WorldWideScience

Sample records for message logging protocols

  1. Nonblocking and orphan free message logging protocols

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  2. CMLOG: A common message logging system

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  3. The Message Logging System for NOνA Experiment

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  4. Message Correlation for Conversation Reconstruction in Service Interaction Logs

    Motahari Nezhad, Hamid R.; Saint-Paul, Regis; Benatallah, Boualem; Casati, Fabio; Andritsos, Periklis

    2007-01-01

    The problem of understanding the behavior of business processes and of services is rapidly becoming a priority in medium and large companies. To this end, recently, analysis tools as well as variations of data mining techniques have been applied to process and service execution logs to perform OLAP-style analysis and to discover behavioral (process and protocol) models out of execution data. All these approaches are based on one key assumption: events describing executions and stored in proce...

  5. An Optimal Non-Interactive Message Authentication Protocol

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  6. Protocol-Based Verification of Message-Passing Parallel Programs

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  7. (In-)Secure messaging with the Silent Circle instant messaging protocol

    Verschoor, S.R.; Lange, T.

    2016-01-01

    Silent Text, the instant messaging application by the company Silent Circle, provides its users with end-to-end encrypted communication on the Blackphone and other smartphones. The underlying protocol, SCimp, has received many extensions during the update to version 2, but has not been subjected to

  8. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  9. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  10. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  11. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more

  12. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. First generation protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs

  13. Message Collision Avoidance Protocols for Detecting Stray Nodes in a Scuba Diving Group Using Ultrasonic Multi-Hop Message Communication

    Shinya Kaido

    2017-12-01

    Full Text Available Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the underwater environment is intrinsically not suitable for propagation of electric waves. Instead, ultrasonic waves are mainly used for underwater communication. Since ultrasonic waves cannot provide sufficient communication speed or capacity, they cannot use existing network technologies, which assume use of radio waves. In particular, communication in shallow water is still an uncharted territory. Few communication technologies are employed in environments where people enjoy scuba diving. This paper addresses problems faced by recreational scuba divers. It proposes constructing an ad hoc mesh-shaped network between divers within a group and use ultrasonic waves as transmission media in order to enable the detection of a stray diver. It also proposes a communication protocol in which messages are relayed in multiple hops, and a message collision avoidance method, which is intended to reduce the rate of packet loss caused by message propagation delay. We have implemented the proposed methods in a network simulator, and compared them with an existing communication method that has no message collision avoidance function, in terms of the packet loss rate, the stray driver detection rate, and the rate of the ability to communicate in multiple hops.

  14. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    2015-12-01

    more protocols (especially at different layers of the OSI model ), implementing an inference engine to extract inter- and intrapacket dependencies, and...ARL-TR-7543 ● DEC 2015 US Army Research Laboratory Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model ...ICMP) Model Generation for ns-3 by Jaime C Acosta and Felipe Jovel Survivability/Lethality Analysis Directorate, ARL Felipe Sotelo and Caesar

  15. A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients

    Kim Morfitt

    2006-09-01

    Full Text Available Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address these and other limitations as pointed out in this paper.

  16. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  17. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  18. Mobile phone text messaging for improving the uptake of vaccinations: a systematic review protocol.

    Kalan, Robyn; Wiysonge, Charles S; Ramafuthole, Tshepiso; Allie, Kurt; Ebrahim, Fatima; Engel, Mark Emmanuel

    2014-08-04

    Low vaccine coverage is a major public health concern, the consequences of which contribute to around 1.5 million child deaths from vaccine-preventable diseases. Thus, innovative strategies to rapidly increase coverage and recall rates for vaccinations are urgently required. Mobile text messaging (or short messaging service, SMS) has the potential to help increase vaccination coverage and therefore we propose to conduct a review of the current best evidence for the use of SMS as an intervention to promote vaccination coverage. This article describes the protocol for a systematic review of the effectiveness of SMS in improving the uptake of vaccination. Primary and secondary outcomes of interest are prespecified. We will preferably include randomised controlled trials (RCTs). However, non-randomised studies (NRS) will be considered if there is an inadequate number of RCTs. We will search several bibliographic databases (eg,PubMed, EMBASE, CINAHL, CENTRAL, Science Citation Index, Africa-Wide Information and WHOLIS electronic databases and search sources for grey literature. Following data extraction and assessment of risk of bias, we will meta-analyse studies and conduct subgroup analyses, according to intervention subtypes. We will assess clinical heterogeneity and statistical heterogeneity. For outcomes without quantitative data, a descriptive analysis will be used. This review protocol is registered in the PROSPERO International Prospective Register of systematic reviews, registration number 2014:CRD42014007531 ETHICS AND DISSEMINATION: Ethics is not required for this study, given that this is a protocol for a systematic review, which uses published data. The findings of this study will be disseminated through peer-reviewed publications and conference presentations. We anticipate that the results could be used by researchers and policymakers to help inform them of the efficacy of mobile phone text messaging interventions to promote increased vaccination coverage

  19. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  20. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  1. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  2. MyVoice National Text Message Survey of Youth Aged 14 to 24 Years: Study Protocol.

    DeJonckheere, Melissa; Nichols, Lauren P; Moniz, Michelle H; Sonneville, Kendrin R; Vydiswaran, V G Vinod; Zhao, Xinyan; Guetterman, Timothy C; Chang, Tammy

    2017-12-11

    There has been little progress in adolescent health outcomes in recent decades. Researchers and youth-serving organizations struggle to accurately elicit youth voice and translate youth perspectives into health care policy. Our aim is to describe the protocol of the MyVoice Project, a longitudinal mixed methods study designed to engage youth, particularly those not typically included in research. Text messaging surveys are collected, analyzed, and disseminated in real time to leverage youth perspectives to impact policy. Youth aged 14 to 24 years are recruited to receive weekly text message surveys on a variety of policy and health topics. The research team, including academic researchers, methodologists, and youth, develop questions through an iterative writing and piloting process. Question topics are elicited from community organizations, researchers, and policy makers to inform salient policies. A youth-centered interactive platform has been developed that automatically sends confidential weekly surveys and incentives to participants. Parental consent is not required because the survey is of minimal risk to participants. Recruitment occurs online (eg, Facebook, Instagram, university health research website) and in person at community events. Weekly surveys collect both quantitative and qualitative data. Quantitative data are analyzed using descriptive statistics. Qualitative data are quickly analyzed using natural language processing and traditional qualitative methods. Mixed methods integration and analysis supports a more in-depth understanding of the research questions. We are currently recruiting and enrolling participants through in-person and online strategies. Question development, weekly data collection, data analysis, and dissemination are in progress. MyVoice quickly ascertains the thoughts and opinions of youth in real time using a widespread, readily available technology-text messaging. Results are disseminated to researchers, policy makers, and

  3. Text messaging reminders for influenza vaccine in primary care: protocol for a cluster randomised controlled trial (TXT4FLUJAB).

    Herrett, Emily; van Staa, Tjeerd; Free, Caroline; Smeeth, Liam

    2014-05-02

    The UK government recommends that at least 75% of people aged under 64 with certain conditions receive an annual influenza vaccination. Primary care practices often fall short of this target and strategies to increase vaccine uptake are required. Text messaging reminders are already used in 30% of practices to remind patients about vaccination, but there has been no trial addressing their effectiveness in increasing influenza vaccine uptake in the UK. The aims of the study are (1) to develop the methodology for conducting cluster randomised trials of text messaging interventions utilising routine electronic health records and (2) to assess the effectiveness of using a text messaging influenza vaccine reminder in achieving an increase in influenza vaccine uptake in patients aged 18-64 with chronic conditions, compared with standard care. This cluster randomised trial will recruit general practices across three settings in English primary care (Clinical Practice Research Datalink, ResearchOne and London iPLATO text messaging software users) and randomise them to either standard care or a text messaging campaign to eligible patients. Flu vaccine uptake will be ascertained using routinely collected, anonymised electronic patient records. This protocol outlines the proposed study design and analysis methods. This study will determine the effectiveness of text messaging vaccine reminders in primary care in increasing influenza vaccine uptake, and will strengthen the methodology for using electronic health records in cluster randomised trials of text messaging interventions. This trial was approved by the Surrey Borders Ethics Committee (13/LO/0872). The trial results will be disseminated at national conferences and published in a peer-reviewed medical journal. The results will also be distributed to the Primary Care Research Network and to all participating general practices. This study is registered at controlled-trials.com ISRCTN48840025, July 2013.

  4. Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP

    RATNA SUSANA

    2016-02-01

    Full Text Available Abstrak Hypertext Transfer Protocol (HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW. Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website. Kata kunci:  basis data, data logger, Hypertext Transfer Protocol (HTTP, website, protokol jaringan. Abstract Hypertext Transfer Protocol (HTTP is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW. This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16

  5. Formative research to develop theory-based messages for a Western Australian child drowning prevention television campaign: study protocol.

