringements and conflicts with the copyright law. The aim of this paper is to identify and analyze the ways in which computer and digital technology have given rise to new trends in the production (e.g. remix culture and consumption (e.g. peer-to-peer file sharing technology of culture, but also to determine how new forms of distribution, use and sharing of digital content changed and shaped the perception of authorship in the 21st century. In order to analyze the dynamic, nature and structure by which new digital and networking technologies are affecting the concept of authorship and author's rights and to test the consistency of previously established hypotheses, we conducted a survey amongst general public. Altogether 535 questionnaires were completed. Data was analyzed using SPSS tool and quantitative method of analysis. In the analysis special attention was given to both, the concept of authorship in the digital environment and the concept of peer-to-peer file sharing technology as not so new, but still very popular networked architecture for distributing, using and sharing digital content. Results have shown that most of the respondents use peer-to-peer file sharing technology to access, consume and/or share different cultural content (e.g. movies, music, books, etc. while violating the rights of copyright holders

  1. Peer-to-Peer Service Sharing Platforms

    DEFF Research Database (Denmark)

    Andersson, Magnus; Hjalmarsson, Anders; Avital, Michel

    2013-01-01

    The sharing economy has been growing continuously in the last decade thanks to the proliferation of internet-based platforms that allow people to disintermediate the traditional commercial channels and to share excess resources and trade with one another effectively at a reasonably low transaction...... cost. Whereas early peer-to-peer platforms were designed to enable file sharing and goods trading, we recently witness the emergence of a new breed of peer-to-peer platforms that are designed for ordinary service sharing. Ordinary services entail intangible provisions and are defined as an economic...... activity that generates immaterial benefits and does not result in ownership of material goods. Based on a structured analysis of 41 internet-based rideshare platforms, we explore and layout the unique characteristics of peer-to-peer service sharing platforms based on three distinct temporal patterns...

  2. Peer to Peer

    Science.gov (United States)

    Brown, Stephanie Willen; Hammond, Chelsea C.

    2008-01-01

    This article reports that the Scopus Student Ambassador (SAm) program, funded by Elsevier, permitted the University of Connecticut (UConn) Libraries to hire graduate students to teach citation searching, using both Scopus and Web of Science, to other graduate students. The training does not cost the libraries anything, and it is free for graduate…

  3. A peer-to-peer traffic safety campaign program.

    Science.gov (United States)

    2014-06-01

    The purpose of this project was to implement a peer-to-peer drivers safety program designed for high school students. : This project builds upon an effective peer-to-peer outreach effort in Texas entitled Teens in the Driver Seat (TDS), the : nati...

  4. Distributed Data Mining in Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — Peer-to-peer (P2P) networks are gaining popularity in many applications such as file sharing, e-commerce, and social networking, many of which deal with rich,...

  5. Peer-to-Peer Networking -RE-SONANCE

    Indian Academy of Sciences (India)

    networking, operating systems and embedded systems. Peer-to-Peer (P2P) networking in recent times has been touted as .... Gnutella (General file sharing) P2P service at the same time. 2. .... The data processing does not occur in 'real time' ...

  6. Give-and-take based peer-to-peer content distribution networks

    Indian Academy of Sciences (India)

    Compared to traditional content distribution schemes, peer- to-peer networks ... are shared among users who desire to download files. In a peer-to-peer ..... randomly generated data points, with 300 segments and 200 peers. From the figure ...

  7. Managing Supply and Demand of Bandwidth in Peer-to-Peer Communities

    NARCIS (Netherlands)

    Meulpolder, M.

    2011-01-01

    On today's Internet, millions of people participate in peer-to-peer communities where they share content such as audio and video files. Contrary to websites such as Youtube, which rely on large and expensive computer servers to store and deliver all of their content, peer-to-peer communities rely on

  8. The Tragedy of the Commons : Arms Race Within Peer-to-Peer Tools

    OpenAIRE

    Carlsson, Bengt

    2001-01-01

    The two major concerns about peer-to-peer are anonymity and non-censorship of documents. Music industry has highlighted these questions by forcing Napster to filter out copyright protected MP3 files and taking legal actions against local users by monitoring their stored MP3 files. Our investigation shows that when copyright protected files are filtered out, users stop downloading public music as well. The success of a distributed peer-to-peer system is dependent on both cooperating coalitions...

  9. Digital portfolio og peer to peer feedback

    DEFF Research Database (Denmark)

    Jacobsen, Ditte; Bahrenscheer, Jesper Glarborg

    2017-01-01

    studerende og øget transfer mellem teori og praksis. Artiklen tager afsæt i erfaringerne fra udvikling, anvendelse og evaluering af den digitale portfolio og peer to peer feedback. Portfolien er digital og tilknyttet Metropols Learning Management System. De studerende uploader individuelt ugentligt deres...

  10. Mobility Helps Peer-to-Peer Security

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre; Buttyan, Levente

    2006-01-01

    We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols...

  11. Simple Peer-to-Peer SIP Privacy

    Science.gov (United States)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  12. Optimization of routing strategies for data transfer in peer-to-peer networks

    International Nuclear Information System (INIS)

    Morioka, Atsushi; Igarashi, Akito

    2014-01-01

    Since peer-to-peer file-sharing systems have become familiar recently, the information traffic in the networks is increasing. Therefore it causes various traffic problems in peer-to-peer networks. In this paper, we model some features of the peer-to-peer networks, and investigate the traffic problems. Peer-to-peer networks have two notable characters. One is that each peer frequently searches for a file and download it from a peer who has the requested file. To decide whether a peer has the requested file or not in modelling of the search and download process, we introduce file-parameter P j , which expresses the amount of files stored in peer j. It is assumed that if P j is large, peer j has many files and can meet other peers' requests with high probability. The other character is that peers leave and join into the network repeatedly. Many researchers address traffic problems of data transfer in computer communication networks. To our knowledge, however, no reports focus on those in peer-to-peer networks whose topology changes with time. For routing paths of data transfer, generally, the shortest paths are used in usual computer networks. In this paper, we introduce a new optimal routing strategy which uses weights of peers to avoid traffic congestion. We find that the new routing strategy is superior to the shortest path strategy in terms of congestion frequency in data transfer

  13. A digital peer-to-peer learning platform for clinical skills development.

    Directory of Open Access Journals (Sweden)

    Jesse Paul Basnak

    2017-02-01

    Conclusion: Students found the practice OSCEs and digital platform effective for learning clinical skills. Thus, peer-to-peer learning and computer automation can be useful adjuncts to traditional medical curricula.

  14. Surveillance of peer to peer payment systems and peer to peer lending platforms

    OpenAIRE

    Faia, Ester

    2014-01-01

    Financial innovation is, as usual, faster than regulation. New forms of speculation and intermediation are rapidly emerging. Largely as a result of the evaporation of trust in financial intermediation, an exponentially increasing role is being played by the so-called peer to peer intermediation. The most prominent example at the moment is Bitcoin. If one expects that shocks in these markets could destabilize also traditional financial markets, then it will be necessary to extend regulatory me...

  15. A Database Query Processing Model in Peer-To-Peer Network ...

    African Journals Online (AJOL)

    Peer-to-peer databases are becoming more prevalent on the internet for sharing and distributing applications, documents, files, and other digital media. The problem associated with answering large-scale ad hoc analysis queries, aggregation queries, on these databases poses unique challenges. This paper presents an ...

  16. Child Pornography in Peer-to-Peer Networks

    Science.gov (United States)

    Steel, Chad M. S.

    2009-01-01

    Objective: The presence of child pornography in peer-to-peer networks is not disputed, but there has been little effort done to quantify and analyze the distribution and nature of that content to-date. By performing an analysis of queries and query hits on the largest peer-to-peer network, we are able to both quantify and describe the nature of…

  17. Peer-to-peer computing (Introduction to Topic 7)

    NARCIS (Netherlands)

    Montresor, A.; Epema, D.H.J.; Jelasity, M.; Jorba, J.; Luque, E.; Margalef, T.; Benítez, D.

    2008-01-01

    After a decade of intensive investigation, peer-to-peer computing has established itself as an accepted research field in the general area of distributed systems. peer-to-peer computing can be seen as the democratization of computing-overthrowing the old regime of hierarchies as in client-server

  18. Jupiter: Peer-to-Peer Networking Platform over Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Norihiro Ishikawa

    2006-10-01

    Full Text Available Peer-to-peer has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Compared with traditional Internet technologies, peer-to-peer has the potential to realize highly scalable, extensible, and efficient distributed applications. This is because its basic functions realize resource discovery, resource sharing, and load balancing in a highly distributed manner. An easy prediction is the emergence of an environment in which many sensors, people, and many different kinds of objects exist, move, and communicate with one another. Peer-to-peer is one of the most important and suitable technologies for such networking since it supports discovery mechanisms, simple one-to-one communication between devices, free and extensible distribution of resources, and distributed search to handle the enormous number of resources. The purpose of this study is to explore a universal peer-to-peer network architecture that will allow various devices to communicate with one another across various networks. We have been designing architecture and protocols for realizing peer-to-peer networking among various devices. We are currently designing APIs that are available for various peer-to-peer applications and are implementing a prototype called "Jupiter" as a peer-to-peer networking platform over heterogeneous networks.

  19. Promoting Residential Renewable Energy via Peer-to-Peer Learning

    Science.gov (United States)

    Heiskanen, Eva; Nissilä, Heli; Tainio, Pasi

    2017-01-01

    Peer-to-peer learning is gaining increasing attention in nonformal community-based environmental education. This article evaluates a novel modification of a concept for peer-to-peer learning about residential energy solutions (Open Homes). We organized collective "Energy Walks" visiting several homes with novel energy solutions and…

  20. Peer-to-Peer Teaching Using Multi-Disciplinary Applications as Topics

    Science.gov (United States)

    Sturdivant, Rodney X.; Souhan, Brian E.

    2011-01-01

    Most educators know that the best way to truly understand new material is to teach it. The use of students as peer educators provides numerous benefits to the student teacher and his or her classmates. Student-led instruction or peer-to-peer teaching is not a new concept or teaching technique. Peer teaching traces its roots back to the ancient…

  1. Hierarchical Data Distribution Scheme for Peer-to-Peer Networks

    Science.gov (United States)

    Bhushan, Shashi; Dave, M.; Patel, R. B.

    2010-11-01

    In the past few years, peer-to-peer (P2P) networks have become an extremely popular mechanism for large-scale content sharing. P2P systems have focused on specific application domains (e.g. music files, video files) or on providing file system like capabilities. P2P is a powerful paradigm, which provides a large-scale and cost-effective mechanism for data sharing. P2P system may be used for storing data globally. Can we implement a conventional database on P2P system? But successful implementation of conventional databases on the P2P systems is yet to be reported. In this paper we have presented the mathematical model for the replication of the partitions and presented a hierarchical based data distribution scheme for the P2P networks. We have also analyzed the resource utilization and throughput of the P2P system with respect to the availability, when a conventional database is implemented over the P2P system with variable query rate. Simulation results show that database partitions placed on the peers with higher availability factor perform better. Degradation index, throughput, resource utilization are the parameters evaluated with respect to the availability factor.

  2. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  3. Efficient Skyline Computation in Structured Peer-to-Peer Systems

    DEFF Research Database (Denmark)

    Cui, Bin; Chen, Lijiang; Xu, Linhao

    2009-01-01

    An increasing number of large-scale applications exploit peer-to-peer network architecture to provide highly scalable and flexible services. Among these applications, data management in peer-to-peer systems is one of the interesting domains. In this paper, we investigate the multidimensional...... skyline computation problem on a structured peer-to-peer network. In order to achieve low communication cost and quick response time, we utilize the iMinMax(\\theta ) method to transform high-dimensional data to one-dimensional value and distribute the data in a structured peer-to-peer network called BATON....... Thereafter, we propose a progressive algorithm with adaptive filter technique for efficient skyline computation in this environment. We further discuss some optimization techniques for the algorithm, and summarize the key principles of our algorithm into a query routing protocol with detailed analysis...

  4. Agent-oriented Modeling for Collaborative Learning Environments: A Peer-to-Peer Helpdesk Case Study

    NARCIS (Netherlands)

    Guizzardi-Silva Souza, R.; Wagner, G.; Aroyo, L.M.

    2002-01-01

    In this paper, we present the analysis and modelling of Help&Learn, an agent-based peer-to-peer helpdesk system to support extra-class interactions among students and teachers. Help&Learn expands the student’s possibility of solving problems, getting involved in a cooperative learning experience

  5. Analysis of peer-to-peer locking of magnetrons

    International Nuclear Information System (INIS)

    Pengvanich, P.; Lau, Y. Y.; Cruz, E.; Gilgenbach, R. M.; Hoff, B.; Luginsland, J. W.

    2008-01-01

    The condition for mutual, or peer-to-peer, locking of two magnetrons is derived. This condition reduces to Adler's classical phase-locking condition in the limit where one magnetron becomes the ''master'' and the other becomes the ''slave.'' The formulation is extended to the peer-to-peer locking of N magnetrons, under the assumption that the electromagnetic coupling among the N magnetrons is modeled by an N-port network.

  6. How Do Peers Impact Learning? An Experimental Investigation of Peer-To-Peer Teaching and Ability Tracking

    OpenAIRE

    Kimbrough, Erik O.; McGee, Andrew; Shigeoka, Hitoshi

    2017-01-01

    Classroom peers are believed to influence learning by teaching each other, and the efficacy of this teaching likely depends on classroom composition in terms of peers' ability. Unfortunately, little is known about peer-to-peer teaching because it is never observed in field studies. Furthermore, identifying how peer-to-peer teaching is affected by ability tracking – grouping students of similar ability – is complicated by the fact that tracking is typically accompanied by changes in curriculum...

  7. Is there something like a peer to peer science?

    Directory of Open Access Journals (Sweden)

    Michel Bauwens

    2010-03-01

    Full Text Available How will peer to peer infrastructures, and the underlying intersubjective and ethical relational model that is implied by it, affect scientific practice? Are peer-to-peer forms of cooperation, based on open and free input of voluntary contributors, participatory processes of governance, and universal availability of the output, more productive than centralized alternatives? In this short introduction, Michel Bauwens reviews a number of open and free, participatory and commons oriented practices that are emerging in scientific research and practice, but which ultimately point to a more profound epistemological revolution linked to increased participatory consciousness between the scientist and his human, organic and inorganic research material.

  8. The mediatization of peer-to-peer health care

    DEFF Research Database (Denmark)

    Dindler, Camilla; Ahlmark, Nanna

    2018-01-01

    observations and qualitative interviews from a peer-to-peer programme for men in Copenhagen. The article analyses the tensions that occurred in the media coverage of the programme as well as in the municipal facilitation and management of the peer-to-peer health care programme defined partly...... by a democratization of health expertise and by a broader culture characterized by individualized, risk aware health promotion. We will argue that tensions between media logics and logics of care and of risk created a mediatized conception of health and of the peer programme that highlighted health care...

  9. mitigating mitigating free riding in peer-to-peer networks

    African Journals Online (AJOL)

    eobe

    The performance of peer-to-peer systems is based on the quality and quantity of resource contributions from peer systems ... riding [3]. There are several measurement studies ...... J. S. Hua, D. C. Huang, S M Yen, and C. W. Chena, “A dynamic.

  10. Stability analysis of peer-to-peer networks against churn

    Indian Academy of Sciences (India)

    Users of the peer-to-peer system join and leave the network randomly, which makes the overlay network dynamic and unstable in nature. In this paper, we propose an analytical framework to assess the robustness of p2p networks in the face of user churn. We model the peer churn through degree-independent as well as ...

  11. PLATON: Peer-to-Peer load adjusting tree overlay networks

    NARCIS (Netherlands)

    Lymberopoulos, L.; Pittaras, C.; Grammatikou, M.; Papavassiliou, S.; Maglaris, V.

    2011-01-01

    Peer-to-Peer systems supporting multi attribute and range queries use a number of techniques to partition the multi dimensional data space among participating peers. Load-balancing of data accross peer partitions is necessary in order to avoid the presence of network hotspots which may cause

  12. Mathematical Framework For Analyzing Incentives In Peer-To-Peer

    African Journals Online (AJOL)

    The existence and performance of peer-to-peer systems depend on the contribution of resources .... analysis in P2P based on game strategy. The entire P2P ... a robust P2P systems, every peer must be made to contribute by designing efficient free ..... Currently, all P2P can be classified based on structure as structured and ...

  13. Key agreement in peer-to-peer wireless networks

    DEFF Research Database (Denmark)

    Cagalj, Mario; Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any ...

  14. A peer-to-peer platform for decentralized logistics

    OpenAIRE

    Gallay, Olivier; Korpela, Kari; Tapio, Niemi; Nurminen, Jukka K.; Kersten, Wolfgang; Blecker, Thorsten; Ringle, Christian M.

    2017-01-01

    We introduce a novel platform for decentralized logistics, the aim of which is to magnify and accelerate the impact offered by the integration of the most recent advances in Information and Communication Technologies (ICTs) to multi-modal freight operations. The essence of our peer-to-peer (P2P) framework distributes the management of the logistics operations to the multiple actors according to their available computational resources. As a result, this new approach prevents the dominant playe...

  15. Peer to peer energy trading with electric vehicles

    OpenAIRE

    Alvaro-Hermana, R.; Fraile-Ardanuy, J.; Zufiria, P.; Knapen, Luk; Janssens, Davy

    2016-01-01

    This paper presents a novel peer-to-peer energy trading system between two sets of electric vehicles, which significantly reduces the impact of the charging process on the power system during business hours. This trading system is also economically beneficial for all the users involved in the trading process. An activity-based model is used to predict the daily agenda and trips of a synthetic population for Flanders (Belgium). These drivers can be initially classified into three sets; after d...

  16. Gossip in a Smartphone Peer-to-Peer Network

    OpenAIRE

    Newport, Calvin

    2017-01-01

    In this paper, we study the fundamental problem of gossip in the mobile telephone model: a recently introduced variation of the classical telephone model modified to better describe the local peer-to-peer communication services implemented in many popular smartphone operating systems. In more detail, the mobile telephone model differs from the classical telephone model in three ways: (1) each device can participate in at most one connection per round; (2) the network topology can undergo a pa...

  17. Writing to Learn and Learning to Write across the Disciplines: Peer-to-Peer Writing in Introductory-Level MOOCs

    Directory of Open Access Journals (Sweden)

    Denise K. Comer

    2014-11-01

    Full Text Available This study aimed to evaluate how peer-to-peer interactions through writing impact student learning in introductory-level massive open online courses (MOOCs across disciplines. This article presents the results of a qualitative coding analysis of peer-to-peer interactions in two introductory level MOOCs: English Composition I: Achieving Expertise and Introduction to Chemistry. Results indicate that peer-to-peer interactions in writing through the forums and through peer assessment enhance learner understanding, link to course learning objectives, and generally contribute positively to the learning environment. Moreover, because forum interactions and peer review occur in written form, our research contributes to open distance learning (ODL scholarship by highlighting the importance of writing to learn as a significant pedagogical practice that should be encouraged more in MOOCs across disciplines.

  18. Robust Reputations for Peer-to-peer Markets

    Science.gov (United States)

    2007-05-24

    a cryptographic protocol that permits persistent pseudonyms: on-line identities that maintain privacy and anonymity yet providing a strong guarantee...July 2005. [106] ——, “Resisting sybils in peer-to-peer markets,” 2007, to appear in the Proceedings of the Joint iTrust and PST Conference on Privacy ...vendors unite to voice their concerns,” Startup Journal, May 2004, http://startup.wsj.com/ ecommerce / ecommerce /20040526-wingfield.html. 179 [117] B. Yu and M

  19. A digital peer-to-peer learning platform for clinical skills development.

    Science.gov (United States)

    Basnak, Jesse; Ortynski, Jennifer; Chow, Meghan; Nzekwu, Emeka

    2017-02-01

    Due to constraints in time and resources, medical curricula may not provide adequate opportunities for pre-clerkship students to practice clinical skills. To address this, medical students at the University of Alberta developed a digital peer-to-peer learning initiative. The initiative assessed if students can learn clinical skills from their peers in co-curricular practice objective structured clinical exams (OSCEs). A total of 144 first-year medical students participated. Students wrote case scenarios that were reviewed by physicians. Students enacted the cases in practice OSCEs, acting as the patient, physician, and evaluator. Verbal and electronic evaluations were completed. A digital platform was used to automate the process. Surveys were disseminated to assess student perceptions of their experience. Seventy-five percent of participants said they needed opportunities to practice patient histories and physical exams in addition to those provided in the medical school curriculum. All participants agreed that the co-curricular practice OSCEs met this need. The majority of participants also agreed that the digital platform was efficient and easy to use. Students found the practice OSCEs and digital platform effective for learning clinical skills. Thus, peer-to-peer learning and computer automation can be useful adjuncts to traditional medical curricula.

  20. PowerFolder – Peer-to-Peer powered Sync and Share

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    PowerFolder is a peer-to-peer (P2P) sync and share solution which started as spin-off from the University of Cologne and University of Applied Science Niederrhein in 2007. It is available as commercial and open-source solution and in use by hundreds of education and research organization and several thousand businesses. The software enables datacenter providers, NRENs or any education and research organization to operate its own PowerFolder cloud as alternative to public clouds while preserving the same end-user experience: Access to data anywhere on any device (Windows, Linux, Apple, Web, Android and iOS). While approaches to sync and share data from/to a single central location have several drawbacks the PowerFolder solution offers a unique peer-to-peer algorithm to replicate and transfer data between sites, users and devices with the freedom to choose whether to store or not to store files at the central hub. This is archived by intelligent; decentralize meta- and binary-data handling between nodes in a se...

  1. Peer-to-peer communication, cancer prevention, and the internet

    Science.gov (United States)

    Ancker, Jessica S.; Carpenter, Kristen M.; Greene, Paul; Hoffmann, Randi; Kukafka, Rita; Marlow, Laura A.V.; Prigerson, Holly G.; Quillin, John M.

    2013-01-01

    Online communication among patients and consumers through support groups, discussion boards, and knowledge resources is becoming more common. In this paper, we discuss key methods through which such web-based peer-to-peer communication may affect health promotion and disease prevention behavior (exchanges of information, emotional and instrumental support, and establishment of group norms and models). We also discuss several theoretical models for studying online peer communication, including social theory, health communication models, and health behavior models. Although online peer communication about health and disease is very common, research evaluating effects on health behaviors, mediators, and outcomes is still relatively sparse. We suggest that future research in this field should include formative evaluation and studies of effects on mediators of behavior change, behaviors, and outcomes. It will also be important to examine spontaneously emerging peer communication efforts to see how they can be integrated with theory-based efforts initiated by researchers. PMID:19449267

  2. PSG: Peer-to-Peer semantic grid framework architecture

    Directory of Open Access Journals (Sweden)

    Amira Soliman

    2011-07-01

    Full Text Available The grid vision, of sharing diverse resources in a flexible, coordinated and secure manner, strongly depends on metadata. Currently, grid metadata is generated and used in an ad-hoc fashion, much of it buried in the grid middleware code libraries and database schemas. This ad-hoc expression and use of metadata causes chronic dependency on human intervention during the operation of grid machinery. Therefore, the Semantic Grid is emerged as an extension of the grid in which rich resource metadata is exposed and handled explicitly, and shared and managed via grid protocols. The layering of an explicit semantic infrastructure over the grid infrastructure potentially leads to increase interoperability and flexibility. In this paper, we present PSG framework architecture that offers semantic-based grid services. PSG architecture allows the explicit use of semantics and defining the associated grid services. PSG architecture is originated from the integration of Peer-to-Peer (P2P computing with semantics and agents. Ontologies are used in annotating each grid component, developing users/nodes profiles and organizing framework agents. While, P2P is responsible for organizing and coordinating the grid nodes and resources.

  3. Defining Peer-to-Peer Accountability From the Nurse's Perspective.

    Science.gov (United States)

    Lockett, Jacqueline Jansen; Barkley, Leslie; Stichler, Jaynelle; Palomo, Jeanne; Kik, Bozena; Walker, Christopher; Donnelly, Janet; Willon, Judy; Sanborn, Julie; O'Byrne, Noeleen

    2015-11-01

    The aim of this study was to define and create a conceptual model for peer-to-peer accountability (P to PA). Many organizations cite the importance of peer accountability (PA) as essential in ensuring patient safety. Professionalism in nursing requires self-regulation of practice and PA. Although discussed in the literature, P to PA is not conceptually defined. A grounded theory study design with constant comparative data collection and analysis was used to explore nurses' definitions of P to PA and their perceptions of motivators and barriers to engaging in P to PA. Transcripts of digital recordings of all interviews were analyzed using line-by-line coding until identified themes emerged. P to PA was defined as the act of speaking up when one observes a peer not practicing to acceptable standards. A conceptual model illustrates the antecedents, attributes, and consequences of P to PA. P to PA is the professional responsibility of every nurse and healthcare provider and is essential for safe patient care. The conceptual definition facilitates actualization of P to PA in practice.

  4. Cooperative peer-to-peer multiagent-based systems.

    Science.gov (United States)

    Caram, L F; Caiafa, C F; Ausloos, M; Proto, A N

    2015-08-01

    A multiagent based model for a system of cooperative agents aiming at growth is proposed. This is based on a set of generalized Verhulst-Lotka-Volterra differential equations. In this study, strong cooperation is allowed among agents having similar sizes, and weak cooperation if agents have markedly different "sizes", thus establishing a peer-to-peer modulated interaction scheme. A rigorous analysis of the stable configurations is presented first examining the fixed points of the system, next determining their stability as a function of the model parameters. It is found that the agents are self-organizing into clusters. Furthermore, it is demonstrated that, depending on parameter values, multiple stable configurations can coexist. It occurs that only one of them always emerges with probability close to one, because its associated attractor dominates over the rest. This is shown through numerical integrations and simulations, after analytic developments. In contrast to the competitive case, agents are able to increase their capacity beyond the no-interaction case limit. In other words, when some collaborative partnership among a relatively small number of partners takes place, all agents act in good faith prioritizing the common good, when receiving a mutual benefit allowing them to surpass their capacity.

  5. Peer-to-Peer Enclaves for Improving Network Defence

    Directory of Open Access Journals (Sweden)

    David W. Archer

    2013-07-01

    Full Text Available Information about cyberthreats within networks spreads slowly relative to the speed at which those threats spread. Typical "threat feeds" that are commercially available also disseminate information slowly relative to the propagation speed of attacks, and they often convey irrelevant information about imminent threats. As a result, hosts sharing a network may miss opportunities to improve their defence postures against imminent attack because needed information arrives too late or is lost in irrelevant noise. We envision timely, relevant peer-to-peer sharing of threat information – based on current technologies – as a solution to these problems and as a useful design pattern for defensive cyberwarfare. In our setting, network nodes form communities that we call enclaves, where each node defends itself while sharing information on imminent threats with peers that have similar threat exposure. In this article, we present our vision for this solution. We sketch the architecture of a typical node in such a network and how it might interact with a framework for sharing threat information; we explain why certain defensive countermeasures may work better in our setting; we discuss current tools that could be used as components in our vision; and we describe opportunities for future research and development.

  6. Inspiring peer-to-peer educations with film

    Science.gov (United States)

    Vachon, R. W.

    2014-12-01

    Oceans are vast, complicated, often inaccessible, three-dimensional and dark (for the most part). The value, vulnerabilities and dynamics of marine systems are quite far removed from the consciousness of many people. However, these reasons are not alibis for not understanding and appreciating oceans deep-rooted influences on our lives. Currently, the Nereus Program, a fellowship of climate, fisheries and computer modeling scientists, are accessing school systems in person and virtually, motivating teens to tell stories about their local understanding of the ocean's influence on their communities (even if they live in a landlocked location). In it's first iteration, we are soliciting youth to communicate through the popular medium of film. These films will be assembled into an on-line digital field guide. In part, this program is designed to be a peer-to-peer educational technique, where civilians are teaching other civilians about local or regional ocean dynamics. Additionally, the act of teaching through film is a proven method for deepening engagement, learning and empowerment of the individuals producing the films.

  7. Personalised Peer-Supported Learning: The Peer-to-Peer Learning Environment (P2PLE)

    Science.gov (United States)

    Corneli, Joseph; Mikroyannidis, Alexander

    2011-01-01

    The Peer-to-Peer Learning Environment (P2PLE) is a proposed approach to helping learners co-construct their learning environment using recommendations about people, content, and tools. The work draws on current research on PLEs, and participant observation at the Peer-to-Peer University (P2PU). We are particularly interested in ways of eliciting…

  8. Surfing Peer-to-Peer IPTV: Distributed Channel Switching

    Science.gov (United States)

    Kermarrec, A.-M.; Le Merrer, E.; Liu, Y.; Simon, G.

    It is now common for IPTV systems attracting millions of users to be based on a peer-to-peer (P2P) architecture. In such systems, each channel is typically associated with one P2P overlay network connecting the users. This significantly enhances the user experience by relieving the source from dealing with all connections. Yet, the joining process resulting in a peer to be integrated in channel overlay usually requires a significant amount of time. As a consequence, switching from one channel to another is far to be as fast as in IPTV solutions provided by telco operators. In this paper, we tackle the issue of efficient channel switching in P2P IPTV system. This is to the best of our knowledge the first study on this topic. First, we conducted and analyzed a set of measurements of one of the most popular P2P systems (PPlive). These measurements reveal that the set of contacts that a joining peer receives from the central server are of the utmost importance in the start-up process. On those neigbors, depends the speed to acquire the first video frames to play. We then formulate the switching problem, and propose a simple distributed algorithm, as an illustration of the concept, which aims at leveraging the presence of peers in the network to fasten the switch process. The principle is that each peer maintains as neighbors peers involved in other channels, providing peers with good contacts upon channel switching. Finally, simulations show that our approach leads to substantial improvements on the channel switching time. As our algorithmic solution does not have any prerequisite on the overlays, it appears to be an appealing add-on for existing P2P IPTV systems.

  9. Preventing DoS attacks in peer-to-peer media streaming systems

    Science.gov (United States)

    Conner, William; Nahrstedt, Klara; Gupta, Indranil

    2006-01-01

    This paper presents a framework for preventing both selfishness and denial-of-service attacks in peer-to-peer media streaming systems. Our framework, called Oversight, achieves prevention of these undesirable activities by running a separate peer-to-peer download rate enforcement protocol along with the underlying peer-to-peer media streaming protocol. This separate Oversight protocol enforces download rate limitations on each participating peer. These limitations prevent selfish or malicious nodes from downloading an overwhelming amount of media stream data that could potentially exhaust the entire system. Since Oversight is based on a peer-to-peer architecture, it can accomplish this enforcement functionality in a scalable, efficient, and decentralized way that fits better with peer-to-peer media streaming systems compared to other solutions based on central server architectures. As peer-to-peer media streaming systems continue to grow in popularity, the threat of selfish and malicious peers participating in such large peer-to-peer networks will continue to grow as well. For example, since peer-to-peer media streaming systems allow users to send small request messages that result in the streaming of large media objects, these systems provide an opportunity for malicious users to exhaust resources in the system with little effort expended on their part. However, Oversight addresses these threats associated with selfish or malicious peers who cause such disruptions with excessive download requests. We evaluated our Oversight solution through simulations and our results show that applying Oversight to peer-to-peer media streaming systems can prevent both selfishness and denial-of-service attacks by effectively limiting the download rates of all nodes in the system.

  10. Peer-to-peer as a travel accommodation option and the customer value

    OpenAIRE

    Rakovets, Elizaveta

    2016-01-01

    The purpose of the study was to investigate the concept of peer-to-peer accommodation as a travel lodging option from the customers’ point of view and the reasons for choosing that. Airbnb and Couchsurfing were used as examples of peer-to-peer accommodation. The theoretical section of the thesis covers the history of the homestay concept as the original form of peer-to-peer accommodation, its features as a part of hospitality exchange network, and the influence of modern technologies. The...

  11. Peer-to-peer computing for secure high performance data copying

    International Nuclear Information System (INIS)

    Hanushevsky, A.; Trunov, A.; Cottrell, L.

    2001-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model--if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, the authors present the bbcp architecture, it's various features, and the reasons for their inclusion

  12. Peer-to-Peer Computing for Secure High Performance Data Copying

    International Nuclear Information System (INIS)

    2002-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model -- if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, we preset the bbcp architecture, it's various features, and the reasons for their inclusion

  13. A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper describes a local and distributed expectation maximization algorithm for learning parameters of Gaussian mixture models (GMM) in large peer-to-peer (P2P)...

  14. 2012 national state safety engineers and traffic engineers peer-to-peer workshop.

    Science.gov (United States)

    2013-11-01

    The Illinois Department of Transportation (IDOT) and the Illinois Center for Transportation (ICT) sponsored and hosted the : 2012 National State Safety Engineers and Traffic Engineers Peer-to-Peer Workshop on November 14 and 15, 2012, at the : Hyatt ...

  15. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... eNcentive facilitates peer-to-peer electronic marketing in mobile ad hoc environments. Our framework employs an intelligent marketing scheme, by providing users the capability to collect information like sales promotions and discounts...

  16. Mitigating Free Riding in Peer-To-Peer Networks: Game Theory ...

    African Journals Online (AJOL)

    Mitigating Free Riding in Peer-To-Peer Networks: Game Theory Approach. ... In this paper, we model the interactions between peers as a modified gift giving game and proposed an utility exchange incentive ... AJOL African Journals Online.

  17. Secure Peer-to-Peer Networks for Scientific Information Sharing, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Our goal is to adapt the peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, as the basis for development of...

  18. A Local Asynchronous Distributed Privacy Preserving Feature Selection Algorithm for Large Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we develop a local distributed privacy preserving algorithm for feature selection in a large peer-to-peer environment. Feature selection is often used...

  19. Client-side Web Mining for Community Formation in Peer-to-Peer Environments

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we present a framework for forming interests-based Peer-to-Peer communities using client-side web browsing history. At the heart of this framework is...

  20. "I'm Not Here to Learn How to Mark Someone Else's Stuff": An Investigation of an Online Peer-to-Peer Review Workshop Tool

    Science.gov (United States)

    Wilson, Michael John; Diao, Ming Ming; Huang, Leon

    2015-01-01

    In this article, we explore the intersecting concepts of fairness, trust and temporality in relation to the implementation of an online peer-to-peer review Moodle Workshop tool at a Sydney metropolitan university. Drawing on qualitative interviews with unit convenors and online surveys of students using the Workshop tool, we seek to highlight a…

  1. Energy-efficient peer-to-peer networking for constrained-capacity mobile environments

    OpenAIRE

    Harjula, E. (Erkki)

    2016-01-01

    Abstract Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of end-user devices in mobile computing. Peer-to-peer technology provides decentralized and self-organizing architecture for distributing content between devices in networks that scale up almost infinitely. However, peer-to-peer networking may require lots of resources from peer nodes, which in turn may lead to increased energy consumption on mobile d...

  2. Online Peer-to-Peer Support for Young People With Mental Health Problems: A Systematic Review

    OpenAIRE

    Ali, Kathina; Farrer, Louise; Gulliver, Amelia; Griffiths, Kathleen M

    2015-01-01

    Background Adolescence and early adulthood are critical periods for the development of mental disorders. Online peer-to-peer communication is popular among young people and may improve mental health by providing social support. Previous systematic reviews have targeted Internet support groups for adults with mental health problems, including depression. However, there have been no systematic reviews examining the effectiveness of online peer-to-peer support in improving the mental health of a...

  3. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  4. Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

    Directory of Open Access Journals (Sweden)

    Francesca Musiani

    2011-06-01

    Full Text Available This article addresses the ongoing, increasing privatization of peer-to-peer (P2P file sharing systems – the emergence of systems that users may only join by personal, friend-to-friend invitation. It argues that, within P2P systems, privacy is increasingly coinciding with “mere” invisibility vis-à-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P technology: The alternation between forms of pervasive surveillance of such systems, and reactions by developers and users to such restrictive measures. Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities.

  5. Active Minds: Creating Peer-to-Peer Mental Health Awareness

    Science.gov (United States)

    Walther, Willliam A.; Abelson, Sara; Malmon, Alison

    2014-01-01

    Utilizing student peers is one vital avenue for improving the prevention, detection, and treatment of mental health disorders on college campuses (The Campus Suicide Prevention Center of Virginia, 2011). This article will briefly review research findings indicating the importance of student peers and then focus on a promising model and growing…

  6. The Benefits of Peer-to-Peer Mentoring: Lessons from The Earth Science Women's Network (ESWN)

    Science.gov (United States)

    Holloway, T.; Steiner, A.; Fiore, A.; Hastings, M.; McKinley, G.; Staudt, A.; Wiedinmyer, C.

    2007-12-01

    The Earth Science Women's Network (ESWN) is a grassroots organization that began with the meeting of six women graduate students and recent Ph.D.s at the Spring 2002 AGU meeting in Washington, DC. Since then, the group has grown to over 400 members, completely by word of mouth. We provide an informal, peer-to-peer network developed to promote and support careers of women in the Earth sciences. Through the network, women have found jobs, established research collaborations, shared strategies on work/life balance, and built a community stretching around the world. We maintain an email list for members to develop an expanded peer network outside of their own institution, and we have recently launched a co-ed jobs list to benefit the wider geoscience community. We will present a summary of strategies that have been discussed by group members on how to transition to a new faculty position, build a research group, develop new research collaborations, and balance career and family.

