730 results on '"Peer-to-peer networks"'
Search Results
2. Application of Graph Theory and Variants of Greedy Graph Coloring Algorithms for Optimization of Distributed Peer-to-Peer Blockchain Networks.
- Author
-
Švarcmajer, Miljenko, Ivanović, Denis, Rudec, Tomislav, and Lukić, Ivica
- Subjects
GRAPH theory ,GREEDY algorithms ,PRIVATE networks ,NP-hard problems ,MATHEMATICAL optimization - Abstract
This paper investigates the application of graph theory and variants of greedy graph coloring algorithms for the optimization of distributed peer-to-peer networks, with a special focus on private blockchain networks. The graph coloring problem, as an NP-hard problem, presents a challenge in determining the minimum number of colors needed to efficiently allocate resources within the network. The paper deals with the influence of different graph density, i.e., the number of links, on the efficiency of greedy algorithms such as DSATUR, Descending, and Ascending. Experimental results show that increasing the number of links in the network contributes to a more uniform distribution of colors and increases the resistance of the network, whereby the DSATUR algorithm achieves the most uniform color saturation. The optimal configuration for a 100-node network has been identified at around 2000 to 2500 links, which achieves stability without excessive redundancy. These results are applied in the context of a private blockchain network that uses optimal connectivity to achieve high resilience and efficient resource allocation. The research findings suggest that adapting network configuration using greedy algorithms can contribute to the optimization of distributed systems, making them more stable and resilient to loads. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
3. The essential necessity to invest in the cultivation of peer recovery specialists as organizational leaders
- Author
-
Jones, Traci Carrano and Burrell, Darrell Norman
- Published
- 2024
- Full Text
- View/download PDF
4. The essential necessity to invest in the cultivation of peer recovery specialists as organizational leaders
- Author
-
Traci Carrano Jones and Darrell Norman Burrell
- Subjects
Peer-to-peer networks ,Peer recovery specialist ,Mental health managers ,Addiction leadership ,Counseling leadership ,Health coaching ,Commerce ,HF1-6182 ,Finance ,HG1-9999 - Abstract
Purpose – The emergence of COVID-19 has exacerbated and spurred the growth of mental health issues in ways that have challenged mental health workers tremendously. The complex nature of COVID-19 has made the need of mental health professionals extremely important. Hospital ward overcrowding, social distancing requirements, sequestrations, limits to face-to-face consultations have created barriers to mental health access, especially those in need of Certified Peer Recovery Specialists. Certified Peer Recovery Specialists play a critical role in the treatment of mental illness through their support and engagement of those recovering from substance abuse. Many in this role are hired because they have a strong skillset for help-oriented clinical work but are often challenged, especially in times like this to development and demonstrate leadership skills. This paper explores the nature and need to develop leadership skills and leadership challenges for people in this field through interpretative phenomenological analysis (IPA) and a content analysis of the current and seminal literature. Design/methodology/approach – This paper explores the nature and need to develop leadership skills and leadership challenges for people in mental health through IPA and a content analysis of the current and seminal literature. Findings – The essential necessity to invest in the cultivation of peer recovery specialists and mental health professionals as organizational leaders. Originality/value – Hospital ward overcrowding, social distancing requirements, sequestrations, limits to face- to- face consultations have created barriers to mental health access, especially those in need of Certified Peer Recovery Specialists. Certified Peer Recovery Specialists play a critical role in the treatment of mental illness through their support and engagement of those recovering from substance abuse.
- Published
- 2024
- Full Text
- View/download PDF
5. The adoption of conservation practices in the Corn Belt: the role of one formal farmer network, Practical Farmers of Iowa.
- Author
-
Asprooth, L, Norton, M, and Galt, R
- Subjects
Adoption ,Agriculture ,Conservation practices ,Corn Belt ,Formal farmer networks ,Peer-to-peer networks ,Applied Economics ,Sociology ,Geography - Abstract
Substantial evidence has shown that involvement in peer-to-peer farming networks influences whether a farmer decides to try a new practice. Formally organized farmer networks are emerging as a unique entity that blend the benefits of decentralized exchange of farmer knowledge within the structure of an organization providing a variety of sources of information and forms of engagement. We define formal farmer networks as farmer networks with a distinct membership and organizational structure, leadership that includes farmers, and an emphasis on peer-to-peer learning. This study complements existing ethnographic research on the benefits of organized farmer networking by examining farmers in one longstanding formal farmer network, Practical Farmers of Iowa. Using a nested, mixed-method research design, we analyzed survey and interview data to understand how participation and forms of engagement in the network are associated with the adoption of conservation practices. Responses from 677 farmers from a regular member survey disseminated by Practical Farmers of Iowa in 2013, 2017, and 2020 were pooled and analyzed. GLM binomial and ordered logistic regression results indicate that greater participation in the network, particularly through in-person formats, has a strong and significant association with greater adoption of conservation practices. Logistic regression results show that building relationships in the network is the most important variable for predicting whether a farmer reported adopting conservation practices as a result of participation in PFI. In-depth interviews with 26 surveyed member farmers revealed that PFI supports farmers to adopt by providing information, resources, encouragement, confidence building, and reinforcement. In-person learning formats were more important to farmers relative to independent formats because they were able to have side conversations with other farmers, ask questions, and observe results. We conclude that formal networks are a promising way to expand the use of conservation practices, particularly through targeted efforts to increase relationship building in the network through face-to-face learning opportunities.
- Published
- 2023
6. "Half of the Node Records Are Forged?": The Problem of Node Records Forgery in Ethereum Network.