    Denehy, Mel; Crawford, Gemma; Leavy, Justine; Nimmo, Lauren; Jancey, Jonine

    2016-05-20

    Worldwide, children under the age of 5 years are at particular risk of drowning. Responding to this need requires the development of evidence-informed drowning prevention strategies. Historically, drowning prevention strategies have included denying access, learning survival skills and providing supervision, as well as education and information which includes the use of mass media. Interventions underpinned by behavioural theory and formative evaluation tend to be more effective, yet few practical examples exist in the drowning and/or injury prevention literature. The Health Belief Model and Social Cognitive Theory will be used to explore participants' perspectives regarding proposed mass media messaging. This paper describes a qualitative protocol to undertake formative research to develop theory-based messages for a child drowning prevention campaign. The primary data source will be focus group interviews with parents and caregivers of children under 5 years of age in metropolitan and regional Western Australia. Qualitative content analysis will be used to analyse the data. This study will contribute to the drowning prevention literature to inform the development of future child drowning prevention mass media campaigns. Findings from the study will be disseminated to practitioners, policymakers and researchers via international conferences, peer and non-peer-reviewed journals and evidence summaries. The study was submitted and approved by the Curtin University Human Research Ethics Committee. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  6. The messages presented in online electronic cigarette promotions and discussions: a scoping review protocol.

    McCausland, Kahlia; Maycock, Bruce; Jancey, Jonine

    2017-11-08

    Electronic cigarettes have become increasingly popular over the last 10 years. These devices represent a new paradigm for tobacco control offering smokers an opportunity to inhale nicotine without inhaling tobacco smoke. To date there are no definite conclusions regarding the safety and long-term health effects of electronic cigarettes; however, there is evidence that they are being marketed online as a healthier alternative to traditional cigarettes. This scoping review aims to identify and describe the breadth of messages (eg, health, smoking-cessation and price related claims) presented in online electronic cigarette promotions and discussions. A scoping review will be undertaken adhering to the methodology outlined in The Joanna Briggs Institute Manual for Scoping Reviews. Six key electronic databases will be searched to identify eligible studies. Studies must be published in English between 2007 and 2017, examine and/or analyse content captured from online electronic cigarette promotions or discussions and report results for electronic cigarettes separately to other forms of tobacco delivery. Studies will be screened initially by title and abstract, followed by full-text review. Results of the search strategy will be reported in a PRISMA flow diagram and presented in tabular form with accompanying narrative summary. The methodology consists of reviewing and collecting data from publicly available studies, and therefore does not require ethics approval. Results will be published in a peer reviewed journal and be presented at national/international conferences. Additionally, findings will be disseminated via social media and online platforms. Advocacy will be key to informing policy makers of regulatory and health issues that need to be addressed. The review was registered prospectively with The Joanna Briggs Institute Systematic Reviews database. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights

  7. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  8. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  9. Mobile Phone Short Messages to Improve Exclusive Breastfeeding and Reduce Adverse Infant Feeding Practices: Protocol for a Randomized Controlled Trial in Yangon, Myanmar.

    Hmone, Myat Pan; Li, Mu; Alam, Ashraful; Dibley, Michael J

    2017-06-28

    , and 5 months postdelivery. Social desirability was measured at 5 months, and text messages expressing delivery success and user experience were assessed at the end of the study. The targeted 353 pregnant women were recruited between January and March 2015. Baseline data have been collected; SMS messages have been developed and pretested and sent to the women from both groups. Follow-up data collection via phone calls has been completed. Data analysis is being done and results are expected soon. This is the first RCT study examining the effects of mobile text messaging for promoting exclusive breastfeeding. This trial is timely in Myanmar following the telecommunications market opening in 2014. Our results will help determine whether text messaging is an effective and feasible method for promoting appropriate feeding practices and will inform further research to assess how this model could be replicated in the broader community. Australian New Zealand Clinical Trial Registry ACTRN12615000063516; https://anzctr.org.au/Trial/Registration/TrialReview.aspx?id=367704 (Archived by WebCite at http://www.webcitation.org/ 6rGif3l81). ©Myat Pan Hmone, Mu Li, Ashraful Alam, Michael J Dibley. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 28.06.2017.

  10. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  11. Unified Internet Messaging

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  12. Text message-based diabetes self-management support (SMS4BG): study protocol for a randomised controlled trial.

    Dobson, Rosie; Whittaker, Robyn; Jiang, Yannan; Shepherd, Matthew; Maddison, Ralph; Carter, Karen; Cutfield, Richard; McNamara, Catherine; Khanolkar, Manish; Murphy, Rinki

    2016-04-02

    Addressing the increasing prevalence, and associated disease burden, of diabetes is a priority of health services internationally. Interventions to support patients to effectively self-manage their condition have the potential to reduce the risk of costly and debilitating complications. The utilisation of mobile phones to deliver self-management support allows for patient-centred care at the frequency and intensity that patients desire from outside the clinic environment. Self-Management Support for Blood Glucose (SMS4BG) is a novel text message-based intervention for supporting people with diabetes to improve self-management behaviours and achieve better glycaemic control and is tailored to individual patient preferences, demographics, clinical characteristics, and culture. This study aims to assess whether SMS4BG can improve glycaemic control in adults with poorly controlled diabetes. This paper outlines the rationale and methods of the trial. A two-arm, parallel, randomised controlled trial will be conducted across New Zealand health districts. One thousand participants will be randomised at a 1:1 ratio to receive SMS4BG, a theoretically based and individually tailored automated text message-based diabetes self-management support programme (intervention) in addition to usual care, or usual care alone (control). The primary outcome is change in glycaemic control (HbA1c) at 9 months. Secondary outcomes include glycaemic control at 3 and 6 months, self-efficacy, self-care behaviours, diabetes distress, health-related quality of life, perceived social support, and illness perceptions. Cost information and healthcare utilisation will also be collected as well as intervention satisfaction and interaction. This study will provide information on the effectiveness of a text message-based self-management support tool for people with diabetes. If found to be effective it has the potential to provide individualised support to people with diabetes across New Zealand (and

  13. Short message service (SMS)-based intervention targeting alcohol consumption among university students: study protocol of a randomized controlled trial.

    Thomas, Kristin; Bendtsen, Marcus; Linderoth, Catharina; Karlsson, Nadine; Bendtsen, Preben; Müssener, Ulrika

    2017-04-04

    Despite significant health risks, heavy drinking of alcohol among university students is a widespread problem; excessive drinking is part of the social norm. A growing number of studies indicate that short message service (SMS)-based interventions are cost-effective, accessible, require limited effort by users, and can enable continuous, real-time, brief support in real-world settings. Although there is emerging evidence for the effect of SMS-based interventions in reducing alcohol consumption, more research is needed. This study aims to test the effectiveness of a newly developed SMS-based intervention targeting excessive alcohol consumption among university and college students in Sweden. The study is a two-arm randomized controlled trial with an intervention (SMS programme) and a control (treatment as usual) group. Outcome measures will be investigated at baseline and at 3-month follow up. The primary outcome is total weekly alcohol consumption. Secondary outcomes are frequency of heavy episodic drinking, highest estimated blood alcohol concentration and number of negative consequences due to excessive drinking. This study contributes knowledge on the effect of automatized SMS support to reduce excessive drinking among students compared with existing support such as Student Health Centres. ISRCTN.com, ISRCTN95054707 . Registered on 31 August 2016.

  14. Instant Messaging by SIP

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  15. Supportive text messages for patients with alcohol use disorder and a comorbid depression: a protocol for a single-blind randomised controlled aftercare trial.

    Hartnett, Dan; Murphy, Edel; Kehoe, Elizabeth; Agyapong, Vincent; McLoughlin, Declan M; Farren, Conor

    2017-05-29

    Alcohol use disorders (AUDs) and mood disorders commonly co-occur, and are associated with a range of negative outcomes for patients. Mobile phone technology has the potential to provide personalised support for such patients and potentially improve outcomes in this difficult-to-treat cohort. The aim of this study is to examine whether receiving supporting SMS text messages, following discharge from an inpatient dual diagnosis treatment programme, has a positive impact on mood and alcohol abstinence in patients with an AUD and a comorbid mood disorder. The present study is a single-blind randomised controlled trial. Patients aged 18-70 years who meet the criteria for both alcohol dependency syndrome/alcohol abuse and either major depressive disorder or bipolar disorder according to the Structured Clinical Interview for Diagnostic and Statistical Manual of Mental Disorders IV Axis I will be randomised to receive twice-daily supportive SMS text messages for 6 months plus treatment as usual, or treatment as usual alone, and will be followed-up at 3, 6, 9 and 12 months postdischarge. Primary outcome measures will include changes from baseline in cumulative abstinence duration, which will be expressed as the proportion of days abstinent from alcohol in the preceding 90 days, and changes from baseline in Beck Depression Inventory scores. The trial has received full ethical approval from the St. Patrick's Hospital Research Ethics Committee (protocol 13/14). Results of the trial will be disseminated through peer-reviewed journal articles and at academic conferences. NCT02404662; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Borehole logging

    Olsen, H.

    1995-01-01

    Numerous ground water investigations have been accomplished by means of borehole logging. Borehole logging can be applied to establish new water recovery wells, to control the existing water producing wells and source areas and to estimate ground water quality. (EG)

  17. Using automated voice messages linked to telephone counselling to increase post-menstrual regulation contraceptive uptake and continuation in Bangladesh: study protocol for a randomised controlled trial.