  7. How Online Peer-to-Peer Conversation Shapes the Effects of a Message About Healthy Sleep.

    Science.gov (United States)

    Robbins, Rebecca; Niederdeppe, Jeff

    2017-02-01

    Conversation about health messages and campaigns is common, and message-related conversations are increasingly recognized as a consequential factor in shaping message effects. The evidence base is limited, however, about the conditions under which conversation may help or hinder health communication efforts. In this study, college students (N = 301) first watched a short sleep video and were randomly assigned to either talk with a partner in an online chat conversation or proceed directly to a short survey. Unknown to participants, the chat partner was a confederate coached to say positive things about sleep and the message ('positive' chat condition), negative things ('negative' chat condition), or unrelated things ('natural' chat condition). All respondents completed a short survey on beliefs about sleep, reactions to the message, and intentions to get adequate sleep. Respondents had greater intentions to engage in healthy sleep when they engaged in positive conversation following message exposure than when they engaged in negative conversation after the message (p chat perceptions were significant predictors (p < 0.05) of intentions to achieve healthy sleep. Health message designers may benefit from understanding how messages are exchanged in peer-to-peer conversation to better predict and explain their effects.

  8. Art-mediated peer-to-peer learning of empathy.

    Science.gov (United States)

    Potash, Jordan; Chen, Julie

    2014-08-01

    Making experiential art in a clinical clerkship offers opportunities for students to gain self-awareness and enhance their empathic understanding of patients. The student-created art can be further used as teaching material for other students. The graduating class of 2012 from Ajou University School of Medicine in South Korea was interested in learning about medical humanities initiatives at the Li Ka Shing Faculty of Medicine, University of Hong Kong (HKU), and made an educational visit in May 2012. As part of the core family medicine curriculum, third-year HKU medical students created poetry and art based on their experiences witnessing patients in pain and suffering. Twenty of the artworks and accompanying reflective writing were chosen for an exhibition. The visiting students viewed the exhibit and created their own art based on their emotional response to one piece selected from the exhibit. The combination of viewing art made by their peers and creating art in response resulted in empathic understanding of patient pain and suffering, and an appreciation of holistic care and the value of the doctor-patient relationship. Medical student-generated artwork has the potential to educate both students and professionals on humanistic aspects of medical care. © 2014 John Wiley & Sons Ltd.

  9. DOLCLAN – Middleware Support for Peer-to-Peer Distributed Shared Objects

    DEFF Research Database (Denmark)

    Bardram, Jakob; Mogensen, Martin

    2007-01-01

    Contemporary object-oriented programming seeks to enable distributed computing by accessing remote objects using blocking remote procedure calls. This technique, however, suffers from several drawbacks because it relies on the assumption of stable network connections and synchronous method...... invocations. In this paper we present an approach to support distributed programming, which rely on local object replicas keeping themselves synchronized using an underlying peer-to-peer infrastructure. We have termed our approach Peer-to-peer Distributed Shared Objects (PDSO). This PDSO approach has been...

  10. The 60 Days of PVE Campaign: Lessons on Organizing an Online, Peer-to-Peer, Counter-radicalization Program

    Directory of Open Access Journals (Sweden)

    Alex Wilner

    2017-09-01

    Full Text Available Combatting violent extremism can involve organizing Peer-to-Peer (P2P preventing violent extremism (PVE programs and social media campaigns. While hundreds of PVE campaigns have been launched around the world in recent months and years, very few of these campaigns have actually been reviewed, analyzed, or assessed in any systematic way. Metrics of success and failure have yet to be fully developed, and very little is publically known as to what might differentiate a great and successful P2P campaign from a mediocre one. This article will provide first-hand insight on orchestrating a publically funded, university-based, online, peer-to-peer PVE campaign – 60 Days of PVE – based on the experience of a group of Canadian graduate students. The article provides an account of the group’s approach to PVE. It highlights the entirety of the group’s campaign, from theory and conceptualization to branding, media strategy, and evaluation, and describes the campaign’s core objectives and implementation. The article also analyzes the campaign’s digital footprint and reach using data gleamed from social media. Finally, the article discusses the challenges and difficulties the group faced in running their campaign, lessons that are pertinent for others contemplating a similar endeavour.

  11. Introduction to the special section on peer-to-peer computing and web data management

    Institute of Scientific and Technical Information of China (English)

    Aoying ZHOU

    2008-01-01

    @@ Peer-to-peer (P2P) computing has been attracting attention from quite a few researchers and practitioners from different fields of computer science, such as networking, distributed computing, and database. Over P2P environment, the data management becomes a challenging issue.

  12. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  13. Studying the Effects of Peer-to-Peer Sharing Economy Platforms on Society

    NARCIS (Netherlands)

    Westerbeek, J.; Ubacht, J.; van der Voort, H.G.; ten Heuvelhof, E.F.; Scholl, Hans Jochem; Glassey, Olivier; Janssen, Marijn; Klievink, Bram; Lindgren, Ida; Parycek, Peter; Tambouris, Efthimios; Wimmer, Maria; Janowski, Tomasz; Sa Soares, Delfina

    2016-01-01

    Peer-to-peer sharing economy platforms potentially have big effects on values in society. Policymakers need to develop governance arrangements to benefit from the positive effects, while simultaneously mitigate the negative effects. This requires having a structured overview of the effects of these

  14. Perception and Management of Risk in Internet-Based Peer-to-Peer Milk-Sharing

    Science.gov (United States)

    Gribble, Karleen D.

    2014-01-01

    The perception and management of the risks of peer-to-peer milk sharing was explored via a written questionnaire administered to 97 peer milk donors and 41 peer milk recipients who were recruited via Facebook. All recipients' respondents were aware that there were risks associated with using peer-shared milk and took action to mitigate these…

  15. Information Propagation in Peer-to-Peer Networking : Modeling and Empirical Studies

    NARCIS (Netherlands)

    Tang, S.

    2010-01-01

    Although being a young technology, peer-to-peer (P2P) networking has spurred dramatic evolution on the Internet over the recent twenty years. Unlike traditional server-client mode, P2P networking applications are user-centric. Users (peers) generate their own content and share it with others across

  16. A multi-tiered architecture for content retrieval in mobile peer-to-peer networks.

    Science.gov (United States)

    2012-01-01

    In this paper, we address content retrieval in Mobile Peer-to-Peer (P2P) Networks. We design a multi-tiered architecture for content : retrieval, where at Tier 1, we design a protocol for content similarity governed by a parameter that trades accu...

  17. Expertise-based peer selection in Peer-to-Peer networks

    NARCIS (Netherlands)

    Haase, Peter; Siebes, Ronny; Harmelen, van Frank

    2007-01-01

    Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destination peer in the first place is not always trivial. We propose a model in which peers advertise their expertise in

  18. Expertise-based peer selection in Peer-to-Peer networks

    NARCIS (Netherlands)

    Haase, Peter; Siebes, Ronny; Harmelen, van Frank

    2007-01-01

    Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destination peer in the first place is not always trivial. We propose a a message to a given peer. However, determining the

  19. A Peer-to-Peer Health Education Program for Vulnerable Children in Uganda

    Science.gov (United States)

    Falk, Diane S.; Pettet, Kristen; Mpagi, Charles

    2016-01-01

    In this paper, children attending a U.S.-sponsored private primary school serving orphaned and vulnerable children in Uganda were interviewed in focus groups about their participation in a peer-to-peer health education program in which they used music, dance, poetry, art, and drama to convey health information. The children reported enhanced…

  20. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  1. DServO: A Peer-to-Peer-based Approach to Biomedical Ontology Repositories.

    Science.gov (United States)

    Mambone, Zakaria; Savadogo, Mahamadi; Some, Borlli Michel Jonas; Diallo, Gayo

    2015-01-01

    We present in this poster an extension of the ServO ontology server system, which adopts a decentralized Peer-To-Peer approach for managing multiple heterogeneous knowledge organization systems. It relies on the use of the JXTA protocol coupled with information retrieval techniques to provide a decentralized infrastructure for managing multiples instances of Ontology Repositories.

  2. Online Peer-to-Peer Support for Young People With Mental Health Problems: A Systematic Review.

    Science.gov (United States)

    Ali, Kathina; Farrer, Louise; Gulliver, Amelia; Griffiths, Kathleen M

    2015-01-01

    Adolescence and early adulthood are critical periods for the development of mental disorders. Online peer-to-peer communication is popular among young people and may improve mental health by providing social support. Previous systematic reviews have targeted Internet support groups for adults with mental health problems, including depression. However, there have been no systematic reviews examining the effectiveness of online peer-to-peer support in improving the mental health of adolescents and young adults. The aim of this review was to systematically identify available evidence for the effectiveness of online peer-to peer support for young people with mental health problems. The PubMed, PsycInfo, and Cochrane databases were searched using keywords and Medical Subject Headings (MeSH) terms. Retrieved abstracts (n=3934) were double screened and coded. Studies were included if they (1) investigated an online peer-to-peer interaction, (2) the interaction discussed topics related to mental health, (3) the age range of the sample was between 12 to 25 years, and (4) the study evaluated the effectiveness of the peer-to-peer interaction. Six studies satisfied the inclusion criteria for the current review. The studies targeted a range of mental health problems including depression and anxiety (n=2), general psychological problems (n=1), eating disorders (n=1), and substance use (tobacco) (n=2). The majority of studies investigated Internet support groups (n=4), and the remaining studies focused on virtual reality chat sessions (n=2). In almost all studies (n=5), the peer support intervention was moderated by health professionals, researchers or consumers. Studies employed a range of study designs including randomized controlled trials (n=3), pre-post studies (n=2) and one randomized trial. Overall, two of the randomized controlled trials were associated with a significant positive outcome in comparison to the control group at post-intervention. In the remaining four

  3. Sexual and reproductive health in Greenland: evaluation of implementing sexual peer-to-peer education in Greenland (the SexInuk project).

    Science.gov (United States)

    Homøe, Anne-Sophie; Knudsen, Ane-Kersti Skaarup; Nielsen, Sigrid Brisson; Grynnerup, Anna Garcia-Alix

    2015-01-01

    For decades, the rates of sexually transmitted infections (STIs), such as gonorrhoea, chlamydia and syphilis, have increased in Greenland, especially within the young age groups (15-29 years). From 2006 to 2013, the number of abortions has been consistent with approximately 800-900 abortions per year in Greenland, which is nearly as high as the total number of births during the same period. Previous studies in Greenland have reported that knowledge about sexual health is important, both as prevention and as facilitator to stop the increasing rates of STIs. A peer-to-peer education programme about sexual health requires adaption to cultural values and acceptance among the population and government in order to be sustainable. Formative evaluation of a voluntary project (SexInuk), in relation to peer-to-peer education with focus on sexual health. Two workshops were conducted in Nuuk, Greenland, to recruit Greenlandic students. Qualitative design with focus group interviews (FGIs) to collect qualitative feedback on feasibility and implementation of the project. Supplemented with a brief questionnaire regarding personal information (gender, age, education) and questions about the educational elements in the SexInuk project. Eight Greenlandic students, who had completed one or two workshops, were enrolled. The FGIs showed an overall consensus regarding the need for improving sexual health education in Greenland. The participants requested more voluntary educators, to secure sustainability. The articulation of taboo topics in the Greenlandic society appeared very important. The participants suggested more awareness by promoting the project. Cultural values and language directions were important elements in the FGIs. To our knowledge, voluntary work regarding peer-to-peer education and sexual health has not been structurally evaluated in Greenland before. To achieve sustainability, the project needs educators and financial support. Further research is needed to investigate

  4. Potential Benefits of Incorporating Peer-to-Peer Interactions Into Digital Interventions for Psychotic Disorders: A Systematic Review.

    Science.gov (United States)

    Biagianti, Bruno; Quraishi, Sophia H; Schlosser, Danielle A

    2018-04-01

    Peer-to-peer interactions and support groups mitigate experiences of social isolation and loneliness often reported by individuals with psychotic disorders. Online peer-to-peer communication can promote broader use of this form of social support. Peer-to-peer interactions occur naturally on social media platforms, but they can negatively affect mental health. Recent digital interventions for persons with psychotic disorders have harnessed the principles of social media to incorporate peer-to-peer communication. This review examined the feasibility, acceptability, and preliminary efficacy of recent digital interventions in order to identify strategies to maximize benefits of online peer-to-peer communication for persons with psychotic disorders. An electronic database search of PubMed, EMBASE, PsycINFO, Ovid MEDLINE, Cochrane Central Register of Controlled Trials, and Health Technology Assessment Database was conducted in February 2017 and yielded a total of 1,015 results. Eight publications that reported data from six independent trials and five interventions were reviewed. The technology supporting peer-to-peer communication varied greatly across studies, from online forums to embedded social networking. When peer-to-peer interactions were moderated by facilitators, retention, engagement, acceptability, and efficacy were higher than for interventions with no facilitators. Individuals with psychotic disorders were actively engaged with moderated peer-to-peer communication and showed improvements in perceived social support. Studies involving service users in intervention design showed higher rates of acceptability. Individuals with psychotic disorders value and benefit from digital interventions that include moderated peer-to-peer interactions. Incorporating peer-to-peer communication into digital interventions for this population may increase compliance with other evidence-based therapies by producing more acceptable and engaging online environments.

  5. Streaming Multimedia via Overlay Networks using Wi-Fi Peer-to-Peer Connections

    DEFF Research Database (Denmark)

    Poderys, Justas; Soler, José

    2017-01-01

    Short range ad-hoc wireless networks can be used to deliver streaming multimedia for information, entertainment and advertisement purposes. To enable short-range communication between various devices, the Wi-Fi Alliance proposed an extension to the IEEE802.11 Wi-Fi standard called Wi-Fi Peer......-to-Peer (P2P). It allows compliant devices to form ad-hoc communication groups without interrupting conventional access point-based Wi-Fi communication. This paper proposes to use Wi-Fi P2P connectivity to distribute streaming multimedia in ah-hoc formed user groups. The exchange of multimedia data...... is performed by forming an overlay network using Peer-to-Peer Streaming Peer Protocol (PPSPP). In order to make PPSPP function over WiFi P2P connections, this paper proposes a number of changes to the protocol. The performance of the proposed system is evaluated using a computer networks emulator...

  6. Peer-To-Peer Architectures in Distributed Data Management Systems for Large Hadron Collider Experiments

    CERN Document Server

    Lo Presti, Giuseppe; Lo Re, G; Orsini, L

    2005-01-01

    The main goal of the presented research is to investigate Peer-to-Peer architectures and to leverage distributed services to support networked autonomous systems. The research work focuses on development and demonstration of technologies suitable for providing autonomy and flexibility in the context of distributed network management and distributed data acquisition. A network management system enables the network administrator to monitor a computer network and properly handle any failure that can arise within the network. An online data acquisition (DAQ) system for high-energy physics experiments has to collect, combine, filter, and store for later analysis a huge amount of data, describing subatomic particles collision events. Both domains have tight constraints which are discussed and tackled in this work. New emerging paradigms have been investigated to design novel middleware architectures for such distributed systems, particularly the Active Networks paradigm and the Peer-to-Peer paradigm. A network man...

  7. Online Peer-to-Peer Communities in the Daily Lives of People With Chronic Illness

    DEFF Research Database (Denmark)

    Kingod, Natasja; Cleal, Bryan; Wahlberg, Ayo

    2017-01-01

    This qualitative systematic review investigated how individuals with chronic illness experience online peer-to-peer support and how their experiences influence daily life with illness. Selected studies were appraised by quality criteria focused upon research questions and study design, participant...... selection, methods of data collection, and methods of analysis. Four themes were identified: (a) illness-associated identity work, (b) social support and connectivity, (c) experiential knowledge sharing, and (d) collective voice and mobilization. Findings indicate that online peer-to-peer communities...... everyday life with illness. This type of knowledge was perceived as extending far beyond medical care. Online communities were also used to mobilize and raise collective awareness about illness-specific concerns....

  8. Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service

    OpenAIRE

    Chen, Ruichuan; Lua, Eng Keong; Cai, Zhuhua; Crowcroft, Jon; Chen, Zhong

    2011-01-01

    Peer-to-Peer (P2P) content sharing systems are susceptible to the content pollution attack, in which attackers aggressively inject polluted contents into the systems to reduce the availability of authentic contents, thus decreasing the confidence of participating users. In this paper, we design a pollution-free P2P content sharing system, Green, by exploiting the inherent content-based information and the social-based reputation. In Green, a content provider (i.e., creator or sharer) publishe...

  9. Large-Scale Cooperative Task Distribution on Peer-to-Peer Networks

    Science.gov (United States)

    2012-01-01

    SUBTITLE Large-scale cooperative task distribution on peer-to-peer networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...disadvantages of ML- Chord are its fixed size (two layers), and limited scala - bility for large-scale systems. RC-Chord extends ML- D. Karrels et al...configurable before runtime. This can be improved by incorporating a distributed learning algorithm to tune the number and range of the DLoE tracking

  10. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  11. Peer-to-peer Services in the Field of Accommodation: Finland vs. Latin America

    OpenAIRE

    Tuominen, Sofia; Kosunen, Sonja

    2016-01-01

    This thesis focuses on peer-to-peer services in the field of accommodation, more closely Airbnb. The thesis aims at researching the differences of the use of Airbnb in Finland and Latin America with the main focus on Mexico. The thesis is commissioned by SMAL (Association of Finnish Travel Agents). The thesis will consist of eight parts. The first part presents an overall introduction of the topic, aims, commissioner, methods and hypotheses. The second part presents the sharing economy ph...

  12. Peer-to-peer milk donors' and recipients' experiences and perceptions of donor milk banks.

    Science.gov (United States)

    Gribble, Karleen D

    2013-07-01

    To explore the intersection of peer-to-peer milk sharing and donor milk banks. A descriptive survey design containing closed and open-ended questions was used to examine women's perceptions of peer-to-peer milk sharing and milk banking. Closed-ended questions were analyzed using descriptive statistics and conventional qualitative content analysis was used to analyze open-ended responses. Participants were recruited via the Facebook sites of two online milk-sharing networks (Human Milk 4 Human Babies and Eats on Feet). Ninety-eight milk donors and 41 milk recipients who had donated or received breast milk in an arrangement that was facilitated via the Internet. One half of donor recipients could not donate to a milk bank because there were no banks local to them or they did not qualify as donors. Other respondents did not donate to a milk bank because they viewed the process as difficult, had philosophical objections to milk banking, or had a philosophical attraction to peer sharing. Most donor respondents felt it was important to know the circumstances of their milk recipients. No recipient respondents had obtained milk from a milk bank; it was recognized that they would not qualify for banked milk or that banked milk was cost prohibitive. Peer-to-peer milk donors and recipients may differ from milk bank donors and recipients in significant ways. Cooperation between milk banks and peer sharing networks could benefit both groups. © 2013 AWHONN, the Association of Women's Health, Obstetric and Neonatal Nurses.

  13. The future of mental health care: peer-to-peer support and social media.

    Science.gov (United States)

    Naslund, J A; Aschbrenner, K A; Marsch, L A; Bartels, S J

    2016-04-01

    People with serious mental illness are increasingly turning to popular social media, including Facebook, Twitter or YouTube, to share their illness experiences or seek advice from others with similar health conditions. This emerging form of unsolicited communication among self-forming online communities of patients and individuals with diverse health concerns is referred to as peer-to-peer support. We offer a perspective on how online peer-to-peer connections among people with serious mental illness could advance efforts to promote mental and physical wellbeing in this group. In this commentary, we take the perspective that when an individual with serious mental illness decides to connect with similar others online it represents a critical point in their illness experience. We propose a conceptual model to illustrate how online peer-to-peer connections may afford opportunities for individuals with serious mental illness to challenge stigma, increase consumer activation and access online interventions for mental and physical wellbeing. People with serious mental illness report benefits from interacting with peers online from greater social connectedness, feelings of group belonging and by sharing personal stories and strategies for coping with day-to-day challenges of living with a mental illness. Within online communities, individuals with serious mental illness could challenge stigma through personal empowerment and providing hope. By learning from peers online, these individuals may gain insight about important health care decisions, which could promote mental health care seeking behaviours. These individuals could also access interventions for mental and physical wellbeing delivered through social media that could incorporate mutual support between peers, help promote treatment engagement and reach a wider demographic. Unforeseen risks may include exposure to misleading information, facing hostile or derogatory comments from others, or feeling more uncertain

  14. Does gender affect funding success at the peer-to-peer credit markets? Evidence from the largest German lending platform

    OpenAIRE

    Barasinska, Nataliya; Schäfer, Dorothea

    2010-01-01

    Studies of peer-to-peer lending in the USA find that female borrowers have better chances of getting funds than males. Is differential treatment of borrowers of different sexes a common feature of peer-to-peer lendingmarkets or is it subject to specific businessmodels, ways of fixing loan contracts and even national financial systems? We aim at answering this question by providing evidence on loan procurement at the largest German peer-to-peer lending platform Smava.de. Our results show that ...

  15. Peer-to-peer architectures for exascale computing : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Vorobeychik, Yevgeniy; Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Donald W.

    2010-09-01

    The goal of this research was to investigate the potential for employing dynamic, decentralized software architectures to achieve reliability in future high-performance computing platforms. These architectures, inspired by peer-to-peer networks such as botnets that already scale to millions of unreliable nodes, hold promise for enabling scientific applications to run usefully on next-generation exascale platforms ({approx} 10{sup 18} operations per second). Traditional parallel programming techniques suffer rapid deterioration of performance scaling with growing platform size, as the work of coping with increasingly frequent failures dominates over useful computation. Our studies suggest that new architectures, in which failures are treated as ubiquitous and their effects are considered as simply another controllable source of error in a scientific computation, can remove such obstacles to exascale computing for certain applications. We have developed a simulation framework, as well as a preliminary implementation in a large-scale emulation environment, for exploration of these 'fault-oblivious computing' approaches. High-performance computing (HPC) faces a fundamental problem of increasing total component failure rates due to increasing system sizes, which threaten to degrade system reliability to an unusable level by the time the exascale range is reached ({approx} 10{sup 18} operations per second, requiring of order millions of processors). As computer scientists seek a way to scale system software for next-generation exascale machines, it is worth considering peer-to-peer (P2P) architectures that are already capable of supporting 10{sup 6}-10{sup 7} unreliable nodes. Exascale platforms will require a different way of looking at systems and software because the machine will likely not be available in its entirety for a meaningful execution time. Realistic estimates of failure rates range from a few times per day to more than once per hour for these

  16. Predicting Availability of Mobile Peers in Large Peer-to-Peer Networks

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Ekler, Péter

    2013-01-01

    users and network operators. In these situations, a certain redundancy must be built into the system because the availability of the nodes can vary greatly. The goal of this paper is to present a methodology to minimize the necessary redundancy by predicting the number of available nodes. The prediction......Peer-to-peer (P2P) applications for mobile devices are becoming more and more popular because of increasing bandwidth, computational performance and storage capabilities. Such a mobile based distributed architecture offers significant advantages in several scenarios from the perspective of both...

  17. Analysis of online trading transaction (peer to peer) on e-commerce based on Islamic law

    OpenAIRE

    Siregar, Richardy Affan Sojuangon; Caroline, Bella Marisela; Lazuardi, Luqman Isyraqi; Renanda, Tris; Qodrya, Hersy Ayu; Sari, Atthiya Prima; Arbi, Ramadana

    2018-01-01

    E-commerce lets buyers order things over the Internet via gadgets wherever they are and whenever they want to. The order will be delivered right to the buyer’s doorstep. There are several e-commerce models at the moment. One model is called peer-to-peer model which has been implemented on three largest e-commerce platforms in Indonesia. The validity of e-commerce from Islamic view is studied in order to clear the Muslims doubt regarding transactions made online. After scrutinizing the peer-to...

  18. An Introduction to Models of Online Peer-to-Peer Social Networking

    CERN Document Server

    Kesidis, George

    2010-01-01

    This book concerns peer-to-peer applications and mechanisms operating on the Internet, particularly those that are not fully automated and involve significant human interaction. So, the realm of interest is the intersection of distributed systems and online social networking. Generally, simple models are described to clarify the ideas. Beginning with short overviews of caching, graph theory and game theory, we cover the basic ideas of structured and unstructured search. We then describe a simple framework for reputations and for iterated referrals and consensus. This framework is applied to a

  19. PBRRI: A Hybrid Peer-to-Peer Communication Model in Distributed Systems

    Institute of Scientific and Technical Information of China (English)

    张亚英; 尤晋元

    2003-01-01

    In distributed systems independent agents need to interact with each other to accomplish their task.Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them cooperate with each other. But in fact, access control should also be considered to limit interaction to make it harmless. This paper proposed a proxy based rule regulated interaction (PBRRI) model. Role based access control is introduced for security concerns. Regulation rules are enforced in a distributed manner so that PBRRI can be applied to the open distributed systems such as Internet.

  20. Macroeconomics and FinTech: Uncovering Latent Macroeconomic Effects on Peer-to-Peer Lending

    OpenAIRE

    Foo, Jessica; Lim, Lek-Heng; Wong, Ken Sze-Wai

    2017-01-01

    Peer-to-peer (P2P) lending is a fast growing financial technology (FinTech) trend that is displacing traditional retail banking. Studies on P2P lending have focused on predicting individual interest rates or default probabilities. However, the relationship between aggregated P2P interest rates and the general economy will be of interest to investors and borrowers as the P2P credit market matures. We show that the variation in P2P interest rates across grade types are determined by three macro...

  1. Peer-to-peer and mass communication effect on opinion shifts

    Science.gov (United States)

    Kindler, A.; Solomon, S.; Stauffer, D.

    2013-02-01

    Opinion dynamics is studied through a minimal Ising model with three main influences (fields): personal conservatism (power-law distributed), inter-personal and group pressure, and a global field incorporating peer-to-peer and mass communications, which is generated bottom-up from the faction supporting the new opinion. A rich phase diagram appears separating possible terminal stages of the opinion diffusion, characterizing failure phases by the features of the individuals who had changed their opinion. An exhaustive solution of the model is produced, allowing predictions to be made on the opinion’s assimilation in the society.

  2. Búsqueda de recursos en redes peer-to-peer totalmente descentralizadas basada en redes neuronales artificiales

    OpenAIRE

    Corbalán, Leonardo César

    2014-01-01

    Las redes Peer-to-Peer (P2P) puras no estructuradas como Gnutella, dónde los nodos se conectan entre sí como pares o iguales, sin roles diferenciados ni jerarquías de ninguna clase, son sistemas distribuidos, dinámicos, sin punto alguno de centralización, que favorecen la robustez y tolerancia a fallos. Sin embargo, la búsqueda de recursos en estos sistemas constituye un problema esencial. El algoritmo de búsqueda BFS de Gnutella genera gran cantidad de tráfico dificultando su escalabilidad. ...

  3. Global phenomena from local rules: Peer-to-peer networks and crystal steps

    Science.gov (United States)

    Finkbiner, Amy

    Even simple, deterministic rules can generate interesting behavior in dynamical systems. This dissertation examines some real world systems for which fairly simple, locally defined rules yield useful or interesting properties in the system as a whole. In particular, we study routing in peer-to-peer networks and the motion of crystal steps. Peers can vary by three orders of magnitude in their capacities to process network traffic. This heterogeneity inspires our use of "proportionate load balancing," where each peer provides resources in proportion to its individual capacity. We provide an implementation that employs small, local adjustments to bring the entire network into a global balance. Analytically and through simulations, we demonstrate the effectiveness of proportionate load balancing on two routing methods for de Bruijn graphs, introducing a new "reversed" routing method which performs better than standard forward routing in some cases. The prevalence of peer-to-peer applications prompts companies to locate the hosts participating in these networks. We explore the use of supervised machine learning to identify peer-to-peer hosts, without using application-specific information. We introduce a model for "triples," which exploits information about nearly contemporaneous flows to give a statistical picture of a host's activities. We find that triples, together with measurements of inbound vs. outbound traffic, can capture most of the behavior of peer-to-peer hosts. An understanding of crystal surface evolution is important for the development of modern nanoscale electronic devices. The most commonly studied surface features are steps, which form at low temperatures when the crystal is cut close to a plane of symmetry. Step bunching, when steps arrange into widely separated clusters of tightly packed steps, is one important step phenomenon. We analyze a discrete model for crystal steps, in which the motion of each step depends on the two steps on either side of

  4. Online peer-to-peer lending and its implications for small business credit financing in Norway

    OpenAIRE

    Brekke, Henrik; Hagerud, Simon

    2017-01-01

    Masteroppgave(MSc) in Master of Science in Business, Strategy - Handelshøyskolen BI, 2017 This thesis seeks to explore how the emergence of online peer-to-peer (P2P) lending will impact small businesses lending in Norway. Increasing attention has been drawn to small businesses and their apparent struggle to obtain appropriate credit financing. At the same time, online P2P lending, part of the new wave of financial technologies, has been held up as a potential remedy for this cr...

  5. Peer-to-Peer Lending in Surabaya: How It Drives Regional Economy?

    OpenAIRE

    Mahardhika, Galih Satria

    2017-01-01

    Financial technology, or so called as “Fintech”, has been remarked as a disruptive idea that changed our current financial system. In Indonesia, one of the emerging financial practices related to Fintech is the online-based peer-to-peer lending (P2PL). This research has two objectives: to explore current scheme of P2PL in Surabaya and to learn how P2PL drives the economy of Surabaya. To meet the objectives, numbers of existing papers are being reviewed related to the matter of P2PL and Micro,...

  6. Jornada “Usos i abusos del peer-to-peer

    Directory of Open Access Journals (Sweden)

    Raquel Xalabarder

    2010-07-01

    Full Text Available El 3 de desembre de 2009, els Estudis de Dret i Ciència Política de la Universitat Oberta de Catalunya (UOC, juntament amb l'Internet Interdisciplinary Institute (IN3, van organitzar la jornada "Usos i abusos del peer-to-peer", que va tenir lloc a la seu central de la UOC a Barcelona. La jornada la van coordinar els professors d'aquests Estudis integrants del grup de recerca Interdret de l'IN3.

  7. Online peer-to-peer lending and its implications for small business credit financing in Norway

    OpenAIRE

    Brekke, Henrik; Hagerud, Simon

    2017-01-01

    This thesis seeks to explore how the emergence of online peer-to-peer (P2P) lending will impact small businesses lending in Norway. Increasing attention has been drawn to small businesses and their apparent struggle to obtain appropriate credit financing. At the same time, online P2P lending, part of the new wave of financial technologies, has been held up as a potential remedy for this credit rationing. Our research involves two main parts. First, we study the extent to whi...

  8. Employing peer-to-peer software distribution in ALICE Grid Services to enable opportunistic use of OSG resources

    CERN Multimedia

    CERN. Geneva; Sakrejda, Iwona

    2012-01-01

    The ALICE Grid infrastructure is based on AliEn, a lightweight open source framework built on Web Services and a Distributed Agent Model in which job agents are submitted onto a grid site to prepare the environment and pull work from a central task queue located at CERN. In the standard configuration, each ALICE grid site supports an ALICE-specific VO box as a single point of contact between the site and the ALICE central services. VO box processes monitor site utilization and job requests (ClusterMonitor), monitor dynamic job and site properties (MonaLisa), perform job agent submission (CE) and deploy job-specific software (PackMan). In particular, requiring a VO box at each site simplifies deployment of job software, done onto a shared file system at the site, and adds redundancy to the overall Grid system. ALICE offline computing, however, has also implemented a peer-to-peer method (based on BitTorrent) for downloading job software directly onto each worker node as needed. By utilizing both this peer-...

  9. Peer-to-peer lending and bias in crowd decision-making.

    Science.gov (United States)

    Singh, Pramesh; Uparna, Jayaram; Karampourniotis, Panagiotis; Horvat, Emoke-Agnes; Szymanski, Boleslaw; Korniss, Gyorgy; Bakdash, Jonathan Z; Uzzi, Brian

    2018-01-01

    Peer-to-peer lending is hypothesized to help equalize economic opportunities for the world's poor. We empirically investigate the "flat-world" hypothesis, the idea that globalization eventually leads to economic equality, using crowdfinancing data for over 660,000 loans in 220 nations and territories made between 2005 and 2013. Contrary to the flat-world hypothesis, we find that peer-to-peer lending networks are moving away from flatness. Furthermore, decreasing flatness is strongly associated with multiple variables: relatively stable patterns in the difference in the per capita GDP between borrowing and lending nations, ongoing migration flows from borrowing to lending nations worldwide, and the existence of a tie as a historic colonial. Our regression analysis also indicates a spatial preference in lending for geographically proximal borrowers. To estimate the robustness for these patterns for future changes, we construct a network of borrower and lending nations based on the observed data. Then, to perturb the network, we stochastically simulate policy and event shocks (e.g., erecting walls) or regulatory shocks (e.g., Brexit). The simulations project a drift towards rather than away from flatness. However, levels of flatness persist only for randomly distributed shocks. By contrast, loss of the top borrowing nations produces more flatness, not less, indicating how the welfare of the overall system is tied to a few distinctive and critical country-pair relationships.

  10. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP

    Science.gov (United States)

    Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni

    The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.

  11. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  12. Providing interoperability of eHealth communities through peer-to-peer networks.

    Science.gov (United States)

    Kilic, Ozgur; Dogac, Asuman; Eichelberg, Marco

    2010-05-01

    Providing an interoperability infrastructure for Electronic Healthcare Records (EHRs) is on the agenda of many national and regional eHealth initiatives. Two important integration profiles have been specified for this purpose, namely, the "Integrating the Healthcare Enterprise (IHE) Cross-enterprise Document Sharing (XDS)" and the "IHE Cross Community Access (XCA)." IHE XDS describes how to share EHRs in a community of healthcare enterprises and IHE XCA describes how EHRs are shared across communities. However, the current version of the IHE XCA integration profile does not address some of the important challenges of cross-community exchange environments. The first challenge is scalability. If every community that joins the network needs to connect to every other community, i.e., a pure peer-to-peer network, this solution will not scale. Furthermore, each community may use a different coding vocabulary for the same metadata attribute, in which case, the target community cannot interpret the query involving such an attribute. Yet another important challenge is that each community may (and typically will) have a different patient identifier domain. Querying for the patient identifiers in the target community using patient demographic data may create patient privacy concerns. In this paper, we address each of these challenges and show how they can be handled effectively in a superpeer-based peer-to-peer architecture.

  13. Using Social Media to Expand Peer-to-Peer Discussion in an Online Course about Regional Climate Modeling

    Science.gov (United States)

    Yarker, M. B.; Mesquita, M. D. S.

    2015-12-01

    The goal of this project is to make knowledge about regional climate modeling accessible to anyone in any location, regardless of their resources. We accomplish this through the development of a free online course, which introduces novice model users to an educational version of the Weather Research and Forecasting model (e-WRF). These courses are grounded in education theory and have been described in detail at prior AGU meetings (Kelsey et al. 2014, Walton et al. 2014, Yarker & Mesquita 2013). Research indicates that effective dialogue is an important component for successful learning to occur and displays the following elements: asking complex questions, deep discussion, and use of evidence to construct arguments (Benus et al. 2013). These can happen between the student and tutor, but peer-to-peer interaction is especially important as well as the most difficult aspect of social constructivism to meet, especially in an online setting. In our online courses, standard course forums were underutilized and generally only used to ask the tutor clarifying questions or troubleshoot error messages. To rectify this problem, we began using social media to facilitate conversation and notice vast improvement in peer-to-peer communication. Moreover, we created a community of over 700 regional climate modelers from around the world, sharing information, asking questions, and creating research projects relating to climate change. Data was gathered by qualitatively analyzing forum and Facebook posts and quantitatively analyzing survey data from participants in both courses. Facebook participants posted on the group more often about a wider variety of topics than the forum participants. Additionally, there were statistically significant increase ('student' t test and Mann-Whitney test) in the elements of effective dialogue. We conclude that social media can serve as a possible tool in the development of online learning, especially for difficult concepts like regional climate

  14. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Science.gov (United States)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  15. Estimating Probability of Default on Peer to Peer Market – Survival Analysis Approach

    Directory of Open Access Journals (Sweden)

    Đurović Andrija

    2017-05-01

    Full Text Available Arguably a cornerstone of credit risk modelling is the probability of default. This article aims is to search for the evidence of relationship between loan characteristics and probability of default on peer-to-peer (P2P market. In line with that, two loan characteristics are analysed: 1 loan term length and 2 loan purpose. The analysis is conducted using survival analysis approach within the vintage framework. Firstly, 12 months probability of default through the cycle is used to compare riskiness of analysed loan characteristics. Secondly, log-rank test is employed in order to compare complete survival period of cohorts. Findings of the paper suggest that there is clear evidence of relationship between analysed loan characteristics and probability of default. Longer term loans are more risky than the shorter term ones and the least risky loans are those used for credit card payoff.