- Author
-
Liu, Yang, Lin, Zhiyuan, Zhang, Yuxi, Jiang, Lin, and Wang, Xuan
- Abstract
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smart contracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connection mechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security. In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application of simulation technology, which is capable of aggregating all node records within the network and the interconnectedness between them. Utilizing this connection information, NodeHunter can procure more comprehensive insights for network status analysis compared to preceding detection methodologies. Throughout a three-month period of unbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with over one hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more of these node records were maliciously forged. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Student Peer-to-Peer File Sharing as an Academic Integrity Issue
- Author
-
Rogerson, Ann M., Curtis, Guy, Section editor, and Eaton, Sarah Elaine, editor
- Published
- 2024
- Full Text
- View/download PDF
8. The Problem of Node Records Forgery in Ethereum Network
- Author
-
Liu, Yang, Zhang, Yuxi, Lin, Zhiyuan, Jiang, Zoe L., Wang, Xuan, Ceccarelli, Marco, Series Editor, Agrawal, Sunil K., Advisory Editor, Corves, Burkhard, Advisory Editor, Glazunov, Victor, Advisory Editor, Hernández, Alfonso, Advisory Editor, Huang, Tian, Advisory Editor, Jauregui Correa, Juan Carlos, Advisory Editor, Takeda, Yukio, Advisory Editor, and Li, Shaofan, editor
- Published
- 2024
- Full Text
- View/download PDF
9. Application of Graph Theory and Variants of Greedy Graph Coloring Algorithms for Optimization of Distributed Peer-to-Peer Blockchain Networks
- Author
-
Miljenko Švarcmajer, Denis Ivanović, Tomislav Rudec, and Ivica Lukić
- Subjects
greedy algorithms ,graph coloring ,DSATUR ,distributed systems ,peer-to-peer networks ,connectivity optimization ,Technology - Abstract
This paper investigates the application of graph theory and variants of greedy graph coloring algorithms for the optimization of distributed peer-to-peer networks, with a special focus on private blockchain networks. The graph coloring problem, as an NP-hard problem, presents a challenge in determining the minimum number of colors needed to efficiently allocate resources within the network. The paper deals with the influence of different graph density, i.e., the number of links, on the efficiency of greedy algorithms such as DSATUR, Descending, and Ascending. Experimental results show that increasing the number of links in the network contributes to a more uniform distribution of colors and increases the resistance of the network, whereby the DSATUR algorithm achieves the most uniform color saturation. The optimal configuration for a 100-node network has been identified at around 2000 to 2500 links, which achieves stability without excessive redundancy. These results are applied in the context of a private blockchain network that uses optimal connectivity to achieve high resilience and efficient resource allocation. The research findings suggest that adapting network configuration using greedy algorithms can contribute to the optimization of distributed systems, making them more stable and resilient to loads.
- Published
- 2025
- Full Text
- View/download PDF
10. Randomized protocols for resilient peer-to-peer networks.
- Author
-
Tanaka, Richard and Zhu, Ying
- Subjects
DISTRIBUTED algorithms ,RANDOM walks ,PROBLEM solving ,GOSSIP ,STEVEDORES - Abstract
This paper studies a few randomized algorithms (e.g., random walks, gossip) in peer-to-peer networks. We leverage the Docker virtual container technology to develop implementations of the peer-to-peer networks and of these distributed randomized algorithms executing on top of them. We can thus analyze their behavior and performance in realistic settings. We further consider the problem of identifying high-risk bottleneck links in the network with the objective of improving the resilience and reliability of peer-to-peer networks. We propose a randomized algorithm to solve this problem and evaluate its performance by simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. “Half of the Node Records Are Forged?”: The Problem of Node Records Forgery in Ethereum Network.
- Author
-
Yang Liu, Zhiyuan Lin, Yuxi Zhang, Lin Jiang, and Xuan Wang
- Abstract
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smart contracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connection mechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security. In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application of simulation technology, which is capable of aggregating all node records within the network and the interconnectedness between them. Utilizing this connection information, NodeHunter can procure more comprehensive insights for network status analysis compared to preceding detection methodologies. Throughout a three-month period of unbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with over one hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more of these node records were maliciously forged. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. DEVELOPING A METHOD FOR THE DETECTION AND IDENTIFICATION OF ROOTSTOCK BLOCKCHAIN NETWORK NODES.
- Author
-
Dorogyy, Yaroslaw and Kolisnichenko, Vadym
- Subjects
ROOTSTOCKS ,INTERNET protocol address ,GRAPH algorithms ,IP networks ,BLOCKCHAINS ,SEARCH algorithms - Abstract
The object of this study is the protocol for detecting nodes in the Rootstock blockchain network and crawling tools. Node discovery protocols are the foundation of any decentralized peer-to-peer network. In blockchain systems, full nodes store and maintain a complete copy of all transactions performed in the network. However, they do not store information about all other nodes, such as their IDs or IP addresses. Each node usually maintains an incomplete list of nodes to which it connects to exchange blockchain data. In decentralized networks, nodes join and leave the network and their IP addresses can change, making it impractical to maintain a complete, up-to-date list of all nodes. Therefore, the only way to get a list of all nodes in the network is to poll each node sequentially. The developed method involves sending specially formed messages to nodes to obtain their neighbors. The graph search algorithm is used to traverse all received neighboring nodes. This allows one to consistently detect all network nodes. Identifying the desired sequence of messages requires a preliminary analysis of the node software RSKj in the part of node discovery protocol. Effectiveness of the proposed method was verified using the developed software and an experiment in the main network. 6 verification nodes were deployed in different physical locations and at different times. All test nodes were detected in less than 10 minutes. The developed method found 222 nodes that have 209 unique IP addresses. Results of this study show how to perform analysis of node discovery protocol. They provide the means to obtain information about the available nodes of the Rootstock blockchain system, enabling the analysis of both the blockchain network in general and individual node. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Student Peer-to-Peer File Sharing as an Academic Integrity Issue
- Author
-
Rogerson, Ann M., Curtis, Guy, Section editor, and Eaton, Sarah Elaine, editor
- Published
- 2023
- Full Text
- View/download PDF
14. Community-Based Gossip Algorithm for Distributed Averaging
- Author
-
Sirocchi, Christel, Bogliolo, Alessandro, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Patiño-Martínez, Marta, editor, and Paulo, João, editor
- Published
- 2023
- Full Text
- View/download PDF
15. Data flow dissemination in a network.
- Author
-
Gopalan, Aditya and Stolyar, Alexander L.
- Subjects
- *
QUEUEING networks , *VEHICULAR ad hoc networks , *SIMULATION methods & models , *DATA packeting , *BLOCKCHAINS - Abstract
We consider the following network model motivated, in particular, by blockchains and peer-to-peer live streaming. Data packet flows arrive at the network nodes and need to be disseminated to all other nodes. Packets are relayed through the network via links of finite capacity. A packet leaves the network when it is disseminated to all nodes. Our focus is on two communication disciplines, which determine the order in which packets are transmitted over each link, namely Random-Useful (RU) and Oldest-Useful (OU). We show that RU has the maximum stability region in a general network. For the OU we demonstrate that, somewhat surprisingly, it does not in general have the maximum stability region. We prove that OU does achieve maximum stability in the important special case of a symmetric network, given by the full graph with equal capacities on all links and equal arrival rates at all nodes. We also give other stability results, and compare different disciplines' performances in a symmetric system via simulation. Finally, we study the cumulative delays experienced by a packet as it propagates through the symmetric system, specifically the delay asymptotic behavior as N → ∞ . We put forward some conjectures about this behavior, supported by heuristic arguments and simulation experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. The adoption of conservation practices in the Corn Belt: the role of one formal farmer network, Practical Farmers of Iowa.
