Peer-to-Peer Information Storage and Discovery Systems

2011 ◽  
pp. 79-113
Author(s):  
Cristina Schmidt ◽  
Manish Parashar

This chapter investigates the current landscape of peer-to-peer (P2P) storage and discovery systems. A classification of existing P2P discovery systems, outlining the advantages and disadvantages of each category, and surveying existing systems in each class, is presented. The design, operation and applications of Squid, a P2P information discovery system that supports flexible queries with search guarantees, are described.

2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Resource discovery is an important fundamental aspect and a crucial task in Mobile Peer-to-Peer Networks (MP2P). To compliment network dynamics and churn, the unstructured search architecture is widely used. The key goal of an efficient search scheme is to find the required resource with minimal search latency, low overhead, and low power consumption to better suit the nature of mobile nodes where resource constraints are the major bottleneck. Resource discovery thus becomes an integral part of the distributed architecture and resource sharing systems. In the past, many resource discovery strategies are proposed for Mobile P2P networks. A schematic and tabular classification of these systems enables one to review the existing works under one umbrella. This article presents an overview of such several different schemes for performing resource discovery in the MP2P network broadly classified under six different categories, i.e., centralized, unstructured, structured, super node based, hybrid, and other general lookup schemes. We also give a brief comparison of P2P, MANET, and P2P MANETs. Further, we discuss various routing schemes in such an evolving network. In this survey, we study and review the existing resource discovery techniques in MP2P systems. The classification of each scheme with their advantages and disadvantages are discussed. We highlight a few open research issues, and brief the role of network topology and its structure on the performance of the resource search protocols. Further, we also glimpse on the security threats in MP2P networks and suggest their countermeasures. And, finally, a summary of each method is given, along with their lookup complexities.


2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Resource discovery is an important fundamental aspect and a crucial task in Mobile Peer-to-Peer Networks (MP2P). To compliment network dynamics and churn, the unstructured search architecture is widely used. The key goal of an efficient search scheme is to find the required resource with minimal search latency, low overhead, and low power consumption to better suit the nature of mobile nodes where resource constraints are the major bottleneck. Resource discovery thus becomes an integral part of the distributed architecture and resource sharing systems. In the past, many resource discovery strategies are proposed for Mobile P2P networks. A schematic and tabular classification of these systems enables one to review the existing works under one umbrella. This article presents an overview of such several different schemes for performing resource discovery in the MP2P network broadly classified under six different categories, i.e., centralized, unstructured, structured, super node based, hybrid, and other general lookup schemes. We also give a brief comparison of P2P, MANET, and P2P MANETs. Further, we discuss various routing schemes in such an evolving network. In this survey, we study and review the existing resource discovery techniques in MP2P systems. The classification of each scheme with their advantages and disadvantages are discussed. We highlight a few open research issues, and brief the role of network topology and its structure on the performance of the resource search protocols. Further, we also glimpse on the security threats in MP2P networks and suggest their countermeasures. And, finally, a summary of each method is given, along with their lookup complexities.


2020 ◽  
pp. 29-45
Author(s):  
O.A. Naydis ◽  
I.O. Naydis

The article considers the types, forms, mechanisms and classification of mergers and acquisitions, identifies their positive effects, and studies the tactics of acquisitions. The analysis of anti-capture measures: active and preventive methods of protection against hostile mergers and acquisitions. A comparative analysis of anti-capture measures with acquisitions tactics was carried out, the advantages and disadvantages of their application were identified.


Author(s):  
O. Semenenko ◽  
O. Vodchyts ◽  
V. Koverga ◽  
R. Lukash ◽  
O. Lutsenko

The introduction and active use of information transmission and storage systems in the Ministry of Defense (MoD) of Ukraine form the need to develop ways of guaranteed removal of data from media after their use or long-term storage. Such a task is an essential component of the functioning of any information security system. The article analyzes the problems of guaranteed destruction of information on magnetic media. An overview of approaches to the guaranteed destruction of information on magnetic media of different types is presented, and partial estimates of the effectiveness of their application are given by some generally accepted indicators of performance evaluation. The article also describes the classification of methods of destruction of information depending on the influence on its medium. The results of the analysis revealed the main problems of application of software methods and methods of demagnetization of the information carrier. The issue of guaranteed destruction of information from modern SSD devices, which are actively used in the formation of new systems of information accumulation and processing, became particularly relevant in the article. In today's conditions of development of the Armed Forces of Ukraine, methods of mechanical and thermal destruction are more commonly used today. In the medium term, the vector of the use of information elimination methods will change towards the methods of physical impact by the pulsed magnetic field and the software methods that allow to store the information storage device, but this today requires specialists to develop new ways of protecting information in order to avoid its leakage.