  16. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  17. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  18. A Preliminary Study of Peer-to-Peer Human-Robot Interaction

    Science.gov (United States)

    Fong, Terrence; Flueckiger, Lorenzo; Kunz, Clayton; Lees, David; Schreiner, John; Siegel, Michael; Hiatt, Laura M.; Nourbakhsh, Illah; Simmons, Reid; Ambrose, Robert

    2006-01-01

    The Peer-to-Peer Human-Robot Interaction (P2P-HRI) project is developing techniques to improve task coordination and collaboration between human and robot partners. Our work is motivated by the need to develop effective human-robot teams for space mission operations. A central element of our approach is creating dialogue and interaction tools that enable humans and robots to flexibly support one another. In order to understand how this approach can influence task performance, we recently conducted a series of tests simulating a lunar construction task with a human-robot team. In this paper, we describe the tests performed, discuss our initial results, and analyze the effect of intervention on task performance.

  19. Peer-to-peer I/O (P2PIO) protocol specification Version 0.6

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Gunter, Dan; Hoschek, Wolfgang

    2004-04-21

    Today's distributed systems require simple and powerful resource discovery queries in a dynamic environment consisting of a large number of resources spanning many autonomous administrative domains. The distributed search problem is hard due to the variety of query types, the number of resources and their autonomous, partitioned and dynamic nature. We propose a generalized resource discovery framework that is built around an application level messaging protocol called Peer-to-Peer I/O (P2PIO). P2PIO addresses a number of scalability problems in a general way. It provides flexible and uniform transport-independent resource discovery mechanisms to reduce both the client and network burden in multi-hop P2P systems.

  20. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  1. Peer-to-peer psychological contracts in the South African wine industry

    Directory of Open Access Journals (Sweden)

    Ruth Penfold

    2015-12-01

    Full Text Available Orientation: Very few studies examine the impact of peer relationships on the psychological contract. Research purpose: Using the backdrop of wine farm workers in the Western Cape, South Africa, the aim of our study was to explore the nature of peer relationships shaping the psychological contract. Motivation for the study: The agricultural sector of South Africa, in particular the wine farms in the Western Cape, has undergone radical change in the past decades as a result of labour legislation and changing government structures. It was therefore expected that these changes would influence the psychological contracts held by wine farm workers. Research approach, design and method: This qualitative study sampled all 24 full-time employees and 2 managers on the Constantia Hills Wine Estate in Cape Town, South Africa. Semi-structured interviews were conducted using the critical incident technique in combination with a series of open questions. Main findings: Our findings showed support for the existence of peer-to-peer psychological contracts and noted the valuable influence of a suitable conduit individual on the relationship between employees and their employer. Practical and/or managerial implications: Wine farm workers in South Africa have a strong need to be consulted after a lifetime of having no voice. In addition to ensuring suitable levels of two-way communication, management must understand the inter-peer contract and the nature of the relationships sustaining it. Contribution: Whilst literature has suggested that management of the psychological contract lies firmly within the domain of the employer, our findings indicated that ensuring harmonious peer-to-peer contracts was also central to good working relationships.

  2. Economic models for management of resources in peer-to-peer and grid computing

    Science.gov (United States)

    Buyya, Rajkumar; Stockinger, Heinz; Giddy, Jonathan; Abramson, David

    2001-07-01

    The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Enterprises (VE) for sharing resources distributed across the world. However, resource management, application development and usage models in these environments is a complex undertaking. This is due to the geographic distribution of resources that are owned by different organizations or peers. The resource owners of each of these resources have different usage or access policies and cost models, and varying loads and availability. In order to address complex resource management issues, we have proposed a computational economy framework for resource allocation and for regulating supply and demand in Grid computing environments. The framework provides mechanisms for optimizing resource provider and consumer objective functions through trading and brokering services. In a real world market, there exist various economic models for setting the price for goods based on supply-and-demand and their value to the user. They include commodity market, posted price, tenders and auctions. In this paper, we discuss the use of these models for interaction between Grid components in deciding resource value and the necessary infrastructure to realize them. In addition to normal services offered by Grid computing systems, we need an infrastructure to support interaction protocols, allocation mechanisms, currency, secure banking, and enforcement services. Furthermore, we demonstrate the usage of some of these economic models in resource brokering through Nimrod/G deadline and cost-based scheduling for two different optimization strategies on the World Wide Grid (WWG) testbed that contains peer-to-peer resources located on five continents: Asia, Australia, Europe, North America, and South America.

  3. A Liberation Health Approach to Examining Challenges and Facilitators of Peer-to-Peer Human Milk Sharing.

    Science.gov (United States)

    McCloskey, Rebecca J; Karandikar, Sharvari

    2018-04-01

    Human milk sharing between peers is a common and growing practice. Although human milk has been unequivocally established as the ideal food source for infants, much stigma surrounds the practice of human milk sharing. Furthermore, there is little research examining peer-to-peer human milk sharing. Research Aim: We used the liberation health social work model to examine the experiences of mothers who have received donated human milk from a peer. Research questions were as follows: (a) What challenges do recipient mothers experience in peer-to-peer human milk sharing? (b) What supports do recipient mothers identify in peer-to-peer human milk sharing? Researchers conducted in-depth interviews with mothers ( N = 20) in the United States and Canada who were recipients of peer-to-peer human milk sharing. Researchers independently reviewed transcripts and completed open, axial, and selective coding. The authors discussed conflicts in theme identification until agreement was reached. Challenges to peer-to-peer human milk sharing were (a) substantial effort required to secure human milk; (b) institutional barriers; (c) milk bank specific barriers; and (d) lack of societal awareness and acceptance of human milk sharing. Facilitators included (a) informed decision making and transparency and (b) support from healthcare professionals. Despite risks and barriers, participants continued to pursue peer-to-peer human milk sharing. Informed by a liberation health framework, healthcare professionals-rather than universally discouraging human milk sharing between peers-should facilitate open dialogue with parents about the pros and cons of this practice and about screening recommendations to promote safety and mitigate risk.

  4. Screening in new credit markets: can individual lenders infer borrower creditworthiness in peer-to-peer lending?

    NARCIS (Netherlands)

    Iyer, R.; Khwaja, A.I.; Luttmer, E.F.P.; Shue, K.

    2009-01-01

    The current banking crisis highlights the challenges faced in the traditional lending model, particularly in terms of screening smaller borrowers. The recent growth in online peer-to-peer lending marketplaces offers opportunities to examine different lending models that rely on screening by multiple

  5. A Novel Multimedia Streaming System for Urban Rail Environments Using Wi-Fi Peer-to-Peer Technology

    DEFF Research Database (Denmark)

    Poderys, Justas; Farooq, Jahanzeb; Soler, José

    2018-01-01

    to passenger devices using Wi-Fi Peer-to-Peer (P2P) technology. Such a multimedia distribution system can be deployed incrementally, as it can function concurrently with Wi-Fi connections already available in a number of trains. This paper presents the results obtained by emulating multimedia streaming...

  6. Partnerships Enhancing Practice: A Preliminary Model of Technology-Based Peer-to-Peer Evaluations of Teaching in Higher Education

    Science.gov (United States)

    Servilio, Kathryn L.; Hollingshead, Aleksandra; Hott, Brittany L.

    2017-01-01

    In higher education, current teaching evaluation models typically involve senior faculty evaluating junior faculty. However, there is evidence that peer-to-peer junior faculty observations and feedback may be just as effective. This descriptive case study utilized an inductive analysis to examine experiences of six special education early career…

  7. Wi-Fi Walkman : A wireless handhold that shares and recommends music on peer-to-peer networks

    NARCIS (Netherlands)

    Wang, J.; Reinders, M.J.T.; Pouwelse, J.; Lagendijk, R.L.

    2005-01-01

    The Wi-Fi walkman is a mobile multimedia application that we developed to investigate the technological and usability aspects of human-computer interaction with personalized, intelligent and context-aware wearable devices in peer-to-peer wireless environments such as the future home, office, or

  8. Peer-to-peer shadowing as a technique for the development of nurse middle managers clinical leadership : an explorative study

    NARCIS (Netherlands)

    Pieterbas Lalleman; G.A.C. Smid; J. Rasiah; J. Bouma; M.J. Schuurmans

    2017-01-01

    The purpose of this study was to explore the experiences and impact of peer-to-peer shadowing as a technique to develop nurse middle managers’ clinical leadership practices. A qualitative descriptive study was conducted to gain insight into the experiences of nurse middle managers using

  9. Effects of Script Training on the Peer-to-Peer Communication of Children with Autism Spectrum Disorder

    Science.gov (United States)

    Ledbetter-Cho, Katherine; Lang, Russell; Davenport, Katy; Moore, Melissa; Lee, Allyson; Howell, Alexandria; Drew, Christine; Dawson, Dana; Charlop, Marjorie H.; Falcomata, Terry; O'Reilly, Mark

    2015-01-01

    A multiple baseline design across participants was used to demonstrate the effects of a script-training procedure on the peer-to-peer communication of 3 children with autism spectrum disorder during group play with peers. Both scripted and unscripted initiations as well as responses to peers increased for all 3 participants. Stimulus…

  10. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    Science.gov (United States)

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  11. Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems

    Science.gov (United States)

    Anceaume, Emmanuelle; Brasileiro, Francisco; Ludinard, Romaric; Sericola, Bruno; Tronel, Frederic

    Awerbuch and Scheideler [2] have shown that peer-to-peer overlays networks can only survive Byzantine attacks if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. A prerequisite for this condition to hold is to guarantee that nodes identifiers randomness is continuously preserved. However targeted join/leave attacks may quickly endanger the relevance of such an assumption. Inducing churn has been shown to be the other fundamental ingredient to preserve randomness. Several strategies based on these principles have been proposed. Most of them are based on locally induced churn. However either they have been proven incorrect or they involve a too high level of complexity to be practically acceptable [2]. The other ones, based on globally induced churn, enforce limited lifetime for each node in the system. However, these solutions keep the system in an unnecessary hyper-activity, and thus need to impose strict restrictions on nodes joining rate which clearly limit their applicability to open systems.

  12. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Jian Dong

    2014-09-01

    Full Text Available The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen’s classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen’s model. Moreover, B-AFD has better adaptability to P2P network.

  13. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  14. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    Science.gov (United States)

    Dong, Jian; Ren, Xiao; Zuo, Decheng; Liu, Hongwei

    2014-01-01

    The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P) networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS) can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen's classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD) is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen's model. Moreover, B-AFD has better adaptability to P2P network. PMID:25198005

  15. Redundancy Maintenance and Garbage Collection Strategies in Peer-to-Peer Storage Systems

    Science.gov (United States)

    Liu, Xin; Datta, Anwitaman

    Maintaining redundancy in P2P storage systems is essential for reliability guarantees. Numerous P2P storage system maintenance algorithms have been proposed in the last years, each supposedly improving upon the previous approaches. We perform a systematic comparative study of the various strategies taking also into account the influence of different garbage collection mechanisms, an issue not studied so far. Our experiments show that while some strategies generally perform better than some others, there is no universally best strategy, and their relative superiority depends on various other design choices as well as the specific evaluation criterion. Our results can be used by P2P storage systems designers to make prudent design decisions, and our exploration of the various evaluation metrics also provides a more comprehensive framework to compare algorithms for P2P storage systems. While there are numerous network simulators specifically developed even to simulate peer-to-peer networks, there existed no P2P storage simulators - a byproduct of this work is a generic modular P2P storage system simulator which we provide as open-source. Different redundancy, maintenance, placement, garbage-collection policies, churn scenarios can be easily integrated to the simulator to try out new schemes in future, and provides a common framework to compare (future) p2p storage systems designs - something which has not been possible so far.

  16. AntBot: Anti-pollution peer-to-peer botnets

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Ha, Duc T [UNIV. AT BUFFALO

    2009-01-01

    Botnets, which are responsible for many email sparnming and DDoS (Distributed Denial of Service) attacks in the current Internet, have emerged as one of most severe cyber-threats in recent years. To evade detection and improve resistance against countermeasures, botnets have evolved from the first generation that relies on IRC chat channels to deliver commands to the current generation that uses highly resilient P2P (Peer-to-Peer) protocols to spread their C&C (Command and Control) information. It is, however, revealed that P2P botnets, although relieved from the single point of failure that IRC botnets suffer, can be easily disrupted using pollution-based mitigation schemes [15]. In this paper, we play the devil's advocate and propose a new type of hypothetical botnets called AntBot, which aim to propagate their C&C information to individual bots even though there exists an adversary that persistently pollutes keys used by seized bots to search the command information. The key idea of AntBot is a tree-like structure that bots use to deliver the command so that captured bots reveal only limited information. To evaluate effectiveness of AntBot against pollution-based mitigation in a virtual environment, we develop a distributed P2P botnet simulator. Using extensive experiments, we demonstrate that AntBot operates resiliently against pollution-based mitigation. We further present a few potential defense schemes that could effectively disrupt AntBot operations.

  17. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    Science.gov (United States)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  18. Aorta: a management layer for mobile peer-to-peer massive multiplayer games

    Science.gov (United States)

    Edlich, Stefan; Hoerning, Henrik; Brunnert, Andreas; Hoerning, Reidar

    2005-03-01

    The development of massive multiplayer games (MMPGs) for personal computers is based on a wide range of frameworks and technologies. In contrast, MMPG development for cell phones lacks the availability of framework support. We present Aorta as a multi-purpose lightweight MIDP 2.0 framework to support the transparent and equal API usage of peer-to-peer communication via http, IP and Bluetooth. Special experiments, such as load-tests on Nokia 6600s, have been carried out with Bluetooth support in using a server-as-client architecture to create ad-hoc networks by using piconet functionalities. Additionally, scatternet functionalities, which will be supported in upcoming devices, have been tested in a simulated environment on more than 12 cell phones. The core of the Aorta framework is the Etherlobby, which manages connections, peers, the game lobby, game policies and much more. The framework itself was developed to enable the fast development of mobile games, regardless of the distance between users, which might be within the schoolyard or much further away. The earliest market-ready application shown here is a multimedia game for cell phones utilizing all of the frameworks features. This game, called Micromonster, acts as platform for developer tests, as well as providing valuable information about interface usability and user acceptance.

  19. SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System

    Science.gov (United States)

    Liu, Xiao; Yuan, Dong; Zhang, Gaofeng; Chen, Jinjun; Yang, Yun

    Workflow systems are designed to support the process automation of large scale business and scientific applications. In recent years, many workflow systems have been deployed on high performance computing infrastructures such as cluster, peer-to-peer (p2p), and grid computing (Moore, 2004; Wang, Jie, & Chen, 2009; Yang, Liu, Chen, Lignier, & Jin, 2007). One of the driving forces is the increasing demand of large scale instance and data/computation intensive workflow applications (large scale workflow applications for short) which are common in both eBusiness and eScience application areas. Typical examples (will be detailed in Section 13.2.1) include such as the transaction intensive nation-wide insurance claim application process; the data and computation intensive pulsar searching process in Astrophysics. Generally speaking, instance intensive applications are those processes which need to be executed for a large number of times sequentially within a very short period or concurrently with a large number of instances (Liu, Chen, Yang, & Jin, 2008; Liu et al., 2010; Yang et al., 2008). Therefore, large scale workflow applications normally require the support of high performance computing infrastructures (e.g. advanced CPU units, large memory space and high speed network), especially when workflow activities are of data and computation intensive themselves. In the real world, to accommodate such a request, expensive computing infrastructures including such as supercomputers and data servers are bought, installed, integrated and maintained with huge cost by system users

  20. Peer to Peer Distributed Energy Trading in Smart Grids: A Survey

    Directory of Open Access Journals (Sweden)

    Juhar Abdella

    2018-06-01

    Full Text Available Due to the expansion of distributed renewable energy resources, peer to peer energy trading (P2P DET is expected to be one of the key elements of next generation power systems. P2P DET can provide various benefits such as creating a competitive energy market, reducing power outages, increasing overall efficiency of power systems and supplementing alternative sources of energy according to user preferences. Because of these promising advantages, P2P DET has attracted the attention of several researchers. Current research related to P2P DET include demand response optimization, power routing, network communication, security and privacy. This paper presents a review of the main research topics revolving around P2P DET. Particularly, we present a comprehensive survey of existing demand response optimization models, power routing devices and power routing algorithms. We also identify some key challenges faced in realizing P2P DET. Furthermore, we discuss state of the art enabling technologies such as Energy Internet, Blockchain and Software Defined Networking (SDN and we provide insights into future research directions.

  1. Le Peer to Peer: Vers un Nouveau Modèle de Civilisation

    Directory of Open Access Journals (Sweden)

    Michel Bauwens

    2006-06-01

    Full Text Available Le « peer to peer » est la dynamique intersubjective caractéristique des réseaux distribués. Le but de cet essai est de montrer qu’il s’agit d’une véritable nouvelle forme d’organisation sociale, apte à produire et échanger des biens, à créer de la valeur. Celle-ci est la conséquence d’un nouvel imaginaire social, et possède le potentiel de devenir le pilier d’un nouveau mode d’économie politique, voire d’un nouveau type de civilisation. Pour cela, nous allons d’abord définir le P2P, décrire en bref ces manifestations, et le différencier d’autres modalités d’échange intersubjectif tel que le marché, la hiérarchie, l’économie du don. Comme principale modalité P2P nous distinguons: Les processus de production P2P, comme troisième mode de production, qui n’est ni géré par un mode hiérarchique ou par l’état, ni répondant à des impératifs de profit ou qui sont modulés par le biais des prix. Les processus de gouvernance P2P, qui gouverne ces processus de production. Les formes de propriété P2P, qui sont destine a empecher l’appropriation prive de cette production pour le commun. Afin d’examiner les characteristiques de cette nouvelle dynamique sociale, nous utilisons la typologie intersubjective de l’anthropologue Alan Page Fisque, qui distingue: 1. l’échange égalitaire (Equality Matching, c..a.d l’economie du don. 2. La relation d’autorité (Authority Ranking tel qu’elle s’exprime dans le mode hierarchique. 3. le marché (Market Pricing. 4. la participation commune (Communal Shareholding. En conclusion, nous examinons les possibilites d’expansion de ce nouveau mode sociale et son insertion dans l’economie capitaliste, en nous nous posons la question: le P2P peut-il etre concu comme alternative sociale et economique aux modeles existants. Abstract: “Peer to peer” is hypothesized as a new social formation with intersubjective dynamics characteristic of distributed

  2. Peer-to-peer Cooperative Scheduling Architecture for National Grid Infrastructure

    Science.gov (United States)

    Matyska, Ludek; Ruda, Miroslav; Toth, Simon

    For some ten years, the Czech National Grid Infrastructure MetaCentrum uses a single central PBSPro installation to schedule jobs across the country. This centralized approach keeps a full track about all the clusters, providing support for jobs spanning several sites, implementation for the fair-share policy and better overall control of the grid environment. Despite a steady progress in the increased stability and resilience to intermittent very short network failures, growing number of sites and processors makes this architecture, with a single point of failure and scalability limits, obsolete. As a result, a new scheduling architecture is proposed, which relies on higher autonomy of clusters. It is based on a peer to peer network of semi-independent schedulers for each site or even cluster. Each scheduler accepts jobs for the whole infrastructure, cooperating with other schedulers on implementation of global policies like central job accounting, fair-share, or submission of jobs across several sites. The scheduling system is integrated with the Magrathea system to support scheduling of virtual clusters, including the setup of their internal network, again eventually spanning several sites. On the other hand, each scheduler is local to one of several clusters and is able to directly control and submit jobs to them even if the connection of other scheduling peers is lost. In parallel to the change of the overall architecture, the scheduling system itself is being replaced. Instead of PBSPro, chosen originally for its declared support of large scale distributed environment, the new scheduling architecture is based on the open-source Torque system. The implementation and support for the most desired properties in PBSPro and Torque are discussed and the necessary modifications to Torque to support the MetaCentrum scheduling architecture are presented, too.

  3. Peer-to-peer mentoring for individuals with early inflammatory arthritis: feasibility pilot.

    Science.gov (United States)

    Sandhu, Sharron; Veinot, Paula; Embuldeniya, Gayathri; Brooks, Sydney; Sale, Joanna; Huang, Sicong; Zhao, Alex; Richards, Dawn; Bell, Mary J

    2013-03-01

    To examine the feasibility and potential benefits of early peer support to improve the health and quality of life of individuals with early inflammatory arthritis (EIA). Feasibility study using the 2008 Medical Research Council framework as a theoretical basis. A literature review, environmental scan, and interviews with patients, families and healthcare providers guided the development of peer mentor training sessions and a peer-to-peer mentoring programme. Peer mentors were trained and paired with a mentee to receive (face-to-face or telephone) support over 12 weeks. Two academic teaching hospitals in Toronto, Ontario, Canada. Nine pairs consisting of one peer mentor and one mentee were matched based on factors such as age and work status. Mentee outcomes of disease modifying antirheumatic drugs (DMARDs)/biological treatment use, self-efficacy, self-management, health-related quality of life, anxiety, coping efficacy, social support and disease activity were measured using validated tools. Descriptive statistics and effect sizes were calculated to determine clinically important (>0.3) changes. Peer mentor self-efficacy was assessed using a self-efficacy scale. Interviews conducted with participants examined acceptability and feasibility of procedures and outcome measures, as well as perspectives on the value of peer support for individuals with EIA. Themes were identified through constant comparison. Mentees experienced improvements in the overall arthritis impact on life, coping efficacy and social support (effect size >0.3). Mentees also perceived emotional, informational, appraisal and instrumental support. Mentors also reported benefits and learnt from mentees' fortitude and self-management skills. The training was well received by mentors. Their self-efficacy increased significantly after training completion. Participants' experience of peer support was informed by the unique relationship with their peer. All participants were unequivocal about the need for

  4. RatBot: anti-enumeration peer-to-peer botnets

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Chen, Songqing [GEORGE MASON UNIV.

    2010-01-01

    Botnets have emerged as one of the most severe cyber threats in recent years. To obtain high resilience against a single point of failure, the new generation of botnets have adopted the peer-to-peer (P2P) structure. One critical question regarding these P2P botnets is: how big are they indeed? To address this question, researchers have proposed both actively crawling and passively monitoring methods to enumerate existing P2P botnets. In this work, we go further to explore the potential strategies that botnets may have to obfuscate their true sizes. Towards this end, this paper introduces RatBot, a P2P botnet that applies some statistical techniques to defeat existing P2P botnet enumeration methods. The key ideas of RatBot are two-fold: (1) there exist a fraction of bots that are indistinguishable from their fake identities, which are spoofing IP addresses they use to hide themselves; (2) we use a heavy-tailed distribution to generate the number of fake identities for each of these bots so that the sum of observed fake identities converges only slowly and thus has high variation. We use large-scale high-fidelity simulation to quantify the estimation errors under diverse settings, and the results show that a naive enumeration technique can overestimate the sizes of P2P botnets by one order of magnitude. We believe that our work reveals new challenges of accurately estimating the sizes of P2P botnets, and hope that it will raise the awareness of security practitioners with these challenges. We further suggest a few countermeasures that can potentially defeat RatBot's anti-enumeration scheme.

  5. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  6. Peer-to-peer shadowing as a technique for the development of nurse middle managers clinical leadership.

    Science.gov (United States)

    Lalleman, Pieterbas; Bouma, Joanne; Smid, Gerhard; Rasiah, Jananee; Schuurmans, Marieke

    2017-10-02

    Purpose The purpose of this study was to explore the experiences and impact of peer-to-peer shadowing as a technique to develop nurse middle managers' clinical leadership practices. Design/methodology/approach A qualitative descriptive study was conducted to gain insight into the experiences of nurse middle managers using semi-structured interviews. Data were analysed into codes using constant comparison and similar codes were grouped under sub-themes and then into four broader themes. Findings Peer-to-peer shadowing facilitates collective reflection-in-action and enhances an "investigate stance" while acting. Nurse middle managers begin to curb the caring disposition that unreflectively urges them to act, to answer the call for help in the here and now, focus on ad hoc "doings", and make quick judgements. Seeing a shadowee act produces, via a process of social comparison, a behavioural repertoire of postponing reactions and refraining from judging. Balancing the act of stepping in and doing something or just observing as well as giving or withholding feedback are important practices that are difficult to develop. Originality/value Peer-to-peer shadowing facilitates curbing the caring disposition, which is essential for clinical leadership development through unlocking a behavioural repertoire that is not easy to reveal because it is, unreflectively, closely knit to the professional background of the nurse managers. Unlike most leadership development programmes, that are quite introspective and detached from context, peer-to-peer shadowing does have the potential to promote collective learning while acting, which is an important process.

  7. Beyond Music Sharing: An Evaluation of Peer-to-Peer Data Dissemination Techniques in Large Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Ripeanu, Matei [University of British Columbia, Vancouver; Al-Kiswany, Samer [University of British Columbia, Vancouver; Iamnitchi, Adriana [University of South Florida, Tampa; Vazhkudai, Sudharshan S [ORNL

    2009-03-01

    The avalanche of data from scientific instruments and the ensuing interest from geographically distributed users to analyze and interpret it accentuates the need for efficient data dissemination. A suitable data distribution scheme will find the delicate balance between conflicting requirements of minimizing transfer times, minimizing the impact on the network, and uniformly distributing load among participants. We identify several data distribution techniques, some successfully employed by today's peer-to-peer networks: staging, data partitioning, orthogonal bandwidth exploitation, and combinations of the above. We use simulations to explore the performance of these techniques in contexts similar to those used by today's data-centric scientific collaborations and derive several recommendations for efficient data dissemination. Our experimental results show that the peer-to-peer solutions that offer load balancing and good fault tolerance properties and have embedded participation incentives lead to unjustified costs in today's scientific data collaborations deployed on over-provisioned network cores. However, as user communities grow and these deployments scale, peer-to-peer data delivery mechanisms will likely outperform other techniques.

  8. Care pathways in thrombosis management: the INNOVATE peer-to-peer educational initiative

    Directory of Open Access Journals (Sweden)

    Patel RK

    2017-03-01

    Full Text Available Raj K Patel King’s College Hospital, London, UK Context: Anticoagulant options for the management of venous thromboembolism (VTE now include the non-vitamin K antagonist oral anticoagulants (NOACs. The safe and effective integration of these agents into routine clinical practice within different health care settings presents common challenges. Bayer AG created the INternational Network fOr Venous and Arterial Thrombosis Excellence in practice (INNOVATE program as a professional education network to foster best practice in thrombosis management in the NOAC era.Concept and format: Since 2013, INNOVATE has been run as a series of educational 1.5‑day global meetings at VTE centers of excellence. The format is based on expert-led discussion rather than lectures; all participants are encouraged to share their own expertise and experience. Through peer-to-peer exchange, less experienced professionals from an array of specialties learn from others in a small-group interactive setting. This format encourages positive engagement and discussion, and the establishment of relationships between health care professionals from different countries.Expansion and localization: INNOVATE has successfully expanded to cover a broad spectrum of thromboembolic disorders in which anticoagulation with NOACs plays an important role; now including specific meetings focusing on the management of patients in the community. Local meetings are run in many countries in the local language, facilitating discussion and ensuring applicability to local or regional issues.Implementing learnings: INNOVATE delegates have provided consistently positive feedback and have used their attendance to create and improve thrombosis management pathways in their own institutions. Overseen by a Steering Committee, the program responds to feedback, evolving to meet the needs of participants.Conclusion: By showcasing best practice in the care of patients requiring anticoagulation, INNOVATE

  9. Le Peer to Peer: Vers un Nouveau Modèle de Civilization

    Directory of Open Access Journals (Sweden)

    Michel Bauwens

    2006-06-01

    Full Text Available Le « peer to peer » est la dynamique intersubjective caractéristique des réseaux distribués. Le but de cet essai est de montrer qu'il s'agit d'une véritable nouvelle forme d’organisation sociale, apte à produire et échanger des biens, à créer de la valeur. Celle-ci est la conséquence d'un nouvel imaginaire social, et possède le potentiel de devenir le pilier d'un nouveau mode d'économie politique, voire d'un nouveau type de civilisation. Pour cela, nous allons d'abord définir le P2P, décrire en bref ces manifestations, et le différencier d'autres modalités d'échange intersubjectif tel que le marché, la hiérarchie, l'économie du don.Comme principale modalité P2P nous distinguons: Les processus de production P2P, comme troisième mode de production, qui n'est ni géré par un mode hiérarchique ou par l'état, ni répondant à des impératifs de profit ou qui sont modulés par le biais des prix. Les processus de gouvernance P2P, qui gouverne ces processus de production. Les formes de propriété P2P, qui sont destine a empecher l’appropriation prive de cette production pour le commun.Afin d’examiner les characteristiques de cette nouvelle dynamique sociale, nous utilisons la typologie intersubjective de l’anthropologue Alan Page Fisque, qui distingue: 1. l'échange égalitaire (Equality Matching, c..a.d l’economie du don. 2. La relation d’autorité (Authority Ranking tel qu’elle s’exprime dans le mode hierarchique. 3. le marché (Market Pricing. 4. la participation commune (Communal Shareholding.En conclusion, nous examinons les possibilites d’expansion de ce nouveau mode sociale et son insertion dans l’economie capitaliste, en nous nous posons la question: le P2P peut-il etre concu comme alternative sociale et economique aux modeles existants.

  10. Peer-to-peer mentoring for individuals with early inflammatory arthritis: feasibility pilot

    Science.gov (United States)

    Sandhu, Sharron; Veinot, Paula; Embuldeniya, Gayathri; Brooks, Sydney; Sale, Joanna; Huang, Sicong; Zhao, Alex; Richards, Dawn; Bell, Mary J

    2013-01-01

    Objectives To examine the feasibility and potential benefits of early peer support to improve the health and quality of life of individuals with early inflammatory arthritis (EIA). Design Feasibility study using the 2008 Medical Research Council framework as a theoretical basis. A literature review, environmental scan, and interviews with patients, families and healthcare providers guided the development of peer mentor training sessions and a peer-to-peer mentoring programme. Peer mentors were trained and paired with a mentee to receive (face-to-face or telephone) support over 12 weeks. Setting Two academic teaching hospitals in Toronto, Ontario, Canada. Participants Nine pairs consisting of one peer mentor and one mentee were matched based on factors such as age and work status. Primary outcome measure Mentee outcomes of disease modifying antirheumatic drugs (DMARDs)/biological treatment use, self-efficacy, self-management, health-related quality of life, anxiety, coping efficacy, social support and disease activity were measured using validated tools. Descriptive statistics and effect sizes were calculated to determine clinically important (>0.3) changes. Peer mentor self-efficacy was assessed using a self-efficacy scale. Interviews conducted with participants examined acceptability and feasibility of procedures and outcome measures, as well as perspectives on the value of peer support for individuals with EIA. Themes were identified through constant comparison. Results Mentees experienced improvements in the overall arthritis impact on life, coping efficacy and social support (effect size >0.3). Mentees also perceived emotional, informational, appraisal and instrumental support. Mentors also reported benefits and learnt from mentees’ fortitude and self-management skills. The training was well received by mentors. Their self-efficacy increased significantly after training completion. Participants’ experience of peer support was informed by the unique

  11. Peer-to-Peer JXTA Architecture for Continuing Mobile Medical Education Incorporated in Rural Public Health Centers.

    Science.gov (United States)

    Rajasekaran, Rajkumar; Iyengar, Nallani Chackravatula Sriman Narayana

    2013-04-01

    Mobile technology helps to improve continuing medical education; this includes all aspects of public health care as well as keeping one's knowledge up-to-date. The program of continuing medical and health education is intertwined with mobile health technology, which forms an imperative component of national strategies in health. Continuing mobile medical education (CMME) programs are designed to ensure that all medical and health-care professionals stay up-to-date with the knowledge required through mobile JXTA to appraise modernized strategies so as to achieve national goals of health-care information distribution. In this study, a 20-item questionnaire was distributed to 280 health professionals practicing traditional training learning methodologies (180 nurses, 60 doctors, and 40 health inspectors) in 25 rural hospitals. Among the 83% respondents, 56% are eager to take new learning methodologies as part of their evaluation, which is considered for promotion to higher grades, increments, or as part of their work-related activities. The proposed model was executed in five public health centers in which nurses and health inspectors registered in the JXTA network were referred to the record peer group by administrators. A mobile training program on immunization was conducted through the ADVT, with the lectures delivered on their mobiles. Credits are given after taking the course and completing an evaluation test. The system is faster compared with traditional learning. Medical knowledge management and mobile-streaming application support the CMME system through JXTA. The mobile system includes online lectures and practice quizzes, as well as assignments and interactions with health professionals. Evaluation and assessments are done online and credits certificates are provided based on the score the student obtains. The acceptance of mobile JXTA peer-to-peer learning has created a drastic change in learning methods among rural health professionals. The professionals

  12. Peer-to-Peer Consultations: Ancillary Services Peer Exchange with India: Experience from South Africa, Europe & the United States (Fact Sheet)

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-01

    In support of national and subnational decision makers, the 21st Century Power Partnership regularly works with country partners to organize peer-to-peer consultations on critical issues. In March 2014, 21CPP collaborated with the Regulatory Assistance Project - India to host two peer-to-peer exchanges among experts from India, South Africa, Europe, and the United States to discuss the provision of ancillary services, particularly in the context of added variability and uncertainty from renewable energy. This factsheet provides a high level summary of the peer-to-peer consultation.

  13. A Peer-to-Peer Support Model for Developing Graduate Students' Career and Employability Skills

    Science.gov (United States)

    Jones, Narelle; Torezani, Silvia; Luca, Joseph

    2012-01-01

    Career opportunities for Australian research graduates have expanded in recent years into areas outside academia. However, the employment market is highly competitive, and Australian universities have recognised the need to produce graduates with transferable skills across all sectors, not just academia. The need to provide an infrastructure to…

  14. Peer To Peer-utlåning i Sverige : En komparativ studie mellan bankutlåning och Peer To Peer-utlåning på den svenska konsumentkreditmarknaden

    OpenAIRE

    Edman, Lars; Kaltea, Kristofer

    2015-01-01

    Background: Peer to peer lending has in recent years emerged and become a popular way to borrow money, mostly in the US and the UK. Since the first company was established in 2005, several competitors have emerged, and P2P lending has grown on average by 84 % quarterly between the second quarter year 2007 and the second quarter year 2014 in the US. Lending Club, which is the largest player within P2P-lending, has since its start in 2008 carried loans of a total value of six billions USD. Aim:...

  15. Autenticación de contenidos y control de acceso en redes peer-to-peer puras

    OpenAIRE

    Palomar González, Esther

    2011-01-01

    Esta tesis doctoral se enmarca dentro del área de investigación de la seguridad en entornos Peer-to-Peer (P2P) totalmente descentralizados (también denominados puros.) En particular, el objetivo principal de esta tesis doctoral es definir, analizar e implementar un esquema para la distribución segura de los contenidos compartidos. En este trabajo de tesis se han realizado importantes avances e innovadoras aportaciones enfocadas a garantizar que el contenido compartido es auténtico; es decir, ...

  16. Beauty premium: Event-related potentials evidence of how physical attractiveness matters in online peer-to-peer lending.

    Science.gov (United States)

    Jin, Jia; Fan, Bonai; Dai, Shenyi; Ma, Qingguo

    2017-02-15

    Although it is well known that attractiveness-based impressions affect the labor market, election outcomes and many other social activities, little is known about the role physical attractiveness plays in financial transactions. With the development of online finance, peer-to-peer lending has become one of the most important ways in which businesses or individuals raise capital. However, because of information asymmetry, the lender must decide whether or not to lend money to a stranger based on limited information, resulting in their decision being influenced by many other factors. In the current study, we investigated how potential borrowers' facial attractiveness influenced lenders' attitudes toward borrowers' repayment behavior at the brain level by using event-related potentials. At the priming stage, photos of attractive borrowers induced smaller N200 amplitude than photos of unattractive borrowers. Meanwhile, at the feedback stage, compared with the condition of repaying on time, breach of repayment from unattractive borrowers induced larger feedback-related negativity (FRN) amplitude, which was a frontal-central negative deflection and would be enhanced by the unexpected outcome. Furthermore, smaller P300 amplitude was also elicited by the condition of not repaying on time. These differences in the FRN and P300 amplitudes were not observed between negative and positive feedback from attractive borrowers. Therefore, our findings suggest that the beauty premium phenomenon is present in online peer-to-peer lending and that lenders were more tolerant toward attractive borrowers' dishonest behavior. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. An agent-based peer-to-peer architecture for semantic discovery of manufacturing services across virtual enterprises

    Science.gov (United States)

    Zhang, Wenyu; Zhang, Shuai; Cai, Ming; Jian, Wu

    2015-04-01

    With the development of virtual enterprise (VE) paradigm, the usage of serviceoriented architecture (SOA) is increasingly being considered for facilitating the integration and utilisation of distributed manufacturing resources. However, due to the heterogeneous nature among VEs, the dynamic nature of a VE and the autonomous nature of each VE member, the lack of both sophisticated coordination mechanism in the popular centralised infrastructure and semantic expressivity in the existing SOA standards make the current centralised, syntactic service discovery method undesirable. This motivates the proposed agent-based peer-to-peer (P2P) architecture for semantic discovery of manufacturing services across VEs. Multi-agent technology provides autonomous and flexible problemsolving capabilities in dynamic and adaptive VE environments. Peer-to-peer overlay provides highly scalable coupling across decentralised VEs, each of which exhibiting as a peer composed of multiple agents dealing with manufacturing services. The proposed architecture utilises a novel, efficient, two-stage search strategy - semantic peer discovery and semantic service discovery - to handle the complex searches of manufacturing services across VEs through fast peer filtering. The operation and experimental evaluation of the prototype system are presented to validate the implementation of the proposed approach.

