886 resultados para Peer to peer networks


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cette recherche qualitative de type exploratoire tente, à l'aide du discours de jeunes réfugiés, de comprendre de quelle manière leur parcours migratoire contribue à leur projet d'intégration et identitaire, notamment en saisissant leurs perceptions de leur situation actuelle, leurs rapports avec différents réseaux sociaux, l'impact de leur statut identitaire sur leur insertion scolaire, l'impact de leur statut d’immigrant sur les relations intrafamiliales comme sur leurs choix de relations avec les pairs et leur vision de leur futur. De plus, le but de ce mémoire est de poser un regard sur la mise en place de différentes formes de stratégies identitaires au sein de divers réseaux d'appartenance locaux ou transnationaux (école, religion, organismes communautaires, etc.). Afin de mieux comprendre cette réalité, encore peu traitée au Québec, de jeunes réfugiés âgés entre 15 et 21 ans ont été sollicités pour prendre la parole lors de deux entrevues semi-dirigées. Les données résultant des entrevues mettent en évidence une singularité des cas. Malgré tout, quelques tendances semblent ressortir dans le projet migratoire et d’intégration, tels que des trajectoires migratoires empreintes d’événements douloureux, des défis dans le parcours social et scolaire au Québec et une capacité à surmonter l’adversité dans des situations de contraintes répétitives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Le présent article vise à exposer la situation du régime de la copie privée face à Internet, tant dans son application que dans sa légitimité. L’auteur soumet notamment que l’exception de la copie privée n’est applicable ni à la mise à disposition ni au téléchargement de fichiers musicaux sur Internet à moins que, quant à ce dernier acte, la copie provienne d’une source licite, ce qui exclut les réseaux peer-to-peer. Ensuite, l’auteur analyse la question quant à savoir si les enregistreurs audionumériques et les disques durs des ordinateurs personnels devraient être soumis aux redevances au Canada, et conclut à l’effet qu’une réforme de la Loi sur le droit d’auteur est de mise si l’on veut en arriver à une telle éventualité. Finalement dans la dernière partie, l’auteur soulève la question de la remise en cause du régime de la copie privée face à l’importance grandissante que l‘on accorde à la gestion numérique des droits.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study of the morphology of tidal networks and their relation to salt marsh vegetation is currently an active area of research, and a number of theories have been developed which require validation using extensive observations. Conventional methods of measuring networks and associated vegetation can be cumbersome and subjective. Recent advances in remote sensing techniques mean that these can now often reduce measurement effort whilst at the same time increasing measurement scale. The status of remote sensing of tidal networks and their relation to vegetation is reviewed. The measurement of network planforms and their associated variables is possible to sufficient resolution using digital aerial photography and airborne scanning laser altimetry (LiDAR), with LiDAR also being able to measure channel depths. A multi-level knowledge-based technique is described to extract networks from LiDAR in a semi-automated fashion. This allows objective and detailed geomorphological information on networks to be obtained over large areas of the inter-tidal zone. It is illustrated using LIDAR data of the River Ems, Germany, the Venice lagoon, and Carnforth Marsh, Morecambe Bay, UK. Examples of geomorphological variables of networks extracted from LiDAR data are given. Associated marsh vegetation can be classified into its component species using airborne hyperspectral and satellite multispectral data. Other potential applications of remote sensing for network studies include determining spatial relationships between networks and vegetation, measuring marsh platform vegetation roughness, in-channel velocities and sediment processes, studying salt pans, and for marsh restoration schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The high-level sensitivity of medical information mandates stronger authentication and authorization mechanisms to be used in e-Health systems. This paper describes the design and implementation of certificate-based e-Health authentication and authorization architecture. This architecture was developed to authenticate e-Health professionals accessing shared clinical data among a set of affiliated health institutions based on peer-to- peer networks. The architecture had to accommodate specific medical data sharing and handling requirements, namely the security of professionals' credentials.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the characteristics of the current Web services is that many clients request the same or similar service from a group of replicated servers, e.g. music or movie downloading in peer-to-peer networks. Most of the time, servers are heterogeneous ones in terms of service rate. Much of research has been done in the homogeneous environment. However, there is has been little done on the heterogeneous scenario. It is important and urgent that we have models for heterogeneous server groups for the current Internet applications design and analysis. In this paper, we deploy an approximation method to transform heterogeneous systems into a group of homogeneous system. As a result, the previous results of homogeneous studies can be applied in heterogeneous cases. In order to test the approximation ratio of the proposed model to real applications, we conducted simulations to obtain the degree of similarity. We use two common strategies: random selection algorithm and Firs-Come-First-Serve (FCFS) algorithm to test the approximation ratio of the proposed model. The simulations indicate that the approximation model works well.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper aims to discover and examine ways in which cultural factors shape the adoption and use of information technology for online teaching. This research focuses on influential early adopters in the tertiary education sector in Malaysia who have become change-agents by inspiring small networks of their peers. The study examines the concept of guanxi to understand the operation of trust and inspiration in networking and teamwork in the Asian academic environment. This study points to the importance of developing guanxi, through the middle-down nurturing of peer networks, in developing a rich and rewarding environment for the development of online teaching.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction: New technologies such as the Internet offer an increasing number of options for the delivery of continuing education (CE) to community pharmacists. Many of these options are being utilized to overcome access- and cost-related problems. This paper identifies learning preferences of Australian community pharmacists for CE and identifies issues with the integration of these into contemporary models of CE delivery.
Methods: Four focus group teleconferences were conducted with practicing community pharmacists (n = 15) using a semistructured format and asking generally about their CE and continuing professional development (CPD) experiences.
Results: Pharmacists reported preferences for CE that were very closely aligned to the principles of adult learning. There was a strong preference for interactive and multidisciplinary CE. Engaging in CPD was seen as valuable in promoting reflective learning.
Discussion: These results suggest that pharmacists have a strong preference for CE that is based on adult learning principles. Professional organizations should take note of this and ensure that new CE formats do not compromise the ability of pharmacists to engage in interactive, multidisciplinary, and problem-based CE. Equally, the role of attendance-based CE in maintaining peer networks should not be overlooked.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aims From the pre-teen to the mid-teen years, rates of alcohol use and misuse increase rapidly. Cross-sectional research shows that positive family emotional climate (low conflict, high closeness) is protective, and there is emerging evidence that these protective mechanisms are different for girls versus boys. The aim of this study was to explore gender differences in the longitudinal impact of family emotional climate on adolescent alcohol use and exposure to peer drinking networks.

