1,997 research outputs found

    SELF-PERCEPTION IN ADOLESCENTS IN CROATIA

    Get PDF
    Cilj ovog rada je osvijetliti različite aspekte slike o sebi na uzorku adolescenata iz urbanih područja Republike Hrvatske. Sekundarni ciljevi odnosili su se na utvrđivanje razlika u rezultatima ispitanika u odnosu na spol, dob i školu koju pohađaju. U tu svrhu primijenjen je upitnik autorice Susan Harter (1988) Self – Perception Profile for Adolescents (Kakav sam ja), koji sadrži devet odvojenih subskala, osam ispituje pojedina područja slike o sebi, a deveta se odnosi na procjenu općenitog doživljaja vlastite vrijednosti. Uzorak sudionika u našem istraživanju činilo je 940 učenika 7. i 8. razreda osnovne, te 1., 2. i 3. razreda srednjih škola. Slika o sebi na uzorku adolescenata u Republici Hrvatskoj pokazuje tendencije pozitivne procjene, a posebice se to odnosi na područja bliskih prijateljstava i socijalne prihvaćenosti. U odnosu na spol, adolescenti se razlikuju u šest promatranih područja slike o sebi. Muški ispitanici postižu više rezultate u području sportske kompetencije, zadovoljstva tjelesnim izgledom i romantične privlačnosti kao i u slučaju generalne procjene vlastite vrijednosti. U području regulacije ponašanja i bliskih prijateljstava djevojke postižu značajno više samoprocjene u odnosu na mladiće. Glavni efekt dobi pokazao se značajnim za subskale školska kompetentnost i romantična privlačnost, pri tome, samo najstarija dobna skupina u odnosu na najmlađu pokazuje nižu školsku kompetentnost, a višu romantičnu privlačnost. S obzirom na srednju školu koju ispitanici pohađaju, rezultati su pokazali kako gimnazijalci imaju višu školsku kompetentnost u odnosu na učenike strukovnih škola. Osim toga, učenici gimnazija, za razliku od učenica, pokazuju višu školsku kompetentnost i opći doživljaj vlastite vrijednosti.The aim of this paper is to explore different aspects of adolescents’ self-perception in Croatia. Secondary objectives were to examine differences in self-perception domains according to gender, age and type of high school. It was applied Susan’s Harter Self – Perception Profile for Adolescents (1988), which contains nine subscales. Eight of them examine specific domains of self-perception and the last one examines global self-worth. The sample in this study consisted of 940 participants. In the sample were included 7th and 8th grade primary school students and 1st, 2nd and 3rd grade secondary school students. Generally, results have shown that adolescents have positive self-perception, especially in domains of close relationship and social acceptance. According to gender, adolescents have shown differences in six domains: male score higher results in athletic competence, physical appearance, romantic appeal as well as in general self worth, while female score higher results in a domain of close relationships and behavioural conduct. The main effect of age proved to be significant for the subscales of scholastic competence and romantic appeal, although only the oldest age group compared to the youngest showed lower scholastic competence and higher romantic appeal. According to school differences among secondary school students the results have shown that high school students have higher scholastic competence in comparison to students from vocational schools. In addition, male high school student have shown higher scholastic competence and global self-worth than female high school students

    Depression Symptoms and Self-Oriented Cognitions

    Get PDF
    Samoorijentirane kognicije povezane s depresivnošću uključuju percepciju sebe iz Beckove kognitivne trijade, neusklađenost realnog pojma o sebi s idealnim i traženim pojmom o sebi iz Higginsove teorije neusklađenog pojma o sebi (Higgins, 1987) te perfekcionizam. Kako su dosadašnja istraživanja potvrdila da povezanost između negativnog perfekcionizma i depresivnosti nije izravna (Ashby, Rice i Martin, 2006; Lauri Korajlija, 2004; Preusser, Rice i Ashby, 1994; Rice, Ashby i Slaney, 1998), cilj je ovoga istraživanja ispitati predstavljaju li samosviđanje i samokompetentnost te nesklad stvarno-idealno ja i stvarno-traženo ja medijatore povezanosti između negativnog perfekcionizma i simptoma depresivnosti. Na uzorku su od 147 studentica Edukacijsko-rehabilitacijskog fakulteta Sveučilišta u Zagrebu primijenjeni: Beckov inventar depresivnosti II, Skala pozitivnog i negativnog perfekcionizma, Skala samosviđanja i samokompetentnosti te Skala za mjerenje neusklađenog pojma o sebi. Rezultati su provedenog istraživanja pokazali kako je povezanost između simptoma depresivnosti i negativnog perfekcionizma jednim dijelom posredovana samosviđanjem i neskladom između stvarnog ja i traženog ja. Samokompetentnost te nesklad između stvarnog ja i idealnog ja su povezani i s negativnim perfekcionizmom i sa simptomima depresivnosti, no ne predstavljaju značajne medijatore povezanosti tih dviju varijabli.Self-oriented cognitions related to depression include self-perception from Beck’s cognitive triad, real-ideal self discrepancy from Higgins’ Self-Discrepancy Theory (Higgins, 1987) and perfectionism. Recent studies have shown that the relation between perfectionism and depression is indirect (Ashby, Rice, & Martin, 2006; Lauri Korajlija, 2004; Preusser, Rice, & Ashby, 1994; Rice, Ashby, & Slaney 1998). The aim of this research is to determine whether self-liking, self-competence, real-ideal, and real-ought self discrepancy present mediators in the relation between negative perfectionism and depressive symptoms. A sample of 147 female students from University of Zagreb Faculty of Education and Rehabilitation Sciences was assessed by the following instruments: Beck’s Depression Inventory II, the Positive and Negative Perfectionism Scale, the Self-liking/Self-competence Scale and the Self Concept Questionnaire - Conventional Construct Version. The results of this research have shown that self-liking and real-ought self discrepancy mediate the correlation between depressive symptoms and negative perfectionism. Self-competence and real-ideal discrepancy are both correlated to negative perfectionism and depression but these variables do not mediate the tested relationship