- Author
-
Asprooth, L., Norton, M., and Galt, R.
- Subjects
CORN ,FARMERS ,ETHNOLOGY research ,AGRICULTURE ,LOGISTIC regression analysis - Abstract
Substantial evidence has shown that involvement in peer-to-peer farming networks influences whether a farmer decides to try a new practice. Formally organized farmer networks are emerging as a unique entity that blend the benefits of decentralized exchange of farmer knowledge within the structure of an organization providing a variety of sources of information and forms of engagement. We define formal farmer networks as farmer networks with a distinct membership and organizational structure, leadership that includes farmers, and an emphasis on peer-to-peer learning. This study complements existing ethnographic research on the benefits of organized farmer networking by examining farmers in one longstanding formal farmer network, Practical Farmers of Iowa. Using a nested, mixed-method research design, we analyzed survey and interview data to understand how participation and forms of engagement in the network are associated with the adoption of conservation practices. Responses from 677 farmers from a regular member survey disseminated by Practical Farmers of Iowa in 2013, 2017, and 2020 were pooled and analyzed. GLM binomial and ordered logistic regression results indicate that greater participation in the network, particularly through in-person formats, has a strong and significant association with greater adoption of conservation practices. Logistic regression results show that building relationships in the network is the most important variable for predicting whether a farmer reported adopting conservation practices as a result of participation in PFI. In-depth interviews with 26 surveyed member farmers revealed that PFI supports farmers to adopt by providing information, resources, encouragement, confidence building, and reinforcement. In-person learning formats were more important to farmers relative to independent formats because they were able to have side conversations with other farmers, ask questions, and observe results. We conclude that formal networks are a promising way to expand the use of conservation practices, particularly through targeted efforts to increase relationship building in the network through face-to-face learning opportunities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Secure data dissemination and routing in Internet of Things
- Author
-
Gangadharaiah, S. and Bhajantri, Lokesh B.
- Published
- 2024
- Full Text
- View/download PDF
18. Helios.TALK: A decentralised messaging framework that preserves the privacy of users [version 2; peer review: 1 approved, 5 approved with reservations, 1 not approved]
- Author
-
Vasiliki Gkatziaki, Ioannis Sarridis, Nikos Giatsoglou, Nikos Sarris, Emmanouil Krasanakis, Symeon Papadopoulos, and Ioannis Kompatsiaris
- Subjects
communication applications ,online social networks ,peer-to-peer networks ,instant messaging ,eng ,Science ,Social Sciences - Abstract
Communication via digital means, such as mobile messaging applications (apps), plays an increasingly important role in everyday life. However, most messaging apps employ centralized computing principles that relinquish control of their users’ personal data to social network platform providers. Decentralization has been proposed as an alternative that provides trustworthiness and data confidentiality, but this comes at expense of fewer provided features and non-intuitive user experience. To address this issue, we hereby present two interconnected decentralized messaging tools, developed in the scope of the HELIOS platform, which can support new decentralized social networks. The first tool is a framework that supports the development of context-aware decentralized messaging apps in mobile Android devices by organically tying together many of the platform’s standalone decentralized operations. The second is a decentralized messaging app, called helios.TALK, that builds on the framework but accommodates additional design considerations from the perspective of end-users.
- Published
- 2023
- Full Text
- View/download PDF
19. ANALYZING THE INFLUENCE OF AGENTS IN TRUST NETWORKS: APPLYING NONSMOOTH EIGENSENSITIVITY THEORY TO A GRAPH CENTRALITY PROBLEM.
- Author
-
DONNELLY, JON and STECHLINSKI, PETER
- Subjects
- *
GRAPH theory , *TRUST , *MALWARE , *NONSMOOTH optimization , *SET theory , *GRAPH algorithms , *REPUTATION - Abstract
Graph centrality measures have found widespread use ranking agents in networks by characterizing their "importance" for the purpose of predicting and managing network outcomes. One major application of such a graph centrality problem is found in decentralized, peer-to-peer networks; in particular, the EigenTrust algorithm for trust management aims to reduce the amount of malware distributed in peer-to-peer networks by using graph centrality as a metric for reputation. This popular scheme has been successfully applied to many different types of peer-to-peer networks. However, the effect malicious agents can have on the reliability of schemes like EigenTrust through overt or covert behavior has not yet been fully investigated. In this work, we analyze vulnerabilities in EigenTrust by extending classical eigenvalue/eigenvector sensitivity theory to the nonsmooth setting, where the presence of nonsmoothness in this problem arises from defense mechanisms built into EigenTrust. This enables us to compute the sensitivity of trust scores to ratings provided by individual agents, revealing vulnerabilities in EigenTrust. Our findings indicate that malicious agents can have a large impact on a network despite having relatively low centrality themselves (i.e., appearing untrustworthy). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Practical Provably Secure Flooding for Blockchains
- Author
-
Liu-Zhang, Chen-Da, Matt, Christian, Maurer, Ueli, Rito, Guilherme, Thomsen, Søren Eller, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Agrawal, Shweta, editor, and Lin, Dongdai, editor
- Published
- 2022
- Full Text
- View/download PDF
21. Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
- Author
-
Matt, Christian, Nielsen, Jesper Buus, Thomsen, Søren Eller, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Dodis, Yevgeniy, editor, and Shrimpton, Thomas, editor
- Published
- 2022
- Full Text
- View/download PDF
22. Evolving Roles in Distribution Networks: Resource Coordination and Control Under the Emergence of the Distribution System Operator
- Author
-
Poudineh, Rahmatallah, Brandstätt, Christine, Billimoria, Farhad, Poudineh, Rahmatallah, Brandstätt, Christine, and Billimoria, Farhad
- Published
- 2022
- Full Text
- View/download PDF
23. Polygon Formation in Distributed Multi-Agent Systems.
- Author
-
Yang, Rui, Azadmanesh, Azad, and Farhat, Hassan
- Subjects
POLYGONS ,ROBOTS - Abstract
A primary challenge to form a geometric pattern for a fleet of randomly distributed agents is the determination of their locations on the boundary of a formation. The challenge is more acute if the agents need to be uniformly distributed on the formation. This study addresses this challenge for polygon formations via a two-phase procedure. In the first phase, the agents form an enclosing circle to the location of the formation. This prevents the agents from location-conflicts on the polygon and hence each agent can uniquely ascertain its projection point on the formation. In the second phase, the agents establish their projected points and move toward their locations on the polygon, while mitigating collisions. The circle formation is also used as a regrouping feature before the agents reconfigure themselves into a different polygon formation. The formation control laws developed are verified through simulation for circle formation, convex polygons, and some categories of concave polygons. The control laws include the cases for rotation, translation (relocation), and scaling of polygons as well. [ABSTRACT FROM AUTHOR]
- Published
- 2023
24. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions.