    Reiss, Kate; Andersen, Kathryn; Barnard, Sharmani; Ngo, Thoai D; Biswas, Kamal; Smith, Christopher; Carpenter, James; Church, Kathryn; Nuremowla, Sadid; Pearson, Erin

    2017-10-03

    Adoption of modern contraceptive methods after menstrual regulation (MR) is thought to reduce subsequent unwanted pregnancy and abortion. Long-acting reversible contraceptives (LARCs) are highly effective at reducing unintended pregnancy, but uptake in Bangladesh is low. Providing information on the most effective methods of contraception increases uptake of more effective methods. This protocol describes a randomised controlled trial of an intervention delivered by mobile phone designed to support post-MR contraceptive use in Bangladesh. This is a multi-site single blind individual randomised controlled trial. At least 960 women undergoing MR procedures at selected facilities will be recruited after their procedure by female research assistants. Women will be randomised into the control or intervention group with a 1:1 ratio. All participants will receive usual clinic care, including contraceptive counselling and the telephone number of a non-toll-free call centre which provides counselling on MR and contraception. During the 4 months after their MR procedure, intervention participants will be sent 11 recorded interactive voice messages to their mobile phone about contraception with a focus on their chosen method and LARCs. Each message allows the participant to connect directly to the call centre. The intervention is free to the user. The control group will receive no messages delivered by mobile phone. All participants will be asked to complete an in-person questionnaire at recruitment and follow-up questionnaires by telephone at 2 weeks, 4 months and 12 months after their MR. The primary outcome for the trial will be self-reported LARC use 4 months post-MR. Secondary outcomes include LARC use at 2 weeks and 12 months post-MR, use of any effective modern contraceptive method at 2 weeks, 4 months and 12 months post-MR, and contraceptive discontinuation, contraceptive method switching, pregnancy, subsequent MR and experience of violence during the 12

  18. Using automated voice messages linked to telephone counselling to increase post-menstrual regulation contraceptive uptake and continuation in Bangladesh: study protocol for a randomised controlled trial

    Kate Reiss

    2017-10-01

    Full Text Available Abstract Background Adoption of modern contraceptive methods after menstrual regulation (MR is thought to reduce subsequent unwanted pregnancy and abortion. Long-acting reversible contraceptives (LARCs are highly effective at reducing unintended pregnancy, but uptake in Bangladesh is low. Providing information on the most effective methods of contraception increases uptake of more effective methods. This protocol describes a randomised controlled trial of an intervention delivered by mobile phone designed to support post-MR contraceptive use in Bangladesh. Methods This is a multi-site single blind individual randomised controlled trial. At least 960 women undergoing MR procedures at selected facilities will be recruited after their procedure by female research assistants. Women will be randomised into the control or intervention group with a 1:1 ratio. All participants will receive usual clinic care, including contraceptive counselling and the telephone number of a non-toll-free call centre which provides counselling on MR and contraception. During the 4 months after their MR procedure, intervention participants will be sent 11 recorded interactive voice messages to their mobile phone about contraception with a focus on their chosen method and LARCs. Each message allows the participant to connect directly to the call centre. The intervention is free to the user. The control group will receive no messages delivered by mobile phone. All participants will be asked to complete an in-person questionnaire at recruitment and follow-up questionnaires by telephone at 2 weeks, 4 months and 12 months after their MR. The primary outcome for the trial will be self-reported LARC use 4 months post-MR. Secondary outcomes include LARC use at 2 weeks and 12 months post-MR, use of any effective modern contraceptive method at 2 weeks, 4 months and 12 months post-MR, and contraceptive discontinuation, contraceptive method switching, pregnancy, subsequent MR and

  19. The Effectiveness of Text Messaging for Detection and Management of Hypertension in Indigenous People in Canada: Protocol for a Randomized Controlled Trial.

    Yeates, Karen; Campbell, Norm; Maar, Marion A; Perkins, Nancy; Liu, Peter; Sleeth, Jessica; Smith, Carter; McAllister, Colin; Hua-Stewart, Diane; Wells, George; Tobe, Sheldon W

    2017-12-19

    will include analysis by community, sex, mobile phone ownership at baseline, and age. The knowledge gained from the text messages will be assessed using a questionnaire at study completion, and results will be compared between the groups. This study is expected to provide insights into the implementation of an innovative system of guidelines- and community-based treatment and follow-up for hypertension in Indigenous communities in Canada and in Tanzania, an example of an LMIC. These insights are expected to provide the information needed to plan scalable and sustainable interventions to control BP virtually anywhere in the world. Clinicaltrials.gov NCT02111226; https://clinicaltrials.gov/ct2/show/NCT02111226 (Archived by WebCite at http://www.webcitation.org/6v7IdYzZh). ©Karen Yeates, Norm Campbell, Marion A Maar, Nancy Perkins, Peter Liu, Jessica Sleeth, Carter Smith, Colin McAllister, Diane Hua-Stewart, George Wells, Sheldon W Tobe. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 19.12.2017.

  20. Sharing Annotated Audio Recordings of Clinic Visits With Patients-Development of the Open Recording Automated Logging System (ORALS): Study Protocol.

    Barr, Paul J; Dannenberg, Michelle D; Ganoe, Craig H; Haslett, William; Faill, Rebecca; Hassanpour, Saeed; Das, Amar; Arend, Roger; Masel, Meredith C; Piper, Sheryl; Reicher, Haley; Ryan, James; Elwyn, Glyn

    2017-07-06

    Providing patients with recordings of their clinic visits enhances patient and family engagement, yet few organizations routinely offer recordings. Challenges exist for organizations and patients, including data safety and navigating lengthy recordings. A secure system that allows patients to easily navigate recordings may be a solution. The aim of this project is to develop and test an interoperable system to facilitate routine recording, the Open Recording Automated Logging System (ORALS), with the aim of increasing patient and family engagement. ORALS will consist of (1) technically proficient software using automated machine learning technology to enable accurate and automatic tagging of in-clinic audio recordings (tagging involves identifying elements of the clinic visit most important to patients [eg, treatment plan] on the recording) and (2) a secure, easy-to-use Web interface enabling the upload and accurate linkage of recordings to patients, which can be accessed at home. We will use a mixed methods approach to develop and formatively test ORALS in 4 iterative stages: case study of pioneer clinics where recordings are currently offered to patients, ORALS design and user experience testing, ORALS software and user interface development, and rapid cycle testing of ORALS in a primary care clinic, assessing impact on patient and family engagement. Dartmouth's Informatics Collaboratory for Design, Development and Dissemination team, patients, patient partners, caregivers, and clinicians will assist in developing ORALS. We will implement a publication plan that includes a final project report and articles for peer-reviewed journals. In addition to this work, we will regularly report on our progress using popular relevant Tweet chats and online using our website, www.openrecordings.org. We will disseminate our work at relevant conferences (eg, Academy Health, Health Datapalooza, and the Institute for Healthcare Improvement Quality Forums). Finally, Iora Health, a

  1. A Visualized Message Interface (VMI) for intelligent messaging services

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  2. SMS Messaging Applications

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  3. Efficacy of a text messaging (SMS) based intervention for adults with hypertension: protocol for the StAR (SMS Text-message Adherence suppoRt trial) randomised controlled trial.

    Bobrow, Kirsty; Brennan, Thomas; Springer, David; Levitt, Naomi S; Rayner, Brian; Namane, Mosedi; Yu, Ly-Mee; Tarassenko, Lionel; Farmer, Andrew

    2014-01-11

    Interventions to support people with hypertension in attending clinics and taking their medication have potential to improve outcomes, but delivery on a wide scale and at low cost is challenging. Some trials evaluating clinical interventions using short message service (SMS) text-messaging systems have shown important outcomes, although evidence is limited. We have developed a novel SMS system integrated with clinical care for use by people with hypertension in a low-resource setting. We aim to test the efficacy of the system in improving blood pressure control and treatment adherence compared to usual care. The SMS Text-message Adherence suppoRt trial (StAR) is a pragmatic individually randomised three-arm parallel group trial in adults treated for hypertension at a single primary care centre in Cape Town, South Africa. The intervention is a structured programme of clinic appointment, medication pick-up reminders, medication adherence support and hypertension-related education delivered remotely using an automated system with either informational or interactive SMS text-messages. Usual care is supplemented by infrequent non-hypertension related SMS text-messages. Participants are 1:1:1 individually randomised, to usual care or to one of the two active interventions using minimisation to dynamically adjust for gender, age, baseline systolic blood pressure, years with hypertension, and previous clinic attendance. The primary outcome is the change in mean systolic blood pressure at 12-month follow-up from baseline measured with research staff blinded to trial allocation. Secondary outcomes include the proportion of patients with 80% or more of days medication available, proportion of participants achieving a systolic blood pressure less than 140 mmHg and a diastolic blood pressure less than 90 mmHg, hospital admissions, health status, retention in clinical care, satisfaction with treatment and care, and patient related quality of life. Anonymised demographic data

  4. Efficient Communication Protocols for Deciding Edit Distance

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  5. Supportive text messages to reduce mood symptoms and problem drinking in patients with primary depression or alcohol use disorder: protocol for an implementation research study.