    Local Search, Semantics, and Genetic Programming:a Global Analysis

    Get PDF
    Geometric Semantic Geometric Programming (GSGP) is one of the most prominent Genetic Programming (GP) variants, thanks to its solid theoretical background, the excellent performance achieved, and the execution time significantly smaller than standard syntax-based GP. In recent years, a new mutation operator, Geometric Semantic Mutation with Local Search (GSM-LS), has been proposed to include a local search step in the mutation process based on the idea that performing a linear regression during the mutation can allow for a faster convergence to good-quality solutions. While GSM-LS helps the convergence of the evolutionary search, it is prone to overfitting. Thus, it was suggested to use GSM-LS only for a limited number of generations and, subsequently, to switch back to standard geometric semantic mutation. A more recently defined variant of GSGP (called GSGP-reg) also includes a local search step but shares similar strengths and weaknesses with GSM-LS. Here we explore multiple possibilities to limit the overfitting of GSM-LS and GSGP-reg, ranging from adaptive methods to estimate the risk of overfitting at each mutation to a simple regularized regression. The results show that the method used to limit overfitting is not that important: providing that a technique to control overfitting is used, it is possible to consistently outperform standard GSGP on both training and unseen data. The obtained results allow practitioners to better understand the role of local search in GSGP and demonstrate that simple regularization strategies are effective in controlling overfitting

    Migration cost optimization for service provider legacy network migration to software-defined IPv6 network