- Author
-
Sánchez-Patiño, Natalia, Gallegos-Garcia, Gina, and Rivero-Angeles, Mario E.
- Subjects
CYBERTERRORISM ,COMPUTER network architectures ,TELECOMMUNICATION traffic ,MALWARE ,DENIAL of service attacks ,TELECOMMUNICATION systems - Abstract
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, this communication model also has a clear disadvantage: it has a multitude of vulnerabilities and security threats. The nature of the P2P philosophy itself means that there is no centralized server responsible for uploading, storing, and verifying the authenticity of the shared files and packets. A direct consequence of this is that P2P networks are a good choice for hackers for the spread of malicious software or malware in general since there is no mechanism to control what content is shared. In this paper, we present a mathematical model for P2P networks to study the effect of two different attacks on these systems, namely, malware and denial of service. To analyze the behavior of the cyber attacks and identify important weaknesses, we develop different Markov chains that reflect the main dynamics of the system and the attacks. Specifically, our model considers the case in which a certain number of nodes are infected with a cyber worm that is spread throughout the network as the file is shared among peers. This allows observation of the final number of infected peers when an initial number (we evaluate the system for from 1 to 14 initial nodes) of malicious nodes infect the system. For the DoS attack, our model considers the portion of peers that are unable to communicate and the average attack duration to study the performance degradation of such an attack. A two-pronged approach was used to study the impact of the attacks on P2P networks; the first focused only on the P2P network, and the second focused on the attacks and the network. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Privacy-friendly Discovery of Common Friends in P2P Networks
- Author
-
Tommi Meskanen, Jarkko Kuusijarvi, Sara Ramezanian, and Valtteri Niemi
- Subjects
multiparty computation ,private set intersection ,social media ,peer-to-peer networks ,privacy ,Telecommunication ,TK5101-6720 - Abstract
Several protocols for private set intersection are presented in the literature. When the sets are large these tend to be too slow for many purposes. We consider the problem of two parties finding out how many common friends they have in a privacy preserving way. This problem has arisen in designing a peer-to-peer platform called HELIOS. We present our solution for the problem that is more efficient than older protocols but still sufficiently privacy-friendly for our purposes. The solution is based on iteratively revealing information about hash values of friends identities in small increments.
- Published
- 2022
- Full Text
- View/download PDF
26. A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network.
- Author
-
Ansari, Md. Sarfaraj Alam, Pal, Kunwar, Govil, Prajjval, and Govil, Mahesh Chandra
- Subjects
STREAMING video & television ,PEER-to-peer file sharing ,FLASH memory ,CRYPTOCURRENCIES ,CROWDS ,CREDIT ratings ,MOBILE computing - Abstract
A Peer-to-peer (P2P) network system has proved to be a popular and efficient approach for large-scale live video streaming and file sharing over the Internet. Such a system is always challenged by various issues and requires to be monitored and controlled for significant performance. Among them, one of the major performance issues in P2P networks is the flash crowd. When many users switch to a popular channel in a short span of time, the P2P system suffers from a serious join congestion problem, called the flash crowd problem. In such situations, systems can scale only up to a limit, both by available surplus bandwidth and intense competition among peers for their start-up, and hence, it not only decreases the efficiency but also creates a blockage of services for connected peers. Therefore, management of the flash crowd has been important and becoming paramount with the increased use of online services and the proliferation of various technologies like IoT, Edge & Mobile Computing, Crypto Currencies, and Torrenz-like services. A hierarchy-based admission control model with multiple threshold layers is proposed to mitigate the flash crowd in the P2P network paradigm. A fuzzy logic-based prediction mechanism is proposed to predict the control scheme applicable to the requested peers based on the parameters such as buffer size, bandwidth, etc. In case of the occurrence of the flash crowd, the model applies different control schemes depending upon which threshold layer it is predicted. These include saving the system resources, granting preferences to best-performing peers, dropping requests of worst-performing peers, a slight decrease in service quality, etc. We also characterize the credit score of peers, which denotes their performances. The model is simulated in OMNET++ along with the OverSim framework. Results from the simulation reveal a reduction in request drops, processing delays, and startup delays compared to other management schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. Challenges and Decisions in WOBCompute Design, a P2P Computing System Architecture
- Author
-
Filep, Levente, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Ali, Raian, editor, Kaindl, Hermann, editor, and Maciaszek, Leszek A., editor
- Published
- 2021
- Full Text
- View/download PDF
28. Space Invaders? The Role of Airbnb in the Touristification of Urban Neighbourhoods
- Author
-
Neuts, Bart, Kourtit, Karima, Nijkamp, Peter, Higano, Yoshiro, Editor-in-Chief, Suzuki, Soushi, editor, Kourtit, Karima, editor, and Nijkamp, Peter, editor
- Published
- 2021
- Full Text
- View/download PDF
29. Assessing the credibility of online social network messages
- Author
-
Makinde, Oghenefejiro Winnie
- Subjects
302.30285 ,Credibility ,Online social networks ,Trust ,Agents ,Agent-based Modellig ,Netlogo ,Rewiring ,Social network analysis ,Peer-to-peer networks ,Social media - Abstract
Information gathered socially online is a key feature of the growth and development of modern society. Presently the Internet is a platform for the distribution of data. Millions of people use Online Social Networks daily as a tool to get updated with social, political, educational or other occurrences. In many cases information derived from an Online Social Network is acted upon and often shared with other networks, without further assessments or judgments. Many people do not check to see if the information shared is credible. A user may trust the information generated by a close friend without questioning its credibility, in contrast to a message generated by an unknown user. This work considers the concept of credibility in the wider sense, by proposing whether a user can trust the service provider or even the information itself. Two key components of credibility have been explored; trustworthiness and expertise. Credibility has been researched in the past using Twitter as a validation tool. The research was focused on automatic methods of assessing the credibility of sets of tweets using analysis of microblog postings related to trending topics to determine the credibility of tweets. This research develops a framework that can assist the assessment of the credibility of messages in Online Social Networks. Four types of credibility are explored (experienced, surface, reputed and presumed credibility) resulting in a credibility hierarchy. To determine the credibility of messages generated and distributed in Online Social Networks, a virtual network is created, which attributes nodes with individual views to generate messages in the network at random, recording data from a network and analysing the data based on the behaviour exhibited by agents (an agent-based modelling approach). The factors considered for the experiment design included; peer-to-peer networking, collaboration, opinion formation and network rewiring. The behaviour of agents, frequency in which messages are shared and used, the pathway of the messages and how this affects credibility of messages is also considered. A framework is designed and the resulting data are tested using the design. The resulting data generated validated the framework in part, supporting an approach whereby the concept of tagging the message status assists the understanding and application of the credibility hierarchy. Validation was carried out with Twitter data acquired through twitter’s Application Programming Interface (API). There were similarities in the generation and frequency of the message distributions in the network; these findings were also recorded and analysed using the framework proposed. Some limitations were encountered while acquiring data from Twitter, however, there was sufficient evidence of correlation between the simulated and real social network datasets to indicate the validity of the framework.