  18. Online Peer-to-Peer Communities in the Daily Lives of People With Chronic Illness: A Qualitative Systematic Review.

    Science.gov (United States)

    Kingod, Natasja; Cleal, Bryan; Wahlberg, Ayo; Husted, Gitte R

    2017-01-01

    This qualitative systematic review investigated how individuals with chronic illness experience online peer-to-peer support and how their experiences influence daily life with illness. Selected studies were appraised by quality criteria focused upon research questions and study design, participant selection, methods of data collection, and methods of analysis. Four themes were identified: (a) illness-associated identity work, (b) social support and connectivity, (c) experiential knowledge sharing, and (d) collective voice and mobilization. Findings indicate that online peer-to-peer communities provide a supportive space for daily self-care related to chronic illness. Online communities provided a valued space to strengthen social ties and exchange knowledge that supported offline ties and patient-doctor relationships. Individuals used online communities to exchange experiential knowledge about everyday life with illness. This type of knowledge was perceived as extending far beyond medical care. Online communities were also used to mobilize and raise collective awareness about illness-specific concerns. © The Author(s) 2016.

  19. Adult Willingness to Use Email and Social Media for Peer-to-Peer Cancer Screening Communication: Quantitative Interview Study.

    Science.gov (United States)

    Cutrona, Sarah L; Roblin, Douglas W; Wagner, Joann L; Gaglio, Bridget; Williams, Andrew E; Torres Stone, Rosalie; Field, Terry S; Mazor, Kathleen M

    2013-11-28

    Adults over age 40 are increasing their use of email and social media, raising interest in use of peer-to-peer Internet-based messaging to promote cancer screening. The objective of our study was to assess current practices and attitudes toward use of email and other e-communication for peer-to-peer dialogues on cancer screening. We conducted in-person interviews with 438 insured adults ages 42-73 in Georgia, Hawaii, and Massachusetts. Participants reported on use of email and other e-communication including social media to discuss with peers routine health topics including breast and colorectal cancer (CRC). We ascertained willingness to share personal CRC screening experiences via conversation, postcard, email, or other e-communication. Health literacy scores were measured. Email had been used by one-third (33.8%, 148/438) to discuss routine health topics, by 14.6% (64/438) to discuss breast cancer screening, and by 12.6% (55/438) to discuss CRC screening. Other e-communication was used to discuss routine health topics (11.6%, 51/438), screening for breast cancer (3.9%, 17/438), and CRC (2.3%, 10/438). In the preceding week, 84.5% (370/438) of participants had used email, 55.9% (245/438) had used e-communication of some type; 44.3% (194/438) text, 32.9% (144/438) Facebook, 12.3% (54/438) instant message, 7.1% (31/438) video chat, and 4.8% (21/438) Twitter. Many participants were willing to share their CRC screening experiences via email (32.4%, 142/438 might be willing; 36.3%, 159/438 very willing) and via other e-communication (15.8%, 69/438 might be willing; 14.4%, 63/438 very willing). Individuals willing to send CRC screening emails scored significantly higher on tests of health literacy compared to those willing to send only postcards (Pcommunication to promote cancer screening to peers. Optimal approaches for encouraging peer-to-peer transmission of accurate and appropriate cancer screening messages must be studied.

  20. Using peer-to-peer energy-trading platforms to incentivize prosumers to form federated power plants

    Science.gov (United States)

    Morstyn, Thomas; Farrell, Niall; Darby, Sarah J.; McCulloch, Malcolm D.

    2018-02-01

    Power networks are undergoing a fundamental transition, with traditionally passive consumers becoming `prosumers' — proactive consumers with distributed energy resources, actively managing their consumption, production and storage of energy. A key question that remains unresolved is: how can we incentivize coordination between vast numbers of distributed energy resources, each with different owners and characteristics? Virtual power plants and peer-to-peer (P2P) energy trading offer different sources of value to prosumers and the power network, and have been proposed as different potential structures for future prosumer electricity markets. In this Perspective, we argue they can be combined to capture the benefits of both. We thus propose the concept of the federated power plant, a virtual power plant formed through P2P transactions between self-organizing prosumers. This addresses social, institutional and economic issues faced by top-down strategies for coordinating virtual power plants, while unlocking additional value for P2P energy trading.

  1. Delay-sensitive content distribution via peer-to-peer collaboration in public safety vehicular ad-hoc networks

    KAUST Repository

    Atat, Rachad; Yaacoub, Elias E.; Alouini, Mohamed-Slim; Filali, Fethi; Abu-Dayya, Adnan A.

    2014-01-01

    Delay-sensitive content distribution with peer-to-peer (P2P) cooperation in public safety vehicular networks is investigated. Two cooperative schemes are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range (LR) communications with the base station (BS) and IEEE 802.11p is considered for inter-vehicle collaboration on the short range (SR). The first scheme is shown to outperform non-cooperative unicasting and multicasting, while the second scheme outperforms non-cooperative unicasting beyond a specific number of cooperating vehicles, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2014 Elsevier B.V. All rights reserved.

  2. Delay-sensitive content distribution via peer-to-peer collaboration in public safety vehicular ad-hoc networks

    KAUST Repository

    Atat, Rachad

    2014-05-01

    Delay-sensitive content distribution with peer-to-peer (P2P) cooperation in public safety vehicular networks is investigated. Two cooperative schemes are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range (LR) communications with the base station (BS) and IEEE 802.11p is considered for inter-vehicle collaboration on the short range (SR). The first scheme is shown to outperform non-cooperative unicasting and multicasting, while the second scheme outperforms non-cooperative unicasting beyond a specific number of cooperating vehicles, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2014 Elsevier B.V. All rights reserved.

  3. An Online, Moderated Peer-to-Peer Support Bulletin Board for Depression: User-Perceived Advantages and Disadvantages.

    Science.gov (United States)

    Griffiths, Kathleen Margaret; Reynolds, Julia; Vassallo, Sara

    2015-01-01

    Online, peer-to-peer support groups for depression are common on the World Wide Web and there is some evidence of their effectiveness. However, little is known about the mechanisms by which Internet support groups (ISGs) might work. This study aimed to investigate consumer perceptions of the benefits and disadvantages of online peer-to-peer support by undertaking a content analysis of the spontaneous posts on BlueBoard, a well-established, moderated, online depression bulletin board. The research set comprised all posts on the board (n=3645) for each of 3 months selected at 4 monthly intervals over 2011. The data were analyzed using content analysis and multiple coders. A total of 586 relevant posts were identified, 453 (77.3%) reporting advantages and 133 (22.7%) reporting disadvantages. Positive personal change (335/453, 74.0%) and valued social interactions and support (296/453, 65.3%) emerged as perceived advantages. Other identified benefits were valued opportunities to disclose/express feelings or views (29/453, 6.4%) and advantages of the BlueBoard environment (45/453, 9.9%). Disadvantages were negative personal change (50/133, 37.6%), perceived disadvantages of board rules/moderation (42/133, 31.6%), unhelpful social interactions/contact with other members (40/133, 30.1%), and technical obstacles to using the board (14/133, 10.5%). Consumers value the opportunity to participate in an online mutual support group for mental health concerns. Further research is required to better understand how and if these perceived advantages translate into positive outcomes for consumers, and whether the perceived disadvantages of such boards can be addressed without compromising the safety and positive outcomes of the board.

  4. Problem-based, peer-to-peer global mental health e-learning between the UK and Somaliland: a pilot study.

    Science.gov (United States)

    Murphy, Roberta; Clissold, Elliot; Keynejad, Roxanne C

    2017-11-01

    WHO's mental health gap action programme intervention guide (mhGAP-IG) is an evidence-based tool aimed at front-line health workers in low-income and middle-income countries (LMICs). Its potential to improve global mental health education, especially through digital technologies, has been little studied. Problem-based learning (PBL) is usually conducted face-to-face, but its remote application could facilitate cross-cultural education. To evaluate PBL, applied to peer-to-peer global mental health e-learning (Aqoon), using mhGAP-IG. Twelve pairs of UK and Somaliland medical students completed the full programme. Participants self-directedly met online, via the low-bandwidth Medicine Africa website, for PBL-style tutorials focused on modules of the mhGAP-IG, V.2.0. Preparticipation and postparticipation surveys used mixed methods to evaluate Aqoon, including the Attitudes Toward Psychiatry (ATP-30) instrument. Median ATP-30 scores for Somaliland (82.0 vs 95.0, p=0.003) and UK students (82.0 vs 95.0, p = 0.011) improved significantly following Aqoon. Qualitative feedback showed that participants valued peer connectivity and learning about cultural and psychosocial differences in their partner's country. Somaliland students were motivated by clinical learning and UK students by global health education. Feedback on the PBL structure was positive. Digital PBL represents an innovative method to extend the benefits of mhGAP-IG beyond front-line clinical staff, to healthcare students in LMICs. Educational resource limitations in LMICs may be overcome using digital platforms and PBL. Replication with non-medical healthcare students is the next step for this model to explore Aqoon's relevance to pressing global mental health workforce challenges. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  5. Challenges to Participation in the Sharing Economy: The Case of Local Online Peer-to-Peer Exchange in a Single Parents’ Network

    Directory of Open Access Journals (Sweden)

    Airi Lampinen

    2015-05-01

    Full Text Available This paper depicts an initiative to deploy an online peer-to-peer exchange system for a community network of single parents – a group of people in need of goods, services, and social support in their local neighborhoods. We apply participant observation and semi-structured interviews to uncover key issues that can hinder the emergence of sharing practices in local community networks of this type. Our study illustrates how pressures related to single parenthood can impede opportunities to engage in peer-to-peer exchange, even when community members view the social and material benefits of participation as desirable and necessary. This complicates the prevalent narrative that local peer-to-peer exchange systems are an accessible and convenient alternative to traditional markets. Moreover, we discuss our collaboration with the community as well as the developers of the sharing platform, highlighting the challenges of user-centered design in the sharing economy.

  6. Peer-to-Peer Teaching in Higher Education: A Critical Literature Review

    Science.gov (United States)

    Stigmar, Martin

    2016-01-01

    The aim of my critical literature review is to identify studies where students are engaged as partners in teaching in higher education and to analyze how tutors and tutees benefit from peer teaching. Thirty studies were included for review. Thirteen countries are represented and two thirds of the studies conducted in the United States of America…

  7. MO-E-18C-01: Open Access Web-Based Peer-To-Peer Training and Education in Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Pawlicki, T [UC San Diego Medical Center, La Jolla, CA (United States); Brown, D; Dunscombe, P [Tom Baker Cancer Centre, Calgary, AB (Canada); Mutic, S [Washington University School of Medicine, Saint Louis, MO (United States)

    2014-06-15

    Purpose: Current training and education delivery models have limitations which result in gaps in clinical proficiency with equipment, procedures, and techniques. Educational and training opportunities offered by vendors and professional societies are by their nature not available at point of need or for the life of clinical systems. The objective of this work is to leverage modern communications technology to provide peer-to-peer training and education for radiotherapy professionals, in the clinic and on demand, as they undertake their clinical duties. Methods: We have developed a free of charge web site ( https://i.treatsafely.org ) using the Google App Engine and datastore (NDB, GQL), Python with AJAX-RPC, and Javascript. The site is a radiotherapy-specific hosting service to which user-created videos illustrating clinical or physics processes and other relevant educational material can be uploaded. Efficient navigation to the material of interest is provided through several RT specific search tools and videos can be scored by users, thus providing comprehensive peer review of the site content. The site also supports multilingual narration\\translation of videos, a quiz function for competence assessment and a library function allowing groups or institutions to define their standard operating procedures based on the video content. Results: The website went live in August 2013 and currently has over 680 registered users from 55 countries; 27.2% from the United States, 9.8% from India, 8.3% from the United Kingdom, 7.3% from Brazil, and 47.5% from other countries. The users include physicists (57.4%), Oncologists (12.5%), therapists (8.2%) and dosimetrists (4.8%). There are 75 videos to date including English, Portuguese, Mandarin, and Thai. Conclusion: Based on the initial acceptance of the site, we conclude that this open access web-based peer-to-peer tool is fulfilling an important need in radiotherapy training and education. Site functionality should expand in

  8. MO-E-18C-01: Open Access Web-Based Peer-To-Peer Training and Education in Radiotherapy

    International Nuclear Information System (INIS)

    Pawlicki, T; Brown, D; Dunscombe, P; Mutic, S

    2014-01-01

    Purpose: Current training and education delivery models have limitations which result in gaps in clinical proficiency with equipment, procedures, and techniques. Educational and training opportunities offered by vendors and professional societies are by their nature not available at point of need or for the life of clinical systems. The objective of this work is to leverage modern communications technology to provide peer-to-peer training and education for radiotherapy professionals, in the clinic and on demand, as they undertake their clinical duties. Methods: We have developed a free of charge web site ( https://i.treatsafely.org ) using the Google App Engine and datastore (NDB, GQL), Python with AJAX-RPC, and Javascript. The site is a radiotherapy-specific hosting service to which user-created videos illustrating clinical or physics processes and other relevant educational material can be uploaded. Efficient navigation to the material of interest is provided through several RT specific search tools and videos can be scored by users, thus providing comprehensive peer review of the site content. The site also supports multilingual narration\\translation of videos, a quiz function for competence assessment and a library function allowing groups or institutions to define their standard operating procedures based on the video content. Results: The website went live in August 2013 and currently has over 680 registered users from 55 countries; 27.2% from the United States, 9.8% from India, 8.3% from the United Kingdom, 7.3% from Brazil, and 47.5% from other countries. The users include physicists (57.4%), Oncologists (12.5%), therapists (8.2%) and dosimetrists (4.8%). There are 75 videos to date including English, Portuguese, Mandarin, and Thai. Conclusion: Based on the initial acceptance of the site, we conclude that this open access web-based peer-to-peer tool is fulfilling an important need in radiotherapy training and education. Site functionality should expand in

  9. Cyberbullying or Cyber Aggression?: A Review of Existing Definitions of Cyber-Based Peer-to-Peer Aggression

    Directory of Open Access Journals (Sweden)

    Lucie Corcoran

    2015-03-01

    Full Text Available Due to the ongoing debate regarding the definitions and measurement of cyberbullying, the present article critically appraises the existing literature and offers direction regarding the question of how best to conceptualise peer-to-peer abuse in a cyber context. Variations across definitions are problematic as it has been argued that inconsistencies with regard to definitions result in researchers examining different phenomena, whilst the absence of an agreed conceptualisation of the behaviour(s involved hinders the development of reliable and valid measures. Existing definitions of cyberbullying often incorporate the criteria of traditional bullying such as intent to harm, repetition, and imbalance of power. However, due to the unique nature of cyber-based communication, it can be difficult to identify such criteria in relation to cyber-based abuse. Thus, for these reasons cyberbullying may not be the most appropriate term. Rather than attempting to “shoe-horn” this abusive behaviour into the preconceived conceptual framework that provides an understanding of traditional bullying, it is timely to take an alternative approach. We argue that it is now time to turn our attention to the broader issue of cyber aggression, rather than persist with the narrow focus that is cyberbullying.

  10. A Peer-to-Peer Mentoring Program for In-Center Hemodialysis: A Patient-Centered Quality Improvement Program.

    Science.gov (United States)

    St Clair Russell, Jennifer; Southerland, Shiree; Huff, Edwin D; Thomson, Maria; Meyer, Klemens B; Lynch, Janet R

    2017-01-01

    A patient-centered quality improvement program implemented in one Virginia hemodialysis facility sought to determine if peer-to-peer (P2P) programs can assist patients on in-center hemodialysis with self-management and improve outcomes. Using a single-arm, repeatedmeasurement, quasi-experimental design, 46 patients participated in a four-month P2P intervention. Outcomes include knowledge, self-management behaviors, and psychosocial health indicators: self-efficacy, perceived social support, hemodialysis social support, and healthrelated quality of life (HRQoL). Physiological health indicators included missed and shortened treatments, arteriovenous fistula placement, interdialytic weight gain, serum phosphorus, and hospitalizations. Mentees demonstrated increased knowledge, self-efficacy, perceived social support, hemodialysis social support, and HRQoL. Missed treatments decreased. Mentors experienced increases in knowledge, self-management, and social support. A P2P mentoring program for in-center hemodialysis can benefit both mentees and mentors. Copyright© by the American Nephrology Nurses Association.

  11. Exploring a QoS Driven Scheduling Approach for Peer-to-Peer Live Streaming Systems with Network Coding

    Science.gov (United States)

    Cui, Laizhong; Lu, Nan; Chen, Fu

    2014-01-01

    Most large-scale peer-to-peer (P2P) live streaming systems use mesh to organize peers and leverage pull scheduling to transmit packets for providing robustness in dynamic environment. The pull scheduling brings large packet delay. Network coding makes the push scheduling feasible in mesh P2P live streaming and improves the efficiency. However, it may also introduce some extra delays and coding computational overhead. To improve the packet delay, streaming quality, and coding overhead, in this paper are as follows. we propose a QoS driven push scheduling approach. The main contributions of this paper are: (i) We introduce a new network coding method to increase the content diversity and reduce the complexity of scheduling; (ii) we formulate the push scheduling as an optimization problem and transform it to a min-cost flow problem for solving it in polynomial time; (iii) we propose a push scheduling algorithm to reduce the coding overhead and do extensive experiments to validate the effectiveness of our approach. Compared with previous approaches, the simulation results demonstrate that packet delay, continuity index, and coding ratio of our system can be significantly improved, especially in dynamic environments. PMID:25114968

  12. State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System

    Directory of Open Access Journals (Sweden)

    Olamide Jogunola

    2017-12-01

    Full Text Available Transaction-based energy (TE management and control has become an increasingly relevant topic, attracting considerable attention from industry and the research community alike. As a result, new techniques are emerging for its development and actualization. This paper presents a comprehensive review of TE involving peer-to-peer (P2P energy trading and also covering the concept, enabling technologies, frameworks, active research efforts and the prospects of TE. The formulation of a common approach for TE management modelling is challenging given the diversity of circumstances of prosumers in terms of capacity, profiles and objectives. This has resulted in divergent opinions in the literature. The idea of this paper is therefore to explore these viewpoints and provide some perspectives on this burgeoning topic on P2P TE systems. This study identified that most of the techniques in the literature exclusively formulate energy trade problems as a game, an optimization problem or a variational inequality problem. It was also observed that none of the existing works has considered a unified messaging framework. This is a potential area for further investigation.

  13. Multimethod evaluation of the VA's peer-to-peer Toolkit for patient-centered medical home implementation.

    Science.gov (United States)

    Luck, Jeff; Bowman, Candice; York, Laura; Midboe, Amanda; Taylor, Thomas; Gale, Randall; Asch, Steven

    2014-07-01

    Effective implementation of the patient-centered medical home (PCMH) in primary care practices requires training and other resources, such as online toolkits, to share strategies and materials. The Veterans Health Administration (VA) developed an online Toolkit of user-sourced tools to support teams implementing its Patient Aligned Care Team (PACT) medical home model. To present findings from an evaluation of the PACT Toolkit, including use, variation across facilities, effect of social marketing, and factors influencing use. The Toolkit is an online repository of ready-to-use tools created by VA clinic staff that physicians, nurses, and other team members may share, download, and adopt in order to more effectively implement PCMH principles and improve local performance on VA metrics. Multimethod evaluation using: (1) website usage analytics, (2) an online survey of the PACT community of practice's use of the Toolkit, and (3) key informant interviews. Survey respondents were PACT team members and coaches (n = 544) at 136 VA facilities. Interview respondents were Toolkit users and non-users (n = 32). For survey data, multivariable logistic models were used to predict Toolkit awareness and use. Interviews and open-text survey comments were coded using a "common themes" framework. The Consolidated Framework for Implementation Research (CFIR) guided data collection and analyses. The Toolkit was used by 6,745 staff in the first 19 months of availability. Among members of the target audience, 80 % had heard of the Toolkit, and of those, 70 % had visited the website. Tools had been implemented at 65 % of facilities. Qualitative findings revealed a range of user perspectives from enthusiastic support to lack of sufficient time to browse the Toolkit. An online Toolkit to support PCMH implementation was used at VA facilities nationwide. Other complex health care organizations may benefit from adopting similar online peer-to-peer resource libraries.

  14. MATIN: a random network coding based framework for high quality peer-to-peer live video streaming.

    Science.gov (United States)

    Barekatain, Behrang; Khezrimotlagh, Dariush; Aizaini Maarof, Mohd; Ghaeini, Hamid Reza; Salleh, Shaharuddin; Quintana, Alfonso Ariza; Akbari, Behzad; Cabrera, Alicia Triviño

    2013-01-01

    In recent years, Random Network Coding (RNC) has emerged as a promising solution for efficient Peer-to-Peer (P2P) video multicasting over the Internet. This probably refers to this fact that RNC noticeably increases the error resiliency and throughput of the network. However, high transmission overhead arising from sending large coefficients vector as header has been the most important challenge of the RNC. Moreover, due to employing the Gauss-Jordan elimination method, considerable computational complexity can be imposed on peers in decoding the encoded blocks and checking linear dependency among the coefficients vectors. In order to address these challenges, this study introduces MATIN which is a random network coding based framework for efficient P2P video streaming. The MATIN includes a novel coefficients matrix generation method so that there is no linear dependency in the generated coefficients matrix. Using the proposed framework, each peer encapsulates one instead of n coefficients entries into the generated encoded packet which results in very low transmission overhead. It is also possible to obtain the inverted coefficients matrix using a bit number of simple arithmetic operations. In this regard, peers sustain very low computational complexities. As a result, the MATIN permits random network coding to be more efficient in P2P video streaming systems. The results obtained from simulation using OMNET++ show that it substantially outperforms the RNC which uses the Gauss-Jordan elimination method by providing better video quality on peers in terms of the four important performance metrics including video distortion, dependency distortion, End-to-End delay and Initial Startup delay.

  15. MATIN: a random network coding based framework for high quality peer-to-peer live video streaming.

    Directory of Open Access Journals (Sweden)

    Behrang Barekatain

    Full Text Available In recent years, Random Network Coding (RNC has emerged as a promising solution for efficient Peer-to-Peer (P2P video multicasting over the Internet. This probably refers to this fact that RNC noticeably increases the error resiliency and throughput of the network. However, high transmission overhead arising from sending large coefficients vector as header has been the most important challenge of the RNC. Moreover, due to employing the Gauss-Jordan elimination method, considerable computational complexity can be imposed on peers in decoding the encoded blocks and checking linear dependency among the coefficients vectors. In order to address these challenges, this study introduces MATIN which is a random network coding based framework for efficient P2P video streaming. The MATIN includes a novel coefficients matrix generation method so that there is no linear dependency in the generated coefficients matrix. Using the proposed framework, each peer encapsulates one instead of n coefficients entries into the generated encoded packet which results in very low transmission overhead. It is also possible to obtain the inverted coefficients matrix using a bit number of simple arithmetic operations. In this regard, peers sustain very low computational complexities. As a result, the MATIN permits random network coding to be more efficient in P2P video streaming systems. The results obtained from simulation using OMNET++ show that it substantially outperforms the RNC which uses the Gauss-Jordan elimination method by providing better video quality on peers in terms of the four important performance metrics including video distortion, dependency distortion, End-to-End delay and Initial Startup delay.

  16. Future Structure of the Life-World. As an inevitable consequence of the «peer-to-peer»

    Directory of Open Access Journals (Sweden)

    Mototaka Mori

    2016-01-01

    Full Text Available This article intends to draw theoretically a future structure of the life-world. The state interventionism in the late capitalism has been often argued by the critical theoreticians like Jurgen Habermas since the last half of the twentieth century. It was particularly the main problem how possible the life-world was in such the technologically systematized society. However, the highly technological development of telecommunication has changed our everyday life very rapidly and totally. If we know such the rapid change of coevolution between human life and technology, we have to fundamentally reconsider on the theory of life-world. Therefore, in this article I will firstly focus on the classical theory of mundane social world which Alfred Schutz presented in the early 1930s. Of course, his project of socio-phenomenology has been one of the most brilliant und important works still now. However, his theory also will have to be renewed. If we know particularly the «peer-to-peer» constellation of the computer network by the distributed anonymous persons, the classical model of life-world must be versioned up to a next theoretical level. Secondly, considering on the virtual currency like the Bitcoin, this article will show you a hypothetical aspect of transformation of the life-world. The mechanism of trust, which has been often understood as one of the most important key concepts for the community or the society, may be replaced with the computer technology of cryptographic proof. Such a theoretical examination will finally lead to an important opened problem. We will have to inquire whether such the social order will be spontaneous, or whether such the ordering will have to be decided only by the speed of computer’s central processing unit.

  17. The Effect of Electronic Word of Mouth on Intention to Book Accommodation via Online Peer-to-Peer Platform: Investigation of Theory of Planned Behaviour

    OpenAIRE

    See-Kwong Goh

    2016-01-01

    The main purpose for conducting the research is to investigate whether positive eWOM received by consumers would influence their intention to book accommodation via a peer-to-peer website or mobile phone apps (such as Airbnb). The research was conducted by utilizing the Theory of Planned Behaviour which integrates the eWOM, attitude, subjective norms, perceived behavioural control and behavioural intention. A total of 226 responses had been recorded. The main findings from this research are r...

  18. A mixed methods study of peer-to-peer support in a group-based lifestyle intervention for adults with serious mental illness.

    Science.gov (United States)

    Aschbrenner, Kelly A; Naslund, John A; Bartels, Stephen J

    2016-12-01

    There is potential for peer support to enhance healthy lifestyle interventions targeting changes in body weight and fitness for adults with serious mental illness. The purpose of this study was to explore peer-to-peer support among individuals participating in a group lifestyle intervention that included social media to enhance in-person weight management sessions. A mixed methods study design was used to explore participants' perceptions and experiences of support from other group members during a 6-month group lifestyle intervention. Twenty-five individuals with serious mental illness reported their perceptions of the peer group environment and social support during the intervention. Seventeen of these individuals also participated in focus group interviews further exploring their experiences with group members. More than 80% of participants agreed that other group members were trustworthy and dependable, and 92% reported a high level of shared purpose and active participation in the group. Participants described how shared learning and group problem-solving activities fostered friendships and provided essential support for health behavior change. Sharing information, personal successes and challenges, and "being in the same boat" as other group members were key features of peer-to-peer support. Findings from this exploratory study suggest that participants enrolled in a group-based lifestyle intervention for people with serious mental illness experience peer-to-peer support in various ways that promote health behavior change. These findings highlight opportunities to enhance future lifestyle interventions with collaborative learning and social network technologies that foster peer support among participants. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  19. They all do it, will you? Event-related potential evidence of herding behavior in online peer-to-peer lending.

    Science.gov (United States)

    Yu, Haihong; Dan, MengHan; Ma, Qingguo; Jin, Jia

    2018-05-14

    As herding is a typical characteristic of human behavior, many researchers have found the existence of herding behavior in online peer-to-peer lending through empirical surveys. However, the underlying neural basis of this phenomenon is still unclear. In the current study, we studied the neural activities of herding at decision-making stage and feedback stage using event-related potentials (ERPs). Our results showed that at decision-making stage, larger error related negativity (ERN) amplitude was induced under low-proportion conditions than that of high-proportion conditions. Meanwhile, during feedback stage, negative feedback elicited larger feedback related negativity (FRN) amplitude than that of positive feedback under low-proportion conditions, however, there was no significant FRN difference under high-proportion conditions. The current study suggests that herding behavior in online peer-to-peer lending is related to individual's risk perception and is possible to avoid negative emotions brought by failed investments. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. An Agent-Based Model of Private Woodland Owner Management Behavior Using Social Interactions, Information Flow, and Peer-To-Peer Networks.

    Directory of Open Access Journals (Sweden)

    Emily Silver Huff

    Full Text Available Privately owned woodlands are an important source of timber and ecosystem services in North America and worldwide. Impacts of management on these ecosystems and timber supply from these woodlands are difficult to estimate because complex behavioral theory informs the owner's management decisions. The decision-making environment consists of exogenous market factors, internal cognitive processes, and social interactions with fellow landowners, foresters, and other rural community members. This study seeks to understand how social interactions, information flow, and peer-to-peer networks influence timber harvesting behavior using an agent-based model. This theoretical model includes forested polygons in various states of 'harvest readiness' and three types of agents: forest landowners, foresters, and peer leaders (individuals trained in conservation who use peer-to-peer networking. Agent rules, interactions, and characteristics were parameterized with values from existing literature and an empirical survey of forest landowner attitudes, intentions, and demographics. The model demonstrates that as trust in foresters and peer leaders increases, the percentage of the forest that is harvested sustainably increases. Furthermore, peer leaders can serve to increase landowner trust in foresters. Model output and equations will inform forest policy and extension/outreach efforts. The model also serves as an important testing ground for new theories of landowner decision making and behavior.

  1. Peer-to-peer nursing rounds and hospital-acquired pressure ulcer prevalence in a surgical intensive care unit: a quality improvement project.

    Science.gov (United States)

    Kelleher, Alyson Dare; Moorer, Amanda; Makic, MaryBeth Flynn

    2012-01-01

    We conducted a quality improvement project in order to evaluate the effect of nurse-to-nurse bedside "rounding" as a strategy to decrease hospital-acquired pressure ulcers (HAPU) in a surgical intensive care unit. We instituted weekly peer-to-peer bedside skin rounds in a 17-bed surgical intensive care unit. Two nurses were identified as skin champions and trained by the hospital's certified WOC nurse to conduct skin rounds. The skin champion nurses conducted weekly peer-to-peer rounds that included discussions about key elements of our patients' skin status including current Braden Scale for Pressure Sore Risk score, and implementation of specific interventions related to subscale risk assessment. If a pressure ulcer was present, the current action plan was reevaluated for effectiveness. Quarterly HAPU prevalence studies were conducted from January 2008 to December 2010. Nineteen patients experienced a HAPU: 17 were located on the coccyx and 2 on the heel. Ten ulcers were classified as stage II, 3 PU were stage IV, 5 were deemed unstageable, and 1 was classified as a deep tissue injury. The frequency of preventive interventions rose during our quality improvement project. Specifically, the use of prevention surfaces increased 92%, repositioning increased 30%, nutrition interventions increased 77%, and moisture management increased 100%. Prior to focused nursing rounds, the highest HAPU prevalence rate was 27%. After implementing focused nursing rounds, HAPU rates trended down and were 0% for 3 consecutive quarters.

  2. Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks

    Science.gov (United States)

    de Boever, Jorn; de Grooff, Dirk

    The convergence of Internet and TV, i.e., the Over-The-Top TV (OTT TV) paradigm, created opportunities for P2P content distribution as these systems reduce bandwidth expenses for media companies. This resulted in the arrival of legal, commercial P2P systems which increases the importance of studying economic aspects of these business operations. This chapter examines the value networks of three cases (Kontiki, Zattoo and bittorrent) in order to compare how different actors position and distinguish themselves from competitors by creating value in different ways. The value networks of legal systems have different compositions depending on their market orientation - Business-to-Business (B2B) and/or Businessto- Consumer (B2C). In addition, legal systems differ from illegal systems as legal companies are not inclined to grant control to users, whereas users havemost control in value networks of illegal, self-organizing file sharing communities. In conclusion, the OTT TV paradigm made P2P technology a partner for the media industry rather than an enemy. However, we argue that the lack of control granted to users will remain a seed-bed for the success of illegal P2P file sharing communities.

  3. Help&Learn: A peer-to-peer architecture to support knowledge management in collaborative learning communities

    NARCIS (Netherlands)

    Guizzardi-Silva Souza, R.; Aroyo, L.M.; Wagner, G.

    Collaborative learning motivates active participation of individuals in their learning process, which often results in the attaining of creative and critical thinking skills. This way, students and teachers are viewed as both providers and consumers of knowledge gathered in environments where

  4. Investigating the Effects of Peer to Peer Prompts on Collaborative Argumentation, Consensus and Perceived Efficacy in Collaborative Learning

    Science.gov (United States)

    Harney, Owen M.; Hogan, Michael J.; Quinn, Sarah

    2017-01-01

    In a society which is calling for more productive modes of collaboration to address increasingly complex scientific and social issues, greater involvement of students in dialogue, and increased emphasis on collaborative discourse and argumentation, become essential modes of engagement and learning. This paper investigates the effects of…

  5. Personal Competencies/Personalized Learning: Reflection on Instruction. A Peer-to-Peer Learning and Observation Tool

    Science.gov (United States)

    Twyman, Janet; Redding, Sam

    2015-01-01

    This publication and its companion, "Personal Competencies/Personalized Learning: Lesson Plan Reflection Guide," were created in response to a request for further development of the practical application of personalized learning concepts by teachers. Personalized learning varies the time, place, and pace of learning for each student, and…

  6. Effective peer-to-peer support for young people with end-stage renal disease: a mixed methods evaluation of Camp COOL

    Science.gov (United States)

    2013-01-01

    Background The Camp COOL programme aims to help young Dutch people with end-stage renal disease (ESRD) develop self-management skills. Fellow patients already treated in adult care (hereafter referred to as ‘buddies’) organise the day-to-day program, run the camp, counsel the attendees, and also participate in the activities. The attendees are young people who still have to transfer to adult care. This study aimed to explore the effects of this specific form of peer-to-peer support on the self-management of young people (16–25 years) with ESRD who participated in Camp COOL (CC) (hereafter referred to as ‘participants’). Methods A mixed methods research design was employed. Semi-structured interviews (n = 19) with initiators/staff, participants, and healthcare professionals were conducted. These were combined with retrospective and pre-post surveys among participants (n = 62), and observations during two camp weeks. Results Self-reported effects of participants were: increased self-confidence, more disease-related knowledge, feeling capable of being more responsible and open towards others, and daring to stand up for yourself. According to participants, being a buddy or having one positively affected them. Self-efficacy of attendees and independence of buddies increased, while attendees’ sense of social inclusion decreased (measured as domains of health-related quality of life). The buddy role was a pro-active combination of being supervisor, advisor, and leader. Conclusions Camp COOL allowed young people to support each other in adjusting to everyday life with ESRD. Participating in the camp positively influenced self-management in this group. Peer-to-peer support through buddies was much appreciated. Support from young adults was not only beneficial for adolescent attendees, but also for young adult buddies. Paediatric nephrologists are encouraged to refer patients to CC and to facilitate such initiatives. Together with nephrologists in adult

  7. Expanding the Supply of Pasteurized Donor Milk: Understanding Why Peer-to-Peer Milk Sharers in the United States Do Not Donate to Milk Banks.

    Science.gov (United States)

    Perrin, Maryanne Tigchelaar; Goodell, L Suzanne; Fogleman, April; Pettus, Hannah; Bodenheimer, Amanda L; Palmquist, Aunchalee E L

    2016-05-01

    Lactating women in the United States have several options for what they do with excess breast milk, including donating to milk banks that serve medically fragile infants, sharing directly with families seeking milk, and selling to individuals or for-profit entities. The World Health Organization and the US Surgeon General have issued calls to increase access to pasteurized donor milk for medically fragile infants. To explore how lactating women with a surplus of breast milk come to the decision to share their milk with a peer rather than donate to a milk bank. A qualitative design using a grounded theory approach was employed. Semistructured telephone interviews were conducted with 27 women who had shared milk with a peer but not with a milk bank. Five dominant themes were identified: a strong belief in the value of breast milk, unexpected versus planned donation, sources of information regarding milk exchange, concerns and knowledge gaps about milk banks, and helping and connecting. This research offers insights into potential strategies for promoting milk bank donation among peer-to-peer milk sharers, including developing donor education campaigns focused on knowledge gaps regarding milk banks and developing health care professional referral programs that can reduce barriers associated with the convenience of milk bank donation. © The Author(s) 2016.

  8. In Pursuit of Theoretical Ground in Behavior Change Support Systems: Analysis of Peer-to-Peer Communication in a Health-Related Online Community

    Science.gov (United States)

    Cobb, Nathan; Cohen, Trevor

    2016-01-01

    Background Research studies involving health-related online communities have focused on examining network structure to understand mechanisms underlying behavior change. Content analysis of the messages exchanged in these communities has been limited to the “social support” perspective. However, existing behavior change theories suggest that message content plays a prominent role reflecting several sociocognitive factors that affect an individual’s efforts to make a lifestyle change. An understanding of these factors is imperative to identify and harness the mechanisms of behavior change in the Health 2.0 era. Objective The objective of this work is two-fold: (1) to harness digital communication data to capture essential meaning of communication and factors affecting a desired behavior change, and (2) to understand the applicability of existing behavior change theories to characterize peer-to-peer communication in online platforms. Methods In this paper, we describe grounded theory–based qualitative analysis of digital communication in QuitNet, an online community promoting smoking cessation. A database of 16,492 de-identified public messages from 1456 users from March 1-April 30, 2007, was used in our study. We analyzed 795 messages using grounded theory techniques to ensure thematic saturation. This analysis enabled identification of key concepts contained in the messages exchanged by QuitNet members, allowing us to understand the sociobehavioral intricacies underlying an individual’s efforts to cease smoking in a group setting. We further ascertained the relevance of the identified themes to theoretical constructs in existing behavior change theories (eg, Health Belief Model) and theoretically linked techniques of behavior change taxonomy. Results We identified 43 different concepts, which were then grouped under 12 themes based on analysis of 795 messages. Examples of concepts include “sleepiness,” “pledge,” “patch,” “spouse,” and

  9. In Pursuit of Theoretical Ground in Behavior Change Support Systems: Analysis of Peer-to-Peer Communication in a Health-Related Online Community.