    Agyapong, Vincent Israel Opoku; Mrklas, Kelly; Suen, Victoria Yung Mei; Rose, Marianne Sarah; Jahn, Megan; Gladue, Irene; Kozak, Jody; Leslie, Maureen; Dursun, Serdar; Ohinmaa, Arto; Greenshaw, Andrew

    2015-05-15

    Depression and Alcohol Use Disorders (AUDs) are two leading causes of disability worldwide and are associated with significant treatment challenges requiring new, innovative, cost-effective and technologically-based therapies including the use of supportive text messages. To determine the feasibility and effectiveness of supportive text messages in long-term follow-up to reduce mood symptoms and problem drinking in patients with Depression or AUD respectively and to explore the usefulness of self-reports of health services utilization as an outcomes measure. This will be a longitudinal, prospective, parallel-design, two-arm, placebo-controlled single-rater-blinded randomized clinical trial with a recruitment period of 6 months and an observation period of 12 months for each participant, with two strata based on primary diagnosis of Major Depressive Disorder or AUD. The sample size will be 120, with about 60 patients randomized from each primary diagnostic grouping. Patients in all intervention groups will receive twice-daily supportive SMS text messages for 3 months and then daily supportive text messages for the next three months. Patients will also receive a phone call every two weeks from the research assistant assigning treatment allocation to confirm that they are still receiving the text messages and to thank them for taking part in the study. Patients in the control group will receive no text messages but will also receive a phone call from the same research assistant every two weeks to thank them for taking part in the study. The study starts in April 2015 and ends in September 2016. It is envisaged that both qualitative and quantitative primary and secondary outcomes, including patient perceptions of the intervention, will shed light on the feasibility of using automated supportive text message interventions in long term for patients with Depression and AUD. This will inform a full-scale clinical trial. The paradigm for behavior change using text messages

  6. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  7. Mobile Link - a theory-based messaging intervention for improving sexual and reproductive health of female entertainment workers in Cambodia: study protocol of a randomized controlled trial.

    Brody, Carinne; Tuot, Sovannary; Chhoun, Pheak; Swendenman, Dallas; Kaplan, Kathryn C; Yi, Siyan

    2018-04-19

    In Cambodia, HIV prevalence is concentrated in key populations including among female entertainment workers (FEWs) who may engage in direct or indirect sex work. Reaching FEWs with sexual and reproductive health (SRH) services has been difficult because of their hidden and stigmatized nature. Mobile-phone-based interventions may be an effective way to reach this population and connect them with the existing services. This article describes study design and implementation of a randomized controlled trial (RCT) of a mobile health intervention (the Mobile Link) aiming to improve SRH and related outcomes among FEWs in Cambodia. A two-arm RCT will be used to determine the effectiveness of a mobile-phone-based text/voice messaging intervention. The intervention will be developed through a participatory process. Focus group discussions and in-depth interviews have been conducted to inform and tailor behavior change theory-based text and voice messages. During the implementation phase, 600 FEWs will be recruited and randomly assigned into one of the two arms: (1) a control group and (2) a mobile phone message group (either text messages [SMS] or voice messages [VM], a delivery method chosen by participants). Participants in the control group will also receive a weekly monitoring survey, which will provide real-time information to implementing partners to streamline outreach efforts and be able to quickly identify geographic trends. The primary outcome measures will include self-reported HIV and sexually transmitted infections (STI) testing and treatment, condom use, contraceptive use, and gender-based violence (GBV). If the Mobile Link trial is successful, participants will report an increase in condom use, linkages to screening and treatment for HIV and STI, and contraception use as well as a reduction in GBV. This trial is unique in a number of ways. First, the option of participation mode (SMS or VM) allows participants to choose the message medium that best links them

  8. The Prodiguer Messaging Platform

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  9. Subtle Messages.

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  10. Interactive weekly mobile phone text messaging plus motivational interviewing in promotion of breastfeeding among women living with HIV in South Africa: study protocol for a randomized controlled trial.

    Zunza, Moleen; Cotton, Mark F; Mbuagbaw, Lawrence; Lester, Richard; Thabane, Lehana

    2017-07-17

    South Africa recently phased out access to free formula milk in the public sector in support of breastfeeding for women living with HIV. Few women living with HIV in South Africa choose breastfeeding and among those who do, many stop breastfeeding early. We sought to explore the feasibility of using mobile phone text messaging coupled with motivational interviewing to enhance adherence to breastfeeding practices. A randomized, parallel group, single-center pilot trial. Electronic sequence generation and random allocation will be done centrally. Women of low socioeconomic status, from Cape Town, South Africa will be randomly assigned within 24 h of giving birth at a primary healthcare clinic to a structured weekly text message plus motivational interviewing and usual standard of care, using a permutation of different block sizes. Criteria for feasibility success will include: five participants recruited per week (over 12 weeks), about 75% of all eligible participants consent for study participation, complete evaluation of outcomes in at least 70% of all recruited participants, breastfeeding adherence rates of at least 70% in the intervention group, six months after delivery. Participants will be evaluated soon after giving birth and post-delivery at weeks 2, 6, 10, and 24. Primary analysis will follow the "intention-to-treat" principle. Sub-group analysis will be used to assess sub-group effects. This pilot trial will evaluate the feasibility of conducting a larger trial on communication and support approaches to improve adherence to breastfeeding by HIV-infected women. Text messaging and motivational interviewing are simple interventions which may allow participants to access personalized adherence advice and support. ClinicalTrials.gov: NCT02949713 . Registered on 26 October 2016; Pan African Clinical Trial Registry PACTR201611001855404 . Registered on 8 November 2016.

  11. Connecting Health and Technology (CHAT): protocol of a randomized controlled trial to improve nutrition behaviours using mobile devices and tailored text messaging in young adults

    2012-01-01

    Background Increasing intakes of fruits and vegetables intake, in tandem with reducing consumption of energy-dense and nutrient poor foods and beverages are dietary priorities to prevent chronic disease. Although most adults do not eat enough fruit and vegetables, teenagers and young adults tend to have the lowest intakes. Young adults typically consume a diet which is inconsistent with the dietary recommendations. Yet little is known about the best approaches to improve dietary intakes and behaviours among this group. This randomised controlled trial aims to evaluate the effectiveness of using a mobile device to assess dietary intake, provide tailored dietary feedback and text messages to motivate changes in fruit, vegetable and junk food consumption among young adults. Methods/design The CHAT project will involve the development of the mobile device food record (MDFR), and evaluation of dietary feedback and implementation of a 6-month intervention in young adults aged 18 to 30 years. The participants will be randomly assigned to one of three groups (1) Intervention Group 1: MDFR + Text Messages + Dietary Feedback; (2) Intervention Group 2: MDFR + Dietary Feedback; (3) Control Group 3: MDFR, no feedback. All groups will undertake a 3-day dietary record using the MDFR but only the Intervention Groups 1 and 2 will receive tailored dietary feedback at baseline and at 6-months which will consist of assessment of serves of fruits, vegetables and junk food in comparison to dietary recommendations. Tailored nutrition text messages will be sent to Intervention Group 1 over the 6 months. Data will be collected at baseline and again at the 6-month completion. Discussion This trial will test if applications running on mobile devices have potential to assess diet, provide tailored feedback and nutrition messages as an effective way of improving fruit and vegetable consumption and reducing energy-dense nutrient poor foods in young adults. The CHAT project will assess the

  12. Connecting Health and Technology (CHAT): protocol of a randomized controlled trial to improve nutrition behaviours using mobile devices and tailored text messaging in young adults.

    Kerr, Deborah A; Pollard, Christina M; Howat, Peter; Delp, Edward J; Pickering, Mark; Kerr, Katherine R; Dhaliwal, Satvinder S; Pratt, Iain S; Wright, Janine; Boushey, Carol J

    2012-06-22

    Increasing intakes of fruits and vegetables intake, in tandem with reducing consumption of energy-dense and nutrient poor foods and beverages are dietary priorities to prevent chronic disease. Although most adults do not eat enough fruit and vegetables, teenagers and young adults tend to have the lowest intakes. Young adults typically consume a diet which is inconsistent with the dietary recommendations. Yet little is known about the best approaches to improve dietary intakes and behaviours among this group. This randomised controlled trial aims to evaluate the effectiveness of using a mobile device to assess dietary intake, provide tailored dietary feedback and text messages to motivate changes in fruit, vegetable and junk food consumption among young adults. The CHAT project will involve the development of the mobile device food record (MDFR), and evaluation of dietary feedback and implementation of a 6-month intervention in young adults aged 18 to 30 years. The participants will be randomly assigned to one of three groups (1) Intervention Group 1: MDFR + Text Messages + Dietary Feedback; (2) Intervention Group 2: MDFR + Dietary Feedback; (3) Control Group 3: MDFR, no feedback. All groups will undertake a 3-day dietary record using the MDFR but only the Intervention Groups 1 and 2 will receive tailored dietary feedback at baseline and at 6-months which will consist of assessment of serves of fruits, vegetables and junk food in comparison to dietary recommendations. Tailored nutrition text messages will be sent to Intervention Group 1 over the 6 months. Data will be collected at baseline and again at the 6-month completion. This trial will test if applications running on mobile devices have potential to assess diet, provide tailored feedback and nutrition messages as an effective way of improving fruit and vegetable consumption and reducing energy-dense nutrient poor foods in young adults. The CHAT project will assess the impact of the intervention on behavioural