- Published
- 2018
- Full Text
- View/download PDF
30. A Novel Hypercube-based Approach to Overlay Design Algorithms on Topic Distribution Networks.
- Author
-
YUMUŞAK, Semih, LAYAZALI, Sina, ÖZTOPRAK, Kasim, and Hassanpour, Reza
- Subjects
HYPERCUBES ,DATA transmission systems ,ALGORITHMS ,ENERGY consumption ,COMMUNICATION patterns - Abstract
Copyright of Journal of Polytechnic is the property of Journal of Polytechnic and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
31. Blockchain in Cybersecurity Realm: An Overview
- Author
-
Parizi, Reza M., Dehghantanha, Ali, Azmoodeh, Amin, Choo, Kim-Kwang Raymond, Jajodia, Sushil, Series Editor, Choo, Kim-Kwang Raymond, editor, Dehghantanha, Ali, editor, and Parizi, Reza M., editor
- Published
- 2020
- Full Text
- View/download PDF
32. Existence of an Optimal Perpetual Gossiping Scheme for Arbitrary Networks
- Author
-
Avramovic, Ivan, Richards, Dana S., Kacprzyk, Janusz, Series Editor, Arai, Kohei, editor, and Bhatia, Rahul, editor
- Published
- 2020
- Full Text
- View/download PDF
33. Blockchain Architecture
- Author
-
Saghiri, Ali Mohammad, Kacprzyk, Janusz, Series Editor, Kim, Shiho, editor, and Deka, Ganesh Chandra, editor
- Published
- 2020
- Full Text
- View/download PDF
34. NCtorrent: Peer to Peer File Sharing Over Named Data Networking Using Network Coding
- Author
-
Gebriel, Aya A., Mohamed, Taha M., Sadek, Rowayda A., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Hassanien, Aboul Ella, editor, Shaalan, Khaled, editor, and Tolba, Mohamed Fahmy, editor
- Published
- 2020
- Full Text
- View/download PDF
35. Towards Communication-Efficient Peer-To-Peer Networks
- Author
-
Khalid Hourani and William K. Moses Jr. and Gopal Pandurangan, Hourani, Khalid, Moses Jr., William K., Pandurangan, Gopal, Khalid Hourani and William K. Moses Jr. and Gopal Pandurangan, Hourani, Khalid, Moses Jr., William K., and Pandurangan, Gopal
- Abstract
We focus on designing Peer-to-Peer (P2P) networks that enable efficient communication. Over the last two decades, there has been substantial algorithmic research on distributed protocols for building P2P networks with various desirable properties such as high expansion, low diameter, and robustness to a large number of deletions. A key underlying theme in all of these works is to distributively build a random graph topology that guarantees the above properties. Moreover, the random connectivity topology is widely deployed in many P2P systems today, including those that implement blockchains and cryptocurrencies. However, a major drawback of using a random graph topology for a P2P network is that the random topology does not respect the underlying (Internet) communication topology. This creates a large propagation delay, which is a major communication bottleneck in modern P2P networks. In this paper, we work towards designing P2P networks that are communication-efficient (having small propagation delay) with provable guarantees. Our main contribution is an efficient, decentralized protocol, Close-Weaver, that transforms a random graph topology embedded in an underlying Euclidean space into a topology that also respects the underlying metric. We then present efficient point-to-point routing and broadcast protocols that achieve essentially optimal performance with respect to the underlying space.
- Published
- 2024
- Full Text
- View/download PDF
36. Developing a method for the detection and identification of rootstock blockchain network nodes
- Abstract
The object of this study is the protocol for detecting nodes in the Rootstock blockchain network and crawling tools. Node discovery protocols are the foundation of any decentralized peer-to-peer network. In blockchain systems, full nodes store and maintain a complete copy of all transactions performed in the network. However, they do not store information about all other nodes, such as their IDs or IP addresses. Each node usually maintains an incomplete list of nodes to which it connects to exchange blockchain data. In decentralized networks, nodes join and leave the network and their IP addresses can change, making it impractical to maintain a complete, up-to-date list of all nodes. Therefore, the only way to get a list of all nodes in the network is to poll each node sequentially. The developed method involves sending specially formed messages to nodes to obtain their neighbors. The graph search algorithm is used to traverse all received neighboring nodes. This allows one to consistently detect all network nodes. Identifying the desired sequence of messages requires a preliminary analysis of the node software RSKj in the part of node discovery protocol. Effectiveness of the proposed method was verified using the developed software and an experiment in the main network. 6 verification nodes were deployed in different physical locations and at different times. All test nodes were detected in less than 10 minutes. The developed method found 222 nodes that have 209 unique IP addresses. Results of this study show how to perform analysis of node discovery protocol. They provide the means to obtain information about the available nodes of the Rootstock blockchain system, enabling the analysis of both the blockchain network in general and individual node
- Published
- 2024
37. Secure and Privacy-Enhancing Decentralized Location-based Services : An over-the-Internet P2P connectivity location-based service, leveraging pseudonyms for privacy enhancement.
