949 resultados para Peer-to-Peer


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study investigated the nature of body image and body change strategies, as well as the sociocultural influences on these variables, among a group of 1,266 adolescents (622 males, 644 females). In particular, it investigated weight gain and increased muscle, as well as weight loss. It was found that females were less satisfied with their bodies and were more likely to adopt strategies to lose weight, whereas males were more likely to adopt strategies to increase weight and muscle tone. Respondents with higher body mass index (BMI) evidenced greater body dissatisfaction and more weight loss strategies, but there were no differences between BMI groups in weight gain or strategies to increase muscles. Weight gain and strategies to increase muscles were more likely to be undertaken by older adolescents, but there were no grade level differences in weight loss. Media influences to alter weight, as well as feedback from mother, father, and both male and female peers, were greater for females. There were few grade level or BMI differences in regard to any of the sociocultural influences. The importance of these findings in terms of providing a better understanding of factors which may lead to a disturbed body image and body change disorders, particularly among adolescent boys, is discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The availability of critical services and their data can be significantly increased by replicating them on multiple systems connected with each other, even in the face of system and network failures. In some platforms such as peer-to-peer (P2P) systems, their inherent characteristic mandates the employment of some form of replication to provide acceptable service to their users. However, the problem of how best to replicate data to build highly available peer-to-peer systems is still an open problem. In this paper, we propose an approach to address the data replication problem on P2P systems. The proposed scheme is compared with other techniques and is shown to require less communication cost for an operation as well as provide higher degree of data availability.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The peer-to-peer content distribution network (PCDN) is a hot topic recently, and it has a huge potential for massive data intensive applications on the Internet. One of the challenges in PCDN is routing for data sources and data deliveries. In this paper, we studied a type of network model which is formed by dynamic autonomy area, structured source servers and proxy servers. Based on this network model, we proposed a number of algorithms to address the routing and data delivery issues. According to the highly dynamics of the autonomy area, we established dynamic tree structure proliferation system routing, proxy routing and resource searching algorithms. The simulations results showed that the performance of the proposed network model and the algorithms are stable.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With more and more multimedia applications on the Internet, such as IPTV, bandwidth becomes a vital bottleneck for the booming of large scale Internet based multimedia applications. Network coding is recently proposed to take advantage to use network bandwidth efficiently. In this paper, we focus on massive multimedia data, e.g. IPTV programs, transportation in peer-to-peer networks with network coding. By through study of networking coding, we pointed out that the prerequisites of bandwidth saving of network coding are: 1) one information source with a number of concurrent receivers, or 2) information pieces cached at intermediate nodes. We further proof that network coding can not gain bandwidth saving at immediate connections to a receiver end; As a result, we propose a novel model for IPTV data transportation in unstructured peer-to-peer networks with network coding. Our preliminary simulations show that the proposed architecture works very well.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article describes a Chronic Illness Peer Support (ChIPS) programme designed to assist young people in their adjustment to life with a chronic medical condition. The ChIPS programme takes a non-categorical approach to participation, recognizing that young people with different medical conditions experience many similar concerns. Support groups are facilitated by a health professional and peer co-leader. Groups meet weekly for 8 weeks and typically include between six and eight young people. Young people can choose to remain involved in broader social, educational and recreational activities following completion of the 8-week programme. We discuss nine psychosocial mechanisms by which peer support groups such as ChIPS might act to improve resilience and well-being among participants. We also discuss some theoretical risks in running support groups for chronically ill young people, which emphasize the importance of training and support of group leaders, including the peer co-leaders. The article concludes with a personal testimony by a ChIPS participant that was prepared for the 2003 Australian and New Zealand Adolescent Health Conference.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Two main problems prevent the deployment of peer-to-peer application in a wireless sensor network: the index table, which should be distributed stored rather than uses a central server as the director; the unique node identifier, which cannot use the global addresses. This paper presents a multi-level virtual ring (MVR) structure to solve these two problems.

The index table in MVR is distributed stored by using the DHT technique. MVR is constructed decentralized and runs on mobile nodes themselves, requiring no central server or interruption. Naming system in MVR uses natural names rather than global addresses to identify sensor nodes. The MVR can route directly on the name identifiers of the sensor nodes without being aware the location. Some sensor nodes are selected as the backbone nodes by the backbone selection algorithm and are placed on the different levels of the virtual rings. MVR hashes nodes’ identifiers on the virtual ring, and stores them at the backbone nodes. Furthermore, MVR adopts cross-level routing to improve the routing efficiency.

Experiments using ns2 simulator for up to 200 nodes show that the storage and bandwidth requirements of MVR grow slowly with the size of the network. Furthermore, MVR has demonstrated as self-administrating, fault-tolerant, and resilient under the different workloads.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The existing sharable file searching methods have at least one of the following disadvantages: (1) they are applicable only to certain topology patterns, (2) suffer single point failure, or (3) incur prohibitive maintenance cost. These drawbacks prevent their effective application in unstructured Peer-to-peer (P2P) systems (where the system topologies are changed time to time due to peers' frequently entering and leaving the systems), despite the considerable success of sharing file search in conventional peer-to-peer systems. Motivated by this, we develop several fully dynamic algorithms for searching sharing files in unstructured peer to peer systems. Our solutions can handle any topology pattern with small search time and computational overhead. We also present an in-depth analysis that provides valuable insight into the characteristics of alternative effective search strategies and leads to precision guarantees. Extensive experiments validate our theoretical findings and demonstrate the efficiency of our techniques in practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security research because of P2P worms' increasing complexity and sophistication. Due to the complexity of the problem, no existing work has solved the problem of modeling the propagation of P2P worms, especially when quarantine of peers is enforced. This paper presents a study on modeling the propagation of P2P worms. It also presents our applications of the proposed approach in worm propagation research.

Motivated by our aspiration to invent an easy-to-employ instrument for worm propagation research, the proposed approach models the propagation processes of P2P worms by difference equations of a logic matrix, which are essentially discrete-time deterministic propagation models of P2P worms. To the best of our knowledge, we are the first using a logic matrix in network security research in general and worm propagation modeling in particular.

Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms under three different conditions; secondly, we find the impacts of two different topologies on a P2P worm's attack performance; thirdly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks; and fourthly, we find the impacts of the two different quarantine tactics on the propagation characteristics of P2P worms in unstructured P2P networks. The approach's ease of employment, which is demonstrated by its applications in our simulation experiments, makes it an attractive instrument to conduct worm propagation research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Active Peer-to-Peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help us to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's propagation probability in a P2P overlay network and proposes an optimized patch strategy for defenders. Firstly, we present a probability matrix model to construct the propagation of P2P worms. Our model involves three indispensible aspects for propagation: infected state, vulnerability distribution and patch strategy. Based on a fully connected graph, our comprehensive model is highly suited for real world cases like Code Red II. Finally, by inspecting the propagation procedure, we propose four basic tactics for defense of P2P botnets. The rationale is exposed by our simulated experiments and the results show these tactics are of effective and have considerable worth in being applied in real-world networks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A considerable number of young people face the challenge of living with a chronic illness.  For many, the experience of a chronic illness can be fraught with feelings of frustration, alienation and a sense of isolation.  Recently there has been growing interest in the use of peer support programs as a means of assisting young people's adjustment to life with a chronic illness.  Peer support programs offer therapeutic gain while being financially accessible.  This document describes the development of the Chronic Illness Peer Support (ChIPS) program run through the Centre for Adolescent Health, Melbourne.