    Full text link
    This is the peer reviewed version of the following article: Dawadi, BR, Rawat, DB, Joshi, SR, Manzoni, P, Keitsch, MM. Migration cost optimization for service provider legacy network migration to software-defined IPv6 network. Int J Network Mgmt. 2021; 31:e2145, which has been published in final form at https://doi.org/10.1002/nem.2145. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.[EN] This paper studies a problem for seamless migration of legacy networks of Internet service providers to a software-defined networking (SDN)-based architecture along with the transition to the full adoption of the Internet protocol version 6 (IPv6) connectivity. Migration of currently running legacy IPv4 networks into such new approaches requires either upgrades or replacement of existing networking devices and technologies that are actively operating. The joint migration to SDN and IPv6 network is considered to be vital in terms of migration cost optimization, skilled human resource management, and other critical factors. In this work, we first present the approaches of SDN and IPv6 migration in service providers' networks. Then, we present the common concerns of IPv6 and SDN migration with joint transition strategies so that the cost associated with joint migration is minimized to lower than that of the individual migration. For the incremental adoption of software-defined IPv6 (SoDIP6) network with optimum migration cost, a greedy algorithm is proposed based on optimal path and the customer priority. Simulation and empirical analysis show that a unified transition planning to SoDIP6 network results in lower migration cost.U.S. National Science Foundation (NSF), Grant/Award Number: CNS 1650831 and HRD 1828811; ERASMUS+ KA107; Nepal Academy of Science and Technology (NAST); Norwegian University of Science and Technology; University Grant Commission (UGC), Nepal, Grant/Award Number: FRG/74_75/Engg-1Dawadi, BR.; Rawat, DB.; Joshi, SR.; Manzoni, P.; Keitsch, MM. (2021). Migration cost optimization for service provider legacy network migration to software-defined IPv6 network. International Journal of Network Management. 31(4):1-24. https://doi.org/10.1002/nem.2145S124314APNIC.IPv6 capability measurement.https://stats.labs.apnic.net/ipv6. Accessed April 22 2020.Google Incl. IPv6 user access status.https://www.google.com/intl/en/ipv6/statistics.html. Accessed February 16 2020.Rawat, D. B., & Reddy, S. R. (2017). Software Defined Networking Architecture, Security and Energy Efficiency: A Survey. IEEE Communications Surveys & Tutorials, 19(1), 325-346. doi:10.1109/comst.2016.2618874Dai, B., Xu, G., Huang, B., Qin, P., & Xu, Y. (2017). Enabling network innovation in data center networks with software defined networking: A survey. Journal of Network and Computer Applications, 94, 33-49. doi:10.1016/j.jnca.2017.07.004Kobayashi, M., Seetharaman, S., Parulkar, G., Appenzeller, G., Little, J., van Reijendam, J., … McKeown, N. (2014). Maturing of OpenFlow and Software-defined Networking through deployments. Computer Networks, 61, 151-175. doi:10.1016/j.bjp.2013.10.011Gumaste, A., Sharma, V., Kakadia, D., Yates, J., Clauberg, A., & Voltolini, M. (2017). SDN Use Cases for Service Provider Networks: Part 2. IEEE Communications Magazine, 55(4), 62-63. doi:10.1109/mcom.2017.7901478Dawadi, B. R., Rawat, D. B., & Joshi, S. R. (2019). Software Defined IPv6 Network: A New Paradigm for Future Networking. Journal of the Institute of Engineering, 15(2), 1-13. doi:10.3126/jie.v15i2.27636Shah, J. L., Bhat, H. F., & Khan, A. I. (2019). Towards IPv6 Migration and Challenges. International Journal of Technology Diffusion, 10(2), 83-96. doi:10.4018/ijtd.2019040105Rojas, E., Doriguzzi-Corin, R., Tamurejo, S., Beato, A., Schwabe, A., Phemius, K., & Guerrero, C. (2018). Are We Ready to Drive Software-Defined Networks? A Comprehensive Survey on Management Tools and Techniques. ACM Computing Surveys, 51(2), 1-35. doi:10.1145/3165290Contreras, L. M., Doolan, P., Lønsethagen, H., & López, D. R. (2015). Operational, organizational and business challenges for network operators in the context of SDN and NFV. Computer Networks, 92, 211-217. doi:10.1016/j.comnet.2015.07.016Amin, R., Reisslein, M., & Shah, N. (2018). Hybrid SDN Networks: A Survey of Existing Approaches. IEEE Communications Surveys & Tutorials, 20(4), 3259-3306. doi:10.1109/comst.2018.2837161Audi Marc Amjad A.The Advancement in Information and Communication Technologies (ICT) and Economic Development: A Panel Analysis. MPRA.https://mpra.ub.uni-muenchen.de/93476/. Published 2019. Accessed November 29 2019.Main, A., Zakaria, N. A., & Yusof, R. (2015). Organisation Readiness Factors Towards IPv6 Migration: Expert Review. Procedia - Social and Behavioral Sciences, 195, 1882-1889. doi:10.1016/j.sbspro.2015.06.427Dawadi, B. R., Rawat, D. B., Joshi, S. R., & Baral, D. S. (2019). Affordable Broadband with Software Defined IPv6 Network for Developing Rural Communities. Applied System Innovation, 3(1), 4. doi:10.3390/asi3010004Nikkhah, M. (2016). Maintaining the progress of IPv6 adoption. Computer Networks, 102, 50-69. doi:10.1016/j.comnet.2016.02.027Dell, P. (2018). On the dual-stacking transition to IPv6: A forlorn hope? Telecommunications Policy, 42(7), 575-581. doi:10.1016/j.telpol.2018.04.005GilliganRE NordmarkE GilliganRE et alBasic Transition Mechanisms for IPv6 Hosts and Routers.2000.Cui, Y., Dong, J., Wu, P., Wu, J., Metz, C., Lee, Y. L., & Durand, A. (2013). Tunnel-Based IPv6 Transition. IEEE Internet Computing, 17(2), 62-68. doi:10.1109/mic.2012.63BlanchetM ParentF.IPv6 Tunnel Broker with the Tunnel Setup Protocol (TSP).2010.HuitemaC.Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs) RFC 4380.2006.CarpenterB MooreK.Connection of IPv6 domains via IPv4 clouds.2001.JungC CarpenterBE.Transmission of IPv6 over IPv4 Domains without Explicit Tunnels.1999.CuiY WuJ LeeY WuP VautrinO.Public IPv4‐over‐IPv6 access Network2013.CuiY SunQ LeeYL TsouT FarrerI BoucadairM.Lightweight 4over6: an extension to the dual‐stack lite Architecture2015.TemplinF GleesonT TalwarM ThalerD.Intra‐Site Automatic Tunnel Addressing Protocol (ISATAP) RFC 5214.2008.DurandA DromsR WoodyattJ LeeY.RFC 6333: Dual‐Stack Lite Broadband Deployments Following IPv4 Exhaustion. IETF Aug.2011.BaoC DecW LiX TroanO MatsushimaS MurakamiT.Mapping of Address and Port with Encapsulation (MAP‐E). IETF Internet Draft.2015.TownsleyW TroanO.IPv6 Rapid Deployment on IPv4 Infrastructures (6rd)‐‐Protocol Specification.2010.ChenM ChenG JiangS LeeY DespresR PennoR.IPv4 Residual Deployment via IPv6‐A Stateless Solution (4rd).2015.WuP CuiY XuM et alPET: Prefixing encapsulation and translation for IPv4‐IPv6 coexistence. In: 2010IEEE Global Telecommunications Conference GLOBECOM2010. 2010:1–5.LiX BaoC ChenM ZhangH WuJ.IVI translation design and deployment for the IPv4/IPv6 coexistence and transition.IETF RFC6219 Internet Eng Task Force Fremont CA.2011.Bagnulo, M., Garcia-Martinez, A., & Van Beijnum, I. (2012). The NAT64/DNS64 tool suite for IPv6 transition. IEEE Communications Magazine, 50(7), 177-183. doi:10.1109/mcom.2012.6231295BagnuloM SullivanA MatthewsP VanBeijnumI.DNS64: DNS extensions for network address translation from IPv6 clients to IPv4 servers RFC 6147.2011.LiuD DengH.NAT46 Considerations.2010.MawatariM KawashimaM ByrneC.464XLAT: Combination of stateful and stateless translation. IETF Internet‐Draft.2013.PerreaultS YamagataI MiyakawaS NakagawaA.Common Requirements for Carrier‐Grade NATs (CGNs) RFC6888.2013.YamaguchiJ ShirasakiY NakagawaA AshidaH.Nat444 addressing models. Req Comments Draft Internet Eng Task Force.2012.ChenG CaoZ XieC BinetD.NAT64 Deployment Options and Experience RFC 7269.2014.LiX BaoC DecW TroanO MatsushimaS MurakamiT.Mapping of Address and Port using Translation (MAP‐T) RFC 7599. IETF Internet Draft.2013.Wu, P., Cui, Y., Wu, J., Liu, J., & Metz, C. (2013). Transition from IPv4 to IPv6: A State-of-the-Art Survey. IEEE Communications Surveys & Tutorials, 15(3), 1407-1424. doi:10.1109/surv.2012.110112.00200Hernandez-Valencia, E., Izzo, S., & Polonsky, B. (2015). How will NFV/SDN transform service provider opex? IEEE Network, 29(3), 60-67. doi:10.1109/mnet.2015.7113227BogineniK et alThe Open Networking Lab (ON.Lab). Introducing ONOS—a SDN network operating system for Service Providers.White Pap.2014;1:14.http://onosproject.org/wp-content/uploads/2014/11/Whitepaper-ONOS-final.pdfTR‐506 O ONF TR‐506.SDN Migration Considerations and Use Cases.2014.https://www.opennetworking.org/wp-content/uploads/2014/10/sb-sdn-migration-use-cases.pdfRisdiantoAC LingTC TsaiP YangC KimJ.Leveraging open‐source software for federated multisite SDN‐cloud playground. In: 2016 IEEE NetSoft Conference and Workshops (NetSoft). ;2016:423‐427.https://doi.org/10.1109/NETSOFT.2016.7502479GalizaH SchwarzM BezerraJ IbarraJ.Moving an ip network to sdn: a global use case deployment experience at amlight. In:Anais Do WPEIF2016Workshop de Pesquisa Experimental Da Internet Do Futuro: 15.LevinD CaniniM SchmidS SchaffertF Feldmann A.Panopticon: Reaping the Benefits of Incremental {SDN} Deployment in Enterprise Networks. In: 2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14). ;2014:333–345.Vissicchio, S., Tilmans, O., Vanbever, L., & Rexford, J. (2015). Central Control Over Distributed Routing. ACM SIGCOMM Computer Communication Review, 45(4), 43-56. doi:10.1145/2829988.2787497Huang, X., Cheng, S., Cao, K., Cong, P., Wei, T., & Hu, S. (2019). A Survey of Deployment Solutions and Optimization Strategies for Hybrid SDN Networks. IEEE Communications Surveys & Tutorials, 21(2), 1483-1507. doi:10.1109/comst.2018.2871061Csikor, L., Szalay, M., Retvari, G., Pongracz, G., Pezaros, D. P., & Toka, L. (2020). Transition to SDN is HARMLESS: Hybrid Architecture for Migrating Legacy Ethernet Switches to SDN. IEEE/ACM Transactions on Networking, 28(1), 275-288. doi:10.1109/tnet.2019.2958762Dawadi, B. R., Rawat, D. B., Joshi, S. R., & Manzoni, P. (2020). Legacy Network Integration with SDN-IP Implementation towards a Multi-Domain SoDIP6 Network Environment. Electronics, 9(9), 1454. doi:10.3390/electronics9091454HongDK MaY BanerjeeS MaoZM.Incremental deployment of SDN in hybrid enterprise and ISP networks. In: Proceedings of the Symposium on SDN Research. 2016:1‐7.Karakus, M., & Durresi, A. (2018). Economic Viability of Software Defined Networking (SDN). Computer Networks, 135, 81-95. doi:10.1016/j.comnet.2018.02.015Rizvi, S. N., Raumer, D., Wohlfart, F., & Carle, G. (2015). Towards carrier grade SDNs. Computer Networks, 92, 218-226. doi:10.1016/j.comnet.2015.09.029Sezer, S., Scott-Hayward, S., Chouhan, P., Fraser, B., Lake, D., Finnegan, J., … Rao, N. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), 36-43. doi:10.1109/mcom.2013.6553676Raza, M. H., Sivakumar, S. C., Nafarieh, A., & Robertson, B. (2014). A Comparison of Software Defined Network (SDN) Implementation Strategies. Procedia Computer Science, 32, 1050-1055. doi:10.1016/j.procs.2014.05.532Goransson, P., & Black, C. (2014). SDN in the Data Center. Software Defined Networks, 145-167. doi:10.1016/b978-0-12-416675-2.00007-3AT & T.Introducing the “User Defined Network Cloud”.https://about.att.com/newsroom/introducing_the_user_defined_network_cloud.html. Published 2014. Accessed August 12 2018.CsikorL TokaL SzalayM PongráczG PezarosDP RétváriG.HARMLESS: Cost‐effective transitioning to SDN for small enterprises. In: 2018 IFIP Networking Conference (IFIP Networking) and Workshops. ; 2018:1–9.ON.LAB.Driving SDN Adoption in Service Provider Networks.2014.http://onosproject.org/wp-content/uploads/2014/11/Whitepaper-Service-Provider-SDN-final.pdfBabikerH NikolovaI ChittimaneniKKK.Deploying IPv6 in the Google Enterprise Network. Lessons learned. In:LISA'11 Proceedings of the 25th International Conference on Large Installation System Administration 2011:10.ParkHW HwangISLS LeeJR.Study on the sustainable migration to software defined network for nation‐wide R&E network.Proc—201610th Int Conf Innov Mob Internet Serv Ubiquitous Comput IMIS2016.2016:392‐396.https://doi.org/10.1109/IMIS.2016.117CariaM JukanA HoffmannM.A performance study of network migration to SDN‐enabled traffic engineering. In:2013 IEEE Global Communications Conference (GLOBECOM); 2013:1391‐1396.Sandhya, Sinha, Y., & Haribabu, K. (2017). A survey: Hybrid SDN. Journal of Network and Computer Applications, 100, 35-55. doi:10.1016/j.jnca.2017.10.003LENCSE, G., & KADOBAYASHI, Y. (2019). Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis. IEICE Transactions on Communications, E102.B(10), 2021-2035. doi:10.1587/transcom.2018ebr0002NIST.Technical and Economic Assessment of Internet Protocol Verson 6 9IPv6.2006.https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=912231NIST.IPv6 Economic Impact Assessment. NY;2005.https://www.nist.gov/system/files/documents/director/planning/report05-2.pdfDasT CariaM JukanA HoffmannM.A Techno‐economic Analysis of Network Migration to Software‐Defined Networking.2013.http://arxiv.org/abs/1310.0216Das, T., Drogon, M., Jukan, A., & Hoffmann, M. (2014). Study of Network Migration to New Technologies Using Agent-Based Modeling Techniques. Journal of Network and Systems Management, 23(4), 920-949. doi:10.1007/s10922-014-9327-3Yuan, T., Huang, X., Ma, M., & Zhang, P. (2017). Migration to software-defined networks: The customers’ view. China Communications, 14(10), 1-11. doi:10.1109/cc.2017.8107628TürkS LiuY RadekeR LehnertR.Network migration optimization using genetic algorithms. In: Meeting of the European Network of Universities and Companies in Information and Communication Engineering. 2012:112–123.Türk, S. (2014). Network migration optimization using meta-heuristics. AEU - International Journal of Electronics and Communications, 68(7), 584-586. doi:10.1016/j.aeue.2014.04.005TürkS RadekeR LehnertR.Network migration using ant colony optimization. In:2010 9th Conference of Telecommunication Media and Internet; 2010:1–6.TurkS LiuH RadekeR LehnertR.Improving network migration optimization utilizing memetic algorithms. In: Global Information Infrastructure Symposium—GIIS 2013. 2013:1‐8.https://doi.org/10.1109/GIIS.2013.6684345ShayaniD Mas MachucaC JagerM GladischA.Cost analysis of the service migration problem between communication platforms. In: NOMS 2008–2008 IEEE Network Operations and Management Symposium. 2008:734‐737.https://doi.org/10.1109/NOMS.2008.4575201Shayani, D., Mas Machuca, C., & Jager, M. (2010). A techno-economic approach to telecommunications: the case of service migration. IEEE Transactions on Network and Service Management, 7(2), 96-106. doi:10.1109/tnsm.2010.06.i8p0297Naudts, B., Kind, M., Verbrugge, S., Colle, D., & Pickavet, M. (2015). How can a mobile service provider reduce costs with software-defined networking? International Journal of Network Management, 26(1), 56-72. doi:10.1002/nem.1919Dawadi, B. R., Rawat, D. B., & Joshi, S. R. (2019). Evolutionary Dynamics of Service Provider Legacy Network Migration to Software Defined IPv6 Network. Advances in Intelligent Systems and Computing, 245-257. doi:10.1007/978-3-030-19861-9_24BezrukVM ChebotarovaD V KaliuzhniyNM QiangG YuZ.Optimization and mathematical modeling of communication networks.Monogr—Open Electron Arch Kharkov Natl Univ Radio Electron.2019.http://openarchive.nure.ua/handle/document/10121Omantek. Open‐AudIT: Device Information Management System.https://www.open-audit.org/about.phpNet. Inventory Advisor.Network Inventory Software.https://www.network-inventory-advisor.com/. Accessed December 3 2019.OCS‐Inventory. OCSING: Open Inventory Next Generation.https://ocsinventory-ng.org/?lang=en. Accessed December 3 2019.Group MW. Migration Use Cases and Methods Migration Working Group Open Networking Foundation Use Cases and Migration Methods 2.www.opennetworking.orgSohn, S. Y., & Kim, Y. (2011). Economic Evaluation Model for International Standardization of Correlated Technologies. IEEE Transactions on Engineering Management, 58(2), 189-198. doi:10.1109/tem.2010.2058853ONF TS‐006.OpenFlow 1.3 Switch Specification.2012.https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-spec-v1.3.0.pdfMahlooM MontiP ChenJ WosinskaL.Cost modeling of backhaul for mobile networks. In: 2014 IEEE International Conference on Communications Workshops (ICC). 2014:397–402.https://doi.org/10.1109/ICCW.2014.6881230DawadiBR RawatDB JoshiSR KeitschMM.Joint cost estimation approach for service provider legacy network migration to unified software defined IPv6 network. In: Proceedings—4th IEEE International Conference on Collaboration and Internet Computing CIC 2018.2018.https://doi.org/10.1109/CIC.2018.00056FengT BiJ.OpenRouteFlow: Enable legacy router as a software‐defined routing service for hybrid SDN. In: 2015 24th International Conference on Computer Communication and Networks (ICCCN).2015:1–8.MachucaCM EberspaecherJ JägerM GladischA.Service migration cost modeling. In: 2007 ITG Symposium on Photonic Networks. ; 2007:1–5.Poularakis, K., Iosifidis, G., Smaragdakis, G., & Tassiulas, L. (2019). Optimizing Gradual SDN Upgrades in ISP Networks. IEEE/ACM Transactions on Networking, 27(1), 288-301. doi:10.1109/tnet.2018.2890248Galán-Jiménez, J. (2017). Legacy IP-upgraded SDN nodes tradeoff in energy-efficient hybrid IP/SDN networks. Computer Communications, 114, 106-123. doi:10.1016/j.comcom.2017.10.010Vizarreta, P., Trivedi, K., Helvik, B., Heegaard, P., Blenk, A., Kellerer, W., & Mas Machuca, C. (2018). Assessing the Maturity of SDN Controllers With Software Reliability Growth Models. IEEE Transactions on Network and Service Management, 15(3), 1090-1104. doi:10.1109/tnsm.2018.2848105Salsano, S., Ventre, P. L., Lombardo, F., Siracusano, G., Gerola, M., Salvadori, E., … Prete, L. (2016). Hybrid IP/SDN Networking: Open Implementation and Experiment Management Tools. IEEE Transactions on Network and Service Management, 13(1), 138-153. doi:10.1109/tnsm.2015.2507622DasT GurusamyM.Resilient Controller Placement in Hybrid SDN/Legacy Networks. In: 2018 IEEE Global Communications Conference (GLOBECOM). 2018:1–7.DasT GurusamyM.INCEPT: INcremental ControllEr PlacemenT in software defined networks. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN). 2018:1–6