    Science.gov (United States)

    Myneni, Sahiti; Cobb, Nathan; Cohen, Trevor

    2016-02-02

    Research studies involving health-related online communities have focused on examining network structure to understand mechanisms underlying behavior change. Content analysis of the messages exchanged in these communities has been limited to the "social support" perspective. However, existing behavior change theories suggest that message content plays a prominent role reflecting several sociocognitive factors that affect an individual's efforts to make a lifestyle change. An understanding of these factors is imperative to identify and harness the mechanisms of behavior change in the Health 2.0 era. The objective of this work is two-fold: (1) to harness digital communication data to capture essential meaning of communication and factors affecting a desired behavior change, and (2) to understand the applicability of existing behavior change theories to characterize peer-to-peer communication in online platforms. In this paper, we describe grounded theory-based qualitative analysis of digital communication in QuitNet, an online community promoting smoking cessation. A database of 16,492 de-identified public messages from 1456 users from March 1-April 30, 2007, was used in our study. We analyzed 795 messages using grounded theory techniques to ensure thematic saturation. This analysis enabled identification of key concepts contained in the messages exchanged by QuitNet members, allowing us to understand the sociobehavioral intricacies underlying an individual's efforts to cease smoking in a group setting. We further ascertained the relevance of the identified themes to theoretical constructs in existing behavior change theories (eg, Health Belief Model) and theoretically linked techniques of behavior change taxonomy. We identified 43 different concepts, which were then grouped under 12 themes based on analysis of 795 messages. Examples of concepts include "sleepiness," "pledge," "patch," "spouse," and "slip." Examples of themes include "traditions," "social support

  10. Togetherness, coexistence or confrontation : the impact of school climate and culture on peer-to-peer social relations in Catalonia, Spain

    OpenAIRE

    Ponferrada-Arteaga, Maribel; Carrasco-Pons, Silvia

    2010-01-01

    This paper presents some of the results of the study ‘Coexistence and Confrontation among Peers in Secondary Schools in Catalonia’ commissioned by the Ombudsman’s Office of the Catalan government and carried out at the Institute of Childhood and the Urban World (CIIMU) in Barcelona, Spain, in 2005-2006. It offers a description of the indicators of malaise and exclusion among students at nine public and private secondary schools serving varying social environments in Cataloni...

  11. Schools (Students) Exchanging CAD/CAM Files over the Internet.

    Science.gov (United States)

    Mahoney, Gary S.; Smallwood, James E.

    This document discusses how students and schools can benefit from exchanging computer-aided design/computer-aided manufacturing (CAD/CAM) files over the Internet, explains how files are exchanged, and examines the problem of selected hardware/software incompatibility. Key terms associated with information search services are defined, and several…

  12. Peer-to-Peer Simulation Architecture

    CSIR Research Space (South Africa)

    Duvenhage, B

    2007-06-01

    Full Text Available simulation. Simulation execution requirements for constructive simulations tend to be less stringent, but the faster a simulation executes, the more applicable it becomes as a what-if type analyses tool, as it allows a simulation user to test and evaluate... entities that are modelled at system of systems level, typically require distributed simulation to either provide faster than or real-time compatibility. The ideal simulation architecture would support both distributed and non-distributed simulation...

  13. Inteligência estratégica antecipativa coletiva e crowdfunding: aplicação do método L.E.SCAnning em empresa social de economia peer-to-peer (P2P

    Directory of Open Access Journals (Sweden)

    Mery Blanck

    2014-03-01

    Full Text Available Neste artigo, apresentam-se os resultados de pesquisa qualitativa em que se objetivou investigar a aplicabilidade do método L.E.SCAnning em empresas sociais de economia peer-to-peer (P2P. A motivação partiu da ideia de a autossustentabilidade ser, a longo prazo, um dos maiores desafios das organizações, especialmente aquelas lastreadas na economia social, dentre elas, as empresas P2P. No entanto, empresas sociais são potencialmente negócios dinâmicos e progressistas com os quais o mercado empresarial poderia aprender, uma vez que experimentam e inovam. Partindo exatamente desse espírito inovador, muitas empresas sociais voltaram-se para o modelo crowdfunding de economia P2P, que se configura como tendência emergente de organização colaborativa de recursos na Web. Sob esse prisma, um dos novos desenvolvimentos em gestão que se aplicam à atividade de organizações com enfoque sistêmico é a prática da Inteligência Estratégica Antecipativa Coletiva (IEAc. Nesse sentido, no estudo de caso investigou-se a empresa social francesa Babyloan para compreender de que maneira a organização busca, monitora e utiliza a informação captada do meio externo para sua atuação, prototipando, com base nesse diagnóstico, a aplicação de um ciclo do método L.E.SCAnning. Os resultados deste estudo sugerem que o entendimento pragmático do cenário externo, por meio da IEAc, favorece decisões que trazem uma marca de empreendedorismo e inovação, e tem no universo da economia social P2P, ambiente fortemente baseado em percepção, um impacto potencial significativo.

  14. Online file sharing innovations in media consumption

    CERN Document Server

    Andersson Schwarz, Jonas

    2013-01-01

    It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, ""piracy,"" and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality th

  15. Controlling P2P File-Sharing Networks Traffic

    OpenAIRE

    García Pineda, Miguel; HAMMOUMI, MOHAMMED; Canovas Solbes, Alejandro; Lloret, Jaime

    2011-01-01

    Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many Internet users have chosen this technology to share and search programs, videos, music, documents, etc. The total number of P2P file-sharing users has been increasing and decreasing in the last decade depending on the creation or end of some well known P2P file-sharing systems. P2P file-sharing networks traffic is currently overloading some data networks and it is a major headache for netw...

  16. Interteach and Student Engagement in Political Science

    Science.gov (United States)

    Slagter, Tracy H.; Scribner, Druscilla L.

    2014-01-01

    "Interteach" is a method of guided discussion and feedback developed by Thomas Boyce and Philip Hineline in 2002. This method, primarily used in the psychology classroom, encourages greater student engagement and responsibility for learning by requiring extensive student preparation, peer-to-peer instruction, and peer evaluation. How can…

  17. Targets and Witnesses: Middle School Students' Sexual Harassment Experiences

    Science.gov (United States)

    Lichty, Lauren F.; Campbell, Rebecca

    2012-01-01

    School-based peer-to-peer sexual harassment (SH) emerged as an issue of concern in the early 1990s. As a developing field, this literature has several notable gaps. The current study extends previous research by, (a) exploring the understudied experiences of middle school students, (b) assessing students' experiences witnessing SH, and (c)…

  18. New English file advanced student's book

    CERN Document Server

    Oxenden, Clive

    2010-01-01

    A book of 7 units where each main lesson is 4 pages long. Each lesson opens with a quotation from a famous person - the quotes range from flippant to philosophical, witty, or thought-provoking - which provide talking points for the start of the lesson. The Colloquial English video lessons use interviews with real people, rather than scripted dialogue, to expose students to authentic everyday language.

  19. Do two heads search better than one? Effects of student collaboration on web search behavior and search outcomes.

    NARCIS (Netherlands)

    Lazonder, Adrianus W.

    2005-01-01

    This study compared Pairs of students with Single students in web search tasks. The underlying hypothesis was that peer-to-peer collaboration encourages students to articulate their thoughts, which in turn has a facilitative effect on the regulation of the search process as well as search outcomes.

  20. Reliable file sharing in distributed operating system using web RTC

    Science.gov (United States)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  1. Building a Peer-Learning Service for Students in an Academic Library

    Science.gov (United States)

    O'Kelly, Mary; Garrison, Julie; Merry, Brian; Torreano, Jennifer

    2015-01-01

    Academic libraries are well lauded for offering supportive spaces for students' self-directed study, and significant resources are dedicated to librarian instruction in the classroom. What many academic libraries lack, however, is a middle ground, a routine way for students to help one another using best practices in peer-to-peer learning theory.…

  2. The Art of Talking about Science: Beginning to Teach Physiology Students How to Communicate with Nonscientists

    Science.gov (United States)

    Petzold, Andrew M.; Dunbar, Robert L.

    2018-01-01

    The ability to clearly disseminate scientific knowledge is a skill that is necessary for any undergraduate student within the sciences. Traditionally, this is accomplished through the instruction of scientific presentation or writing with a focus on peer-to-peer communication at the expense of teaching communication aimed at a nonscientific…

  3. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    Science.gov (United States)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  4. Adaptative Peer to Peer Data Sharing for Technology Enhanced Learning

    Science.gov (United States)

    Angelaccio, Michele; Buttarazzi, Berta

    Starting from the hypothesis that P2P Data Sharing in a direct teaching scenario (e.g.: a classroom lesson) may lead to relevant benefits, this paper explores the features of EduSHARE a Collaborative Learning System useful for Enhanced Learning Process.

  5. Peer-to-Peer Learning and the Army Learning Model

    Science.gov (United States)

    2012-06-08

    education will be delivered to the current and future force. This thesis examined the salient areas proposed by the ALM and its impact on P2P learning ...The Army Learning Model is the new educational model that develops adaptive leaders in an era of persistent conflict. Life-long, individual

  6. A Peer-to-Peer Indexing Service for Data Grids

    DEFF Research Database (Denmark)

    Jensen, Henrik Thostrup; Kleist, Josva

    2007-01-01

    deal with nomadic data. The system provides extra services to ease integration with other systems: A registrant service integrates existing storage elements into the system, and a query proxy provides an easy way to query the system. A security model, which builds on the existing grid security model...

  7. Privacy and Cooperation in Peer-to-Peer Systems

    NARCIS (Netherlands)

    Zeilemaker, N.S.M.

    2015-01-01

    P2P networks employ the resources available at peers to reduce the load at, or eliminate the need for a server. In order to achieve these goals, protocols are implemented which aim to allow peers to collaborate efficiently. However, these same protocols can make peers an easy target, as their

  8. Peer-to-Peer Planning for Space Mission Control

    Science.gov (United States)

    Barreiro, Javier; Jones, Grailing, Jr.; Schaffer, Steve

    2009-01-01

    Planning and scheduling for space operations entails the development of applications that embed intimate domain knowledge of distinct areas of mission control, while allowing for significant collaboration among them. The separation is useful because of differences in the planning problem, solution methods, and frequencies of replanning that arise in the different disciplines. For example, planning the activities of human spaceflight crews requires some reasoning about all spacecraft resources at timescales of minutes or seconds, and is subject to considerable volatility. Detailed power planning requires managing the complex interplay of power consumption and production, involves very different classes of constraints and preferences, but once plans are generated they are relatively stable.

  9. Virtual University: A Peer to Peer Open Education Network

    Science.gov (United States)

    Razavi, Amir R.; Strommen-Bakhtiar, Abbas; Krause, Paul

    2011-01-01

    The world is currently going through a transitional period, moving from the Service era to the Information era. Rapid societal and technological innovations are changing the way we live, communicate, and work. As the rate of the technological/societal change increases, pressure on educational institutions also increases. This pressure is…

  10. Millennials, Peer-to-Peer Accommodation and the Hotel Industry

    Directory of Open Access Journals (Sweden)

    Alma Pentescu

    2016-01-01

    The aim of this paper is to present these challenges for the hotel industry, because there has notbeen significant research concerning the trends and changes this new generation / new businessmodel will bring to the hospitality industry. Finally, it suggests how hoteliers could adapt to thesenew expectations and proposes several questions for future research.

  11. Migrant Student Record Transfer System (MSRTS) [machine-readable data file].

    Science.gov (United States)

    Arkansas State Dept. of Education, Little Rock. General Education Div.

    The Migrant Student Record Transfer System (MSRTS) machine-readable data file (MRDF) is a collection of education and health data on more than 750,000 migrant children in grades K-12 in the United States (except Hawaii), the District of Columbia, and the outlying territories of Puerto Rico and the Mariana and Marshall Islands. The active file…

  12. Endodontic complications of root canal therapy performed by dental students with stainless-steel K-files and nickel-titanium hand files.

    Science.gov (United States)

    Pettiette, M T; Metzger, Z; Phillips, C; Trope, M

    1999-04-01

    Straightening of curved canals is one of the most common procedural errors in endodontic instrumentation. This problem is commonly encountered when dental students perform molar endodontics. The purpose of this study was to compare the effect of the type of instrument used by these students on the extent of straightening and on the incidence of other endodontic procedural errors. Nickel-titanium 0.02 taper hand files were compared with traditional stainless-steel 0.02 taper K-files. Sixty molar teeth comprised of maxillary and mandibular first and second molars were treated by senior dental students. Instrumentation was with either nickel-titanium hand files or stainless-steel K-files. Preoperative and postoperative radiographs of each tooth were taken using an XCP precision instrument with a customized bite block to ensure accurate reproduction of radiographic angulation. The radiographs were scanned and the images stored as TIFF files. By superimposing tracings from the preoperative over the postoperative radiographs, the degree of deviation of the apical third of the root canal filling from the original canal was measured. The presence of other errors, such as strip perforation and instrument breakage, was established by examining the radiographs. In curved canals instrumented by stainless-steel K-files, the average deviation of the apical third of the canals was 14.44 degrees (+/- 10.33 degrees). The deviation was significantly reduced when nickel-titanium hand files were used to an average of 4.39 degrees (+/- 4.53 degrees). The incidence of other procedural errors was also significantly reduced by the use of nickel-titanium hand files.

  13. Community College Students and Applied Research. Professional File. Number 30

    Science.gov (United States)

    Zuniga, Sabrina Faust

    2009-01-01

    Student participation in applied research as a form of experiential learning in community colleges is relatively new. Ontario Colleges today participate at different levels with different numbers of projects and faculty involved. A few colleges in Ontario are more established in doing applied research including having basic infrastructure for…

  14. Population-based initiatives in college mental health: students helping students to overcome obstacles.

    Science.gov (United States)

    Kirsch, Daniel J; Pinder-Amaker, Stephanie L; Morse, Charles; Ellison, Marsha L; Doerfler, Leonard A; Riba, Michelle B

    2014-12-01

    College students' need for mental health care has increased dramatically, leaving campus counseling and mental health centers struggling to meet the demand. This has led to the investigation and development of extra-center, population-based interventions. Student-to-student support programs are but one example. Students themselves are a plentiful, often-untapped resource that extends the reach of mental health services on campus. Student-to-student programs capitalize on students' natural inclination to assist their peers. A brief review of the prevalence and effects of mental disorders in the college population is provided, followed by a broad overview of the range of peer-to-peer programs that can be available on college campuses. Two innovative programs are highlighted: (1) a hospital- and community-based program, the College Mental Health Program (CMHP) at McLean Hospital, and 2) the Student Support Network (SSN) at Worcester Polytechnic Institute. The subsequent section reviews the literature on peer-to-peer programs for students with serious and persistent mental illness for which there is a small but generally positive body of research. This lack of an empirical basis in college mental health leads the authors to argue for development of broad practice-research networks.

  15. Formative assessment in mathematics for engineering students

    Science.gov (United States)

    Ní Fhloinn, Eabhnat; Carr, Michael

    2017-07-01

    In this paper, we present a range of formative assessment types for engineering mathematics, including in-class exercises, homework, mock examination questions, table quizzes, presentations, critical analyses of statistical papers, peer-to-peer teaching, online assessments and electronic voting systems. We provide practical tips for the implementation of such assessments, with a particular focus on time or resource constraints and large class sizes, as well as effective methods of feedback. In addition, we consider the benefits of such formative assessments for students and staff.

  16. Serious Gaming Analytics: What Students´ Log Files Tell Us about Gaming and Learning

    Directory of Open Access Journals (Sweden)

    Wim Westera

    2014-06-01

    Full Text Available In this paper we explore existing log files of the VIBOA environmental policy game. Our aim is to identify relevant player behaviours and performance patterns. The VIBOA game is a 50 hours master level serious game that supports inquiry-based learning: students adopt the role of an environmental consultant in the (fictitious consultancy agency VIBOA, and have to deal with complex, multi-faceted environmental problems in an academic and methodologically sound way. A sample of 118 master students played the game. We used learning analytics to extract relevant data from the logging and find meaningful patterns and relationships. We observed substantial behavioural variability across students. Correlation analysis suggest a behavioural trade that reflects the rate of “switching” between different game objects or activities. We were able to establish a model that uses switching indicators as predictors for the efficiency of learning. Also we found slight evidence that students who display increased switching behaviours need more time to complete the games.  We conclude the paper by critically evaluating our findings, making explicit the limitations of our study and making suggestions for future research that links together learning analytics and serious gaming.

  17. Students' Acceptance of File Sharing Systems as a Tool for Sharing Course Materials: The Case of Google Drive

    Science.gov (United States)

    Sadik, Alaa

    2017-01-01

    Students' perceptions about both ease of use and usefulness are fundamental factors in determining their acceptance and successful use of technology in higher education. File sharing systems are one of these technologies and can be used to manage and deliver course materials and coordinate virtual teams. The aim of this study is to explore how…

  18. Student Achievement Study, 1970-1974. The IEA Six-Subject Data Bank [machine-readable data file].

    Science.gov (United States)

    International Association for the Evaluation of Educational Achievement, Stockholm (Sweden).

    The "Student Achievement Study" machine-readable data files (MRDF) (also referred to as the "IEA Six-Subject Survey") are the result of an international data collection effort during 1970-1974 by 21 designated National Centers, which had agreed to cooperate. The countries involved were: Australia, Belgium, Chile, England-Wales,…

  19. Evolutionary Game Theory-Based Evaluation of P2P File-Sharing Systems in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Yusuke Matsuda

    2010-01-01

    Full Text Available Peer-to-Peer (P2P file sharing is one of key technologies for achieving attractive P2P multimedia social networking. In P2P file-sharing systems, file availability is improved by cooperative users who cache and share files. Note that file caching carries costs such as storage consumption and processing load. In addition, users have different degrees of cooperativity in file caching and they are in different surrounding environments arising from the topological structure of P2P networks. With evolutionary game theory, this paper evaluates the performance of P2P file sharing systems in such heterogeneous environments. Using micro-macro dynamics, we analyze the impact of the heterogeneity of user selfishness on the file availability and system stability. Further, through simulation experiments with agent-based dynamics, we reveal how other aspects, for example, synchronization among nodes and topological structure, affect the system performance. Both analytical and simulation results show that the environmental heterogeneity contributes to the file availability and system stability.

  20. Case file audit of Lidcombe program outcomes in a student-led stuttering clinic.

    Science.gov (United States)

    McCulloch, Julia; Swift, Michelle C; Wagnitz, Bianca

    2017-04-01

    The current study aimed to benchmark clinical outcomes for preschool-aged clients (2;0-5;11 years old) that attended a student-led clinic and undertook the Lidcombe Program. A case file audit was undertaken for all preschool clients who attended the clinic between February 2008 and February 2013 and commenced the Lidcombe Program. Clients were grouped according to Stage 1 completion. A mixed ANOVA was used to test for differences between the groups in initial and final percentage syllables stuttered (%SS). Associations between case variable factors and treatment duration were investigated using Pearson correlations. Clients who completed Stage 1 had final %SS and severity rating (SR) scores comparable to the literature; however, the median Stage 1 duration was greater. Over half of the clients (57%) withdrew prior to completing Stage 1. These clients had a significantly higher %SS at final treatment session than their completing peers. Initial %SS and SR scores were the only case variables associated with treatment duration. Students can achieve the same short-term treatment outcomes for children who stutter using the Lidcombe Program as the current published literature; however, treatment duration is greater and may impact completion. Implications of this for clinical education are discussed.

  1. Web-mediated database for internet-based dental radiology teaching files constructed by 5th-year undergraduate students

    International Nuclear Information System (INIS)

    Kito, Shinji; Wakasugi-Sato, Nao; Matsumoto-Takeda, Shinobu; Oda, Masafumi; Tanaka, Tatsurou; Fukai, Yasuhiro; Tokitsu, Takatoshi; Morimoto, Yasuhiro

    2009-01-01

    To provide oral healthcare for patients of all ages, dental welfare environments and technical aspects of dentistry have evolved and developed and dental education must also diversify. Student-centered voluntary education and establishment of a life-long self-learning environment are becoming increasingly important in the changing world of dental education. In this article, we introduce a new process for the construction of a web-mediated database containing internet-based teaching files on the normal radiological anatomy of panoramic radiographs and CT images of the oral and maxillofacial regions, as well as a system for the delivery of visual learning materials through an intra-faculty local network. This process was developed by our 5th-year undergraduate students. Animated CT scan images were produced using Macintosh Iphoto and Imovie animation software. Normal anatomical images of panoramic radiographs and CT scans were produced using Adobe Illustrator CS and Adobe Photoshop CS. The web database was constructed using Macromedia Dreamweaver MX and Microsoft Internet Explorer. This project was the basis of our participation in the Student Clinician Research Program (SCRP). At Kyushu Dental College, we developed a new series of teaching files on the web. Uploading these teaching files to the internet allowed many individuals to access the information. Viewers can easily select the area of study that they wish to examine. These processes suggest that our laboratory practice is a useful tool for promoting students' motivation and improving life-long self learning in dental radiology. We expect that many medical and dental students, practitioners and patients will be able to use our teaching files to learn about the normal radiological anatomy of the oral and maxillofacial regions.(author)

  2. Connecting embedded and stand-alone peer mentoring models to enhance student engagement

    Directory of Open Access Journals (Sweden)

    Rhys Cooper

    2018-03-01

    Full Text Available This paper outlines the Trident Student Mentoring Program that runs in the College of Engineering at Victoria University, Melbourne, Australia. The program offers both embedded and stand-alone models of peer mentoring services to the same cohort of first-year students. It shows that by forming strong links between these two types of peer mentoring models, the inherent challenges of both, such as low attendance rates in stand-alone models and short periods of peer to peer time in embedded models, are mitigated.

  3. Folksonomical P2P File Sharing Networks Using Vectorized KANSEI Information as Search Tags

    Science.gov (United States)

    Ohnishi, Kei; Yoshida, Kaori; Oie, Yuji

    We present the concept of folksonomical peer-to-peer (P2P) file sharing networks that allow participants (peers) to freely assign structured search tags to files. These networks are similar to folksonomies in the present Web from the point of view that users assign search tags to information distributed over a network. As a concrete example, we consider an unstructured P2P network using vectorized Kansei (human sensitivity) information as structured search tags for file search. Vectorized Kansei information as search tags indicates what participants feel about their files and is assigned by the participant to each of their files. A search query also has the same form of search tags and indicates what participants want to feel about files that they will eventually obtain. A method that enables file search using vectorized Kansei information is the Kansei query-forwarding method, which probabilistically propagates a search query to peers that are likely to hold more files having search tags that are similar to the query. The similarity between the search query and the search tags is measured in terms of their dot product. The simulation experiments examine if the Kansei query-forwarding method can provide equal search performance for all peers in a network in which only the Kansei information and the tendency with respect to file collection are different among all of the peers. The simulation results show that the Kansei query forwarding method and a random-walk-based query forwarding method, for comparison, work effectively in different situations and are complementary. Furthermore, the Kansei query forwarding method is shown, through simulations, to be superior to or equal to the random-walk based one in terms of search speed.

  4. Social influence and student choice of higher education institution

    Directory of Open Access Journals (Sweden)

    Joanna Krezel

    2017-09-01

    Full Text Available This conceptual paper discusses changes in higher education sector, growing competition as a result of new private education providers and the adoption of student-as-customer perspective in recruitment and marketing of higher education institutions. The paper reviews numerous models of student choice and identifies inconsistencies in the role of social factors in the student choice. These inconsistencies are of special importance in current higher education landscape and growing prominence of peer-to-peer communication via social media. Consequently, a thorough understanding of influences that effect student choice of higher education institution is imperative. This conceptual paper puts forward a conceptual framework that integrates Kelman’s processes of social influence and Cialdini-Goldstein’s goals that underpin the acceptance of that influence to examine the effects social context has on student choice of higher education institution.

  5. A peer-to-peer overlay for the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.; Fleury, M.; Quadri, N.

    2012-01-01

    The growth of the Internet and its popular services are forcing telecom operators to provide advanced services to their subscribers, as traditional voice services are no longer enough to attract more customers. To enable more innovative and value-added IP services and take advantage of the services

  6. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... New marketing models are being developed and used to target mobile users. A mobile environment introduces new challenges that need to be overcome by these marketing models in order to be successful and effective...

  7. Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables

    Science.gov (United States)

    Legtchenko, Sergey; Monnet, Sébastien; Sens, Pierre; Muller, Gilles

    DHT-based P2P systems provide a fault-tolerant and scalable mean to store data blocks in a fully distributed way. Unfortunately, recent studies have shown that if connection/disconnection frequency is too high, data blocks may be lost. This is true for most current DHT-based system's implementations. To avoid this problem, it is necessary to build really efficient replication and maintenance mechanisms. In this paper, we study the effect of churn on an existing DHT-based P2P system such as DHash or PAST. We then propose solutions to enhance churn tolerance and evaluate them through discrete event simulations.

  8. EvAg: A Scalable Peer-to-Peer Evolutionary Algorithm

    NARCIS (Netherlands)

    Laredo, J.L.J.; Eiben, A.E.; van Steen, M.R.; Merelo, J.J.

    2010-01-01

    This paper studies the scalability of an Evolutionary Algorithm (EA) whose population is structured by means of a gossiping protocol and where the evolutionary operators act exclusively within the local neighborhoods. This makes the algorithm inherently suited for parallel execution in a

  9. The Evolution of a Professional Practice Forum: Balancing Peer-to-Peer Learning With Course Objectives.

    Science.gov (United States)

    Janssen, Anna; Robinson, Tracy; Shaw, Tim

    2014-10-31

    The Opioid Treatment Accreditation Course (OTAC) is a mandatory accreditation requirement in New South Wales, Australia, and aims to prepare medical practitioners for the provision of safe and effective Opioid Substitution Treatment to people with opioid dependence. The course has a strong focus on safe prescribing practices and the course design includes a Professional Practice Forum that is engaging for participants and effective at imparting complex ideas and concepts that do not place additional time constraints on already time-poor health professionals. The study aimed to use participatory action research methods to develop and evaluate an online Professional Practice Forum that is a key component of the OTAC teaching and learning experience. Three evaluation cycles were implemented with three cohorts of participants (N=40) to inform the design and review of the updated OTAC course. Overall, the study relied on participatory action research methods to enhance a sense of online community and to revise the Professional Practice Forum component of the course. Findings from survey feedback and an examination of Web metrics were used to monitor participant learning and were subsequently subject to thematic analysis in order to identify key themes. The use of participatory action techniques in the redesign of the OTAC course was a successful means of engaging with participants and resulted in four revisions based on feedback from facilitators and participants. The Professional Practice Forum was rated highly and received positive feedback from both moderators and participants. The use of interactive forums in online learning in an educational module for adult learners can prove extremely valuable as a means for participants to share their expertise and improve their learning outcomes. In particular, the use of sticky and welcome threads were significant features that enhanced interactions between participants and facilitators and resulted in increased quantity and quality of postings. These findings can help inform future researchers on how to develop peer engagement modules that are amenable to assessment and that build an online sense of community.

  10. Knowledge Transfer Project: Cultivating Smart Energy Solutions through Dynamic Peer-to-Peer Learning

    Energy Technology Data Exchange (ETDEWEB)

    2018-05-01

    As energy policy makers and professionals convene in the Oresund region for the 9th Annual Clean Energy Ministerial (CEM9), the global community is as united as ever around the common goal of accelerating the transition to global clean energy. Through sustained collective effort and thought leadership, CEM partners and stakeholders are systematically addressing the barriers to the widescale deployment of clean energy technologies. Pivotal to their progress is the efficient sharing and dissemination of knowledge. To address that need, the CEM-initiative International SmartGrid Action Network (ISGAN) launched the Knowledge Transfer Project (KTP) in March 2016 to capture, collect, and share knowledge about smart grid technologies among countries and key stakeholders. Building on ISGAN's experience with delivering deep-dive workshops, the KTP fosters meaningful international dialogue on smart grids with a focus on developing competence and building capacity. After a successful 2016 pilot project and two consecutive projects, each with a different focus and structure, the KTP has become an established practice that can support existing ISGAN or CEM initiatives. To accommodate different purposes, needs, and practical circumstances, ISGAN has adopted three basic models for delivering KTP workshops: Country-Centric, Multilateral, and Hybrid. This fact sheet describes each approach through case studies of workshops in Mexico, India, and Belgium, and invites new ideas and partners for future KTPs.

  11. Research on load optimization of DHT-based hierarchy peer-to-peer system

    Science.gov (United States)

    Zhong, Haifeng; Luo, Dongjian; Wu, Wei; Xiao, Liang

    2009-08-01

    The main reason of causing the cost in p2p system is the maintenance cost that nodes build their routing information. In a large-scale system or a dynamic environment, p2p system generates considerable maintenance workload, which not only increase the bandwidth consumption but also affect the routing efficiency. So we present here a new Hierarchy_based maintenance method to minimize the maintenance cost which combines the hierarchical DHT algorithm with a peer proximity mechanism. The analysis results show our design can significantly decrease maintenance cost and improve scalability of the P2P system.

  12. Capturing the Flatness of a peer-to-peer lending network through random and selected perturbations

    Science.gov (United States)

    Karampourniotis, Panagiotis D.; Singh, Pramesh; Uparna, Jayaram; Horvat, Emoke-Agnes; Szymanski, Boleslaw K.; Korniss, Gyorgy; Bakdash, Jonathan Z.; Uzzi, Brian

    Null models are established tools that have been used in network analysis to uncover various structural patterns. They quantify the deviance of an observed network measure to that given by the null model. We construct a null model for weighted, directed networks to identify biased links (carrying significantly different weights than expected according to the null model) and thus quantify the flatness of the system. Using this model, we study the flatness of Kiva, a large international crownfinancing network of borrowers and lenders, aggregated to the country level. The dataset spans the years from 2006 to 2013. Our longitudinal analysis shows that flatness of the system is reducing over time, meaning the proportion of biased inter-country links is growing. We extend our analysis by testing the robustness of the flatness of the network in perturbations on the links' weights or the nodes themselves. Examples of such perturbations are event shocks (e.g. erecting walls) or regulatory shocks (e.g. Brexit). We find that flatness is unaffected by random shocks, but changes after shocks target links with a large weight or bias. The methods we use to capture the flatness are based on analytics, simulations, and numerical computations using Shannon's maximum entropy. Supported by ARL NS-CTA.

  13. Peer-to-Peer Mentoring for African American Women With Lupus: A Feasibility Pilot.

    Science.gov (United States)

    Williams, Edith M; Hyer, J Madison; Viswanathan, Ramakrishnan; Faith, Trevor D; Voronca, Delia; Gebregzaibher, Mulugeta; Oates, Jim C; Egede, Leonard

    2018-06-01

    To examine the feasibility and potential benefits of peer mentoring to improve the disease self-management and quality of life of individuals with systemic lupus erythematosus (SLE). Peer mentors were trained and paired with up to 3 mentees to receive self-management education and support by telephone over 12 weeks. This study took place at an academic teaching hospital in Charleston, South Carolina. Seven quads consisting of 1 peer mentor and 3 mentees were matched, based on factors such as age, area of residence, and marital and work status. Mentee outcomes of self-management, health-related quality of life, and disease activity were measured using validated tools at baseline, mid-intervention, and post-intervention. Descriptive statistics and effect sizes were calculated to determine clinically important (>0.3) changes from baseline. Mentees showed trends toward lower disease activity (P = 0.004) and improved health-related quality of life, in the form of decreased anxiety (P = 0.018) and decreased depression (P = 0.057). Other improvements in health-related quality of life were observed with effect sizes >0.3, but did not reach statistical significance. In addition, both mentees and mentors gave very high scores for perceived treatment credibility and service delivery. The intervention was well received. Training, the peer-mentoring program, and outcome measures were demonstrated to be feasible with modifications. This result provides preliminary support for the efficacy, acceptability, and perceived credibility of a peer-mentoring approach to improve disease self-management and health-related quality of life in African American women with SLE. Peer mentoring may augment current rheumatologic care. © 2017, American College of Rheumatology.

  14. Peer-to-peer session initiation protocol in highly volatile environments

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Roper, I.; Morphett, J.

    2008-01-01

    The session initiation protocol (SIP) is an IETF standardised protocol for multimedia signalling and communication over the internet. SIP has been used in many deployments in client-server architecture. However, this configuration potentially possesses various scalability and redundancy limitations

  15. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    Science.gov (United States)

    2005-01-01

    trade and commu- nication strategies, mobile electronic marketing, intelligent agents, collaborative eCommerce 1. INTRODUCTION With the explosion of...requests the promotion (since Jeff is a cof- fee drinker). MH2 signs the promotion with Susan’s eN- centive ID. At 6pm, Jeff decides to take advantage of the...to become valid, a user has a choice of remaining in his current loca- tion and being able to take advantage of the promotion. The eNcentive Ad

  16. Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies

    OpenAIRE

    Brambilla, Giacomo

    2017-01-01

    A distinctive feature of smart cities is the fruitful and effective interconnection among mobile users and resources, to support the fulfillment of sophisticated location-based services (LBSs). LBSs are increasingly taking advantage of user geographic location to provide a broad range of applications, such as traffic monitoring, social networking, emergency management and advertising. Unfortunately, most LBSs rely upon centralized infrastructures, thus raising, besides scalability and r...

  17. Peer-to-Peer Mentoring of Science Journalists in Asia and Latin ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Since 2006, IDRC has supported the Science Journalism Cooperation (SjCOOP) project in partnership with the World Federation of Science Journalists. Arguably the most ambitious project of its kind, SjCOOP's initial efforts involved promoting the development of science journalism in Africa and the Middle East through an ...

  18. Remixing to Design Learning: Social Media and Peer-to-Peer Interaction

    Science.gov (United States)

    Casey, Gail; Wells, Muriel

    2015-01-01

    Social and participatory media offer opportunities to interact and share user-generated content. After some investigation and research, the authors are in their initial stages of using such media to provide a pathway for thinking about learning design in higher education. Using the concept of remixing, the authors aim to creatively blend and…

  19. Cooperative Networked Control of Dynamical Peer-to-Peer Vehicle Systems

    National Research Council Canada - National Science Library

    Dullerud, Geir E; Bullo, Francesco; Feron, Eric; Frazzoli, Emilio; Kumar, P. R; Lall, Sanjay; Liberzon, Daniel; Lynch, Nancy A; Mitchell, John C; Mitter, Sanjoy K

    2007-01-01

    ... and semi-autonomous air vehicles. The research is specifically aimed at the critical reliability and performance issues facing autonomous vehicle systems which operate in highly uncertain environments, and enables the vehicles...

  20. Query Processing in Ontology-Based Peer-to-Peer Systems

    NARCIS (Netherlands)

    Stuckenschmidt, Heiner; Harmelen, Frank Van; Giunchiglia, Fausto

    2005-01-01

    The unstructured, heterogeneous and dynamic nature of the Web poses a new challenge to query-answering over multiple data sources. The so-called Semantic Web aims at providing more and semantically richer structures in terms of ontologies and meta-data. A problem that remains is the combined use of

  1. Regulating peer-to-peer network currency : Lessons from Napster and payment Systems

    NARCIS (Netherlands)

    Kasiyanto, Safari

    2015-01-01

    It was only yesterday when the central banks across the world shared a similar concerns about the rise of e-money as a ‘new’ form of money. Theoretically, e-money as a network good has the potential to achieve a position necessary to replace traditional money. If this happens, the central bank’s

  2. Peer-to-Peer Human-Robot Interaction for Space Exploration

    Science.gov (United States)

    Fong, Terrence; Nourbakhsh, Illah

    2004-01-01

    NASA has embarked on a long-term program to develop human-robot systems for sustained, affordable space exploration. To support this mission, we are working to improve human-robot interaction and performance on planetary surfaces. Rather than building robots that function as glorified tools, our focus is to enable humans and robots to work as partners and peers. In this paper. we describe our approach, which includes contextual dialogue, cognitive modeling, and metrics-based field testing.

  3. Bandwidth Reduction via Localized Peer-to-Peer (P2P Video

    Directory of Open Access Journals (Sweden)

    Ken Kerpez

    2010-01-01

    Full Text Available This paper presents recent research into P2P distribution of video that can be highly localized, preferably sharing content among users on the same access network and Central Office (CO. Models of video demand and localized P2P serving areas are presented. Detailed simulations of passive optical networks (PON are run, and these generate statistics of P2P video localization. Next-Generation PON (NG-PON is shown to fully enable P2P video localization, but the lower rates of Gigabit-PON (GPON restrict performance. Results here show that nearly all of the traffic volume of unicast video could be delivered via localized P2P. Strong growth in video delivery via localized P2P could lower overall future aggregation and core network bandwidth of IP video traffic by 58.2%, and total consumer Internet traffic by 43.5%. This assumes aggressive adoption of technologies and business practices that enable highly localized P2P video.