2017 ◽  
Vol 31 (2) ◽  
pp. 82-89
Author(s):  
E. S. Epifanov

This article presents a classification of major factors that shape the cost of Internet site. Also discusses the limitations in determining the objectives of the web site; advantages and disadvantages of different factors.


i-com ◽  
2020 ◽  
Vol 19 (2) ◽  
pp. 67-85
Author(s):  
Matthias Weise ◽  
Raphael Zender ◽  
Ulrike Lucke

AbstractThe selection and manipulation of objects in Virtual Reality face application developers with a substantial challenge as they need to ensure a seamless interaction in three-dimensional space. Assessing the advantages and disadvantages of selection and manipulation techniques in specific scenarios and regarding usability and user experience is a mandatory task to find suitable forms of interaction. In this article, we take a look at the most common issues arising in the interaction with objects in VR. We present a taxonomy allowing the classification of techniques regarding multiple dimensions. The issues are then associated with these dimensions. Furthermore, we analyze the results of a study comparing multiple selection techniques and present a tool allowing developers of VR applications to search for appropriate selection and manipulation techniques and to get scenario dependent suggestions based on the data of the executed study.


2021 ◽  
Vol 11 (5) ◽  
pp. 668
Author(s):  
Sani Saminu ◽  
Guizhi Xu ◽  
Zhang Shuai ◽  
Isselmou Abd El Kader ◽  
Adamu Halilu Jabire ◽  
...  

The benefits of early detection and classification of epileptic seizures in analysis, monitoring and diagnosis for the realization and actualization of computer-aided devices and recent internet of medical things (IoMT) devices can never be overemphasized. The success of these applications largely depends on the accuracy of the detection and classification techniques employed. Several methods have been investigated, proposed and developed over the years. This paper investigates various seizure detection algorithms and classifications in the last decade, including conventional techniques and recent deep learning algorithms. It also discusses epileptiform detection as one of the steps towards advanced diagnoses of disorders of consciousness (DOCs) and their understanding. A performance comparison was carried out on the different algorithms investigated, and their advantages and disadvantages were explored. From our survey, much attention has recently been paid to exploring the efficacy of deep learning algorithms in seizure detection and classification, which are employed in other areas such as image processing and classification. Hybrid deep learning has also been explored, with CNN-RNN being the most popular.


Author(s):  
K. G. Yashchenkov ◽  
K. S. Dymko ◽  
N. O. Ukhanov ◽  
A. V. Khnykin

The issues of using data analysis methods to find and correct errors in the reports issued by meteorologists are considered. The features of processing various types of meteorological messages are studied. The advantages and disadvantages of existing methods of classification of text information are considered. The classification methods are compared in order to identify the optimal method that will be used in the developed algorithm for analyzing meteorological messages. The prospects of using each of the methods in the developed algorithm are described. An algorithm for processing the source data is proposed, which consists in using syntactic and logical analysis to preclean the data from various kinds of noise and determine format errors for each type of message. After preliminary preparation the classification method correlates the received set of message characteristics with the previously trained model to determine the error of the current weather report and output the corresponding message to the operator in real time. The software tools used in the algorithm development and implementation processes are described. A complete description of the process of processing a meteorological message is presented from the moment when the message is entered in a text editor until the message is sent to the international weather message exchange service. The developed software is demonstrated, in which the proposed algorithm is implemented, which allows to improve the quality of messages and, as a result, the quality of meteorological forecasts. The results of the implementation of the new algorithm are described by comparing the number of messages containing various types of errors before the implementation of the algorithm and after the implementation.


Author(s):  
Pranjal Kumar

Human Activity Recognition (HAR) has become a vibrant research field over the last decade, especially because of the spread of electronic devices like mobile phones, smart cell phones, and video cameras in our daily lives. In addition, the progress of deep learning and other algorithms has made it possible for researchers to use HAR in many fields including sports, health, and well-being. HAR is, for example, one of the most promising resources for helping older people with the support of their cognitive and physical function through day-to-day activities. This study focuses on the key role machine learning plays in the development of HAR applications. While numerous HAR surveys and review articles have previously been carried out, the main/overall HAR issue was not taken into account, and these studies concentrate only on specific HAR topics. A detailed review paper covering major HAR topics is therefore essential. This study analyses the most up-to-date studies on HAR in recent years and provides a classification of HAR methodology and demonstrates advantages and disadvantages for each group of methods. This paper finally addresses many problems in the current HAR subject and provides recommendations for potential study.


2019 ◽  
Vol 16 (5) ◽  
pp. 558-571
Author(s):  
A. V. Belyakova ◽  
B. V. Saveliev

Introduction. Organization of high-quality training of the vehicles’ drivers is possible only with the proper formation of professional skills. Moreover, the formation of the skills is necessary for the driver to control the vehicle safety, perhaps by using simulators at the initial stage of training. The use of simulators allows automating the actions that the driver performs, while not exposing the student to risks.Therefore, the purpose of the paper is to analyze the application of simulators in the training of the vehicles’ drivers.Materials and methods. The paper presented the basic psycho physiological principles of the learning process, which should be taken into account when using simulators for driver training. The authors demonstrated the classification of the car simulators used for training of drivers by the information models. Existing information models of simulators were divided into two groups: reproducing only visual information, without imitation of the vestibular and simulating both visual and vestibular information. The analysis reflected the advantages and disadvantages of information models.Results. As a result, the authors proposed two systematizing features: the view angle of the visual information and the simulation of vestibular information.Discussion and conclusions. The research is useful not only for the further science development, but also for the selection of simulators and for the organization of the educational process in driving schools.


Sign in / Sign up

Export Citation Format

Share Document