  13. Connecting Health and Technology (CHAT: protocol of a randomized controlled trial to improve nutrition behaviours using mobile devices and tailored text messaging in young adults

    Kerr Deborah A

    2012-06-01

    Full Text Available Abstract Background Increasing intakes of fruits and vegetables intake, in tandem with reducing consumption of energy-dense and nutrient poor foods and beverages are dietary priorities to prevent chronic disease. Although most adults do not eat enough fruit and vegetables, teenagers and young adults tend to have the lowest intakes. Young adults typically consume a diet which is inconsistent with the dietary recommendations. Yet little is known about the best approaches to improve dietary intakes and behaviours among this group. This randomised controlled trial aims to evaluate the effectiveness of using a mobile device to assess dietary intake, provide tailored dietary feedback and text messages to motivate changes in fruit, vegetable and junk food consumption among young adults. Methods/design The CHAT project will involve the development of the mobile device food record (MDFR, and evaluation of dietary feedback and implementation of a 6-month intervention in young adults aged 18 to 30 years. The participants will be randomly assigned to one of three groups (1 Intervention Group 1: MDFR + Text Messages + Dietary Feedback; (2 Intervention Group 2: MDFR + Dietary Feedback; (3 Control Group 3: MDFR, no feedback. All groups will undertake a 3-day dietary record using the MDFR but only the Intervention Groups 1 and 2 will receive tailored dietary feedback at baseline and at 6-months which will consist of assessment of serves of fruits, vegetables and junk food in comparison to dietary recommendations. Tailored nutrition text messages will be sent to Intervention Group 1 over the 6 months. Data will be collected at baseline and again at the 6-month completion. Discussion This trial will test if applications running on mobile devices have potential to assess diet, provide tailored feedback and nutrition messages as an effective way of improving fruit and vegetable consumption and reducing energy-dense nutrient poor foods in young adults. The CHAT

  14. Advanced Messaging Concept Development Basic Safety Message

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  15. Study protocol for Log2Lose: A feasibility randomized controlled trial to evaluate financial incentives for dietary self-monitoring and interim weight loss in adults with obesity.

    Voils, Corrine I; Levine, Erica; Gierisch, Jennifer M; Pendergast, Jane; Hale, Sarah L; McVay, Megan A; Reed, Shelby D; Yancy, William S; Bennett, Gary; Strawbridge, Elizabeth M; White, Allison C; Shaw, Ryan J

    2018-02-01

    The obesity epidemic has negative physical, psychological, and financial consequences. Despite the existence of effective behavioral weight loss interventions, many individuals do not achieve adequate weight loss, and most regain lost weight in the year following intervention. We report the rationale and design for a 2×2 factorial study that involves financial incentives for dietary self-monitoring (yes vs. no) and/or interim weight loss (yes vs. no). Outpatients with obesity participate in a 24-week, group-based weight loss intervention. All participants are asked to record their daily dietary and liquid intake on a smartphone application (app) and to weigh themselves daily at home on a study-provided cellular scale. An innovative information technology (IT) solution collates dietary data from the app and weight from the scale. Using these data, an algorithm classifies participants weekly according to whether they met their group's criteria to receive a cash reward ranging from $0 to $30 for dietary self-monitoring and/or interim weight loss. Notice of the reward is provided via text message, and credit is uploaded to a gift card. This pilot study will provide information on the feasibility of using this novel IT solution to provide variable-ratio financial incentives in real time via its effects on recruitment, intervention adherence, retention, and cost. This study will provide the foundation for a comprehensive, adequately-powered, randomized controlled trial to promote short-term weight loss and long-term weight maintenance. If efficacious, this approach could reduce the prevalence, adverse outcomes, and costs of obesity for millions of Americans. Clinicaltrials.gov registration: NCT02691260. Published by Elsevier Inc.

  16. DMS message design workshops.

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  17. Stepwise strategy to improve Cervical Cancer Screening Adherence (SCAN-CC): automated text messages, phone calls and face-to-face interviews: protocol of a population-based randomised controlled trial.

    Firmino-Machado, João; Mendes, Romeu; Moreira, Amélia; Lunet, Nuno

    2017-10-05

    Screening is highly effective for cervical cancer prevention and control. Population-based screening programmes are widely implemented in high-income countries, although adherence is often low. In Portugal, just over half of the women adhere to cervical cancer screening, contributing for greater mortality rates than in other European countries. The most effective adherence raising strategies are based on patient reminders, small/mass media and face-to-face educational programmes, but sequential interventions targeting the general population have seldom been evaluated. The aim of this study is to assess the effectiveness of a stepwise approach, with increasing complexity and cost, to improve adherence to organised cervical cancer screening: step 1a-customised text message invitation; step 1b-customised automated phone call invitation; step 2-secretary phone call; step 3-family health professional phone call and face-to-face appointment. A population-based randomised controlled trial will be implemented in Portuguese urban and rural areas. Women eligible for cervical cancer screening will be randomised (1:1) to intervention and control. In the intervention group, women will be invited for screening through text messages, automated phone calls, manual phone calls and health professional appointments, to be applied sequentially to participants remaining non-adherent after each step. Control will be the standard of care (written letter). The primary outcome is the proportion of women adherent to screening after step 1 or sequences of steps from 1 to 3. The secondary outcomes are: proportion of women screened after each step (1a, 2 and 3); proportion of text messages/phone calls delivered; proportion of women previously screened in a private health institution who change to organised screening. The intervention and control groups will be compared based on intention-to-treat and per-protocol analyses. The study was approved by the Ethics Committee of the Northern Health

  18. Lay health supporters aided by a mobile phone messaging system to improve care of villagers with schizophrenia in Liuyang, China: protocol for a randomised control trial.

    Xu, Dong Roman; Gong, Wenjie; Caine, Eric D; Xiao, Shuiyuan; Hughes, James P; Ng, Marie; Simoni, Jane; He, Hua; Smith, Kirk L; Brown, Henry Shelton; Gloyd, Stephen

    2016-01-20

    Schizophrenia is a severe, chronic and disabling mental illness. Non-adherence to medication and relapse may lead to poorer patient function. This randomised controlled study, under the acronym LEAN (Lay health supporter, e-platform, award, and iNtegration), is designed to improve medication adherence and high relapse among people with schizophrenia in resource poor settings. The community-based LEAN has four parts: (1) Lay health supporters (LHSs), mostly family members who will help supervise patient medication, monitor relapse and side effects, and facilitate access to care, (2) an E-platform to support two-way mobile text and voice messaging to remind patients to take medication; and alert LHSs when patients are non-adherent, (3) an Award system to motivate patients and strengthen LHS support, and (4) iNtegration of the efforts of patients and LHSs with those of village doctors, township mental health administrators and psychiatrists via the e-platform. A random sample of 258 villagers with schizophrenia will be drawn from the schizophrenic '686' Program registry for the 9 Xiang dialect towns of the Liuyang municipality in China. The sample will be further randomised into a control group and a treatment group of equal sizes, and each group will be followed for 6 months after launch of the intervention. The primary outcome will be medication adherence as measured by pill counts and supplemented by pharmacy records. Other outcomes include symptoms and level of function. Outcomes will be assessed primarily when patients present for medication refill visits scheduled every 2 months over the 6-month follow-up period. Data from the study will be analysed using analysis of covariance for the programme effect and an intent-to-treat approach. University of Washington: 49464 G; Central South University: CTXY-150002-6. Results will be published in peer-reviewed journals with deidentified data made available on FigShare. ChiCTR-ICR-15006053; Pre-results. Published by the

  19. Lay health supporters aided by a mobile phone messaging system to improve care of villagers with schizophrenia in Liuyang, China: protocol for a randomised control trial

    Gong, Wenjie; Caine, Eric D; Xiao, Shuiyuan; Hughes, James P; Ng, Marie; Simoni, Jane; He, Hua; Smith, Kirk L; Brown, Henry Shelton; Gloyd, Stephen

    2016-01-01

    Introduction Schizophrenia is a severe, chronic and disabling mental illness. Non-adherence to medication and relapse may lead to poorer patient function. This randomised controlled study, under the acronym LEAN (Lay health supporter, e-platform, award, and iNtegration), is designed to improve medication adherence and high relapse among people with schizophrenia in resource poor settings. Methods/analysis The community-based LEAN has four parts: (1) Lay health supporters (LHSs), mostly family members who will help supervise patient medication, monitor relapse and side effects, and facilitate access to care, (2) an E-platform to support two-way mobile text and voice messaging to remind patients to take medication; and alert LHSs when patients are non-adherent, (3) an Award system to motivate patients and strengthen LHS support, and (4) iNtegration of the efforts of patients and LHSs with those of village doctors, township mental health administrators and psychiatrists via the e-platform. A random sample of 258 villagers with schizophrenia will be drawn from the schizophrenic ‘686’ Program registry for the 9 Xiang dialect towns of the Liuyang municipality in China. The sample will be further randomised into a control group and a treatment group of equal sizes, and each group will be followed for 6 months after launch of the intervention. The primary outcome will be medication adherence as measured by pill counts and supplemented by pharmacy records. Other outcomes include symptoms and level of function. Outcomes will be assessed primarily when patients present for medication refill visits scheduled every 2 months over the 6-month follow-up period. Data from the study will be analysed using analysis of covariance for the programme effect and an intent-to-treat approach. Ethics and dissemination University of Washington: 49464 G; Central South University: CTXY-150002-6. Results will be published in peer-reviewed journals with deidentified data made available on

  20. Mixed messages

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  1. Using Publish-Subscribe Messaging for System Status and Automation

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  2. Testing feedback message framing and comparators to address prescribing of high-risk medications in nursing homes: protocol for a pragmatic, factorial, cluster-randomized trial.