Design
Three-wave two-level (individual, within-individual over time) ordinal logistic regression with alcohol use in the past year as the dependent measure and family variables lagged by 1 year.

Setting Adolescents completed surveys during school hours.

Participants A total of 855 Australian students (modal age 10–11 years at baseline) participating in the International Youth Development Study (Victoria, Australia).

Measurements
These included emotional closeness to mother/father, family conflict, parent disapproval of alcohol use and peer alcohol use.

Findings
For girls, the effect of emotional closeness to mothers on alcohol use was mediated by exposure to high-risk peer networks. Parent disapproval of alcohol use was protective for both genders, but this effect was larger for boys versus girls, and there was no evidence that peer use mediated this effect. Peer drinking networks showed stronger direct risk effects than family variables.

Conclusions Family factors unidirectionally impact on growth in adolescent alcohol use and effects vary with child gender.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Taking advantage of the huge potential of consumers’ untapped computing power, self-organizing cloud is a novel computing paradigm where the consumers are able to contribute/sell their computing resources. Meanwhile, host machines held by the consumers are connected by a peer-to-peer (P2P) overlay network on the Internet. In this new architecture, due to large and varying multitudes of resources and prices, it is inefficient and tedious for consumers to select the proper resource manually. Thus, there is a high demand for a scalable and automatic mechanism to accomplish resource allocation. In view of this challenge, this paper proposes two novel economic strategies based on mechanism design. Concretely, we apply the Modified Vickrey Auction (MVA) mechanism to the case where the resource is sufficient; and the Continuous Double Auction (CDA) mechanism is employed when the resource is insufficient. We also prove that aforementioned mechanisms have dominant strategy incentive compatibility. Finally, extensive experiment results are conducted to verify the performance of the proposed strategies in terms of procurement cost and execution efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There are some approaches that take advantage of unused computational resources in the Internet nodes - users´ machines. In the last years , the peer-to-peer networks (P2P) have gaining a momentum mainly due to its support for scalability and fault tolerance. However, current P2P architectures present some problems such as nodes overhead due to messages routing, a great amount of nodes reconfigurations when the network topology changes, routing traffic inside a specific network even when the traffic is not directed to a machine of this network, and the lack of a proximity relationship among the P2P nodes and the proximity of these nodes in the IP network. Although some architectures use the information about the nodes distance in the IP network, they use methods that require dynamic information. In this work we propose a P2P architecture to fix the problems afore mentioned. It is composed of three parts. The first part consists of a basic P2P architecture, called SGrid, which maintains a relationship of nodes in the P2P network with their position in the IP network. Its assigns adjacent key regions to nodes of a same organization. The second part is a protocol called NATal (Routing and NAT application layer) that extends the basic architecture in order to remove from the nodes the responsibility of routing messages. The third part consists of a special kind of node, called LSP (Lightware Super-Peer), which is responsible for maintaining the P2P routing table. In addition, this work also presents a simulator that validates the architecture and a module of the Natal protocol to be used in Linux routers