    ADOLESCENTS’ SUSCEPTIBILITY TO PEER PRESSURE – CHALLENGES OF DEFINING AND MEASURING

    Get PDF
    Cilj ovog rada bio je konstruirati višedimenzionalnu skalu podložnosti vršnjačkom pritisku te utvrditi razlikuje li konstruirana skala adolescente s obzirom na spol i razred. U istraživanju je sudjelovalo 217 učenika prvih, drugih i trećih razreda srednjih škola u Zagrebu. Uzorak čini 66% djevojčica i 34% dječaka u dobi od 15 do 18 godina starosti. Područja vršnjačkog pritiska i skupina potencijalnih čestica za skalu definirani su na temelju Brownove i Clasenove (1985.) konceptualizacije vršnjačkog pritiska prema kojoj se vršnjački pritisak javlja u pet područja života adolescenata te razultata fokusnih grupa s adolescentima. Redukcija čestica provedena je s obzirom na raspršenja rezultata za svaku česticu, rezultate faktorskih analiza za svako od pet područja vršnjačkog pritiska, korelacije među česticama i korelacije čestica s ukupnim rezultatom te rezultata faktorske analize cijele skale. Konstruirana skala podložnosti vršnjačkom pritisku sastoji se od 22 čestice koje se raspoređuju u pet faktora (1. odnosi s vršnjacima, 2. fizički izgled, 3. odnosi s roditeljima, 4. rizična ponašanja i 5. ponašanje u školi) te se može zaključiti kako pokazuje zadovoljavajuću faktorsku strukturu i unutarnju konzistenciju. Rezultati ovog istraživanja pokazali su kako su dječaci, u odnosu na djevojčice, podložniji vršnjačkom pritisku u području rizičnih ponašanja, no nema razlike u podložnosti vršnjačkom pritisku s obzirom na razred koji adolescenti pohađaju.The aim of the research was to construct a multidimensional susceptibility to peer pressure scale and explore eventual differences in susceptibility to peer pressure regarding gender and grade. The participants were 217 first, second and third grade high-school students in Zagreb. The sample included 66% of girls and 34% of boys, aged 15 to 18. Areas of peer pressure and categories of potential items for the scale were defined on the basis of Brown’s and Clasen’s (1985) conceptualization of peer pressure. Focus groups with adolescents were also conducted with the aim of gaining peer pressure categories. Item reduction was conducted in several steps: distribution of each item, factor analysis for each category, inter-item and item-total correlations and factor analysis of the whole scale. The constructed version of the scale included 22 items on five factors (1. Peer relations; 2. Physical appearance; 3. Relations with parents; 4. Risk behaviour and 5. Behaviour in school). The scale showed good factor structure and internal consistency. The results of the research suggest that boys are more susceptible to peer pressure than girls only for risk behaviour, whereas there are no differences in susceptibility to peer pressure related to the grade attended by the students

