scholarly journals Quality Assurance for Reusable Learning Objects on a Peer-To-Peer Network

Author(s):  
Rajendra G. Singh ◽  
Margaret A. Bernard

In this research, improving on the quality of Reusable Learning Objects (RLOs) on a Peer-To-Peer (P2P) network is considered. The RLO was first redesigned to have a fundamentally inherent pedagogical structure, which gave it an immediate foundational level of quality in terms of opportunities related to reusability. Applying the Learning Object Review Instrument 1.5 (LORI 1.5) demonstrated that some of the elements are inherent in this new RLO design, so there was no need to constantly have such features evaluated with LORI. A modified LORI was therefore developed in order to evaluate the remaining features of the RLO. The research identified these remaining elements to produce a Review Rubric for scoring the RLO’s quality. In addition, an algorithm is given which considers one or more subject-matter experts as part of a review process. Utilizing the subject-matter experts in a P2P network involved the creation of special nodes to ensure data integrity and post-availability of the review scores for RLOs. The research concludes that the redesigned RLOs along with the corresponding Review Rubric and scoring algorithm produces a system suitable for a P2P network, where for the first time, RLOs can be shared of assured quality to promote eLearning within P2P networks.

10.28945/2565 ◽  
2002 ◽  
Author(s):  
Griff Richards ◽  
Rory McGreal ◽  
Norm Friesen

Repositories provide mechanisms to encourage the discovery, exchange and re-use of learning objects. This paper describes Portals for On-line Objects in Learning (POOL), a consortium project of the TeleLearning NCE to build a learning object repository scalable to the national level. Funded in part by the Canarie Learning Program, POOL contributes to the development of two focal technologies: “POOL POND and SPLASH” a distributed architecture for a peer-to-peer network of learning object repositories, and CanCore, a practical metadata protocol for cataloguing learning objects.


Author(s):  
Federico Franzoni ◽  
Xavier Salleras ◽  
Vanesa Daza

AbstractOver the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.


2013 ◽  
Vol 765-767 ◽  
pp. 1254-1258
Author(s):  
Ai Xia Zhou ◽  
Lian Feng Gao ◽  
Jing Feng ◽  
Li Yu ◽  
Xue Yan Zhang

In order to meet the special needs of military applications, network users were classified according to characteristics of users and a hierarchical behavior-controllable P2P network topology construction was designed. In the new construction, different information has different circulation range and the survivability and expansion characteristics of the P2P network were made full use.


2010 ◽  
Vol 40-41 ◽  
pp. 392-397
Author(s):  
Den Ming Fan ◽  
Qi Zhu

This paper aim To analyze and discuss a Query-based Routing Method in P2P network (QRM) , In this algorithm,the node records the received query and the nodes that can answer the query very well,in these nodes, Simulation experiments demonstrate that the method can enhance the searching efficiency very well with the number of queries becoming more and more.


2020 ◽  
Vol 2020 (6) ◽  
pp. 67-74
Author(s):  
Flávio Barbosa ◽  
Guido de Souza Filho

Assuming that video streaming is now responsible for the absolute majority of the Internet traffic and considering that the audience uses WebRTC-enabled web browsers and mobile devices to access and retrieve content, this work proposes the development of a peer-to-peer overlay network to assist the delivery of video streaming events that use HTTP-based protocols without the need to install additional software. Using the peer-to-peer network, the client/server model becomes hybrid, where network nodes that are watching the same event can retrieve portions of the video content directly from the server or neighboring nodes. This approach has two main objectives; decrease the client/server traffic and consequently the economic cost of delivery while improving the quality of the users' experience, given that communication between neighboring nodes can support the flow of better quality videos between the points


Author(s):  
Chun-Rong Su ◽  
Jiann-Jone Chen

Performing Content-Based Image Retrieval (CBIR) in Internet connected databases through Peer-to-Peer (P2P) network (P2P-CBIR) helps to effectively explore the large-scale image database distributed over connected peers. Decentralized unstructured P2P framework is adopted in our system to compromise with the structured one while still reserving flexible routing control when peers join/leave or network fails. The P2P- CBIR search engine is designed to provide multi-instance query with multi-feature types to effectively reduce network traffic while maintaining high retrieval accuracy. In addition, the proposed P2P-CBIR system is also designed in the way to provide scalable retrieval function, which can adaptively control the query scope and progressively refine the accuracy of retrieved results. To reflect the most updated local database characteristics for the P2P-CBIR users, reconfiguring system at each regular interval time can effectively reduce trivial peer routing and retrieval operations due to imprecise configuration. Experiments demonstrated that the average recall rate of the proposedP2P-CBIR with reconfiguration is higher than the one without about 20%, and the latter outperforms previous methods, i.e., firework query model (FQM) and breadth-first search (BFS) about 20% and 120%, respectively, under the same range of TTL values.


2014 ◽  
Vol 24 (8) ◽  
pp. 2132-2150
Author(s):  
Hong-Yan MEI ◽  
Yu-Jie ZHANG ◽  
Xiang-Wu MENG ◽  
Wen-Ming MA

Sign in / Sign up

Export Citation Format

Share Document