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the work in progress of an on-demand software deployment system based on application virtualization concepts which eliminates the need of software installation and configuration on each computer. Some mechanisms were created, such as mapping of utilization of resources by the application to improve the software distribution and startup; a virtualization middleware which give all resources needed for the software execution; an asynchronous P2P transport used to optimizing distribution on the network; and off-line support where the user can execute the application even when the server is not available or when is out of the network. © Springer-Verlag Berlin Heidelberg 2010.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A prevalent claim is that we are in knowledge economy. When we talk about knowledge economy, we generally mean the concept of “Knowledge-based economy” indicating the use of knowledge and technologies to produce economic benefits. Hence knowledge is both tool and raw material (people’s skill) for producing some kind of product or service. In this kind of environment economic organization is undergoing several changes. For example authority relations are less important, legal and ownership-based definitions of the boundaries of the firm are becoming irrelevant and there are only few constraints on the set of coordination mechanisms. Hence what characterises a knowledge economy is the growing importance of human capital in productive processes (Foss, 2005) and the increasing knowledge intensity of jobs (Hodgson, 1999). Economic processes are also highly intertwined with social processes: they are likely to be informal and reciprocal rather than formal and negotiated. Another important point is also the problem of the division of labor: as economic activity becomes mainly intellectual and requires the integration of specific and idiosyncratic skills, the task of dividing the job and assigning it to the most appropriate individuals becomes arduous, a “supervisory problem” (Hogdson, 1999) emerges and traditional hierarchical control may result increasingly ineffective. Not only specificity of know how makes it awkward to monitor the execution of tasks, more importantly, top-down integration of skills may be difficult because ‘the nominal supervisors will not know the best way of doing the job – or even the precise purpose of the specialist job itself – and the worker will know better’ (Hogdson,1999). We, therefore, expect that the organization of the economic activity of specialists should be, at least partially, self-organized. The aim of this thesis is to bridge studies from computer science and in particular from Peer-to-Peer Networks (P2P) to organization theories. We think that the P2P paradigm well fits with organization problems related to all those situation in which a central authority is not possible. We believe that P2P Networks show a number of characteristics similar to firms working in a knowledge-based economy and hence that the methodology used for studying P2P Networks can be applied to organization studies. Three are the main characteristics we think P2P have in common with firms involved in knowledge economy: - Decentralization: in a pure P2P system every peer is an equal participant, there is no central authority governing the actions of the single peers; - Cost of ownership: P2P computing implies shared ownership reducing the cost of owing the systems and the content, and the cost of maintaining them; - Self-Organization: it refers to the process in a system leading to the emergence of global order within the system without the presence of another system dictating this order. These characteristics are present also in the kind of firm that we try to address and that’ why we have shifted the techniques we adopted for studies in computer science (Marcozzi et al., 2005; Hales et al., 2007 [39]) to management science.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sensor networks have been an active research area in the past decade due to the variety of their applications. Many research studies have been conducted to solve the problems underlying the middleware services of sensor networks, such as self-deployment, self-localization, and synchronization. With the provided middleware services, sensor networks have grown into a mature technology to be used as a detection and surveillance paradigm for many real-world applications. The individual sensors are small in size. Thus, they can be deployed in areas with limited space to make unobstructed measurements in locations where the traditional centralized systems would have trouble to reach. However, there are a few physical limitations to sensor networks, which can prevent sensors from performing at their maximum potential. Individual sensors have limited power supply, the wireless band can get very cluttered when multiple sensors try to transmit at the same time. Furthermore, the individual sensors have limited communication range, so the network may not have a 1-hop communication topology and routing can be a problem in many cases. Carefully designed algorithms can alleviate the physical limitations of sensor networks, and allow them to be utilized to their full potential. Graphical models are an intuitive