    Ivers, Noah M; Desveaux, Laura; Presseau, Justin; Reis, Catherine; Witteman, Holly O; Taljaard, Monica K; McCleary, Nicola; Thavorn, Kednapa; Grimshaw, Jeremy M

    2017-07-14

    Audit and feedback (AF) interventions that leverage routine administrative data offer a scalable and relatively low-cost method to improve processes of care. AF interventions are usually designed to highlight discrepancies between desired and actual performance and to encourage recipients to act to address such discrepancies. Comparing to a regional average is a common approach, but more recipients would have a discrepancy if compared to a higher-than-average level of performance. In addition, how recipients perceive and respond to discrepancies may depend on how the feedback itself is framed. We aim to evaluate the effectiveness of different comparators and framing in feedback on high-risk prescribing in nursing homes. This is a pragmatic, 2 × 2 factorial, cluster-randomized controlled trial testing variations in the comparator and framing on the effectiveness of quarterly AF in changing high-risk prescribing in nursing homes in Ontario, Canada. We grouped homes that share physicians into clusters and randomized these clusters into the four experimental conditions. Outcomes will be assessed after 6 months; all primary analyses will be by intention-to-treat. The primary outcome (monthly number of high-risk medications received by each patient) will be analysed using a general linear mixed effects regression model. We will present both four-arm and factorial analyses. With 160 clusters and an average of 350 beds per cluster, assuming no interaction and similar effects for each intervention, we anticipate 90% power to detect an absolute mean difference of 0.3 high-risk medications prescribed. A mixed-methods process evaluation will explore potential mechanisms underlying the observed effects, exploring targeted constructs including intention, self-efficacy, outcome expectations, descriptive norms, and goal prioritization. An economic analysis will examine cost-effectiveness analysis from the perspective of the publicly funded health care system. This protocol

  3. Encyclopedia of well logging

    Desbrandes, R.

    1985-01-01

    The 16 chapters of this book aim to provide students, trainees and engineers with a manual covering all well-logging measurements ranging from drilling to productions, from oil to minerals going by way of geothermal energy. Each chapter is a summary but a bibliography is given at the end of each chapter. Well-logging during drilling, wireline logging equipment and techniques, petroleum logging, data processing of borehole data, interpretation of well-logging, sampling tools, completion and production logging, logging in relief wells to kill off uncontrolled blowouts, techniques for high temperature geothermal energy, small-scale mining and hydrology, logging with oil-base mud and finally recommended logging programs are all topics covered. There is one chapter on nuclear well-logging which is indexed separately. (UK)

  4. LHCb Online Log Analysis and Maintenance System

    Garnier, J-C

    2011-01-01

    History has shown, many times computer logs are the only information an administrator may have for an incident, which could be caused either by a malfunction or an attack. Due to the huge amount of logs that are produced from large-scale IT infrastructures, such as LHCb Online, critical information may be overlooked or simply be drowned in a sea of other messages. This clearly demonstrates the need for an automatic system for long-term maintenance and real time analysis of the logs. We have constructed a low cost, fault tolerant centralized logging system which is able to do in-depth analysis and cross-correlation of every log. This system is capable of handling O(10000) different log sources and numerous formats, while trying to keep the overhead as low as possible. It provides log gathering and management, Offline analysis and online analysis. We call Offline analysis the procedure of analyzing old logs for critical information, while Online analysis refer to the procedure of early alerting and reacting. ...

  5. Safety message broadcast in vehicular networks

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  6. Extracting the Textual and Temporal Structure of Supercomputing Logs

    Jain, S; Singh, I; Chandra, A; Zhang, Z; Bronevetsky, G

    2009-05-26

    Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource of information about their operational status and health. However, their massive size, complexity, and lack of standard format makes it difficult to automatically extract information that can be used to improve system management. In this work we propose a novel method to succinctly represent the contents of supercomputing logs, by using textual clustering to automatically find the syntactic structures of log messages. This information is used to automatically classify messages into semantic groups via an online clustering algorithm. Further, we describe a methodology for using the temporal proximity between groups of log messages to identify correlated events in the system. We apply our proposed methods to two large, publicly available supercomputing logs and show that our technique features nearly perfect accuracy for online log-classification and extracts meaningful structural and temporal message patterns that can be used to improve the accuracy of other log analysis techniques.

  7. Asynchronous Message Service Reference Implementation

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  8. http Log Analysis

    Bøving, Kristian Billeskov; Simonsen, Jesper

    2004-01-01

    This article documents how log analysis can inform qualitative studies concerning the usage of web-based information systems (WIS). No prior research has used http log files as data to study collaboration between multiple users in organisational settings. We investigate how to perform http log...... analysis; what http log analysis says about the nature of collaborative WIS use; and how results from http log analysis may support other data collection methods such as surveys, interviews, and observation. The analysis of log files initially lends itself to research designs, which serve to test...... hypotheses using a quantitative methodology. We show that http log analysis can also be valuable in qualitative research such as case studies. The results from http log analysis can be triangulated with other data sources and for example serve as a means of supporting the interpretation of interview data...

  9. Log N-log S in inconclusive

    Klebesadel, R. W.; Fenimore, E. E.; Laros, J.

    1983-01-01

    The log N-log S data acquired by the Pioneer Venus Orbiter Gamma Burst Detector (PVO) are presented and compared to similar data from the Soviet KONUS experiment. Although the PVO data are consistent with and suggestive of a -3/2 power law distribution, the results are not adequate at this state of observations to differentiate between a -3/2 and a -1 power law slope.

  10. The Meaning of Logs

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom

    2007-01-01

    While logging events is becoming increasingly common in computing, in communication and in collaborative work, log systems need to satisfy increasingly challenging (if not conflicting) requirements.Despite the growing pervasiveness of log systems, to date there is no high-level framework which

  11. The Meaning of Logs

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom; Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min

    While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not conflicting) requirements. In this paper we propose a high-level framework for modeling log systems, and reasoning about

  12. Cryptographic Protocols:

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  13. The Message Reporting System of the ATLAS DAQ System

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  14. LogScope

    Havelund, Klaus; Smith, Margaret H.; Barringer, Howard; Groce, Alex

    2012-01-01

    LogScope is a software package for analyzing log files. The intended use is for offline post-processing of such logs, after the execution of the system under test. LogScope can, however, in principle, also be used to monitor systems online during their execution. Logs are checked against requirements formulated as monitors expressed in a rule-based specification language. This language has similarities to a state machine language, but is more expressive, for example, in its handling of data parameters. The specification language is user friendly, simple, and yet expressive enough for many practical scenarios. The LogScope software was initially developed to specifically assist in testing JPL s Mars Science Laboratory (MSL) flight software, but it is very generic in nature and can be applied to any application that produces some form of logging information (which almost any software does).

  15. Data Mining of Network Logs

    Collazo, Carlimar

    2011-01-01

    The statement of purpose is to analyze network monitoring logs to support the computer incident response team. Specifically, gain a clear understanding of the Uniform Resource Locator (URL) and its structure, and provide a way to breakdown a URL based on protocol, host name domain name, path, and other attributes. Finally, provide a method to perform data reduction by identifying the different types of advertisements shown on a webpage for incident data analysis. The procedures used for analysis and data reduction will be a computer program which would analyze the URL and identify and advertisement links from the actual content links.

  16. EMI Messaging Guidelines

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  17. An Interpersonal Approach to Writing Negative Messages.

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  18. Radiometric well logging instruments

    Davydov, A.V.

    1975-01-01

    The technical properties of well instruments for radioactive logging used in the radiometric logging complexes PKS-1000-1 (''Sond-1'') and PRKS-2 (''Vitok-2'') are described. The main features of the electric circuit of the measuring channels are given

  19. Power to the logs!

    CERN. Geneva; MACMAHON, Joseph

    2015-01-01

    Are you tired of using grep, vi and emacs to read your logs? Do you feel like you’re missing the big picture? Does the word "statistics" put a smile on your face? Then it’s time to give power to the logs!

  20. Increasing the Operational Value of Event Messages

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  1. Message Correlation Analysis Tool for NOvA

    CERN. Geneva

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic realtime correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the DAQ of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  2. Message Correlation Analysis Tool for NOvA

    Lu Qiming; Biery, Kurt A; Kowalkowski, James B

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  3. Message correlation analysis tool for NOvA

    Lu, Qiming [Fermilab; Biery, Kurt A. [Fermilab; Kowalkowski, James B. [Fermilab

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  4. Digital mineral logging system

    West, J.B.