- Author
-
Loizou, Rafail and Loizou, Rafail
- Abstract
Location-based services have seen a growth in popularity in recent decades, which was facilitated by the advancements in mobile computing and innovations that allowed for devices to be locationaware. Therefore, multiple applications that integrate location information have been developed and made their way into the daily lives of the average mobile device user. To highlight this last point here are some examples of such applications; maps and navigation, social-media post geotagging, food delivery, ridesharing, and location-based gaming. Due to the popularity of location-based services, their providers are handling massive amounts of data daily from a great number of users. Recent studies have shown these service providers to be honest-but-curious; they provide legit information but collect user data which can be used to infer sensitive information. The same narrative applies with other types of service providers as well, but in our specific case, there is one other important piece of sensitive information shared which is location; past, current, or future. Subsequently, many successful privacy-enhancing schemes have been introduced which utilize peerto-peer communication on local ad-hoc wireless networks and attempt to obfuscate the correlation between user identity and user location by routing requests amongst users before reaching the provider, replacing exact location with fake location, use pseudonyms and information caching to reduce interaction with the provider. Such schemes though require a substantial number of users before becoming realizable; if users have no peers near them, they cannot join a peer network and thus have to communicate with the provider directly. In this thesis, a scheme was designed to act as a fallback and predecessor of such wireless peer connectivity solutions by utilizing over-the-Internet peer connectivity and leveraging pseudonyms to achieve user privacy-enhancement. To test the functionality and fitness of the scheme both a mobil, Platsbaserade tjänster har sett en tillväxt i popularitet under de senaste decennierna, vilket underlättades av framsteg inom mobilberäkning och innovationer som möjliggjorde att enheter blev platsmedvetna. Därför har flera applikationer som integrerar platsinformation utvecklats och tagit sig in i vardagen för den genomsnittliga användaren av mobila enheter. För att belysa denna sista punkt nämns här några sådana applikationer; kartor och navigering, geotaggning av sociala medieinlägg, matleverans, samåkning och platsbaserad spelning. På grund av populariteten av platsbaserade tjänster hanterar deras leverantörer massiva mängder data dagligen från ett stort antal användare. Nyligen har studier visat att dessa tjänsteleverantörer är ärliga men nyfikna; de tillhandahåller legitim information men samlar in användardata som kan användas för att dra slutsatser om känslig information. Samma berättelse gäller även för andra typer av tjänsteleverantörer, men i vårt specifika fall är en annan viktig bit av känslig information plats; tidigare, nuvarande eller framtida. Följaktligen har många framgångsrika integritetsförstärkande system introducerats som använder peer-to-peer-kommunikation på lokala ad-hoc trådlösa nätverk och försöker förvränga korrelationen mellan användaridentitet och användarplats genom att dirigera förfrågningar mellan användare innan de når leverantören, ersätta exakt plats med falsk plats, använda pseudonymer och information i cacheminnet för att minska interaktionen med leverantören. Sådana system kräver dock ett betydande antal användare innan de blir genomförbara; om användare inte har några kamrater nära dem kan de inte ansluta sig till ett kamratnätverk och måste därför kommunicera direkt med leverantören. I den här avhandlingen utformades ett system för att fungera som en säkerhetsåtgärd och föregångare till sådana trådlösa peer-anslutningslösningar genom att använda peer-anslutning över internet och dra nytta av pseudonymer för att uppnå förbätt
- Published
- 2024
38. Time- and Communication-Efficient Overlay Network Construction via Gossip
- Author
-
Fabien Dufoulon and Michael Moorman and William K. Moses Jr. and Gopal Pandurangan, Dufoulon, Fabien, Moorman, Michael, Moses Jr., William K., Pandurangan, Gopal, Fabien Dufoulon and Michael Moorman and William K. Moses Jr. and Gopal Pandurangan, Dufoulon, Fabien, Moorman, Michael, Moses Jr., William K., and Pandurangan, Gopal
- Abstract
We focus on the well-studied problem of distributed overlay network construction. We consider a synchronous gossip-based communication model where in each round a node can send a message of small size to another node whose identifier it knows. The network is assumed to be reconfigurable, i.e., a node can add new connections (edges) to other nodes whose identifier it knows or drop existing connections. Each node initially has only knowledge of its own identifier and the identifiers of its neighbors. The overlay construction problem is, given an arbitrary (connected) graph, to reconfigure it to obtain a bounded-degree expander graph as efficiently as possible. The overlay construction problem is relevant to building real-world peer-to-peer network topologies that have desirable properties such as low diameter, high conductance, robustness to adversarial deletions, etc. Our main result is that we show that starting from any arbitrary (connected) graph G on n nodes and m edges, we can construct an overlay network that is a constant-degree expander in polylog rounds using only Õ(n) messages. Our time and message bounds are both essentially optimal (up to polylogarithmic factors). Our distributed overlay construction protocol is very lightweight as it uses gossip (each node communicates with only one neighbor in each round) and also scalable as it uses only Õ(n) messages, which is sublinear in m (even when m is moderately dense). To the best of our knowledge, this is the first result that achieves overlay network construction in polylog rounds and o(m) messages. Our protocol uses graph sketches in a novel way to construct an expander overlay that is both time and communication efficient. A consequence of our overlay construction protocol is that distributed computation can be performed very efficiently in this model. In particular, a wide range of fundamental tasks such as broadcast, leader election, and minimum spanning tree (MST) construction can be accomplished in po
- Published
- 2024
- Full Text
- View/download PDF
39. CRYPTOCURRENCY AS A PRIORITY MEANS OF TERRORISM FINANCING IN THE DIGITAL ECONOMY.
- Author
-
Muradyan, Svetlana, Pcholovsky, Nikolay, Sarbaev, Grigory, Vinogradova, Kristina, and Vasyukov, Vitaliy
- Abstract
Copyright of Revista Gestão & Tecnologia is the property of Revista Gestao & Tecnologia and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
40. Formal verification of a peer-to-peer streaming protocol
- Author
-
Oluwafolake E. Ojo, Ayodeji O. Oluwatope, and Suraju O. Ajadi
- Subjects
Peer-to-peer networks ,Video streaming and temporal logic ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Peer (P2P) networks have emerged as an efficient and affordable means of transmitting videos to numerous end-users via the Internet. The dynamic and heterogeneous nature of P2P streaming systems (P2PSS) makes testing, analyzing and verification a cumbersome task. However, formal methods offer efficient approaches to rigorously analyze and verify P2PSS. This paper demonstrates the use of formal verification techniques for analyzing the behavioral properties of P2PSS. We use temporal logics to analyze whether all the possible behaviors within the P2P streaming systems conform to the defined specifications. Specifically, we apply model checking to check the consistency, completeness and certainty of the model if the temporal properties of the proposed system satisfies the required specifications. Furthermore, the P2PSS framework was modeled and verified using Simulink Design Verifier (SDV) in MATLAB simulation tool. The simulations results showed 100% validation for all frames and 50% validation for I-frames prioritisation. Further, the probability of a peer capable of forwarding frames while receiving is at most 0.5.