  4. The Effect of Peer-to-Peer Training on Staff Interactions with Adults with Dual Diagnoses

    Science.gov (United States)

    Finn, Lori L.; Sturmey, Peter

    2009-01-01

    Researchers have demonstrated the importance of training behavioral skills to staff members working with consumers with developmental disabilities. A training program that does not rely solely on consultants or administrators may benefit human services agencies that have limited resources to allocate to training. In the present study, the…

  5. Experiences from introduction of peer-to-peer teaching methods in Advanced Biochemistry E2010

    DEFF Research Database (Denmark)

    Brodersen, Ditlev; Etzerodt, Michael; Rasmussen, Jan Trige

    2012-01-01

    During the autumn semester 2010, we experimented with a range of active teaching methods on the course, Advanced Biochemistry, at the Department of Molecular Biology and Genetics.......During the autumn semester 2010, we experimented with a range of active teaching methods on the course, Advanced Biochemistry, at the Department of Molecular Biology and Genetics....

  6. Distributed Random Process for a Large-Scale Peer-to-Peer Lottery

    OpenAIRE

    Grumbach, Stéphane; Riemann, Robert

    2017-01-01

    International audience; Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of protocols with no trusted third party. We argue that the security requirements of online lotteries are similar to those of online voting, and propose a novel distributed online lottery protocol that applies techniques dev...

  7. qBitcoin: A Peer-to-Peer Quantum Cash System

    OpenAIRE

    Ikeda, Kazuki

    2017-01-01

    A decentralized online quantum cash system, called qBitcoin, is given. We design the system which has great benefits of quantization in the following sense. Firstly, quantum teleportation technology is used for coin transaction, which prevents from the owner of the coin keeping the original coin data even after sending the coin to another. This was a main problem in a classical circuit and a blockchain was introduced to solve this issue. In qBitcoin, the double-spending problem never happens ...

  8. The Paradoxes of Distributed Trust: Peer-to-Peer Architecture and User Confidence in Bitcoin

    OpenAIRE

    Mallard , Alexandre; Méadel , Cécile; Musiani , Francesca

    2014-01-01

    International audience; The decentralized electronic currency system Bitcoin gives the possibility to execute transactions via direct communication between users, without the need to resort to third parties entrusted with legitimizing the concerned monetary value. In its current state of development - a recent, fast-changing, volatile and highly mediatized technology - the discourses that unfold within spaces of information and discussion related to Bitcoin can be analysed in light of their a...

  9. A Pedagogy for Outreach Activities in ICT: Promoting Peer to Peer Learning, Creativity and Experimentation

    Science.gov (United States)

    Lang, Catherine; Craig, Annemieke; Casey, Gail

    2017-01-01

    The importance of integrating technology into the classroom has become a priority at most levels of the curriculum in many countries around the world. This paper draws on the evaluation and research that informed four outreach programs. The authors acknowledge that teachers are generally time poor and often have limited information and…

  10. Peer-to-Peer Support for Science Journalism in the Developing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC has a long history of supporting the advancement of science journalism in the Third World. Since 2000, IDRC helped establish the London-based Science and Development Network (SciDev.Net) with regional nodes in developing countries and played a pivotal role in the Fourth Conference on Science Journalism ...

  11. An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols

    Science.gov (United States)

    2009-03-01

    that they term BLINd Classification (BLINC) [KPF05]. This classification framework attempts to characterize network flows on three levels: The social...Cohen. The BitTorrent Protocol Specification, February 2008. http://www.bittorrent.org/ beps / bep 0003.html. Cor05. CounterPath Corporation. Xten

  12. Open knowledge coordinating knowledge sharing through peer-to-peer interaction

    NARCIS (Netherlands)

    Robertson, Dave; Giunchiglia, Fausto; Van Harmelen, Frank; Marchese, Maurizio; Sabou, Marta; Schorlemmer, Marco; Shadbolt, Nigel; Siebes, Ronnie; Sierra, Carles; Walton, Chris; Dasmahapatra, Srinandan; Dupplaw, Dave; Lewis, Paul; Yatskevich, Mikalai; Kotoulas, Spyros; De Pinninck, Adrian Perreau; Loizou, Antonis

    2008-01-01

    The drive to extend the Web by taking advantage of automated symbolic reasoning (the so-called Semantic Web) has been dominated by a traditional model of knowledge sharing, in which the focus is on task-independent standardisation of knowledge. It appears to be difficult, in practice, to standardise

  13. Junior nursing students' experiences of vertical violence during clinical rotations.

    Science.gov (United States)

    Thomas, Sandra P; Burk, Renee

    2009-01-01

    Horizontal violence is a form of workplace violence, a phenomenon that is prevalent in the nursing profession. Research has revealed a variety of negative peer-to-peer behaviors that lower morale and lead to turnover. However, little research has been conducted on "eating our young" (violence occurring between individuals with unequal power, such as staff nurse and student). We propose "vertical violence" as the appropriate term when abusive registered nurse (RN) behavior is directed towards students. We report a content analysis of stories written by junior nursing students about incidents of injustice perpetrated by staff RNs during their clinical experiences. Four levels of injustice were described. Nursing leadership, both in hospitals and educational institutions, must become engaged in efforts to eradicate vertical violence towards students.

  14. The Paperless Classroom: E-filing and E-valuating Students' Work in English Composition.

    Science.gov (United States)

    Davis, Dan

    2002-01-01

    Explores the possibilities of the paperless classroom achieved through e-mail strategies and the use of Blackboard, an e-learning software platform. Claims that the system can be an efficient method for storing and evaluating papers and communicating with students. Concludes that the system allows the author to create a permanent electronic paper…

  15. From Log Files to Assessment Metrics: Measuring Students' Science Inquiry Skills Using Educational Data Mining

    Science.gov (United States)

    Gobert, Janice D.; Sao Pedro, Michael; Raziuddin, Juelaila; Baker, Ryan S.

    2013-01-01

    We present a method for assessing science inquiry performance, specifically for the inquiry skill of designing and conducting experiments, using educational data mining on students' log data from online microworlds in the Inq-ITS system (Inquiry Intelligent Tutoring System; www.inq-its.org). In our approach, we use a 2-step process: First we use…

  16. Comparative study of root-canal shaping with stainless steel and rotary NiTi files performed by preclinical dental students.

    Science.gov (United States)

    Alrahabi, Mothanna

    2015-01-01

    We evaluated the use of NiTi rotary and stainless steel endodontic instruments for canal shaping by undergraduate students. We also assessed the quality of root canal preparation as well as the occurrence of iatrogenic events during instrumentation. In total, 30 third-year dental students attending Taibah University Dental College prepared 180 simulated canals in resin blocks with NiTi rotary instruments and stainless steel hand files. Superimposed images were prepared to measure the removal of material at different levels from apical termination using the GSA image analysis software. Preparation time, procedural accidents, and canal shape after preparation were analyzed using χ 2 and t-tests. The statistical significance level was set at P instruments and stainless steel files; the former was associated with shorter preparation time, less ledge formation (1.1% vs. 14.4%), and greater instrument fracture (5.56% vs. 1.1%). These results indicate that NiTi rotary instruments result in better canal geometry and cause less canal transportation. Manual instrumentation using stainless steel files is safer than rotary instrumentation for inexperienced students. Intensive preclinical training is a prerequisite for using NiTi rotary instruments. These results prompted us to reconsider theoretical and practical coursework when teaching endodontics.

  17. Who and What Influences Choice of University? Student and University Perceptions

    Science.gov (United States)

    Johnston, Timothy C.

    2010-01-01

    Emerging peer-to-peer communication via social media, and the role of influential peers, is changing the way that marketers communicate with prospects. The model is changing from a sender-receiver model to one that includes influential peer-to-peer and receiver-to-sender communication. This research examines this phenomenon in the context of…

  18. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  19. Applications of Coding in Network Communications

    Science.gov (United States)

    Chang, Christopher SungWook

    2012-01-01

    This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…

  20. Local Farmers' Organisations: A Space for Peer-to-Peer Learning? The Case of Milk Collection Cooperatives in Morocco

    Science.gov (United States)

    Faysse, Nicolas; Srairi, Mohamed Taher; Errahj, Mostafa

    2012-01-01

    Purpose: The study investigated to what extent local farmers' organisations are spaces where farmers discuss, learn and innovate. Design/methodology/approach: Two milk collection cooperatives in Morocco were studied. The study analysed the discussion networks, their impacts on farmers' knowledge and innovation, and the performance of collective…

  1. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    Science.gov (United States)

    Faruq Ibn Ibrahimy, Abdullah; Rafiqul, Islam Md; Anwar, Farhat; Ibn Ibrahimy, Muhammad

    2013-12-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper.

  2. The Contribution of Online Peer-to-Peer Communication Among Patients With Adrenal Disease to Patient-Centered Care

    NARCIS (Netherlands)

    Kauw, D.; Repping-Wuts, H.; Noordzij, A.; Stikkelbroeck, N.; Hermus, A.R.; Faber, M.J.

    2015-01-01

    BACKGROUND: Addison's disease and Cushing's syndrome are rare. The Dutch Adrenal Society offers an online forum for Dutch adrenal patients to meet and communicate. However, little is known about the added value such a forum has for the delivery of patient-centered care. OBJECTIVE: Our aim was to

  3. The contribution of online peer-to-peer communication among patients with adrenal disease to patient-centered care.

    Science.gov (United States)

    Kauw, Dirkjan; Repping-Wuts, Han; Noordzij, Alida; Stikkelbroeck, Nike; Hermus, Ad; Faber, Marjan

    2015-02-25

    Addison's disease and Cushing's syndrome are rare. The Dutch Adrenal Society offers an online forum for Dutch adrenal patients to meet and communicate. However, little is known about the added value such a forum has for the delivery of patient-centered care. Our aim was to analyze the purposes of online patient-to-patient forum conversations, within the context of patient-centered care. For this study a consecutive sample of 300 questions ("threads") from the past 3.5 years was selected from the forum. The content of these patient-driven questions was analyzed based on the dimensions of patient-centeredness of the Picker Institute. This analysis was performed using ATLAS.ti. From the 390 questions analyzed, 80.8% (N=315) were intended to gain more information about the disease, the treatment, and to verify if other patients had similar complaints. To a much lesser extent (38/390, 9.7%), questions expressed a call for emotional support. Patients answered primarily by giving practical tips to fellow patients and to share their own experiences. On an online patient forum for Cushing's syndrome and Addison's disease, patients appear to primarily gain knowledge and, to a lesser extent, emotional support from their peers. This experience-based knowledge has become a very important information source. As such, patients can make a substantial contribution to the creation of patient-centered care if this knowledge is integrated into the care provided by health care professionals.

  4. Content-specific network analysis of peer-to-peer communication in an online community for smoking cessation.

    Science.gov (United States)

    Myneni, Sahiti; Cobb, Nathan K; Cohen, Trevor

    2016-01-01

    Analysis of user interactions in online communities could improve our understanding of health-related behaviors and inform the design of technological solutions that support behavior change. However, to achieve this we would need methods that provide granular perspective, yet are scalable. In this paper, we present a methodology for high-throughput semantic and network analysis of large social media datasets, combining semi-automated text categorization with social network analytics. We apply this method to derive content-specific network visualizations of 16,492 user interactions in an online community for smoking cessation. Performance of the categorization system was reasonable (average F-measure of 0.74, with system-rater reliability approaching rater-rater reliability). The resulting semantically specific network analysis of user interactions reveals content- and behavior-specific network topologies. Implications for socio-behavioral health and wellness platforms are also discussed.

  5. Peer-to-Peer JXTA Architecture for Continuing Mobile Medical Education Incorporated in Rural Public Health Centers

    OpenAIRE

    Rajasekaran, Rajkumar; Sriman Narayana Iyengar, Nallani Chackravatula

    2013-01-01

    Objectives: Mobile technology helps to improve continuing medical education; this includes all aspects of public health care as well as keeping one?s knowledge up-to-date. The program of continuing medical and health education is intertwined with mobile health technology, which forms an imperative component of national strategies in health. Continuing mobile medical education (CMME) programs are designed to ensure that all medical and health-care professionals stay up-to-date with the knowled...

  6. Advice on Life? Online Fan Forums as a Space for Peer-to-Peer Sex and Relationships Education

    Science.gov (United States)

    Masanet, Maria-Jose; Buckingham, David

    2015-01-01

    Previous research has pointed to the potential of entertainment media as a source of informal sex education for young people. New social media may offer additional potential in this respect. In this paper, we consider the pedagogical possibilities and limitations of online fan forums, via a case study of the forums of the controversial British…

  7. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  8. The Opportunity in Higher Education: How Open Education and Peer-to-Peer Networks Are Essential for Higher Education

    Science.gov (United States)

    Ondercin, David J.

    2010-01-01

    The university's role in the nation's economy is to increase its ability to transfer research to industry, generate new inventions and patents, and spin-off its technology in the form of startup companies. As such, there has been a movement in the USA and around the world to make universities "engines of innovation", and to enhance their ability…

  9. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    International Nuclear Information System (INIS)

    Ibrahimy, Abdullah Faruq Ibn; Rafiqul, Islam Md; Anwar, Farhat; Ibrahimy, Muhammad Ibn

    2013-01-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper

  10. City tourism and the sharing economy – potential effects of online peer-to-peer marketplaces on urban property markets

    Directory of Open Access Journals (Sweden)

    Stefan Brauckmann

    2017-09-01

    Full Text Available Purpose – The purpose of this paper is to investigate the potential effects of the so-called sharing economy on growing city tourism as well as on urban property markets. Design/methodology/approach – Official statistical data and a geo-information system (GIS are used on a small scale in order to identify concentration processes among overnight visitors and the potential concomitant conflicts with other interest groups. Findings – Currently, the effects of the sharing economy on housing markets and city tourism are barely measurable and are limited to a few central locations. However, a growing demand can be discerned in housing-like accommodation concepts which can be operated via booking platforms. As there is likely to be strong future growth in this area, continuous market observation (monitoring is urgently advised. Research limitations/implications – Official statistics only allow an analysis of overnight guests staying with larger accommodation providers. Booking platforms for holiday homes and other temporary accommodation options have such little interest in data transparency that the overall phenomenon of city tourism can be addressed only in part. Practical implications – Associating various data within the GIS enables municipal administrators and urban planners to identify potential sources of conflict within the property markets in good time and effectively counteract these where possible. Social implications – Increases in property prices directly attributable to growing city tourism may lead to the displacement of less financially secure members of the established population as well as businesses. Originality/value – The sharing economy is a relatively new research topic which will become increasingly important in future. The identification of potential sources of conflict due to tourist accommodation has therefore not yet been comprehensively carried out on a small scale.

  11. What makes a sustainable business model successful? : An empirical comparison of two peer-to-peer goods-sharing platforms

    NARCIS (Netherlands)

    Piscicelli, Laura; Ludden, Geke D.S.; Cooper, Tim

    2018-01-01

    Sustainable business models are intended to create economic value while benefitting the environment and society. Their wider adoption and diffusion is necessary to tackle pressing societal problems. How they are implemented and what determines their success (or lack thereof) in the market is not yet

  12. MOBI-DIC: MOBIle DIssemination of loCal information in Peer-to-Peer Wireless Networks, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Information Technology (IT) is a key element in the successful achievement of NASA's strategic goals. Modern IT tools and techniques have the capability to redefine...

  13. Distributed Identification of Top-l Inner Product Elements and its Application in a Peer-to-Peer Network

    Data.gov (United States)

    National Aeronautics and Space Administration — Inner product computation is an important primitive used in many techniques for feature dependency detection, distance computation, clustering and correlation...

  14. Effectiveness of web-based self-disclosure peer-to-peer support for weight loss: randomized controlled trial.

    Science.gov (United States)

    Imanaka, Mie; Ando, Masahiko; Kitamura, Tetsuhisa; Kawamura, Takashi

    2013-07-09

    Obesity is one of the most common public health problems in the industrialized world as a cause of noncommunicable diseases. Although primarily used for one-on-one communication, email is available for uninterrupted support for weight loss, but little is known about the effects of dietitian group counseling for weight control via the Internet. We developed a Web-based self-disclosure health support (WSHS) system for weight loss. This study aims to compare the effect of weight change between those using the WSHS and those using the email health support (EHS). This study was designed as an open prospective individual randomized controlled trial. Eligible participants were aged 35 to 65 years with a body mass index (BMI) of ≥25.0 in their latest health examination. Participants were randomly assigned to either the WSHS group or the EHS group. Thirteen registered dietitians under the direction of a principal dietitian each instructed 6 to 8 participants from the respective groups. All participants in the WSHS group could receive nutritional advice and calculate their nutritive intake from a photograph of a meal on their computer screen from the Internet sent to them by their dietitian, receive supervision from the registered dietitian, and view fellow participants' weight changes and lifestyle modifications. In the EHS group, a participant could receive one-on-one nutritional advice and calculate his/her nutritive intake from the photograph of a meal on computer screen sent by email from his/her dietitian, without being able to view fellow participants' status. The follow-up period was 12 weeks for both groups. The primary outcome measure was change in body weight. The secondary outcome measure included changes in BMI and waist circumference. The intergroup comparison of the changes before and after intervention was evaluated using analysis of covariance. A total of 193 participants were randomly assigned to either the WSHS group (n=97) or the EHS group (n=96). Ten from the WSHS group and 8 from the EHS group dropped out during the study period, and the remaining 87 in the WSHS group and 88 in the EHS group were followed up completely. Weight loss was significantly greater in the WSHS group than in the EHS group (-1.6 kg vs -0.7 kg; adjusted P=.04). However, there were few differences in waist circumference between the 2 groups. (-3.3 cm vs -3.0 cm; adjusted P=.71). Our newly developed WSHS system using forced self-disclosure had better short-term weight loss results. Further study in a longer-term trial is necessary to determine what effects this type of intervention might have on long-term cardiovascular disease. University Hospital Medical Information Network Clinical Trial Registration (UMIN-CTR): UMIN000009147; https://upload.umin.ac.jp/cgi-open-bin/ctr/ctr.cgi?function=brows&action=brows&type=summary&recptno=R000010719&language=E (Archived by WebCite at http://www.webcitation.org/6HTCkhb1p).

  15. Heart to Heart, Student to Student

    Science.gov (United States)

    Ambler, Marjane

    2010-01-01

    AIDS affects thousands of American Indians and Alaska Natives: They have the third highest rate of AIDS diagnosis in the United States, despite having the smallest population. To tackle this problem, the federal agency has provided capacity-building grants to seven tribal colleges and universities (TCUs) for an innovative, peer-to-peer initiative.…

  16. Dental students' perceptions about the endodontic treatments performed using NiTi rotary instruments and hand stainless steel files.

    Science.gov (United States)

    Martins, Renata Castro; Seijo, Marília Oliveira Saraiva; Ferreira, Efigênia Ferreira; Paiva, Saul Martins; Ribeiro Sobrinho, Antônio Paulino

    2012-01-01

    This study evaluated the perceptions of Brazilian undergraduate dental students about the endodontic treatments performed using NiTi rotary instruments and hand stainless steel. Data were collected using a questionnaire administered to undergraduate dental students enrolled in endodontic disciplines. The students were divided into 3 groups: G1, students who had treated straight canals with SS hand instruments; G2, students who had treated curved canals with SS hand instruments; and G3, students who had treated both straight and curved canals with NiTi rotary instruments. The number of endodontic treatments performed, types of treated teeth, students' learning, time spent, encountered difficulties, quality of endodontic treatment and characteristics of the employed technique were analyzed. There was a 91.3% rate of return for the questionnaires. Mandibular molars were the most frequently treated teeth, followed by maxillary incisors. The Kruskal-Wallis test showed no differences in learning (p=0.528) or in the characteristics of the technique employed (p=0.560) among the three groups. G3 students performed a greater number of endodontic treatments (pendodontic treatments differed only between G1 and G2 (p=0.045). The use of NiTi rotary instruments should be included in undergraduate dental curriculum, contributing to the increase of patients assisted and consequently to improve the clinical experience of the students.

  17. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  18. XML Files

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  19. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  20. Evaluation of an Intercultural Peer Training for Incoming Undergraduate Students at an International University in Germany

    Directory of Open Access Journals (Sweden)

    Karina K. Kedzior

    2015-09-01

    Full Text Available University education is increasingly becoming international. Therefore, it is important that universities prepare their new students for the challenges of an intercultural academic environment. The aim of the current study was to quantitatively evaluate the effectiveness of an intercultural peer-to-peer training offered to all new incoming students at Jacobs University Bremen, Germany. The training aims to facilitate the social and academic integration of students at this international university. A total of 117 first-year undergraduate students completed a pen-and-paper questionnaire with 47 items one semester (6 months after attending the intercultural training. The results suggest that participants liked the structure of the training and the use of senior students as peer trainers. It appears that the training improved the awareness of the effects of culture (own and other on the social life of students. However, the training was less adequate at preparing the participants for the student-centered academic culture at this university. In light of its cost-effectiveness, the intercultural training could be easily adopted for use at other universities as part of the campus-wide orientation activities. However, regardless of their culture, all new university students require more assistance to academically adapt to and succeed in multicultural classrooms.

  1. Introducing evidence-based dentistry to dental students using histology.

    Science.gov (United States)

    Lallier, Thomas E

    2014-03-01

    The expansion of evidence-based dentistry (EBD) is essential to the continued growth and development of the dental profession. Expanding EBD requires increased emphasis on critical thinking skills during dental education, as noted in the American Dental Education Association's Competencies for the New General Dentist. In order to achieve this goal, educational exercises must be introduced to increase the use of critical thinking skills early in the dental curriculum, with continued reinforcement as students progress through subsequent years. Described in this article is one approach to increasing student exposure to critical thinking during the early basic science curriculum-specifically, within the confines of a traditional histology course. A method of utilizing the medical and dental research literature to reinforce and enliven the concepts taught in histology is described, along with an approach for using peer-to-peer presentations to demonstrate the tools needed to critically evaluate research studies and their presentation in published articles. This approach, which could be applied to any basic science course, will result in a stronger foundation on which students can build their EBD and critical thinking skills.

  2. MS PHD'S: Effective Strategies for the Retention and Advancement of URM Students in ESS

    Science.gov (United States)

    Escalera, J.; Burgess, A. K.; Pace, L.; Scott, O.; Strickland, J.; Johnson, A.; Williamson Whitney, V.; Ithier-Guzman, W.

    2012-12-01

    The Minorities Striving and Pursuing Higher Degrees of Success (MS PHD'S) Professional Development Program in Earth system science (ESS) is a model initiative for improving the retention of underrepresented minority (URM) students in STEM fields. Entering its ninth cohort, MS PHD'S remains committed to helping URM undergraduate and graduate students achieve outstanding careers in ESS. MS PHD'S facilitates URM student achievement through a three-phase program designed to increase student exposure to the ESS community. By engaging in a series of professional development and skill building exercises, peer-to-peer community building activities, participation in scientific society conferences and workshops, mentoring by URM and other scientists, and a virtual community, URM students gain the confidence and support necessary to achieve their academic goals and enter the ESS workforce. Since its inception, MS PHD'S continues to support 189 participants. Of these 189 participants, 35 have advanced from undergraduate and graduate academic pathways to completion of their PhD and another 60 are currently enrolled in doctoral programs. MS PHD'S maintains close ties with program alumni to further support retention, inclusivity, and broadening participation of URM students and graduates in STEM activities. Its model is built on reengaging alumni to become mentors and leaders for each new cohort as well as facilitating valuable opportunities for alumni to advance in their ESS related academic and professional career pathways.

  3. A Virtual Mental Health Clinic for University Students: A Qualitative Study of End-User Service Needs and Priorities

    Science.gov (United States)

    Gulliver, Amelia; Chan, Jade KY; Bennett, Kylie; Griffiths, Kathleen M

    2015-01-01

    Background Help seeking for mental health problems among university students is low, and Internet-based interventions such as virtual clinics have the potential to provide private, streamlined, and high quality care to this vulnerable group. Objective The objective of this study was to conduct focus groups with university students to obtain input on potential functions and features of a university-specific virtual clinic for mental health. Methods Participants were 19 undergraduate students from an Australian university between 19 and 24 years of age. Focus group discussion was structured by questions that addressed the following topics: (1) the utility and acceptability of a virtual mental health clinic for students, and (2) potential features of a virtual mental health clinic. Results Participants viewed the concept of a virtual clinic for university students favorably, despite expressing concerns about privacy of personal information. Participants expressed a desire to connect with professionals through the virtual clinic, for the clinic to provide information tailored to issues faced by students, and for the clinic to enable peer-to-peer interaction. Conclusions Overall, results of the study suggest the potential for virtual clinics to play a positive role in providing students with access to mental health support. PMID:26543908

  4. Perspective: the potential of student organizations for developing leadership: one school's experience.

    Science.gov (United States)

    Veronesi, Michael C; Gunderman, Richard B

    2012-02-01

    Leadership development is vital to the future of medicine. Some leadership development may take place through the formal curriculum of the medical school, yet extracurricular activities, such as student government and affiliated student organizations, can provide additional, highly valuable leadership development opportunities. These organizations and their missions can serve as catalysts for students to work with one another, with the faculty and administration of the medical school, with the community, and with local, regional, and national organizations. The authors have organized this discussion of the leadership development potential of student organizations around six important principles of leadership: ownership, experience, efficacy, sense of community, service learning, and peer-to-peer mentoring. They provide practical examples of these leadership principles from one institution. They do not presume that the school is unique, but they do believe their practical examples help to illuminate the potential of extracurricular programs for enhancing the leadership capabilities of future physicians. In addition, the authors use their examples to demonstrate how the medical school, its surrounding community, and the profession of medicine can benefit from promoting leadership through student organizations.

  5. file 6

    African Journals Online (AJOL)

    Within the school setting, sexual harassment university students results from the increase encompasses a wide range .... university students' perception that forced southeast Nigeria. ..... Journal of Counseling and Consulting. 16.Brener, N.D. ...

  6. JENDL special purpose file

    International Nuclear Information System (INIS)

    Nakagawa, Tsuneo

    1995-01-01

    In JENDL-3,2, the data on all the reactions having significant cross section over the neutron energy from 0.01 meV to 20 MeV are given for 340 nuclides. The object range of application extends widely, such as the neutron engineering, shield and others of fast reactors, thermal neutron reactors and nuclear fusion reactors. This is a general purpose data file. On the contrary to this, the file in which only the data required for a specific application field are collected is called special purpose file. The file for dosimetry is a typical special purpose file. The Nuclear Data Center, Japan Atomic Energy Research Institute, is making ten kinds of JENDL special purpose files. The files, of which the working groups of Sigma Committee are in charge, are listed. As to the format of the files, ENDF format is used similarly to JENDL-3,2. Dosimetry file, activation cross section file, (α, n) reaction data file, fusion file, actinoid file, high energy data file, photonuclear data file, PKA/KERMA file, gas production cross section file and decay data file are described on their contents, the course of development and their verification. Dosimetry file and gas production cross section file have been completed already. As for the others, the expected time of completion is shown. When these files are completed, they are opened to the public. (K.I.)

  7. Weakest students benefit most from a customized educational experience for Generation Y students

    Directory of Open Access Journals (Sweden)

    Romesh P. Nalliah

    2014-12-01

    Full Text Available Most current dental students were born in the 1980s and 1990s and are defined as Generation Y (Gen Y. The authors developed a customized educational experience that brought together some characteristics of Gen Y and the objective of this educational experience was to develop the critical thinking skills of Gen Y students. The objective of the current study is to evaluate outcomes from pre-session and post-session tests. Additionally, we wanted to integrate aspects of team-based learning, self-directed learning and peer-to-peer teaching as a means of reducing the need for intense faculty supervision but maintain positive educational outcomes. Single bitewing x-ray was displayed and informal class discussion was facilitated by a Senior Tutor. A list of questions and concepts that needed to be understood more clearly was made. Student groups self allocated research tasks to members. After conducting research, students presented to class and faculty facilitated discussions aiming to foster critical thinking and identify what information needed to be more thoroughly understood. Pre-session and post-session tests were conducted and compared. Students who scored below 85% in their pre-session test improved their score in the post-session test by a mean of 9.5 points (p = 0.02. Those who scored above 95% in their pre-session test scored less in the post-session test (mean reduction of 6.31 points, p = 0.001. Findings from this study demonstrate that the weakest students in the class (those who scored below 85% correct in the pre-session test benefitted most from this unique educational experience.

  8. Weakest students benefit most from a customized educational experience for Generation Y students.

    Science.gov (United States)

    Nalliah, Romesh P; Allareddy, Veerasathpurush

    2014-01-01

    Most current dental students were born in the 1980s and 1990s and are defined as Generation Y (Gen Y). The authors developed a customized educational experience that brought together some characteristics of Gen Y and the objective of this educational experience was to develop the critical thinking skills of Gen Y students. The objective of the current study is to evaluate outcomes from pre-session and post-session tests. Additionally, we wanted to integrate aspects of team-based learning, self-directed learning and peer-to-peer teaching as a means of reducing the need for intense faculty supervision but maintain positive educational outcomes. Single bitewing x-ray was displayed and informal class discussion was facilitated by a Senior Tutor. A list of questions and concepts that needed to be understood more clearly was made. Student groups self allocated research tasks to members. After conducting research, students presented to class and faculty facilitated discussions aiming to foster critical thinking and identify what information needed to be more thoroughly understood. Pre-session and post-session tests were conducted and compared. Students who scored below 85% in their pre-session test improved their score in the post-session test by a mean of 9.5 points (p = 0.02). Those who scored above 95% in their pre-session test scored less in the post-session test (mean reduction of 6.31 points, p = 0.001). Findings from this study demonstrate that the weakest students in the class (those who scored below 85% correct in the pre-session test) benefitted most from this unique educational experience.

  9. How fifth grade Latino/a bilingual students use their linguistic resources in the classroom and laboratory during science instruction

    Science.gov (United States)

    Stevenson, Alma R.

    2013-12-01

    This qualitative, sociolinguistic research study examines how bilingual Latino/a students use their linguistic resources in the classroom and laboratory during science instruction. This study was conducted in a school in the southwestern United States serving an economically depressed, predominantly Latino population. The object of study was a fifth grade science class entirely comprised of language minority students transitioning out of bilingual education. Therefore, English was the means of instruction in science, supported by informal peer-to-peer Spanish-language communication. This study is grounded in a social constructivist paradigm. From this standpoint, learning science is a social process where social, cultural, and linguistic factors are all considered crucial to the process of acquiring scientific knowledge. The study was descriptive in nature, examining specific linguistic behaviors with the purpose of identifying and analyzing the linguistic functions of students' utterances while participating in science learning. The results suggest that students purposefully adapt their use of linguistic resources in order to facilitate their participation in science leaning. What is underscored in this study is the importance of explicitly acknowledging, supporting, and incorporating bilingual students' linguistic resources both in Spanish and English into the science classroom in order to optimize students' participation and facilitate their understanding.

  10. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  11. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  12. PC Graphic file programing

    International Nuclear Information System (INIS)

    Yang, Jin Seok

    1993-04-01

    This book gives description of basic of graphic knowledge and understanding and realization of graphic file form. The first part deals with graphic with graphic data, store of graphic data and compress of data, programing language such as assembling, stack, compile and link of program and practice and debugging. The next part mentions graphic file form such as Mac paint file, GEM/IMG file, PCX file, GIF file, and TIFF file, consideration of hardware like mono screen driver and color screen driver in high speed, basic conception of dithering and conversion of formality.

  13. Exploring Online Students' Self-Regulated Learning with Self-Reported Surveys and Log Files: A Data Mining Approach

    Science.gov (United States)

    Cho, Moon-Heum; Yoo, Jin Soung

    2017-01-01

    Many researchers who are interested in studying students' online self-regulated learning (SRL) have heavily relied on self-reported surveys. Data mining is an alternative technique that can be used to discover students' SRL patterns from large data logs saved on a course management system. The purpose of this study was to identify students' online…

  14. file 4

    African Journals Online (AJOL)

    students who were selected by a systematic sampling method. A semi-structured .... response rate of 96.9%. The mean age of 69.2% of respondents, while reduction in food .... natural disasters, and travel health world summit on global ...

  15. Decay data file based on the ENSDF file

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, J. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1997-03-01

    A decay data file with the JENDL (Japanese Evaluated Nuclear Data Library) format based on the ENSDF (Evaluated Nuclear Structure Data File) file was produced as a tentative one of special purpose files of JENDL. The problem using the ENSDF file as primary source data of the JENDL decay data file is presented. (author)

  16. Updating a Strategic Highway Safety Plan : Learning from the Idaho Transportation Department (ITD) - Proceedings from the Federal Highway Administration's (FHWA) Highway Safety Peer-to-Peer Exchange Program

    Science.gov (United States)

    2009-10-01

    On November 4, 2009, ITDs Office of Highway Operations and Safety partnered with the FHWA Office of Safety to host a one-day peer exchange. This event focused on the update of Idahos Strategic Highway Safety Plan (SHSP), entitled Toward Zero...

  17. Integrating Metropolitan Planning Organizations into the State's Highway Safety Improvement Program (HSIP) : Proceedings from the Federal Highway Administration's Peer-to-Peer Exchange Program

    Science.gov (United States)

    2010-06-01

    This report provides a summary of a peer exchange sponsored by the Association of New York State Metropolitan Planning Organizations (NYSMPO) and the New York State Department of Transportation (NYSDOT). It also includes proposed next steps developed...

  18. Characterization of Temporal Semantic Shifts of Peer-to-Peer Communication in a Health-Related Online Community: Implications for Data-driven Health Promotion.

    Science.gov (United States)

    Sridharan, Vishnupriya; Cohen, Trevor; Cobb, Nathan; Myneni, Sahiti

    2016-01-01

    With online social platforms gaining popularity as venues of behavior change, it is important to understand the ways in which these platforms facilitate peer interactions. In this paper, we characterize temporal trends in user communication through mapping of theoretically-linked semantic content. We used qualitative coding and automated text analysis to assign theoretical techniques to peer interactions in an online community for smoking cessation, subsequently facilitating temporal visualization of the observed techniques. Results indicate manifestation of several behavior change techniques such as feedback and monitoring' and 'rewards'. Automated methods yielded reasonable results (F-measure=0.77). Temporal trends among relapsers revealed reduction in communication after a relapse event. This social withdrawal may be attributed to failure guilt after the relapse. Results indicate significant change in thematic categories such as 'social support', 'natural consequences', and 'comparison of outcomes' pre and post relapse. Implications for development of behavioral support technologies that promote long-term abstinence are discussed.

  19. Social interaction in type 2 diabetes computer-mediated environments: How inherent features of the channels influence peer-to-peer interaction.

    Science.gov (United States)

    Lewinski, Allison A; Fisher, Edwin B

    2016-06-01

    Interventions via the internet provide support to individuals managing chronic illness. The purpose of this integrative review was to determine how the features of a computer-mediated environment influence social interactions among individuals with type 2 diabetes. A combination of MeSH and keyword terms, based on the cognates of three broad groupings: social interaction, computer-mediated environments, and chronic illness, was used to search the PubMed, PsychInfo, Sociology Research Database, and Cumulative Index to Nursing and Allied Health Literature databases. Eleven articles met the inclusion criteria. Computer-mediated environments enhance an individual's ability to interact with peers while increasing the convenience of obtaining personalized support. A matrix, focused on social interaction among peers, identified themes across all articles, and five characteristics emerged: (1) the presence of synchronous and asynchronous communication, (2) the ability to connect with similar peers, (3) the presence or absence of a moderator, (4) personalization of feedback regarding individual progress and self-management, and (5) the ability of individuals to maintain choice during participation. Individuals interact with peers to obtain relevant, situation-specific information and knowledge about managing their own care. Computer-mediated environments facilitate the ability of individuals to exchange this information despite temporal or geographical barriers that may be present, thus improving T2D self-management. © The Author(s) 2015.

  20. A Unified Peer-to-Peer Database Framework for XQueries over Dynamic Distributed Content and its Application for Scalable Service Discovery

    CERN Document Server

    Hoschek, Wolfgang

    In a large distributed system spanning administrative domains such as a Grid, it is desirable to maintain and query dynamic and timely information about active participants such as services, resources and user communities. The web services vision promises that programs are made more flexible and powerful by querying Internet databases (registries) at runtime in order to discover information and network attached third-party building blocks. Services can advertise themselves and related metadata via such databases, enabling the assembly of distributed higher-level components. In support of this vision, this thesis shows how to support expressive general-purpose queries over a view that integrates autonomous dynamic database nodes from a wide range of distributed system topologies. We motivate and justify the assertion that realistic ubiquitous service and resource discovery requires a rich general-purpose query language such as XQuery or SQL. Next, we introduce the Web Service Discovery Architecture (WSDA), wh...

  1. Modelos peer-to-peer aplicados a sistemas de comunicação multimédia móveis

    OpenAIRE

    Urbano, António Carlos Alves

    2006-01-01

    Mestrado em Sistemas de Informação É sobejamente conhecido o impacto das TICs (Tecnologias de Informação e Comunicação) no dia-a-dia das sociedades modernas e industrializadas. A adesão maciça à comunicação móvel de voz, que (ainda) está a decorrer e que teve o seu início no final dos anos 80, levou a uma nova área de pesquisa aplicada nas TICs: a comunicação móvel de dados. Desde então, surgiram variadíssimos conceitos, tecnologias e standards de comunicação, como por exemplo,...