    1980-01-01

    A digital mineral logging system acquires data from a mineral logging tool passing through a borehole and transmits the data uphole to an electronic digital signal processor. A predetermined combination of sensors, including a deviometer, is located in a logging tool for the acquisition of the desired data as the logging tool is raised from the borehole. Sensor data in analog format is converted in the logging tool to a digital format and periodically batch transmitted to the surface at a predetermined sampling rate. An identification code is provided for each mineral logging tool, and the code is transmitted to the surface along with the sensor data. The self-identifying tool code is transmitted to the digital signal processor to identify the code against a stored list of the range of numbers assigned to that type of tool. The data is transmitted up the d-c power lines of the tool by a frequency shift key transmission technique. At the surface, a frequency shift key demodulation unit transmits the decoupled data to an asynchronous receiver interfaced to the electronic digital signal processor. During a recording phase, the signals from the logging tool are read by the electronic digital signal processor and stored for later processing. During a calculating phase, the stored data is processed by the digital signal processor and the results are outputted to a printer or plotter, or both

  5. Texting for Health: The Use of Participatory Methods to Develop Healthy Lifestyle Messages for Teens

    Hingle, Melanie; Nichter, Mimi; Medeiros, Melanie; Grace, Samantha

    2013-01-01

    Objective: To develop and test messages and a mobile phone delivery protocol designed to influence the nutrition and physical activity knowledge, attitudes, and behavior of adolescents. Design: Nine focus groups, 4 classroom discussions, and an 8-week pilot study exploring message content, format, origin, and message delivery were conducted over…

  6. Synchronous message-based communication for distributed heterogeneous systems

    Wilkinson, N.; Dohan, D.

    1992-01-01

    The use of a synchronous, message-based real-time operating system (Unison) as the basis of transparent interprocess and inter-processor communication over VME-bus is described. The implementation of a synchronous, message-based protocol for network communication between heterogeneous systems is discussed. In particular, the design and implementation of a message-based session layer over a virtual circuit transport layer protocol using UDP/IP is described. Inter-process communication is achieved via a message-based semantic which is portable by virtue of its ease of implementation in other operating system environments. Protocol performance for network communication among heterogeneous architecture is presented, including VMS, Unix, Mach and Unison. (author)

  7. Mariners Weather Log

    National Oceanic and Atmospheric Administration, Department of Commerce — The Mariners Weather Log (MWL) is a publication containing articles, news and information about marine weather events and phenomena, worldwide environmental impact...

  8. Log-inject-log in sand consolidation

    Murphy, R.P.; Spurlock, J.W.

    1977-01-01

    A method is described for gathering information for the determination of the adequacy of placement of sand consolidating plastic for sand control in oil and gas wells. The method uses a high neutron cross-section tracer which becomes part of the plastic and uses pulsed neutron logging before and after injection of the plastic. Preferably, the method uses lithium, boron, indium, and/or cadmium tracers. Boron oxide is especially useful and can be dissolved in alcohol and mixed with the plastic ingredients

  9. Elephant logging and environment

    Tin-Aung-Hla

    1995-01-01

    The natural environment comprises non-biological elements such as air, water, light, heat and biological elements of animal and plant life; all interact with each other to create an ecosystem. Human activities like over-exploitation of forest results in deforestation and desertification. This consequently changes ecological balance. Topics on: (1) history of elephants utilization; (2) elephant logging; (3) classification of elephants; (4) dragging gear; (5) elephant power; (6) elephant logging and environment, are discussed

  10. Auctioning Bulk Mobile Messages

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  11. DIRECTIONAL OPPORTUNISTIC MECHANISM IN CLUSTER MESSAGE CRITICALITY LEVEL BASED ZIGBEE ROUTING

    B.Rajeshkanna *1, Dr.M.Anitha 2

    2018-01-01

    The cluster message criticality level based zigbee routing(CMCLZOR) has been proposed for routing the cluster messages in wireless smart energy home area networks. It employs zigbee opportunistic shortcut tree routing(ZOSTR) and AODV individually for routing normal messages and highly critical messages respectively. ZOSTR allows the receiving nodes to compete for forwarding a packet with the priority of left-over hops rather than stating single next hop node like unicast protocols. Since it h...

  12. Covert Channel Pada Aliran Data Websocket untuk Komunikasi Messaging XMPP

    Yoga Dwitya Pramudita

    2015-07-01

    Abstract Instant Messaging communication services provide a variety of communication features that can be used by the user, such as text messaging (text messages both online and offline. One of the standard protocol that supports this service is XMPP (Extensible Messaging and Presence Protocol. XMPP communication using XML documents, making it vulnerable to passive attacks monitoring content of  communications. To overcome this drawback the solution is encrypted communications. The other solutions that try to offer in this research is the use of a covert channel to send hidden messages. In this research will create a browser based XMPP client application that is capable to deliver XMPP communication and also provide covert channel communication. XMPP communication can be built on a web-based application using WebSocket protocol. This protocol will exploit field masking-key to load the covert channel messages that is sent during the session XMPP communication takes place. From the test results, the client application is able to produce a covert channel communication with a data width of 3 bytes in each packet. The client application is also able to perform covert communication channel in a communication link with the condition of the probability of packet loss rate below 10%.   Keywords— WebSocket, XMPP, masking-key, Covert Channel, browser based application.

  13. Log4J

    Perry, Steven

    2009-01-01

    Log4j has been around for a while now, and it seems like so many applications use it. I've used it in my applications for years now, and I'll bet you have too. But every time I need to do something with log4j I've never done before I find myself searching for examples of how to do whatever that is, and I don't usually have much luck. I believe the reason for this is that there is a not a great deal of useful information about log4j, either in print or on the Internet. The information is too simple to be of real-world use, too complicated to be distilled quickly (which is what most developers

  14. The effectiveness of quantum operations for eavesdropping on sealed messages

    Lopata, Paul A; Bahder, Thomas B

    2007-01-01

    A quantum protocol is described which enables a user to send sealed messages and that allows for the detection of active eavesdroppers. We examine a class of eavesdropping strategies, those that make use of quantum operations, and we determine the information gain versus disturbance caused by these strategies. We demonstrate this tradeoff with an example and we compare this protocol to quantum key distribution, quantum direct communication, and quantum seal protocols

  15. 'MATRI-SUMAN' a capacity building and text messaging intervention to enhance maternal and child health service utilization among pregnant women from rural Nepal: study protocol for a cluster randomised controlled trial.

    Singh, Jitendra Kumar; Kadel, Rajendra; Acharya, Dilaram; Lombard, Daniel; Khanal, Saval; Singh, Shri Prakash

    2018-06-14

    Capacity development of health volunteers and text messaging to pregnant women through mobile phones have shown improved maternal and child health (MCH) outcomes and is associated with increased utilisation of MCH services. However, such interventions are uncommon in Nepal. We aim to carry out an intervention with the hypothesis that capacity building and text messaging intervention will increase the MCH service utilisation. MATRI-SUMAN is a 12-month cluster randomized controlled trial (RCT). The trial involves pregnant women from 52 clusters of six village development committees (VDCs) covering 66,000 populations of Dhanusha district of Nepal. In the intervention clusters, Female Community Health Volunteers (FCHVs) will receive capacity development skills through reinforcement training, supervision and monitoring skills for the promotion of health seeking behaviour among pregnant women and study participants will receive periodic promotional text messaging service about MCH components through mobile phones. A sample of 354with equal numbers in each study arm is estimated using power calculation formula. The primary outcomes of this study are the rate of utilization of skilled birth attendants and consumption of a specified diversified meal. The secondary outcomes are: four antenatal (ANC) visits, weight gain of women during pregnancy, delivery of a baby at the health facility, postnatal care (PNC) visits, positive changes in child feeding practices among mothers, performance of FCHVs in MCH service utilization. The intervention is designed to enhance the capacity of health volunteers for the promotion of health seeking behaviour among pregnant women and text messaging through a mobile phone to expecting mothers to increase MCH service utilization. The trial if proven effective will have policy implications in poor resource settings. ISRCTN60684155, ( https://doi.org/10.1186/ISRCTN60684155 ). The trial was registered retrospectively.

  16. Mechanics of log calibration

    Waller, W.C.; Cram, M.E.; Hall, J.E.

    1975-01-01

    For any measurement to have meaning, it must be related to generally accepted standard units by a valid and specified system of comparison. To calibrate well-logging tools, sensing systems are designed which produce consistent and repeatable indications over the range for which the tool was intended. The basics of calibration theory, procedures, and calibration record presentations are reviewed. Calibrations for induction, electrical, radioactivity, and sonic logging tools will be discussed. The authors' intent is to provide an understanding of the sources of errors, of the way errors are minimized in the calibration process, and of the significance of changes in recorded calibration data

  17. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-01-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US?Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3%...

  18. Log of Apollo 11.

    National Aeronautics and Space Administration, Washington, DC.

    The major events of the first manned moon landing mission, Apollo 11, are presented in chronological order from launch time until arrival of the astronauts aboard the U.S.S. Hornet. The log is descriptive, non-technical, and includes numerous color photographs of the astronauts on the moon. (PR)

  19. Borehole logging system

    Allen, L.S.