- Published
- 2020
- Full Text
- View/download PDF
41. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions
- Author
-
Natalia Sánchez-Patiño, Gina Gallegos-Garcia, and Mario E. Rivero-Angeles
- Subjects
teletraffic ,peer-to-peer networks ,cyber attacks ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, this communication model also has a clear disadvantage: it has a multitude of vulnerabilities and security threats. The nature of the P2P philosophy itself means that there is no centralized server responsible for uploading, storing, and verifying the authenticity of the shared files and packets. A direct consequence of this is that P2P networks are a good choice for hackers for the spread of malicious software or malware in general since there is no mechanism to control what content is shared. In this paper, we present a mathematical model for P2P networks to study the effect of two different attacks on these systems, namely, malware and denial of service. To analyze the behavior of the cyber attacks and identify important weaknesses, we develop different Markov chains that reflect the main dynamics of the system and the attacks. Specifically, our model considers the case in which a certain number of nodes are infected with a cyber worm that is spread throughout the network as the file is shared among peers. This allows observation of the final number of infected peers when an initial number (we evaluate the system for from 1 to 14 initial nodes) of malicious nodes infect the system. For the DoS attack, our model considers the portion of peers that are unable to communicate and the average attack duration to study the performance degradation of such an attack. A two-pronged approach was used to study the impact of the attacks on P2P networks; the first focused only on the P2P network, and the second focused on the attacks and the network.
- Published
- 2023
- Full Text
- View/download PDF
42. Applications
- Author
-
Saghiri, Ali Mohammad, Khomami, M. Daliri, Meybodi, Mohammad Reza, Saghiri, Ali Mohammad, Khomami, M. Daliri, and Meybodi, Mohammad Reza
- Published
- 2019
- Full Text
- View/download PDF
43. An Efficient Method to Classify the Peer-to-Peer Network Videos and Video Servers Over Video on Demand Services
- Author
-
Narayanan, M., Kacprzyk, Janusz, Series Editor, Saini, H. S., editor, Singh, R. K., editor, Kumar, Girish, editor, Rather, G.M., editor, and Santhi, K., editor
- Published
- 2019
- Full Text
- View/download PDF
44. An HCI Perspective on Distributed Ledger Technologies for Peer-to-Peer Energy Trading
- Author
-
Scuri, Sabrina, Tasheva, Gergana, Barros, Luísa, Nunes, Nuno Jardim, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Lamas, David, editor, Loizides, Fernando, editor, Nacke, Lennart, editor, Petrie, Helen, editor, Winckler, Marco, editor, and Zaphiris, Panayiotis, editor
- Published
- 2019
- Full Text
- View/download PDF
45. Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks.
- Author
-
Reddyvari, Vamseedhar, Bobbili, Sarat Chandra, Parag, Parimal, and Shakkottai, Srinivas
- Subjects
ALGORITHMS ,PEER-to-peer architecture (Computer networks) ,LYAPUNOV stability ,NOISE measurement - Abstract
The ability of a P2P network to scale its throughput up in proportion to the arrival rate of peers has recently been shown to be crucially dependent on the chunk sharing policy employed. Some policies can result in low frequencies of a particular chunk, known as the missing chunk syndrome, which can dramatically reduce throughput and lead to instability of the system. For instance, commonly used policies that nominally “boost” the sharing of infrequent chunks such as the well-known rarest-first algorithm have been shown to be unstable. We take a complementary viewpoint, and instead consider a policy that simply prevents the sharing of the most frequent chunk(s), that we call mode-suppression. We also consider a more general version that suppresses the mode only if the mode frequency is larger than the lowest frequency by a fixed threshold. We prove the stability of mode-suppression using Lyapunov techniques, and use a Kingman bound argument to show that the total download time does not increase with peer arrival rate. We then design versions of mode-suppression that sample a small number of peers at each time, and construct noisy mode estimates by aggregating these samples over time. We show numerically that mode suppression stabilizes and outperforms all other recently proposed chunk sharing algorithms, and via integration into BitTorrent implementation operating over the ns-3 that it ensures stable, low sojourn time operation in a real-world setting. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
46. Peer-to-Peer Networks and Agricultural Conservation
- Author
-
Jalil, Azmiri
- Subjects
- Environmental Studies, Peer-to-peer networks, Informal farmer networks, Conservation practices, Western Lake Erie Basin
- Abstract
Persistent harmful algal blooms (HABs) in the western Lake Erie basin (WLEB), caused by excessive phosphorus in agricultural runoff, negatively affect both human and ecological well-being. To combat increased phosphorous levels from agricultural land, the goal of reducing total phosphorus loading by 40% from 2008 levels is believed critical to substantially reduce the frequency and severity of HABs. To effectively manage nutrient loss in agriculture and achieve phosphorus reduction targets, widespread implementation of agricultural Best Management Practices (BMPs) in the WLEB is crucial.The United States primarily relies on incentive and outreach programs to encourage farmers to voluntarily adopt BMPs. However, despite decades of effort to increase farmers’ use of conservation practices, adoption rates remain low and relatively static. Several researchers have recommended farmer-led peer learning as an alternative to traditional, hierarchical outreach programs. In such approaches, farmers deliver outreach to engage other farmers in adopting various conservation practices. Previous studies have examined the role of peer learning networks in promoting conservation actions. Generally, these studies find that the benefits of farmer-led networks include the opportunity for direct interaction and learning from those who have actual experience with conservation practices, building relationships with other farmers, the ability to observe other farmers’ outcomes with the practices, and building confidence in the practices they are already using.However, prior research on the effectiveness of farmer-led peer learning has focused largely on informal learning networks for women agricultural landowners, or formalized farmer networks (e.g., where the farmers doing the engagement have formal roles and the interactions are structured by traditional partners). These studies also tend to focus on the effect of peer learning after a singular event (e.g., one day meeting, one personal visit). No prior studies have examined the role of informal peer-to-peer learning networks over time, or focused on male operators who are interested in conservation practices as the target of the informal network. The study reported here fills this gap by examining the effectiveness of a three-year informal peer-led learning network where early adopters provide support to potential middle