  2. UPIN Group File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Group Unique Physician Identifier Number (UPIN) File is the business entity file that contains the group practice UPIN and descriptive information. It does NOT...

  3. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  4. Student use of a Learning Management System for group projects: A case study investigating interaction, collaboration, and knowledge construction

    Science.gov (United States)

    Lonn, Steven D.

    Web-based Learning Management Systems (LMS) allow instructors and students to share instructional materials, make class announcements, submit and return course assignments, and communicate with each other online. Previous LMS-related research has focused on how these systems deliver and manage instructional content with little concern for how students' constructivist learning can be encouraged and facilitated. This study investigated how students use LMS to interact, collaborate, and construct knowledge within the context of a group project but without mediation by the instructor. The setting for this case study was students' use in one upper-level biology course of the local LMS within the context of a course-related group project, a mock National Institutes of Health grant proposal. Twenty-one groups (82 students) voluntarily elected to use the LMS, representing two-thirds of all students in the course. Students' peer-to-peer messages within the LMS, event logs, online surveys, focus group interviews, and instructor interviews were used in order to answer the study's overarching research question. The results indicate that students successfully used the LMS to interact and, to a significant extent, collaborate, but there was very little evidence of knowledge construction using the LMS technology. It is possible that the ease and availability of face-to-face meetings as well as problems and limitations with the technology were factors that influenced whether students' online basic interaction could be further distinguished as collaboration or knowledge construction. Despite these limitations, students found several tools and functions of the LMS useful for their online peer interaction and completion of their course project. Additionally, LMS designers and implementers are urged to consider previous literature on computer-supported collaborative learning environments in order to better facilitate independent group projects within these systems. Further research is

  5. A File Archival System

    Science.gov (United States)

    Fanselow, J. L.; Vavrus, J. L.

    1984-01-01

    ARCH, file archival system for DEC VAX, provides for easy offline storage and retrieval of arbitrary files on DEC VAX system. System designed to eliminate situations that tie up disk space and lead to confusion when different programers develop different versions of same programs and associated files.

  6. Text File Comparator

    Science.gov (United States)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  7. Not Your Typical Simulation Workshop: Using LEGOs to Train Medical Students on the Practice of Effective Communication.

    Science.gov (United States)

    Papanagnou, Dimitrios; Lee, Hyunjoo; Rodriguez, Carlos; Zhang, Xiao Chi C; Rudner, Joshua

    2018-01-21

    As students in the health professions transition from the classroom into the clinical environment, they will be expected to effectively communicate with their team members and their patients. Effective communication skills are essential to their ability to effectively contribute to their clinical team and the patient care they deliver. The authors propose an interactive workshop that can support students' deliberate practice of communication skills. The authors designed a simulation workshop that affords students the opportunity to practice their communication and peer-to-peer coaching skills. Using LEGOs, a one-hour workshop was conducted with medical students. Students were divided into groups of two. Each student took on a different role: teacher or builder. Teachers were tasked with instructing builders on how to construct a pre-made LEGO structure, not allowing builders to look at the structure. A group debriefing followed to evaluate the activity and explore the themes that emerged. Twenty first-year medical students and 25 fourth-year medical students participated in this activity. Most groups were successful in reproducing the pre-made structure. Groups that pre-briefed before building were most successful. Unsuccessful groups did not define orientation or direction in mutually understood terms, resulting in the creation of an incorrect mirror image of the structure - a common phenomenon seen during the teaching of procedures in the clinical learning environment. The workshop was well received. Students made requests to have similar sessions throughout their training to better support the development of effective communication skills. The workshop can easily be applied to other specialties to assist with procedural skills instruction or in workshops focusing on effective communication.

  8. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

    Science.gov (United States)

    2008-01-29

    Crime and the Internet, December 2006, [http://www.sigma.com.pl/pliki/ albums /userpics/10007/Virtual_Criminology_Report_ 2006.pdf]. 22 Gnutella emerged...as the first fully decentralized peer-to-peer protocol in 2000, and was used on the Internet to share and swap music files in MP3 compression format...The music industry was often frustrated in their efforts to counter this peer-to-peer technology because it could not identify a main controlling

  9. Not Your Typical Simulation Workshop: Using LEGOs to Train Medical Students on the Practice of Effective Communication

    Science.gov (United States)

    Lee, Hyunjoo; Rodriguez, Carlos; Zhang, Xiao Chi C; Rudner, Joshua

    2018-01-01

    As students in the health professions transition from the classroom into the clinical environment, they will be expected to effectively communicate with their team members and their patients. Effective communication skills are essential to their ability to effectively contribute to their clinical team and the patient care they deliver. The authors propose an interactive workshop that can support students’ deliberate practice of communication skills. The authors designed a simulation workshop that affords students the opportunity to practice their communication and peer-to-peer coaching skills. Using LEGOs, a one-hour workshop was conducted with medical students. Students were divided into groups of two. Each student took on a different role: teacher or builder. Teachers were tasked with instructing builders on how to construct a pre-made LEGO structure, not allowing builders to look at the structure. A group debriefing followed to evaluate the activity and explore the themes that emerged. Twenty first-year medical students and 25 fourth-year medical students participated in this activity. Most groups were successful in reproducing the pre-made structure. Groups that pre-briefed before building were most successful. Unsuccessful groups did not define orientation or direction in mutually understood terms, resulting in the creation of an incorrect mirror image of the structure – a common phenomenon seen during the teaching of procedures in the clinical learning environment. The workshop was well received. Students made requests to have similar sessions throughout their training to better support the development of effective communication skills. The workshop can easily be applied to other specialties to assist with procedural skills instruction or in workshops focusing on effective communication. PMID:29568715

  10. Health-profession students' teaching and learning expectations in Ugandan medical schools: pre- and postcommunity placement comparison.

    Science.gov (United States)

    Wakida, Edith K; Ruzaaza, Gad; Muggaga, Kintu; Akera, Peter; Oria, Hussein; Kiguli, Sarah

    2015-01-01

    The benefits of community-based medical education for both students and teachers are becoming increasingly clear. However, there is paucity of information about the importance of incorporating students' thoughts in the community-based education curriculum and the impact it has on their intentions to work in rural communities. The purpose of this study was to assess the teaching and learning expectations before and after placement of health-profession students going for community placement for the first time and make suggestions for improvement of the community-based programs. The study was a cross-sectional survey with both structured and unstructured questions. Participants were recruited from four medical schools in Uganda targeting 100% participation of health-profession students going for community placement in 2014. In total, 454 and 305 participants responded to self-administered questionnaires before and after community placement, respectively; and they were from different programs and years of study. Students' learning expectations before placement, in ranking were: community engagement, interpersonal skills, community diagnosis, clinical skills, lifestyle practices, and patient management. After placement, the order of ranking was: interpersonal skills, community engagement, community diagnosis, lifestyle practices, clinical skills, and patient management. Most of the students had prior rural exposure and expected to do community engagement. However, after community placement they indicated having developed interpersonal skills. The various health-profession students were able to harmoniously work together to achieve a common purpose, which they find difficult to do in a classroom environment. Having student teams comprised of different health programs and years of study going for community placement together promoted peer-to-peer mentorship and enhanced team building during community placement.

  11. Finding the right doctoral thesis - an innovative research fair for medical students.

    Science.gov (United States)

    Steffen, Julius; Grabbert, Markus; Pander, Tanja; Gradel, Maximilian; Köhler, Lisa-Maria; Fischer, Martin R; von der Borch, Philip; Dimitriadis, Konstantinos

    2015-01-01

    The importance of research, as promoted by the CanMEDS framework, is widely acknowledged. Many medical students in Germany work on a research project as part of their doctoral thesis whilst still going to medical school. However, a significant amount of projects are abandoned unfinished, which leads to substantial wastage of resources. One reason for this is an information deficit concerning undergraduate research projects. To counteract this, we introduced an annual event at LMU Munich called DoktaMed with more than 600 visitors each year. It combines medical convention and research fair including keynote lectures, workshops and poster sessions as well as an exhibition of research groups and institutes. DoktaMed is a peer-to-peer event organized by a team of 40 students. A needs analysis before its implementation underlined the information deficit as a possible cause for the high rate of abandoned projects. In the annual evaluation, visitors of DoktaMed rate the event with an average grade of 2.1 on a six-level Likert scale (n=558, SD=1.06, with "1=very good", "6=poor"). They stated to now feel better informed about the topic and regarded visiting DoktaMed as a worthwhile investment of time. Students are generally satisfied with the event and feel better informed after visiting DoktaMed. However, many students never visit DoktaMed for various reasons. A possible improvement would be to present a greater number of clinical studies in addition to the laboratory work that DoktaMed focuses on now. Evaluation after six years of DoktaMed is very promising. Visitors seem to be better informed. Nevertheless there is space for improvement in order to get more students and more faculty members involved. More studies are needed to assess long-term effects.

  12. Finding the right doctoral thesis – an innovative research fair for medical students

    Directory of Open Access Journals (Sweden)

    Steffen, Julius

    2015-08-01

    Full Text Available Introduction: The importance of research, as promoted by the framework, is widely acknowledged. Many medical students in Germany work on a research project as part of their doctoral thesis whilst still going to medical school. However, a significant amount of projects are abandoned unfinished, which leads to substantial wastage of resources. One reason for this is an information deficit concerning undergraduate research projects.Project description: To counteract this, we introduced an annual event at LMU Munich called with more than 600 visitors each year. It combines medical convention and research fair including keynote lectures, workshops and poster sessions as well as an exhibition of research groups and institutes. is a peer-to-peer event organized by a team of 40 students. Results: A needs analysis before its implementation underlined the information deficit as a possible cause for the high rate of abandoned projects. In the annual evaluation, visitors of rate the event with an average grade of 2.1 on a six-level Likert scale (n=558, SD=1.06, with "1=very good", "6=poor". They stated to now feel better informed about the topic and regarded visiting as a worthwhile investment of time.Discussion: Students are generally satisfied with the event and feel better informed after visiting . However, many students never visit DoktaMed for various reasons. A possible improvement would be to present a greater number of clinical studies in addition to the laboratory work that focuses on now.Conclusion: Evaluation after six years of is very promising. Visitors seem to be better informed. Nevertheless there is space for improvement in order to get more students and more faculty members involved. More studies are needed to assess long-term effects.

  13. Source Reference File

    Data.gov (United States)

    Social Security Administration — This file contains a national set of names and contact information for doctors, hospitals, clinics, and other facilities (known collectively as sources) from which...

  14. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  15. RRB Earnings File (RRBERN)

    Data.gov (United States)

    Social Security Administration — RRBERN contains records for all beneficiaries on the RRB's PSSVES file who's SSNs are validated through the SVES processing. Validated output is processed through...

  16. 76 FR 62092 - Filing Procedures

    Science.gov (United States)

    2011-10-06

    ... INTERNATIONAL TRADE COMMISSION Filing Procedures AGENCY: International Trade Commission. ACTION: Notice of issuance of Handbook on Filing Procedures. SUMMARY: The United States International Trade Commission (``Commission'') is issuing a Handbook on Filing Procedures to replace its Handbook on Electronic...

  17. Perceived impact on student engagement when learning middle school science in an outdoor setting

    Science.gov (United States)

    Abbatiello, James

    Human beings have an innate need to spend time outside, but in recent years children are spending less time outdoors. It is possible that this decline in time spent outdoors could have a negative impact on child development. Science teachers can combat the decline in the amount of time children spend outside by taking their science classes outdoors for regular classroom instruction. This study identified the potential impacts that learning in an outdoor setting might have on student engagement when learning middle school science. One sixth-grade middle school class participated in this case study, and students participated in outdoor intervention lessons where the instructional environment was a courtyard on the middle school campus. The outdoor lessons consisted of the same objectives and content as lessons delivered in an indoor setting during a middle school astronomy unit. Multiple sources of data were collected including questionnaires after each lesson, a focus group, student work samples, and researcher observations. The data was triangulated, and a vignette was written about the class' experiences learning in an outdoor setting. This study found that the feeling of autonomy and freedom gained by learning in an outdoor setting, and the novelty of the outdoor environment did increase student engagement for learning middle school science. In addition, as a result of this study, more work is needed to identify how peer to peer relationships are impacted by learning outdoors, how teachers could best utilize the outdoor setting for regular science instruction, and how learning in an outdoor setting might impact a feeling of stewardship for the environment in young adults.

  18. FHEO Filed Cases

    Data.gov (United States)

    Department of Housing and Urban Development — The dataset is a list of all the Title VIII fair housing cases filed by FHEO from 1/1/2007 - 12/31/2012 including the case number, case name, filing date, state and...

  19. Efficient File Sharing by Multicast - P2P Protocol Using Network Coding and Rank Based Peer Selection

    Science.gov (United States)

    Stoenescu, Tudor M.; Woo, Simon S.

    2009-01-01

    In this work, we consider information dissemination and sharing in a distributed peer-to-peer (P2P highly dynamic communication network. In particular, we explore a network coding technique for transmission and a rank based peer selection method for network formation. The combined approach has been shown to improve information sharing and delivery to all users when considering the challenges imposed by the space network environments.

  20. Download this PDF file

    African Journals Online (AJOL)

    5,. May. 1923, p. 287. ISouth African Military Schools) p 287. CGS Box 231, File 31/0/2. .... One gains the impression that the sphere .... tions, Anthropology, Sociology and Man Manage- ment. ... of the word, possesses personality and initiative,.

  1. MMLEADS Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare-Medicaid Linked Enrollee Analytic Data Source (MMLEADS) Public Use File (PUF) contains demographic, enrollment, condition prevalence, utilization, and...

  2. Hospital Service Area File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is derived from the calendar year inpatient claims data. The records contain number of discharges, length of stay, and total charges summarized by provider...

  3. Patient Treatment File (PTF)

    Data.gov (United States)

    Department of Veterans Affairs — This database is part of the National Medical Information System (NMIS). The Patient Treatment File (PTF) contains a record for each inpatient care episode provided...

  4. USEEIO Satellite Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — These files contain the environmental data as particular emissions or resources associated with a BEA sectors that are used in the USEEIO model. They are organized...

  5. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file contains data on characteristics of hospitals and other types of healthcare facilities, including the name and address of the facility and the type of...

  6. Download this PDF file

    African Journals Online (AJOL)

    countries quite a number of distance education institutions and programmes are more likely to be ... The Open University of Tanzania (OUT), (Ministry of Higher Education, Science and ..... (1991) Comic Relief Funding file. BAI, London, 1st ...

  7. JENDL Dosimetry File

    International Nuclear Information System (INIS)

    Nakazawa, Masaharu; Iguchi, Tetsuo; Kobayashi, Katsuhei; Iwasaki, Shin; Sakurai, Kiyoshi; Ikeda, Yujiro; Nakagawa, Tsuneo.

    1992-03-01

    The JENDL Dosimetry File based on JENDL-3 was compiled and integral tests of cross section data were performed by the Dosimetry Integral Test Working Group of the Japanese Nuclear Data Committee. Data stored in the JENDL Dosimetry File are the cross sections and their covariance data for 61 reactions. The cross sections were mainly taken from JENDL-3 and the covariances from IRDF-85. For some reactions, data were adopted from other evaluated data files. The data are given in the neutron energy region below 20 MeV in both of point-wise and group-wise files in the ENDF-5 format. In order to confirm reliability of the data, several integral tests were carried out; comparison with the data in IRDF-85 and average cross sections measured in fission neutron fields, fast reactor spectra, DT neutron fields and Li(d, n) neutron fields. As a result, it has been found that the JENDL Dosimetry File gives better results than IRDF-85 but there are some problems to be improved in future. The contents of the JENDL Dosimetry File and the results of the integral tests are described in this report. All of the dosimetry cross sections are shown in a graphical form. (author) 76 refs

  8. JENDL Dosimetry File

    Energy Technology Data Exchange (ETDEWEB)

    Nakazawa, Masaharu; Iguchi, Tetsuo [Tokyo Univ. (Japan). Faculty of Engineering; Kobayashi, Katsuhei [Kyoto Univ., Kumatori, Osaka (Japan). Research Reactor Inst.; Iwasaki, Shin [Tohoku Univ., Sendai (Japan). Faculty of Engineering; Sakurai, Kiyoshi; Ikeda, Yujior; Nakagawa, Tsuneo [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1992-03-15

    The JENDL Dosimetry File based on JENDL-3 was compiled and integral tests of cross section data were performed by the Dosimetry Integral Test Working Group of the Japanese Nuclear Data Committee. Data stored in the JENDL Dosimetry File are the cross sections and their covariance data for 61 reactions. The cross sections were mainly taken from JENDL-3 and the covariances from IRDF-85. For some reactions, data were adopted from other evaluated data files. The data are given in the neutron energy region below 20 MeV in both of point-wise and group-wise files in the ENDF-5 format. In order to confirm reliability of the data, several integral tests were carried out; comparison with the data in IRDF-85 and average cross sections measured in fission neutron fields, fast reactor spectra, DT neutron fields and Li(d,n) neutron fields. As a result, it has been found that the JENDL Dosimetry File gives better results than IRDF-85 but there are some problems to be improved in future. The contents of the JENDL Dosimetry File and the results of the integral tests are described in this report. All of the dosimetry cross sections are shown in a graphical form.

  9. Renewal-anomalous-heterogeneous files

    International Nuclear Information System (INIS)

    Flomenbom, Ophir

    2010-01-01

    Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is not exponential as in Brownian files, yet obeys: ψ α (t)∼t -1-α , 0 2 >, obeys, 2 >∼ 2 > nrml α , where 2 > nrml is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

  10. 'We have the internet in our hands': Bangladeshi college students' use of ICTs for health information.

    Science.gov (United States)

    Waldman, Linda; Ahmed, Tanvir; Scott, Nigel; Akter, Shahinoor; Standing, Hilary; Rasheed, Sabrina

    2018-03-20

    women students, as sharing information may enable them to bypass gatekeepers and make decisions about reproduction. This suggests that digital health information seeking may be exercising a disruptive effect within the health sector. However, the extent of this disruption may depend, not on students' mobile phone usage, but on the degree to which powerful new gatekeepers are able to retain control over and market SRH information through students' peer-to-peer sharing.

  11. How did the Good School Toolkit reduce the risk of past week physical violence from teachers to students? Qualitative findings on pathways of change in schools in Luwero, Uganda.

    Science.gov (United States)

    Kyegombe, N; Namakula, S; Mulindwa, J; Lwanyaaga, J; Naker, D; Namy, S; Nakuti, J; Parkes, J; Knight, L; Walakira, E; Devries, K M

    2017-05-01

    Violence against children is a serious violation of children's rights with significant impacts on current and future health and well-being. The Good School Toolkit (GST) is designed to prevent violence against children in primary schools through changing schools' operational cultures. Conducted in the Luwero District in Uganda between 2012 and 2014, findings from previous research indicate that the Toolkit reduced the odds of past week physical violence from school staff (OR = 0.40, 95%CI 0.26-0.64, p students, teachers, school administration, and parents, and two focus group discussion with teachers. Interviews were conducted using semi-structured tools and analysed using thematic analysis complemented by constant comparison and deviant case analysis techniques. Within a context of normative acceptance of corporal punishment this qualitative paper reports suggestive pathways related to teacher-student relationships through which reductions in violence operated. First, improved student-teacher relationships resulted in improved student voice and less fear of teachers. Second, the intervention helped schools to clarify and encourage desired behaviour amongst students through rewards and praise. Third, many teachers valued positive discipline and alternative discipline methods, including peer-to-peer discipline, as important pathways to reduced use of violence. These shifts were reflected in changes in the views, use, and context of beating. Although the GST is effective for reducing physical violence from teachers to students, violence persisted, though at significantly reduced levels, in all schools with reductions varying across schools and individuals. Much of the success of the Toolkit derives from the support it provides for fostering better student-teacher relationships and alternative discipline options. Such innovation could usefully be incorporated in teacher training syllabi to equip teachers with knowledge and skills to maintain discipline without the

  12. Formalizing a hierarchical file system

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, Muhammad Ikram

    An abstract file system is defined here as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for creation, removal,

  13. Formalizing a Hierarchical File System

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, M.I.

    2009-01-01

    In this note, we define an abstract file system as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for removal

  14. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  15. Long term file migration. Part I: file reference patterns

    International Nuclear Information System (INIS)

    Smith, A.J.

    1978-08-01

    In most large computer installations, files are moved between on-line disk and mass storage (tape, integrated mass storage device) either automatically by the system or specifically at the direction of the user. This is the first of two papers which study the selection of algorithms for the automatic migration of files between mass storage and disk. The use of the text editor data sets at the Stanford Linear Accelerator Center (SLAC) computer installation is examined through the analysis of thirteen months of file reference data. Most files are used very few times. Of those that are used sufficiently frequently that their reference patterns may be examined, about a third show declining rates of reference during their lifetime; of the remainder, very few (about 5%) show correlated interreference intervals, and interreference intervals (in days) appear to be more skewed than would occur with the Bernoulli process. Thus, about two-thirds of all sufficiently active files appear to be referenced as a renewal process with a skewed interreference distribution. A large number of other file reference statistics (file lifetimes, interference distributions, moments, means, number of uses/file, file sizes, file rates of reference, etc.) are computed and presented. The results are applied in the following paper to the development and comparative evaluation of file migration algorithms. 17 figures, 13 tables

  16. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  17. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  18. Download this PDF file

    African Journals Online (AJOL)

    1- is gifts' ta5ie" in elist fig'equitable' fees distilition s ... O'." & 1 25; 33i) re...) C SS Sati ri. Southerri'Stillah diffigFiles'f actities s % -- - , a v. & ' " St - a s fit . . . fiji ſti i ...

  19. Challenging Ubiquitous Inverted Files

    NARCIS (Netherlands)

    de Vries, A.P.

    2000-01-01

    Stand-alone ranking systems based on highly optimized inverted file structures are generally considered ‘the’ solution for building search engines. Observing various developments in software and hardware, we argue however that IR research faces a complex engineering problem in the quest for more

  20. The Global File System

    Science.gov (United States)

    Soltis, Steven R.; Ruwart, Thomas M.; OKeefe, Matthew T.

    1996-01-01

    The global file system (GFS) is a prototype design for a distributed file system in which cluster nodes physically share storage devices connected via a network-like fiber channel. Networks and network-attached storage devices have advanced to a level of performance and extensibility so that the previous disadvantages of shared disk architectures are no longer valid. This shared storage architecture attempts to exploit the sophistication of storage device technologies whereas a server architecture diminishes a device's role to that of a simple component. GFS distributes the file system responsibilities across processing nodes, storage across the devices, and file system resources across the entire storage pool. GFS caches data on the storage devices instead of the main memories of the machines. Consistency is established by using a locking mechanism maintained by the storage devices to facilitate atomic read-modify-write operations. The locking mechanism is being prototyped in the Silicon Graphics IRIX operating system and is accessed using standard Unix commands and modules.

  1. Download this PDF file

    African Journals Online (AJOL)

    AJNS WEBMASTERS

    Incidence is higher in the elderly, about 58 per 100,000 per year. Diagnosis of CSDH is still .... in the other two patients was not stated in the case file. Evacuation of the Subdural .... Personal experience in 39 patients. Br J of Neurosurg. 2003 ...

  2. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    4 KB of data is read or written, data is copied back and forth using trampoline buffers — pages that are shared during proxy initialization — because...in 2008. CIO Magazine. 104 · File system virtual appliances [64] Megiddo, N. and Modha, D. S. 2003. ARC: A Self-Tuning, Low Over- head Replacement

  3. 11 CFR 100.19 - File, filed or filing (2 U.S.C. 434(a)).

    Science.gov (United States)

    2010-01-01

    ... a facsimile machine or by electronic mail if the reporting entity is not required to file..., including electronic reporting entities, may use the Commission's website's on-line program to file 48-hour... the reporting entity is not required to file electronically in accordance with 11 CFR 104.18. [67 FR...

  4. Evaluated neutronic file for indium

    International Nuclear Information System (INIS)

    Smith, A.B.; Chiba, S.; Smith, D.L.; Meadows, J.W.; Guenther, P.T.; Lawson, R.D.; Howerton, R.J.

    1990-01-01

    A comprehensive evaluated neutronic data file for elemental indium is documented. This file, extending from 10 -5 eV to 20 MeV, is presented in the ENDF/B-VI format, and contains all neutron-induced processes necessary for the vast majority of neutronic applications. In addition, an evaluation of the 115 In(n,n') 116m In dosimetry reaction is presented as a separate file. Attention is given in quantitative values, with corresponding uncertainty information. These files have been submitted for consideration as a part of the ENDF/B-VI national evaluated-file system. 144 refs., 10 figs., 4 tabs

  5. Identifying Opportunities for Peer Learning: An Observational Study of Medical Students on Clinical Placements.

    Science.gov (United States)

    Tai, Joanna H; Canny, Benedict J; Haines, Terry P; Molloy, Elizabeth K

    2017-01-01

    observation and feedback on the ward; discussion during lunch) situations in clinical education and find it useful. The educator is crucial in fostering PAL through providing opportunities for learners to practice together and in helping to moderate discussions about quality of performance. Student engagement in PAL may reduce passivity commonly reported in clinical rotations. Further directions for research into PAL in clinical education are identified along with potential strategies that may maximize the benefits of peer to peer learning.

  6. Web-Delivered Supplemental Instruction: Dynamic Customizing of Search Algorithms to Enhance Independent Learning for Developmental Mathematics Students

    Science.gov (United States)

    Taksa, Isak; Goldberg, Robert

    2004-01-01

    Traditional peer-to-peer Supplemental Instruction (SI) was introduced into higher education over a quarter of a century ago and promptly became an integral part of the developmental mathematics curricula in many senior and community colleges. Later, some colleges introduced Video-based Supplemental Instruction (VSI) and, in recent years,…

  7. Download this PDF file

    African Journals Online (AJOL)

    Prof. Mereku

    2010-08-15

    Aug 15, 2010 ... curriculum, examination bodies, teachers, students, home, and textbook. Apart from these. 1 ... teachers in primary schools, students not interested in hard work, perception that ..... Use slash (/) to separate the last 2 digits in ...

  8. Download this PDF file

    African Journals Online (AJOL)

    aphorism as it applies at the University of Zimbabwe, Perspectives on Student Affairs in South. Africa is a ... Benchmarks and outcomes of educational .... certainly be felt as it makes its way into libraries and offices of student affairs practitioners.

  9. Download this PDF file

    African Journals Online (AJOL)

    monitoring of assessment results and student academic support and development ... Over a number of years, the focus of the LDP for UFS medical students has been on ..... A remedial intervention linked to a formative assessment is effective ...

  10. Download this PDF file

    African Journals Online (AJOL)

    Administrator

    Objectives: This study assessed secondary school students' perception of AIDS epidemic, and the influence of ... Nigeria, students spend six years in the elementary school, three years .... schoolteachers and a guidance counselor attested to.

  11. File: International bilateral relations

    International Nuclear Information System (INIS)

    Feltin, Ch.; Rabouhams, J.; Bravo, X.; Rousseau, M.; Le Breton, S.; Saint Raymond, Ph.; Brigaud, O.; Pertuis, V.; McNair, J.; Sayers, M.R.; Bye, R.; Scherrer, J.

    1998-01-01

    Since its creation in 1973, the Authority of Safety was assigned missions in the international field with following objectives: to develop information exchanges with its foreign counterpart, to make know and to explain the French approach and practice; to give to concerned countries the useful information on french nuclear facilities situated near the border; This file shows with some examples, how bilateral relations allow to fill up these objectives and how the French Authority got the foreign experience. (N.C.)

  12. PFS: a distributed and customizable file system

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file

  13. Huygens file service and storage architecture

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Stabell-Kulo, Tage; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage

  14. Huygens File Service and Storage Architecture

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Stabell-Kulo, Tage; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage

  15. 78 FR 75554 - Combined Notice of Filings

    Science.gov (United States)

    2013-12-12

    ...-000. Applicants: Young Gas Storage Company, Ltd. Description: Young Fuel Reimbursement Filing to be.... Protests may be considered, but intervention is necessary to become a party to the proceeding. eFiling is... qualifying facilities filings can be found at: http://www.ferc.gov/docs-filing/efiling/filing-req.pdf . For...

  16. 12 CFR 5.4 - Filing required.

    Science.gov (United States)

    2010-01-01

    ... CORPORATE ACTIVITIES Rules of General Applicability § 5.4 Filing required. (a) Filing. A depository institution shall file an application or notice with the OCC to engage in corporate activities and... advise an applicant through a pre-filing communication to send the filing or submission directly to the...

  17. The Galley Parallel File System

    Science.gov (United States)

    Nieuwejaar, Nils; Kotz, David

    1996-01-01

    Most current multiprocessor file systems are designed to use multiple disks in parallel, using the high aggregate bandwidth to meet the growing I/0 requirements of parallel scientific applications. Many multiprocessor file systems provide applications with a conventional Unix-like interface, allowing the application to access multiple disks transparently. This interface conceals the parallelism within the file system, increasing the ease of programmability, but making it difficult or impossible for sophisticated programmers and libraries to use knowledge about their I/O needs to exploit that parallelism. In addition to providing an insufficient interface, most current multiprocessor file systems are optimized for a different workload than they are being asked to support. We introduce Galley, a new parallel file system that is intended to efficiently support realistic scientific multiprocessor workloads. We discuss Galley's file structure and application interface, as well as the performance advantages offered by that interface.

  18. 75 FR 51994 - Combined Notice of Filings

    Science.gov (United States)

    2010-08-24

    ...: Panther Interstate Pipeline Energy, LLC. Description: Panther Interstate Pipeline Energy, LLC submits tariff filing per 154.203: Panther Baseline eTariff Filing to be effective 8/ 12/2010. Filed Date: 08/13...

  19. 76 FR 52323 - Combined Notice of Filings; Filings Instituting Proceedings

    Science.gov (United States)

    2011-08-22

    .... Applicants: Young Gas Storage Company, Ltd. Description: Young Gas Storage Company, Ltd. submits tariff..., but intervention is necessary to become a party to the proceeding. The filings are accessible in the.... More detailed information relating to filing requirements, interventions, protests, and service can be...

  20. The DNA Files

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-06-09

    The DNA Files is a radio documentary which disseminates genetics information over public radio. The documentaries explore subjects which include the following: How genetics affects society. How human life began and how it evolved. Could new prenatal genetic tests hold the key to disease prevention later in life? Would a national genetic data base sacrifice individual privacy? and Should genes that may lead to the cure for cancer be privately owned? This report serves as a project update for the second quarter of 1998. It includes the spring/summer 1998 newsletter, the winter 1998 newsletter, the program clock, and the latest flyer.

  1. Earnings Public-Use File, 2006

    Data.gov (United States)

    Social Security Administration — Social Security Administration released Earnings Public-Use File (EPUF) for 2006. File contains earnings information for individuals drawn from a systematic random...

  2. Download this PDF file

    African Journals Online (AJOL)

    The primary site of clinical instruction is an urban public hospital in Blantyre. ... Risks of contracting. HIV, TB, cholera and other illnesses in theworkplace frighten many students. Finally, clinical students and interns struggle with the limitations placed .... felt, and political corruption further stripped the hospitals of needed drugs ...

  3. Download this PDF file

    African Journals Online (AJOL)

    Journal of Student Affairs in Africa | Volume 4(1) 2016, 98–100 | 2307-6267 | DOI: 10.14426/jsaa.v4i1.148 www.jsaa.ac.za ... Dr Birgit Schreiber is Senior Director Student Affairs at the University of Stellenbosch. Frameworks for extended ... This book contributes to the scholarship on concepts of persistence, success, attrition.

  4. Download this PDF file

    African Journals Online (AJOL)

    Proff.Adewunmi

    deduce actions to be carried out to enhance their safety and the safety of the future health professionals. The aim of this study was to determine the attitudes and practices of nursing students regarding ... Table 2: Distribution of BEA cases among 101 nursing student victims .... inoculum during an injection (Abiteboul, 2003).

  5. Download this PDF file

    African Journals Online (AJOL)

    francis

    students in the Rwandan context experienced peer assessment of group writing as one way to improve the quality of their ... evaluate the quality of their fellow students' work, using a set of agreed criteria, and providing each other ... To the best of my knowledge, no research has been carried out on how the concerned.

  6. Download this PDF file

    African Journals Online (AJOL)

    The information from this table is then used to com- pute the student's grade either for a single semester results (Grade point Average) or cumulatively (Cu- mulative Grade Point Average, CGPA). The CGPA of 1.00 at the end of every academic session is required for a student to continue with his programme. Below CGPA of ...

  7. Portable File Format (PFF) specifications

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  8. Software for Managing Personal Files.

    Science.gov (United States)

    Lundeen, Gerald

    1989-01-01

    Discusses the special characteristics of personal file management software and compares four microcomputer software packages: Notebook II with Bibliography and Convert, Pro-Cite with Biblio-Links, askSam, and Reference Manager. Each package is evaluated in terms of the user interface, file maintenance, retrieval capabilities, output, and…

  9. Mixed-Media File Systems

    NARCIS (Netherlands)

    Bosch, H.G.P.

    1999-01-01

    This thesis addresses the problem of implementing mixed-media storage systems. In this work a mixed-media file system is defined to be a system that stores both conventional (best-effort) file data and real-time continuous-media data. Continuous-media data is usually bulky, and servers storing and

  10. Storing files in a parallel computing system using list-based index to identify replica files

    Science.gov (United States)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Zhang, Zhenhua; Grider, Gary

    2015-07-21

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value for one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.

  11. Design and creation of a direct access nuclear data file

    International Nuclear Information System (INIS)

    Charpentier, P.

    1981-06-01

    General considerations on the structure of instructions and files are reviewed. Design, organization and mode of use of the different files: instruction file, index files, inverted files, automatic analysis and inquiry programs are examined [fr

  12. How Do Learning Outcomes, Assessments and Student Engagement in a Fully Online Geoscience Laboratory Compare to Those Of The Original Hands-on Exercise?

    Science.gov (United States)

    Jones, F. M.

    2015-12-01

    In a third year geoscience elective for BSc majors, we adapted several active f2f learning strategies for an equivalent fully online version of the course. In particular, we converted a hands-on laboratory including analysis and interpretation of hand-specimens, sketching results and peer-to-peer discussion of scientific implications. This study compares learning outcomes in both formats and describes resources that make engaging, effective and efficient learning experiences for large classes in an asynchronous online environment. Our two hypotheses are: 1) a hands-on geology lab exercise can be converted for efficient fully online use without sacrificing feedback and assessment opportunities; 2) students find either the f2f or DE versions equally effective and enjoyable as learning experiences. Key components are an authentic context, interactive resources including sketching, strategies that enable efficient assessment and feedback on solo and group work, and asynchronous yet productive interaction with peers. Students in the f2f class handle real rock and fossil specimens, work with peers in the lab and classroom, and deliver most results including annotated figures on paper. DE students complete identical tasks using interactive high resolution figures and videos of specimens. Solo work is first delivered for automated assessment and feedback, then students engage asynchronously in small groups to improve results and discuss implications. Chronostratigraphy and other interpretations are sketched on prepared template images using a simple open-source sketching app that ensures equal access and consistent results that are efficient to assess by peers and instructors. Learning outcomes based on subsequent quizzes, sketches, and lab results (paper for f2f students and automated data entry for DE students), show that f2f and online students demonstrate knowledge and scientific interpretations of comparable quality. Effective engagement and group work are

  13. Learning analytics in serious gaming: uncovering the hidden treasury of game log files

    NARCIS (Netherlands)

    Westera, Wim; Nadolski, Rob; Hummel, Hans

    2018-01-01

    This paper presents an exploratory analysis of existing log files of the VIBOA environmental policy games at Utrecht University. For reasons of statistical power we’ve combined student cohorts 2008, 2009, 2010, and 2011, which led to a sample size of 118 students. The VIBOA games are inquiry-based

  14. Number of Minority Students in Colleges Rose by 9% from 1990 to 1991, U.S. Reports; Fact File: State-by-State Enrollment by Racial and Ethnic Group, Fall 1991.

    Science.gov (United States)

    Evangelauf, Jean

    1993-01-01

    A national survey shows that total minority enrollment in colleges is at an all-time high at 20.6 percent of overall enrollment. Despite this, minority groups continue to be underrepresented in college student populations. Enrollments by state indicate wide geographic variation in percentages of students from ethnic and racial minorities. (MSE)

  15. Download this PDF file

    African Journals Online (AJOL)

    Education

    counseling services at colleges or lack thereof. Other factors ... these findings are not segregated by public versus private HLIs, a .... In this study, individual semi structured ... group discussions were conducted with 10 student representatives.

  16. Download this PDF file

    African Journals Online (AJOL)

    Administrator

    the minimum required grade of C+ to enable them join universities in the country. ... that school authorities in collaboration with the teacher of French should inculcate ... The opinion held by teachers of French is that students who excel in co-.

  17. Download this PDF file

    African Journals Online (AJOL)

    Dr Olaleye

    1Department of Physiotherapy, College of Medicine, University of Ibadan, Oyo State, Nigeria. 2 Department of ..... received by students increases the confidence and self-esteem ..... Nurses' Perceptions Concerning Clinical Learning.