choice for designing sensor network algorithms. This thesis focuses on a classic application in sensor networks, detecting and tracking of targets. It develops feasible inference techniques for sensor networks using statistical graphical model inference, binary sensor detection, events isolation and dynamic clustering. The main strategy is to use only binary data for rough global inferences, and then dynamically form small scale clusters around the target for detailed computations. This framework is then extended to network topology manipulation, so that the framework developed can be applied to tracking in different network topology settings. Finally the system was tested in both simulation and real-world environments. The simulations were performed on various network topologies, from regularly distributed networks to randomly distributed networks. The results show that the algorithm performs well in randomly distributed networks, and hence requires minimum deployment effort. The experiments were carried out in both corridor and open space settings. A in-home falling detection system was simulated with real-world settings, it was setup with 30 bumblebee radars and 30 ultrasonic sensors driven by TI EZ430-RF2500 boards scanning a typical 800 sqft apartment. Bumblebee radars are calibrated to detect the falling of human body, and the two-tier tracking algorithm is used on the ultrasonic sensors to track the location of the elderly people.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND We describe the setup of a neonatal quality improvement tool and list which peer-reviewed requirements it fulfils and which it does not. We report on the so-far observed effects, how the units can identify quality improvement potential, and how they can measure the effect of changes made to improve quality. METHODS Application of a prospective longitudinal national cohort data collection that uses algorithms to ensure high data quality (i.e. checks for completeness, plausibility and reliability), and to perform data imaging (Plsek's p-charts and standardized mortality or morbidity ratio SMR charts). The collected data allows monitoring a study collective of very low birth-weight infants born from 2009 to 2011 by applying a quality cycle following the steps 'guideline - perform - falsify - reform'. RESULTS 2025 VLBW live-births from 2009 to 2011 representing 96.1% of all VLBW live-births in Switzerland display a similar mortality rate but better morbidity rates when compared to other networks. Data quality in general is high but subject to improvement in some units. Seven measurements display quality improvement potential in individual units. The methods used fulfil several international recommendations. CONCLUSIONS The Quality Cycle of the Swiss Neonatal Network is a helpful instrument to monitor and gradually help improve the quality of care in a region with high quality standards and low statistical discrimination capacity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study sought to investigate the ways in which social anxiety impedes the development of romantic relationships across adolescence. Previous research has demonstrated a natural progression for romantic associations during adolescence in which teens transition from same- to mixed-sex peer groups, and finally to dyadic relationships with romantic partners (Connolly, Furman, Konarski, 2000; Dunphy, 1963). This model of development was the basis for the present investigation. Social anxiety was examined in terms of how it impacted affiliations at the same- and mixed sex peer group levels, and ultimately the formation of romantic relationships. This project involved administering a series of questionnaires and rating scales to students enrolled in the 9th through \2l grades. Participants included 457 adolescents (196 males, 261 females) recruited from public high schools in the state of Maine. The questionnaires assessed social anxiety, peer acceptance, heterosocial competence, gender composition of adolescent peer networks, dating history, and relationship quality with significant others in the adolescent's life. Higher levels of social anxiety were expected to be associated with impairment at each of these three levels. Given the proposed developmental progression, the effects of anxiety were theorized to be most pronounced within the older cohort of adolescents. Moreover, gender was expected to affect the pattern of results. Social anxiety is most prevalent among females (LaGreca, 1998; LaGreca & Lopez, 1998), who are also thought to progress along the proposed developmental trajectory more quickly than their male counterparts. Therefore, social anxiety was expected to impact the females to a greater degree at each of the three levels. Correlation coefficients, multivariate analyses of variance, and regression analyses were used to evaluate the data. Overall, despite some discrepant findings, the results supported the hypotheses. Social anxiety was affiliated with problems in the same-sex peer group, the mixed-sex clique, and, for older adolescents, romantic relationships. As expected, social anxiety affected females the most at each level. There seems to be a maladaptive pathway that socially anxious teens are following that is markedly different than their non-anxious counterparts.