    Susceptibility to Peer Pressure and Self-Esteem

    Get PDF
    Vršnjacki utjecaj neosporan je i važan dio odrastanja, razvoja identiteta pojedinca i oblikovanja njegovih navika ponašanja. Odnosi s vršnjacima tijekom adolescencije postaju sve važniji, a kod adolescenta raste potreba da cini ono što vršnjaci od njega traže. Vršnjacki pritisak može se defi nirati kao utjecaj grupe na pojedinca kroz pozitivno potkrepljenje onima koji se konformiraju grupnim normama i/ili sankcije onima koji se opiru konformizmu. Cilj ovog rada je utvrditi podrucja najvece i najmanje podložnosti vršnjackom pritisku, usporediti rezultate dobivene na uzorku studenata s onima dobivenim na uzorku srednjoškolaca, ispitati razlike s obzirom na spol te istražiti odnos podložnosti vršnjackom pritisku i samopoštovanja studenata. Istraživanje je provedeno na uzorku studenata koji je cinilo 654 studenta Sveucilišta i Veleucilišta u Zagrebu i to 47% ispitanika muškog i 53% ispitanica ženskog spola. Primijenjena su dva mjerna instrumenta: Upitnik vršnjackog pritiska, te Skala samoprihvacanja i samokompetentnosti (SLCS; autori Tafarodi i Swann, 1995). Podrucja na kojima ispitanici pokazuju najvecu podložnost vršnjackom pritisku govore o formiranju slike o sebi koje se temelji na mišljenju važnih drugih iz naše okoline. Najmanji doživljaj pritiska vršnjaka bilježi se kod manifestnih rizicnih ponašanja, a posebice se to odnosi na seksualno ponašanje. Doživljaj podložnosti vršnjackom pritisku izraženiji je u uzorku srednjoškolaca u odnosu na uzorak studenata, a s obzirom na spol, rezultati pokazuju znacajniji doživljaj vršnjackog pritiska kod ispitanika muškog spola u podrucju manifestnih rizicnih ponašanja. Povezanost između podložnosti vršnjackom pritisku i samopoštovanja neocekivano se pokazala niskom.Peer influence is inevitable and important part of growing up, one\u27s identity development and forming behavioral habits. Peer relations become more important during the adolescence and there is an increasing need for an adolescent to do what his/her peers are demanding from him/her. Peer pressure can be defined as group influence through rewards to those who conform to group norms and/or sanctions to those who resist them. The aim of this paper is to determine domains of the highest and the lowest susceptibility to peer pressure, compare results of peer pressure of undergraduate students with high school students, examine gender differences and explore relation between students’ susceptibility to peer pressure and self-esteem. The research has been conducted among 654 undergraduates from University of Zagreb, 47% male students and 53% female students. Two questionnaires have been applied: Peer pressure questionnaire and Self liking competence scale (SLCS; authors Tafarodi i Swann, 1995). The highest susceptibility to peer pressure was demonstrated in the areas regarding forming self-image through judgement of relevant others in our surrounding. The lowest susceptibility to peer pressure is experienced at manifested risk behavior, especially sexual behavior. Susceptibility to peer pressure is more expressed among high school students comparing to undergraduates’ sample. According to gender, male respondents have shown more significant experience of peer pressure in manifested risk behavior. Correlation between susceptibility to peer pressure and self-esteem was unexpectedly low