adopters in the WLEB to help them transition to doing conservation.Over a period of 3 years, we evaluated a new informal peer learning network started by The Nature Conservancy called “Farmer Advocates for Conservation”. We conducted a total of 5 focus groups with farmer advocates (i.e., individuals trained to lead the peer-to-peer learning program), and 4 focus groups with engaged farmers who advocates identified as potential middle adopters (i.e., farmers who have expressed interest in conservation practices but have not yet fully implemented them). With the focus group data, we captured the benefits of this type of learning over traditional networks, how peer learning can be tailored to different types of farmers, and what types of advocates are most effective. Our results indicate that there are several unique advantages of peer learning relative to traditional networks including: the ability to observe others, the source of the information (peers versus conservation professionals) being more trusted, the information provided being more relevant and accessible, the style of learning (informal versus formal) being preferred, the ability to form one-on-one connections and the enhanced access to farmer networks. Our results also indicate that farmer advocates tailor their approaches for different groups of farmers for greater effectiveness in ways that may not be possible through traditional top-down programs. For example, one-on-one conversations are recommended for small to mid-sized farms. We also identify the characteristics that contribute to the success of advocates, such as being able to speak with other farmers in non-judgmental ways, having the time to engage, having contact details of interested farmers, repeated success with the practice, operating large-scale farms, and sharing the same mindsets with engaged farmers. Finally, our findings indicate that the most likely beneficiaries of this type of learning program are conservation-minded farmers, mid to small-size farms, and new and/or young farmers.We also conducted a post-engagement survey with engaged farmers to measure their satisfaction with their advocate and the extent to which engagement increased their confidence and behavioral intentions, as well as to assess how the aforementioned program outcomes varied by different types of farmers. Overall, we see that the engaged farmers tend to be younger, more educated with larger farms, and have less experience in farming relative to the population of farmers in the region. Further, the survey results indicate that younger farmers tend to exhibit higher levels of satisfaction with their advocate, further emphasizing the benefit of such programs to these groups.Based on our findings, we suggest that informal peer-to-peer learning programs work well for farmers who are conservation-minded and are willing to make changes (try something new). Our results confirm prior research showing that observing other farmers practicing conservation influences farmers' decision-making, farmers trust their peers' advice, and farmers prefer informal interactions. Additionally, when engaging with larger farms, small-scale experimentation is recommended. Our findings point to new insights in informal farmer networks, recommending one-on-one interaction specifically for small to mid-size farms and farmers who may be reluctant to adopt conservation practices. Further, the new insights reveal that while success and respect are important, advocates must also possess additional skills and personality traits to lead informal farmer-to-farmer learning. The findings suggest that it may be difficult for advocates in an informal network to adequately connect with other farmers. As a result, advocates may need additional support in making connections, such as being provided with lists of farmers to contact, or creating informal opportunities for those contacts to be made. Finally, future research should investigate concrete changes among engaged farmers in conservation adoption over time resulting from peer-to-peer learning to further evaluate the effectiveness of an informal farmer network.
- Published
- 2024
47. Federating Smart Cluster Energy Grids for Peer-to-Peer Energy Sharing and Trading
- Author
-
Ioan Petri, Ateyah Alzahrani, Jonathan Reynolds, and Yacine Rezgui
- Subjects
Energy sharing ,cluster federation ,peer-to-peer networks ,smart grids ,fish industries ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
With the rapid growth in clean distributed energy resources involving micro-generation and flexible loads, users can actively manage their own energy and have the capability to enter in a market of energy services as prosumers while reducing their carbon footprint. The coordination between these distributed energy resources is essential in order to ensure fair trading and equality in resource sharing among a community of prosumers. Peer-to-Peer (P2P) networks can provide the underlying mechanisms for supporting such coordination and offer incentives to prosumers to participate in the energy market. In particular, the federation of energy clusters with P2P networks has the potential to unlock access to energy resources and lead to the development of new energy services in a fast-growing sharing energy economy. In this paper, we present the formation and federation of smart energy clusters using P2P networks with a view to decentralise energy markets and enable access and use of clean energy resources. We implement a P2P framework to support the federation of energy clusters and study the interaction of consumers and producers in a market of energy resources and services. We demonstrate how energy exchanges and energy costs in a federation are influenced by the energy demand, the size of energy clusters and energy types. We conduct our modelling and analysis based on a real fish industry case study in Milford Haven, South Wales, as part of the EU H2020 INTERREG piSCES project.
- Published
- 2020
- Full Text
- View/download PDF
48. A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do
- Author
-
Prünster, Bernd, Ziegler, Dominik, Kollmann, Chrisitan, Suzic, Bojan, Akan, Ozgur, Series Editor, Bellavista, Paolo, Series Editor, Cao, Jiannong, Series Editor, Coulson, Geoffrey, Series Editor, Dressler, Falko, Series Editor, Ferrari, Domenico, Series Editor, Gerla, Mario, Series Editor, Kobayashi, Hisashi, Series Editor, Palazzo, Sergio, Series Editor, Sahni, Sartaj, Series Editor, Shen, Xuemin (Sherman), Series Editor, Stan, Mircea, Series Editor, Xiaohua, Jia, Series Editor, Zomaya, Albert Y., Series Editor, Beyah, Raheem, editor, Chang, Bing, editor, Li, Yingjiu, editor, and Zhu, Sencun, editor
- Published
- 2018
- Full Text
- View/download PDF
49. Online Laboratory Architectures and Technical Considerations
- Author
-
Zutin, Danilo Garbi, Auer, Michael E., editor, Azad, Abul K.M., editor, Edwards, Arthur, editor, and de Jong, Ton, editor
- Published
- 2018
- Full Text
- View/download PDF
50. Client-Server versus Peer-to-Peer.
- Author
-
Altan, Başak and Sunay, M. Oğuz
- Abstract
Copyright of Boğaziçi Journal: Review of Social, Economic & Administrative Studies is the property of Bogazici University, Faculty of Economics & Administrative Sciences and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.