  18. Download this PDF file

    African Journals Online (AJOL)

    2012-09-30

    Sep 30, 2012 ... Key words: Prophylactic mastectomy, breast cancer, prevention, Surgical outpatient clinic ... relatives, mother or sisters, before age 50),those who have tested positive ... Students were the largest group with 172 (68.4%) of the ...

  19. Download this PDF file

    African Journals Online (AJOL)

    Prof. Osuagwwu

    ICT Education: A Tool For Quality Assurance In Tertiary Institution In Nigeria ... Department of Computer Science, College of Education, Pankshin, Plateau .... informal education opportunity. ... example secondary School students who must.

  20. Download this PDF file

    African Journals Online (AJOL)

    Nassiri P

    Estimation of the Sensitivity to Heat Stress in the Outdoor Workers at Risk. .... health department of Health Ministry, and students who were ..... comfort. Each type of cloth affects heat transfer from the human and the environment by mechanisms ...

  1. Download this PDF file

    African Journals Online (AJOL)

    USER

    use of ICT in instruction enhance academic performance of students. The study ... computer based tools used by teachers to teach ... like video, audio, camera, and so on, which convert .... example about 84.9% of the respondents agreed.

  2. Download this PDF file

    African Journals Online (AJOL)

    Publicizing this risk might help reduce prevalence of smoking. .... error in children has been found. ... mean refraction than those of non-smokers ... of Optometry and medical students were .... smoking-related eye disease and blindness to.

  3. Download this PDF file

    African Journals Online (AJOL)

    Administrator

    scores of physical, psychological, environment and social relationships. .... religious affiliation, number of children, family size, .... Pearson's chi-square test and the Student's t-test were ..... mortality: Roles of health behavior and baseline.

  4. Download this PDF file

    African Journals Online (AJOL)

    2017-03-22

    Mar 22, 2017 ... Dental students' and graduates' choice of a dental specialty is determined .... and factors influencing the choice of our respon- .... Dhar V. Reason for choosing paediatric dentistry as career-survey among postgraduate.

  5. Download this PDF file

    African Journals Online (AJOL)

    USER

    The target population were 200 students, which were purposively .... information can be in paper or in electronic format .... Engineering (CSE). ... bound journals) and browsing new titles of library ... To search materials for thesis\\project.

  6. Download this PDF file

    African Journals Online (AJOL)

    user

    concise definition. To eliminate .... playwright is merely a scenario which guides the director, designers and .... Radio and Television and Film production and marketing .... Research has shown that cooperation among students increases when ...

  7. Download this PDF file

    African Journals Online (AJOL)

    UFS Campus

    Twenty years into democracy and education in post-apartheid South Africa (SA) still retains a strong racial dimension in .... torical link between slavery and the privileges of whites in their ...... white students start to understand and challenge.

  8. Download this PDF file

    African Journals Online (AJOL)

    that healthy looking persons could be HIV positive (88.2%). VCT awareness .... students and assess the effect of the intervention ... control. Learning was reinforced via games, ... television, Video camera, and Projector among. 423 and 417 ...

  9. Download this PDF file

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    Twenty (120) questionnaires were placed at the circulation desk (from October to December ... analysis was carried out using Statistical Package for social Sciences (SPSS), and the ... learning modules for medical students, and the computer.

  10. Download this PDF file

    African Journals Online (AJOL)

    Gopal Sharma. School of Language Studies and Journalism, Post Box No: 395, Wollega University, Ethiopia ... literature to High School students in Nigeria in ... The Middle Path. Both the ... five: Birth, Food, Sleep, Love and Death. But he,.

  11. Download this PDF file

    African Journals Online (AJOL)

    RAGHAVENDRA

    training institutions should strengthen constructivist te teachers trainees, discussion is ..... pilot study at Diza secondary school to 13 teachers and. 27 students by purposive ..... large, was given due attention in the education and training policy ...

  12. Download this PDF file

    African Journals Online (AJOL)

    Mortality and disability data were obtained directly from WHO. The results ... burden. Among men 70% of all alcohol-attributable injury deaths occurred among 15-44 year olds ... young people (especially students in secondary or tertiary ...

  13. Download this PDF file

    African Journals Online (AJOL)

    2017-11-10

    Nov 10, 2017 ... ater other learning institutions' requirements throughout Malaysia. ... attendance to class and university student's performance. .... [8-10] have developed a similar attendance system using biometric (fingerprint) and Global.

  14. Download this PDF file

    African Journals Online (AJOL)

    User

    The result of this study shows that students and teachers agreed in most of the merits ..... planning and extent to which attention was .... selective (Tewodros 2006: 69). The .... Table-6: Quality of Visual Experiences Attributed by the Plasma TV.

  15. Download this PDF file

    African Journals Online (AJOL)

    important to ensure good-quality reflection on experiences where students articulately ... The usefulness of a tool to assess reflection in a service-learning experience ..... final mark for practical work, and could also contribute towards formative.

  16. Download this PDF file

    African Journals Online (AJOL)

    Erah

    2008-06-02

    Jun 2, 2008 ... namely, sociodemographic data, access to computer and internet ... Keywords: LMS, e-Learning, pharmacy students, ICT, teaching and ... changes in Universities in many countries, ... lecturers is very low because of time, and.

  17. Virtual file system for PSDS

    Science.gov (United States)

    Runnels, Tyson D.

    1993-01-01

    This is a case study. It deals with the use of a 'virtual file system' (VFS) for Boeing's UNIX-based Product Standards Data System (PSDS). One of the objectives of PSDS is to store digital standards documents. The file-storage requirements are that the files must be rapidly accessible, stored for long periods of time - as though they were paper, protected from disaster, and accumulative to about 80 billion characters (80 gigabytes). This volume of data will be approached in the first two years of the project's operation. The approach chosen is to install a hierarchical file migration system using optical disk cartridges. Files are migrated from high-performance media to lower performance optical media based on a least-frequency-used algorithm. The optical media are less expensive per character stored and are removable. Vital statistics about the removable optical disk cartridges are maintained in a database. The assembly of hardware and software acts as a single virtual file system transparent to the PSDS user. The files are copied to 'backup-and-recover' media whose vital statistics are also stored in the database. Seventeen months into operation, PSDS is storing 49 gigabytes. A number of operational and performance problems were overcome. Costs are under control. New and/or alternative uses for the VFS are being considered.

  18. PKA spectrum file

    Energy Technology Data Exchange (ETDEWEB)

    Kawai, M. [Toshiba Corp., Kawasaki, Kanagawa (Japan). Nuclear Engineering Lab.

    1997-03-01

    In the Japanese Nuclear Data Committee, the PKA/KERMA file containing PKA spectra, KERMA factors and DPA cross sections in the energy range between 10{sup -5} eV and 50 MeV is being prepared from the evaluated nuclear data. The processing code ESPERANT was developed to calculate quantities of PKA, KERMA and DPA from evaluated nuclear data for medium and heavy elements by using the effective single particle emission approximation (ESPEA). For light elements, the PKA spectra are evaluated by the SCINFUL/DDX and EXIFON codes, simultaneously with other neutron cross sections. The DPA cross sections due to charged particle emitted from light elements are evaluated for high neutron energy above 20 MeV. (author)

  19. 5 CFR 1203.13 - Filing pleadings.

    Science.gov (United States)

    2010-01-01

    ... delivery, by facsimile, or by e-filing in accordance with § 1201.14 of this chapter. If the document was... submitted by e-filing, it is considered to have been filed on the date of electronic submission. (e... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Filing pleadings. 1203.13 Section 1203.13...

  20. 12 CFR 16.33 - Filing fees.

    Science.gov (United States)

    2010-01-01

    ... Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.33 Filing fees. (a) Filing fees must accompany certain filings made under the provisions of this part... Comptroller of the Currency Fees published pursuant to § 8.8 of this chapter. (b) Filing fees must be paid by...

  1. 77 FR 13587 - Combined Notice of Filings

    Science.gov (United States)

    2012-03-07

    .... Applicants: Transcontinental Gas Pipe Line Company. Description: Annual Electric Power Tracker Filing... Company. Description: 2012 Annual Fuel and Electric Power Reimbursement to be effective 4/1/2012. Filed... submits tariff filing per 154.403: Storm Surcharge 2012 to be effective 4/1/2012. Filed Date: 3/1/12...

  2. 75 FR 4689 - Electronic Tariff Filings

    Science.gov (United States)

    2010-01-29

    ... elements ``are required to properly identify the nature of the tariff filing, organize the tariff database... (or other pleading) and the Type of Filing code chosen will be resolved in favor of the Type of Filing...'s wish expressed in its transmittal letter or in other pleadings, the Commission may not review a...

  3. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  4. 77 FR 74839 - Combined Notice of Filings

    Science.gov (United States)

    2012-12-18

    ..., LP. Description: National Grid LNG, LP submits tariff filing per 154.203: Adoption of NAESB Version 2... with Order to Amend NAESB Version 2.0 Filing to be effective 12/1/2012. Filed Date: 12/11/12. Accession...: Refile to comply with Order on NAESB Version 2.0 Filing to be effective 12/1/2012. Filed Date: 12/11/12...

  5. The File System Interface is an Anachronism

    OpenAIRE

    Ellard, Daniel

    2003-01-01

    Contemporary file systems implement a set of abstractions and semantics that are suboptimal for many (if not most) purposes. The philosophy of using the simple mechanisms of the file system as the basis for a vast array of higher-level mechanisms leads to inefficient and incorrect implementations. We propose several extensions to the canonical file system model, including explicit support for lock files, indexed files, and resource forks, and the benefit of session semantics for write updates...

  6. Curved canals: Ancestral files revisited

    Directory of Open Access Journals (Sweden)

    Jain Nidhi

    2008-01-01

    Full Text Available The aim of this article is to provide an insight into different techniques of cleaning and shaping of curved root canals with hand instruments. Although a plethora of root canal instruments like ProFile, ProTaper, LightSpeed ® etc dominate the current scenario, the inexpensive conventional root canal hand files such as K-files and flexible files can be used to get optimum results when handled meticulously. Special emphasis has been put on the modifications in biomechanical canal preparation in a variety of curved canal cases. This article compiles a series of clinical cases of root canals with curvatures in the middle and apical third and with S-shaped curvatures that were successfully completed by employing only conventional root canal hand instruments.

  7. Value Modifier Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Center for Medicare (CM) has created a standard analytical file intended to promote transparency. For each Value Modifier performance year, CM will publish a...

  8. Cytoscape file of chemical networks

    Data.gov (United States)

    U.S. Environmental Protection Agency — The maximum connectivity scores of pairwise chemical conditions summarized from Cmap results in a file with Cytoscape format (http://www.cytoscape.org/). The figures...

  9. File: nuclear safety and transparency

    International Nuclear Information System (INIS)

    Martinez, J.P.; Etchegoyen, A.; Jeandron, C.

    2001-01-01

    Several experiences of nuclear safety and transparency are related in this file. Public information, access to documents, transparency in nuclear regulation are such subjects developed in this debate. (N.C.)

  10. Physician Compare National Downloadable File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Physician Compare National Downloadable File is organized at the individual eligible professional level; each line is unique at the professional/enrollment...

  11. Registering Researchers in Authority Files

    NARCIS (Netherlands)

    Altman, M.; Conlon, M.; Cristan, A.L.; Dawson, L.; Dunham, J.; Hickey, T.; Hook, D.; Horstmann, W.; MacEwan, A.; Schreur, P.; Smart, L.; Smith-Yoshimura, K.; Wacker, M.; Woutersen, S.

    2014-01-01

    Registering researchers in some type of authority file or identifier system has become more compelling as both institutions and researchers recognize the need to compile their scholarly output. The report presents functional requirements and recommendations for six stakeholders: researchers,

  12. Health Topic XML File Description

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xmldescription.html Health Topic XML File Description: MedlinePlus To use the sharing ... information categories assigned. Example of a Full Health Topic Record A record for a MedlinePlus health topic ...

  13. Enabling High Data Availability in a DHT

    NARCIS (Netherlands)

    Knezevic, Predrag; Wombacher, Andreas; Risse, Thomas

    Many decentralized and peer-to-peer applications require some sort of data management. Besides P2P file-sharing, there are already scenarios (e.g. BRICKS project) that need management of finer-grained objects including updates and, keeping them highly available in very dynamic communities of peers.

  14. On the Quality of Experience of SopCast

    NARCIS (Netherlands)

    Fallica, B.; Lu, Y.; Kuipers, F.; Kooij, R.E.; Mieghem, P. van

    2008-01-01

    Peer-to-Peer (P2P) file sharing has become immensely popular in the Internet. Recently, there has been a growing interest in academic and commercial environments for live streaming using P2P technology. A number of new P2P digital television (P2PTV) applications have emerged. Such P2PTV applications

  15. Piracy Activity vs. Product Features in Digital Games

    DEFF Research Database (Denmark)

    Drachen, Anders; Bauer, Kevin; Veitch, Rob

    Torrent peer-to-peer (P2P) file-sharing protocol. The sample includes 173 games and a collection period of three months from late 2010 to early 2011. With a total of 12.6 million unique peers identified, it is the largest examination of game piracy via P2P networks to date. Analysis of the data shows...

  16. www.p2p.edu: Rip, Mix & Burn Your Education.

    Science.gov (United States)

    Gillespie, Thom

    2001-01-01

    Discusses peer to peer technology which allows uploading files from one hard drive to another. Topics include the client/server model for education; the Napster client/server model; Gnutella; Freenet and other projects to allow the free exchange of information without censorship; bandwidth problems; copyright issues; metadata; and the United…

  17. JNDC FP decay data file

    International Nuclear Information System (INIS)

    Yamamoto, Tohru; Akiyama, Masatsugu

    1981-02-01

    The decay data file for fission product nuclides (FP DECAY DATA FILE) has been prepared for summation calculation of the decay heat of fission products. The average energies released in β- and γ-transitions have been calculated with computer code PROFP. The calculated results and necessary information have been arranged in tabular form together with the estimated results for 470 nuclides of which decay data are not available experimentally. (author)

  18. Specifying a Realistic File System

    Directory of Open Access Journals (Sweden)

    Sidney Amani

    2015-11-01

    Full Text Available We present the most interesting elements of the correctness specification of BilbyFs, a performant Linux flash file system. The BilbyFs specification supports asynchronous writes, a feature that has been overlooked by several file system verification projects, and has been used to verify the correctness of BilbyFs's fsync( C implementation. It makes use of nondeterminism to be concise and is shallowly-embedded in higher-order logic.

  19. 76 FR 43679 - Filing via the Internet; Notice of Additional File Formats for efiling

    Science.gov (United States)

    2011-07-21

    ... list of acceptable file formats the four-character file extensions for Microsoft Office 2007/2010... files from Office 2007 or Office 2010 in an Office 2003 format prior to submission. Dated: July 15, 2011...

  20. Download this PDF file

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    study consists of staff and students of the special educational institutions in Plateau State. ... day to day activities. ... impairment in functional performance and activity, ... who are deaf and hearing-impaired, and persons ... disability, this group includes a very large ..... Some of the questions the study intends to provide.

  1. Download this PDF file

    African Journals Online (AJOL)

    SEGUN ADENIJI

    Key words: Teenage pregnancy, Cross-sectional Survey, Secondary School, Nigeria, High School Drop-out ... Counselling was given before suspension or expulsion in 4% of public schools and 15% of private .... In their opinions, most public (80%) and private (70%) school .... junior secondary school grade one students in.

  2. Download this PDF file

    African Journals Online (AJOL)

    their academic performance, capabilities and functionings. At a tertiary ... for development and wellbeing on an educational, personal and social level.[2] ... Nursing students' work environment should improve. .... A similar study also reported a diversity of stress sources, and that high levels of stress ... Successful role-models.

  3. Download this PDF file

    African Journals Online (AJOL)

    lviljoen

    PERCEPTIONS AND ATTITUDES OF SECONDARY SCHOOL STUDENTS IN KWAZULU- ... Lecturer, School of Social Work and Community Development, University of KwaZulu-Natal ... and explores the relationship between risky sexual behaviour and girls who ... that South African youth initiate sexual intercourse at.

  4. Download this PDF file

    African Journals Online (AJOL)

    GB

    2014-01-01

    Jan 1, 2014 ... This study aimed to identify the different causes of eye diseases in children visiting a ... increased risk of blindness and mortality (6, 7). Cataract in ... refractive errors (6.3%) and non-trachomatous ... students (11). .... children at JUDO in the year 2010 were related to .... Med Hyg, 105 (2011) 507– 511. 10.

  5. Download this PDF file

    African Journals Online (AJOL)

    Administrator

    health, adolescents, Family life education (FLE), ABC approach, abstinence, curriculum, Youths,. Teenagers ... They are seen as children and divulging .... opponents say it should be the indicator of behavior ... climate for policies and laws on adolescent health. .... have computer laboratories that students can use to.

  6. Download this PDF file

    African Journals Online (AJOL)

    ETIWISTIC

    2013-04-29

    Apr 29, 2013 ... Psychology, Guidance and Counselling, University of Port. Harcourt, Port .... Preparation of current generation of students for future workplace that is, providing tools ... Supporting the functional roles of ICTs for knowledge creation, sharing and ... should be motivated for KU in order to boost their productivity,.

  7. Download this PDF file

    African Journals Online (AJOL)

    User

    independent samples t-test was administered to see if there was a significant difference in vocabulary ... The study revealed that the students in the experimental group scored a significantly ..... If the null hypothesis were true, such a result ...

  8. Download this PDF file

    African Journals Online (AJOL)

    UNIBEN

    Background: Emergency contraception (EC) refers to the use of drugs or a device as an emergency measure ... Methods: A descriptive cross-sectional study was carried out on 400 male students of the. University of ... University of Benin, Benin City, Edo State, Nigeria. E-mail: ..... pill,. IUD. 2013.www.nhs.uk/conditions/contra.

  9. Download this PDF file

    African Journals Online (AJOL)

    abp

    Mental distress among university students in Ethiopia: a cross sectional survey. Yadeta Dessie1 ... countries like Singapore and United States of America (USA) had ... mental distress which could present variably in different contexts ... The main reason is ... and cigarette smoking were (37.9%) and 49 (11.4%) respectively.

  10. Download this PDF file

    African Journals Online (AJOL)

    home

    2014-05-15

    May 15, 2014 ... A Peer-reviewed Official International Journal of Wollega University, ... Foreign Language (EFL) teachers‟ level of emotional intelligence (EI) ... Similarly, EFL classroom teaching in Ethiopian context ... teaching and learning show that some students learn a ...... In Handbook of Cross-cultural Psychology:.

  11. Download this PDF file

    African Journals Online (AJOL)

    University, Lawrence, KS, USA 66045-2506 ... professional practice sharpens these skills, students are rarely educated ... Such high officials are no longer directly involved. ... opportunity to establish a following for his/her brand that may survive the ... features have been defined in a multitude of judicial decisions and are.

  12. Download this PDF file

    African Journals Online (AJOL)

    matthew

    2014-09-12

    Sep 12, 2014 ... encouraged to use process approach in teaching writing and that more emphasis should be placed ... Until the 1980s, the focus of students studying English language writing was ... In this method, learners would have to copy sentence structures provided ... researchers are still doubtful of its effectiveness.

  13. Download this PDF file

    African Journals Online (AJOL)

    Mr Olusoji

    labour. This rupture of fetal membranes may occur anytime during the course of pregnancy. It however becomes a .... The women who met the inclusion criteria were randomized into two ... for significance using the student t-test for continuous ...

  14. Download this PDF file

    African Journals Online (AJOL)

    five point Likert scale (Hobson, 2003; Frid 2000) of. Strongly Agree (SA) through to Strongly Disagree. (SD). A questionnaire was necessary to enable the undergraduate students to express their attitudes towards the course in order to find ways of improving the course to make it meet both national and individual needs.

  15. Download this PDF file

    African Journals Online (AJOL)

    Tracie1

    United States with the insight of highlighting the implications for students in Nigeria. .... argument concerning the several negative effects the New. Media have on ... media representations that can be found in some movies or video games. .... authorities should restrict/censor some activities on the. Internet and Social ...

  16. Download this PDF file

    African Journals Online (AJOL)

    User

    THE GRAMMATICAL ERRORS OF THE STUDENTS LEARNING. THE CHINESE LANGAUGE AT NNAMDI AZIKIWE UNIVERSITY,. AWKA. Ifeanyi Sunny Odinye. Abstract. Learning a second language is difficult and error making is inevitable. At first sight, it may seem rather odd to focus on what learners get wrong rather ...

  17. Download this PDF file

    African Journals Online (AJOL)

    PROF. EZECHUKWU

    2014-10-13

    Oct 13, 2014 ... health concern globally, but its prevalence is not known ... major public health problem confronting many high, middle and low income ... school students in Port Harcourt and this may have a ... smoking of cigarette, using cocaine, going out in the evenings for ..... hammed E. Alcohol and drug use prevalence ...

  18. Download this PDF file

    African Journals Online (AJOL)

    ETIWISTIC

    2013-04-29

    Apr 29, 2013 ... This claim is premised on the number of emerging musicians, ... recommendation include a blended e-learning approach that would be made ... theatrical tradition so gates were taken and performers or the organizers made .... students can access the materials at any convenient time and place without.

  19. Download this PDF file

    African Journals Online (AJOL)

    Mixed-methods were used, but this article will focus on the qualitative data gathered. ... will have been trained in the PHC approach but then will be working within a ... apartheid had on health care provision in South Africa, and this could then ... are a concern, as it is these types of views that are likely to cause students to ...

  20. Download this PDF file

    African Journals Online (AJOL)

    NWUuser

    As to pro bono work by students during their LLB, consideration will be given to ... in particular.8 It is proposed that a year's community service for law graduates and. 4 ... assets to be divided, could well be handled by the litigants sans legal .... scholars have devoted considerable attention and resources to creating or.

  1. Download this PDF file

    African Journals Online (AJOL)

    ZINOX

    fist in corporal punishment is a common practice in. Nigeria. Alternative methods of punishment such as kneeling down, “frog jump” or “picking pin” have been suggested in other studies . It is worrisome that hyphema occurred in school pupils and students. (28.4%) who are in their formative period of life, in this study.

  2. Download this PDF file

    African Journals Online (AJOL)

    pc

    2017-11-10

    Nov 10, 2017 ... International License. Libraries ... The recent implementation of TGfU pedagogy among Malaysian schools game curriculum ... students aged 13±.23 years old investigated Non Linear Pedagogy (NP) and LP models using .... The TGfU model was first introduced at Loughborough University in late 1960s, in.

  3. Download this PDF file

    African Journals Online (AJOL)

    We were selected as student observers to watch the proceedings and to give our ... In this short paper, we have made a summary of the main issues raised throughout the three days of the workshop and represent our observations .... Ida Johanne Ulseth has a Bachelor degree from the Norwegian University of Science and.

  4. Download this PDF file

    African Journals Online (AJOL)

    ability of a pesticide mixture by soil micro organisms. Lienou C. ... fung and pH7.2 for bacteria. According to statistical analysis using Student t-test of the three parameters ..... and 9 on the pH scale was suitable for bioremediation of xenobiotics.

  5. Download this PDF file

    African Journals Online (AJOL)

    mwakagugu

    2013-06-18

    Jun 18, 2013 ... Awareness and perception of oral health services among Chifubu secondary school students in ... with a positive utilization on oral health tended to be younger .... dental visits are important in both dentate people ... oral health care depends on his attitude, self ... fact that older children's dentition have.

  6. Download this PDF file

    African Journals Online (AJOL)

    2012-09-15

    Sep 15, 2012 ... Present study is a qualitative type supported by a quantitative approach. ... the students who participated in performance test .... Lack of interest and attention to learn map reading skills. 78. 44.32 ... sample teachers were asked to evaluate the map reading .... questions instead of learning all the contents of.

  7. Download this PDF file

    African Journals Online (AJOL)

    FEN

    AFRREV IJAH, Vol.1 (2) May, 2012 ... quality of students' discipline (Reynolds, 1989). This is because ... country. Docking based his observation on researches by Reynolds (1976) ..... Calculation of the chi-square test was based on respondents' distribution with ..... Educational and Psychological Measurement Vol. 30,. No.

  8. Download this PDF file

    African Journals Online (AJOL)

    Alemayehu

    This study was undertaken in view to: (1) Examining the status of early school leaving in Southern ... primary cycle but fail to gain the ... enrolled children that make steady progress ..... Item 4 of Table 1 refers to years of service ..... and volunteer students at the venue where the local community regards convenient and safe.

  9. Download this PDF file

    African Journals Online (AJOL)

    IBMC grant of University of Strasbourg, France. C) Academic Syllabus. O The syllabus contained four main courses (Unit values) values in biochemistry and two organic chem- istry. o Whether for the award of “Licence' or. "Maitrise'degree in biochemistry and molecular bi- ology, students must pass four (4) unity of Values.

  10. Download this PDF file

    African Journals Online (AJOL)

    De Don

    neural network of a web-based learning that will increase access to high q?a~tty umverstty educahon espectally ... technologies have changed educational models and thousands of years before the advent of new ..... of different learning styles of students and the ... creates and returns an HTML page with the results.

  11. Cobol for students

    CERN Document Server

    Parkin, Andrew

    1995-01-01

    COBOL for Students has established itself as one of the most successful teaching texts on COBOL programming and is now in its fourth edition. The first part of the book concentrates on the fundamentals of the language and takes students to the point where they can write modestly sized programs using sequential files. Part two assumes competence in elementary COBOL and explains design and other programming techniques which should be part of the professional programmer's repertoire. Part three extends the student's knowledge of the language by explaining some of the more advanced features of COB

  12. Zebra: A striped network file system

    Science.gov (United States)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  13. PFS: a distributed and customizable file system

    OpenAIRE

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file system or a file-system simulator can be constructed. Each of the components in the library is easily replaced by another implementation to accommodate a wide range of applications.

  14. Search the SEC website for the latest EDGAR filings

    Data.gov (United States)

    Securities and Exchange Commission — This listing contains the most recent filings for the current official filing date (including filings made after the 5:30pm deadline on the previous filing day)....

  15. Building a parallel file system simulator

    International Nuclear Information System (INIS)

    Molina-Estolano, E; Maltzahn, C; Brandt, S A; Bent, J

    2009-01-01

    Parallel file systems are gaining in popularity in high-end computing centers as well as commercial data centers. High-end computing systems are expected to scale exponentially and to pose new challenges to their storage scalability in terms of cost and power. To address these challenges scientists and file system designers will need a thorough understanding of the design space of parallel file systems. Yet there exist few systematic studies of parallel file system behavior at petabyte- and exabyte scale. An important reason is the significant cost of getting access to large-scale hardware to test parallel file systems. To contribute to this understanding we are building a parallel file system simulator that can simulate parallel file systems at very large scale. Our goal is to simulate petabyte-scale parallel file systems on a small cluster or even a single machine in reasonable time and fidelity. With this simulator, file system experts will be able to tune existing file systems for specific workloads, scientists and file system deployment engineers will be able to better communicate workload requirements, file system designers and researchers will be able to try out design alternatives and innovations at scale, and instructors will be able to study very large-scale parallel file system behavior in the class room. In this paper we describe our approach and provide preliminary results that are encouraging both in terms of fidelity and simulation scalability.

  16. Chronic Condition Public Use File (PUF)

    Data.gov (United States)

    U.S. Department of Health & Human Services — This release contains the Chronic Conditions Public Use Files (PUF) with information from Medicare claims. The CMS Chronic Conditions PUF is an aggregated file in...

  17. Improving File System Performance by Striping

    Science.gov (United States)

    Lam, Terance L.; Kutler, Paul (Technical Monitor)

    1998-01-01

    This document discusses the performance and advantages of striped file systems on the SGI AD workstations. Performance of several striped file system configurations are compared and guidelines for optimal striping are recommended.

  18. 47 CFR 1.1704 - Station files.

    Science.gov (United States)

    2010-10-01

    ... System (COALS) § 1.1704 Station files. Applications, notifications, correspondence, electronic filings... Television Relay Service (CARS) are maintained by the Commission in COALS and the Public Reference Room...

  19. source files for manuscript in tex format

    Data.gov (United States)

    U.S. Environmental Protection Agency — Source tex files used to create the manuscript including original figure files and raw data used in tables and inline text. This dataset is associated with the...

  20. 75 FR 66748 - Notice of Baseline Filings

    Science.gov (United States)

    2010-10-29

    ...- 000] Notice of Baseline Filings October 22, 2010. ONEOK Gas Transportation, L.L.C Docket No. PR11-68... above submitted a revised baseline filing of their Statement of Operating Conditions for services...

  1. Physician-Supplier Procedure Summary Master File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is a 100 percent summary of all Part B Carrier and DMERC Claims processed through the Common Working File and stored in the National Claims History...

  2. Data_files_Reyes_EHP_phthalates

    Data.gov (United States)

    U.S. Environmental Protection Agency — The file contains three files in comma separated values (.csv) format. “Reyes_EHP_Phthalates_US_metabolites.csv” contains information about the National Health and...

  3. Ambulance Reasonable Charge Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Ambulance Reasonable Charge public use files for calendar years (CY) 2003 through 2005 are located in the Downloads section below. These public use files are...

  4. 49 CFR 564.5 - Information filing; agency processing of filings.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Information filing; agency processing of filings... HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REPLACEABLE LIGHT SOURCE INFORMATION (Eff. until 12-01-12) § 564.5 Information filing; agency processing of filings. (a) Each manufacturer...

  5. Cut-and-Paste file-systems: integrating simulators and file systems

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1995-01-01

    We have implemented an integrated and configurable file system called the Pegasus filesystem (PFS) and a trace-driven file-system simulator called Patsy. Patsy is used for off-line analysis of file-systemalgorithms, PFS is used for on-line file-systemdata storage. Algorithms are first analyzed in

  6. Cut-and-Paste file-systems : integrating simulators and file systems

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    We have implemented an integrated and configurable file system called the PFS and a trace-driven file-system simulator called Patsy. Patsy is used for off-line analysis of file-system algorithms, PFS is used for on-line file-system data storage. Algorithms are first analyzed in Patsy and when we are

  7. Preservation of root canal anatomy using self-adjusting file instrumentation with glide path prepared by 20/0.02 hand files versus 20/0.04 rotary files

    Science.gov (United States)

    Jain, Niharika; Pawar, Ajinkya M.; Ukey, Piyush D.; Jain, Prashant K.; Thakur, Bhagyashree; Gupta, Abhishek

    2017-01-01

    Objectives: To compare the relative axis modification and canal concentricity after glide path preparation with 20/0.02 hand K-file (NITIFLEX®) and 20/0.04 rotary file (HyFlex™ CM) with subsequent instrumentation with 1.5 mm self-adjusting file (SAF). Materials and Methods: One hundred and twenty ISO 15, 0.02 taper, Endo Training Blocks (Dentsply Maillefer, Ballaigues, Switzerland) were acquired and randomly divided into following two groups (n = 60): group 1, establishing glide path till 20/0.02 hand K-file (NITIFLEX®) followed by instrumentation with 1.5 mm SAF; and Group 2, establishing glide path till 20/0.04 rotary file (HyFlex™ CM) followed by instrumentation with 1.5 mm SAF. Pre- and post-instrumentation digital images were processed with MATLAB R 2013 software to identify the central axis, and then superimposed using digital imaging software (Picasa 3.0 software, Google Inc., California, USA) taking five landmarks as reference points. Student's t-test for pairwise comparisons was applied with the level of significance set at 0.05. Results: Training blocks instrumented with 20/0.04 rotary file and SAF were associated less deviation in canal axis (at all the five marked points), representing better canal concentricity compared to those, in which glide path was established by 20/0.02 hand K-files followed by SAF instrumentation. Conclusion: Canal geometry is better maintained after SAF instrumentation with a prior glide path established with 20/0.04 rotary file. PMID:28855752

  8. The Crystallographic Information File (CIF

    Directory of Open Access Journals (Sweden)

    I D Brown

    2006-11-01

    Full Text Available The Crystallographic Information File (CIF, owned by the International Union of Crystallography, is a file structure based on tag-value ASCII pairs with tags defined in machine-readable dictionaries. The crystallographic community publishes and archives large quantities of numeric information generated by crystal structure determinations, and CIF's acceptance was assured by its adoption as the submission format for Acta Crystallographica and by the obvious needs of the community. CIF's strength lies in its dictionaries, which define most of the concepts of crystallography; its weakness is the difficulty of writing software that exploits its full potential.

  9. FileMaker Pro 9

    CERN Document Server

    Coffey, Geoff

    2007-01-01

    FileMaker Pro 9: The Missing Manual is the clear, thorough and accessible guide to the latest version of this popular desktop database program. FileMaker Pro lets you do almost anything with the information you give it. You can print corporate reports, plan your retirement, or run a small country -- if you know what you're doing. This book helps non-technical folks like you get in, get your database built, and get the results you need. Pronto.The new edition gives novices and experienced users the scoop on versions 8.5 and 9. It offers complete coverage of timesaving new features such as the Q

  10. 12 CFR 1780.9 - Filing of papers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Filing of papers. 1780.9 Section 1780.9 Banks... papers. (a) Filing. Any papers required to be filed shall be addressed to the presiding officer and filed... Director or the presiding officer. All papers filed by electronic media shall also concurrently be filed in...

  11. 77 FR 35371 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-06-13

    .... Applicants: Duke Energy Miami Fort, LLC. Description: MBR Filing to be effective 10/1/2012. Filed Date: 6/5...-000. Applicants: Duke Energy Piketon, LLC. Description: MBR Filing to be effective 10/1/2012. Filed...-1959-000. Applicants: Duke Energy Stuart, LLC. Description: MBR Filing to be effective 10/1/2012. Filed...

  12. 76 FR 63291 - Combined Notice Of Filings #1

    Science.gov (United States)

    2011-10-12

    ... filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession Number: 20110923.... submits tariff filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession.... submits tariff filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession...

  13. Protecting your files on the DFS file system

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The Windows Distributed File System (DFS) hosts user directories for all NICE users plus many more data.    Files can be accessed from anywhere, via a dedicated web portal (http://cern.ch/dfs). Due to the ease of access to DFS with in CERN it is of utmost importance to properly protect access to sensitive data. As the use of DFS access control mechanisms is not obvious to all users, passwords, certificates or sensitive files might get exposed. At least this happened in past to the Andrews File System (AFS) - the Linux equivalent to DFS) - and led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed recently to apply more stringent protections to all DFS user folders. The goal of this data protection policy is to assist users in pro...

  14. Protecting your files on the AFS file system

    CERN Multimedia

    2011-01-01

    The Andrew File System is a world-wide distributed file system linking hundreds of universities and organizations, including CERN. Files can be accessed from anywhere, via dedicated AFS client programs or via web interfaces that export the file contents on the web. Due to the ease of access to AFS it is of utmost importance to properly protect access to sensitive data in AFS. As the use of AFS access control mechanisms is not obvious to all users, passwords, private SSH keys or certificates have been exposed in the past. In one specific instance, this also led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed in April 2010 to apply more stringent folder protections to all AFS user folders. The goal of this data protection policy is to assist users in...

  15. 77 FR 60418 - Combined Notice of Filings

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice that the Commission has received the following Natural Gas Pipeline Rate and Refund Report filings...-1064-000. Applicants: Venice Gathering System, L.L.C. Description: NAESB 2.0 Compliance Filing to be...

  16. 77 FR 27221 - Combined Notice of Filings

    Science.gov (United States)

    2012-05-09

    ... Generator Status of Minonk Wind, LLC. Filed Date: 4/19/12. Accession Number: 20120419-5196. Comments Due: 5... Self-Certification of Exempt Wholesale Generator Status of Senate Wind, LLC. Filed Date: 4/19/12... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice...

  17. 77 FR 23474 - Combined Notice of Filings

    Science.gov (United States)

    2012-04-19

    ...: Young Gas Storage Company, Ltd. Description: EBB Notice Categories to be effective 5/15/2012. Filed Date... intervention is necessary to become a party to the proceeding. Filings in Existing Proceedings Docket Numbers... requirements, interventions, protests, and service can be found at: http://www.ferc.gov/docs-filing/efiling...

  18. 76 FR 80921 - Combined Notice of Filings

    Science.gov (United States)

    2011-12-27

    .... Comments Due: 5 p.m. ET 12/27/11. Docket Numbers: RP12-243-000. Applicants: Young Gas Storage Company, Ltd... considered, but intervention is necessary to become a party to the proceeding. The filings are accessible in... can be found at: http://www.ferc.gov/docs-filing/efiling/filing-req.pdf . For other information, call...

  19. 78 FR 13050 - Combined Notice of Filings

    Science.gov (United States)

    2013-02-26

    ... be considered, but intervention is necessary to become a party to the proceeding. Filings in Existing Proceedings Docket Numbers: RP13-106-002. Applicants: Young Gas Storage Company, Ltd. Description: Young NAESB..., protests, and service can be found at: http://www.ferc.gov/docs-filing/efiling/filing-req.pdf . For other...

  20. 33 CFR 148.246 - When is a document considered filed and where should I file it?

    Science.gov (United States)

    2010-07-01

    ... filed and where should I file it? 148.246 Section 148.246 Navigation and Navigable Waters COAST GUARD... Formal Hearings § 148.246 When is a document considered filed and where should I file it? (a) If a document to be filed is submitted by mail, it is considered filed on the date it is postmarked. If a...