    GENDER DIFFERENCES IN STIGMATIZATION OF CONVICTED OFFENDERS

    Get PDF
    Stigmatizacija počinitelja kaznenih djela često uključuje ideju da su počinitelji ‘jednostavno loše osobe koje se ne mogu promijeniti’ te to može poticati razvoj kriminalnog identiteta osobe ili onemogućiti njegovo mijenjanje što dovodi do povratka kriminalnom životnom stilu nakon odsluženja kazne zatvora. Počinitelji kaznenih djela čine vrlo heterogenu skupinu s obzirom na kazneno djelo koje su počinili, njihov socioekonomski status, stupanj obrazovanja, dob, ali prije svega i s obzirom na spol. Za očekivati je da će percepcija muškaraca i žena koji su počinili kazneno djelo biti drugačija, a samim time će se razlikovati i stigmatizacija javnosti prema te dvije skupine počinitelja. Cilj ovog istraživanja je utvrditi postoje li razlike u stigmatizaciji osuđenih počinitelja kaznenih djela s obzirom na spol sudionika i počinitelja. U istraživanju je sudjelovalo 387 sudionika, od čega je 192 muškaraca i 195 žena. Polovica sudionika je kao objekt stigmatizacije procjenjivala muškarce koji su osuđeni za činjenje kaznenog djela (n=191), a druga polovica je procjenjivala žene koje su osuđene za kazneno djelo (n=196). Sudionici su ispunili skalu stavova prema muškim ili ženskim osuđenim počiniteljima kaznenih djela, listu za označavanje stereotipa, skalu socijalne distance te su odgovorili na pitanja kojima se ispituju sociodemografski podaci (spol, dob, stupanj obrazovanja, bračni status, veličina mjesta u kojem žive). Rezultati istraživanja pokazali su kako sudionici imaju pozitivnije stavove prema ženama koje su počinile kazneno djelo, njihovi stereotipi o ženama koje su počinile kazneno djelo su pozitivniji, a socijalna distanca sudionika prema počiniteljicama je manja u odnosu na počinitelje. Osim toga, muškarci imaju pozitivnije stavove prema počiniteljima kaznenih djela, bez obzira na spol, a njihova socijalna distanca prema počiniteljima je manja nego socijalna distanca žena. Ne postoji interakcija spola sudionika i spola počinitelja na stavove prema počiniteljima, na pozitivnost/negativnost stereotipa o počiniteljima, niti na socijalnu distancu.The stigmatization of criminal offenders often includes the idea that the perpetrators are ‘just bad people who can’t change themselves’ and this may encourage the development of the criminal identity of the person or prevent his/her change leading to the return of a criminal lifestyle after completing his prison sentence. Offenders are a very heterogeneous group with regard to the offense that they committed, their socioeconomic status, education level, age, but primarily with regard to gender. It is expected that the perception of men and women who have committed a criminal offense will be different, and thus the stigmatization of the public towards these two groups of offenders will vary. The aim of this study was to determine whether there are differences in the stigmatization of convicted offenders based on gender of participants and offenders. The study included 387 participants, 192 men and 195 women. Half of the participants assessed men who were convicted of committing criminal offenses as an object of stigmatization (n=191), and the other half evaluated women who were convicted of the crime (n=196). Participants fi lled out a scale of attitudes toward male and female offenders, the check-list of stereotypes, social distance scale, and responded to questions about socio-demographic data (gender, age, education level, marital status, size of the place where they live). The results have shown that participants have more positive attitudes toward women who have committed a criminal offense, their stereotypes about women who have committed a criminal offense has been more positive, and social distance toward female offenders was lower than toward male offenders. In addition, male participants have more positive attitudes toward offenders regardless of their gender, and their social distance toward offender is smaller than social distance toward female participants. There is no interaction between participants’ gender and offenders’ gender on the attitudes, the positivity/negativity of the stereotypes, or the social distance toward offenders

    PERCEPCIJA PSIHOSOCIJALNE KLIME I OSOBINE LIČNOSTI ZATVORENIKA

    Get PDF

    Managing chronic pathologies with a stepped mHealth-based approach in clinical psychology and medicine

    Get PDF
    Chronic diseases and conditions typically require long-term monitoring and treatment protocols both in traditional settings and in out-patient frameworks. The economic burden of chronic conditions is a key challenge and new and mobile technologies could offer good solutions. mHealth could be considered an evolution of eHealth and could be defined as the practice of medicine and public health supported by mobile communication devices. mHealth approach could overcome limitations linked with the traditional, restricted, and highly expensive in-patient treatment of many chronic pathologies. Possible applications include stepped mHealth approach, where patients can be monitored and treated in their everyday contexts. Unfortunately, many barriers for the spread of mHealth are still present. Due the significant impact of psychosocial factors on disease evolution, psychotherapies have to be included into the chronic disease protocols. Existing psychological theories of health behavior change have to be adapted to the new technological contexts and requirements. In conclusion, clinical psychology and medicine have to face the "chronic care management" challenge in both traditional and mHealth settings

    Microenvironmental regulation of the IL-23R/IL-23 axis overrides chronic lymphocytic leukemia indolence

    Get PDF
    Although the progression of chronic lymphocytic leukemia (CLL) requires the cooperation of the microenvironment, the exact cellular and molecular mechanisms involved are still unclear. We investigated the interleukin (IL)-23 receptor (IL-23R)/IL-23 axis and found that circulating cells from early-stage CLL patients with shorter time-to-treatment, but not of those with a more benign course, expressed a defective form of the IL-23R complex lacking the IL-12R beta 1 chain. However, cells from both patient groups expressed the complete IL-23R complex in tissue infiltrates and could be induced to express the IL-12R. 1 chain when cocultured with activated T cells or CD40L(+) cells. CLL cells activated in vitro in this context produced IL-23, a finding that, together with the presence of IL-23 in CLL lymphoid tissues, suggests the existence of an autocrine/paracrine loop inducing CLL cell proliferation. Interference with the IL-23R/IL-23 axis using an anti-IL-23p19 antibody proved effective in controlling disease onset and expansion in xenografted mice, suggesting potential therapeutic strategies
    corecore