    1988-01-01

    A radioactive borehole logging tool employs an epithermal neutron detector having a neutron counter surrounded by an inner thermal neutron filter and an outer thermal neutron filter. Located between the inner and outer filters is a neutron moderating material for extending the lifetime of epithermal neutrons to enhance the counting rate of such epithermal neutrons by the neutron counter

  20. Instant Messaging between Students and Faculty: A Tool for Increasing Student-Faculty Interaction

    Hickerson, Corey A.; Giglio, Matt

    2009-01-01

    This study explores the pedagogical potential of instant messaging in a communication course. Two instructors made themselves available to students via instant messaging as a supplement to other modes of communication (e.g., e-mail, office hours). In order to gauge students' reactions to and use of the technology, the researchers kept logs of…

  1. Future-based Static Analysis of Message Passing Programs

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  2. The Network Protocol Analysis Technique in Snort

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  3. Effect of e-cigarette advertisements and antismoking messages on explicit and implicit attitudes towards tobacco and e-cigarette smoking in 18–65-year-olds: a randomised controlled study protocol

    Albery, Ian P; Frings, Daniel

    2017-01-01

    Introduction Since the advent of e-cigarettes, e-cigarette advertising has escalated and companies are able to use marketing strategies that are not permissible for tobacco products. Research into the effect of e-cigarette advertising on attitudes towards tobacco and e-cigarettes is in its infancy. To date, no research has compared indirect (implicit) measures of attitude towards e-cigarettes with direct (explicit) measures. Furthermore, little consideration has been given to how viewing online advertisements may have an effect on attitudes towards e-cigarettes or how positive attitudes to e-cigarettes may undermine antismoking public health messages. The objectives of this study are to investigate (1) the relationship between explicit and implicit attitudes towards tobacco and e-cigarettes, (2) the effect of e-cigarette advertising on these attitudes and (3) the effect of these attitudes on the efficacy of antismoking health messages. Methods and analysis In experiment 1 an analysis of covariance will be conducted to determine whether viewing an e-cigarette advertisement, compared with a neutral image, has an effect on implicit or explicit attitudes towards tobacco and e-cigarettes, and if these attitudes differ between smokers, vapers and non-smokers aged 18 - 25 years. In experiment 2, moderation analysis will be conducted to assess whether attitudes towards e-cigarettes moderate the psychological efficacy of antismoking health messages in participants aged 18–65 years. In each experiment, attitudes will be measured preintervention and postintervention and 1 week later (n=150) in participants who are smokers (n=50), vapers (n=50) or non-smokers (n=50). Ethics and dissemination Approval for this study has been given by the London South Bank University’s (LSBU) Research Ethics Committee. The findings of these studies will be submitted for publication and disseminated via conferences. The results will be integrated into course provision for practitioners

  4. Neutron--neutron logging

    Allen, L.S.

    1977-01-01

    A borehole logging tool includes a steady-state source of fast neutrons, two epithermal neutron detectors, and two thermal neutron detectors. A count rate meter is connected to each neutron detector. A first ratio detector provides an indication of the porosity of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two epithermal neutron detectors. A second ratio detector provides an indication of both porosity and macroscopic absorption cross section of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two thermal neutron detectors. By comparing the signals of the two ratio detectors, oil bearing zones and salt water bearing zones within the formation being logged can be distinguished and the amount of oil saturation can be determined. 6 claims, 2 figures

  5. The message is the message-maker.

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  6. Pulsed radiation decay logging

    Mills, W.R. Jr.

    1983-01-01

    There are provided new and improved well logging processes and systems wherein the detection of secondary radiation is accomplished during a plurality of time windows in a manner to accurately characterize the decay rate of the secondary radiation. The system comprises a well logging tool having a primary pulsed radiation source which emits repetitive time-spaced bursts of primary radiation and detector means for detecting secondary radiation resulting from the primary radiation and producing output signals in response to the detected radiation. A plurality of measuring channels are provided, each of which produces a count rate function representative of signals received from the detector means during successive time windows occurring between the primary radiation bursts. The logging system further comprises means responsive to the measuring channels for producing a plurality of functions representative of the ratios of the radiation count rates measured during adjacent pairs of the time windows. Comparator means function to compare the ratio functions and select at least one of the ratio functions to generate a signal representative of the decay rate of the secondary radiation

  7. Geophysical borehole logging

    McCann, D.; Barton, K.J.; Hearn, K.

    1981-08-01

    Most of the available literature on geophysical borehole logging refers to studies carried out in sedimentary rocks. It is only in recent years that any great interest has been shown in geophysical logging in boreholes in metamorphic and igneous rocks following the development of research programmes associated with geothermal energy and nuclear waste disposal. This report is concerned with the programme of geophysical logging carried out on the three deep boreholes at Altnabreac, Caithness, to examine the effectiveness of these methods in crystalline rock. Of particular importance is the assessment of the performance of the various geophysical sondes run in the boreholes in relation to the rock mass properties. The geophysical data can be used to provide additional in-situ information on the geological, hydrogeological and engineering properties of the rock mass. Fracturing and weathering in the rock mass have a considerable effect on both the design parameters for an engineering structure and the flow of water through the rock mass; hence, the relation between the geophysical properties and the degree of fracturing and weathering is examined in some detail. (author)

  8. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  9. Popular Mobilization Messaging

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  10. Multi-level scaling properties of instant-message communications

    Chen, Guanxiong; Han, Xiaopu; Wang, Binghong

    2010-08-01

    To research the statistical properties of human's communication behaviors is one of the highlight areas of Human Dynamics. In this paper, we analyze the instant message data of QICQ from volunteers, and discover that there are many forms of non-Poisson characters, such as inter-event distributions of sending and receiving messages, communications between two friends, log-in activities, the distribution of online time, quantities of messages, and so on. These distributions not only denote the pattern of human communication activities, but also relate to the statistical property of human behaviors in using software. We find out that most of these exponents distribute between -1 and -2, which indicates that the Instant Message (IM) communication behavior of human is different from Non-IM communication behaviors; there are many fat-tail characters related to IM communication behavior.

  11. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. PMID:22163845

  12. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Tai-Hoon Kim

    2011-04-01

    Full Text Available People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors.

  13. Concrete Security for Entity Recognition: The Jane Doe Protocol

    Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre

    2008-01-01

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal...

  14. Effect of e-cigarette advertisements and antismoking messages on explicit and implicit attitudes towards tobacco and e-cigarette smoking in 18-65-year-olds: a randomised controlled study protocol.

    Booth, Paula; Albery, Ian P; Frings, Daniel

    2017-06-23

    Since the advent of e-cigarettes, e-cigarette advertising has escalated and companies are able to use marketing strategies that are not permissible for tobacco products. Research into the effect of e-cigarette advertising on attitudes towards tobacco and e-cigarettes is in its infancy. To date, no research has compared indirect (implicit) measures of attitude towards e-cigarettes with direct (explicit) measures. Furthermore, little consideration has been given to how viewing online advertisements may have an effect on attitudes towards e-cigarettes or how positive attitudes to e-cigarettes may undermine antismoking public health messages. The objectives of this study are to investigate (1) the relationship between explicit and implicit attitudes towards tobacco and e-cigarettes, (2) the effect of e-cigarette advertising on these attitudes and (3) the effect of these attitudes on the efficacy of antismoking health messages. In experiment 1 an analysis of covariance will be conducted to determine whether viewing an e-cigarette advertisement, compared with a neutral image, has an effect on implicit or explicit attitudes towards tobacco and e-cigarettes, and if these attitudes differ between smokers, vapers and non-smokers aged 18 - 25 years. In experiment 2, moderation analysis will be conducted to assess whether attitudes towards e-cigarettes moderate the psychological efficacy of antismoking health messages in participants aged 18-65 years. In each experiment, attitudes will be measured preintervention and postintervention and 1 week later (n=150) in participants who are smokers (n=50), vapers (n=50) or non-smokers (n=50). Approval for this study has been given by the London South Bank University's (LSBU) Research Ethics Committee. The findings of these studies will be submitted for publication and disseminated via conferences. The results will be integrated into course provision for practitioners training at LSBU. © Article author(s) (or their employer(s) unless

  15. Eating for Two? Protocol of an Exploratory Survey and Experimental Study on Social Norms and Norm-Based Messages Influencing European Pregnant and Non-pregnant Women’s Eating Behavior

    Bevelander, Kirsten E.; Herte, Katharina; Kakoulakis, Catherine; Sanguino, Inés; Tebbe, Anna-Lena; Tünte, Markus R.

    2018-01-01

    The social context is an important factor underlying unhealthy eating behavior and the development of inappropriate weight gain. Evidence is accumulating that powerful social influences can also be used as a tool to impact people’s eating behavior in a positive manner. Social norm-based messages have potential to steer people in making healthier food choices. The research field on nutritional social norms is still emerging and more research is needed to gain insights into why some people adhere to social norms whereas others do not. There are indications stemming from empirical studies on social eating behavior that this may be due to ingratiation purposes and uncertainty reduction. That is, people match their eating behavior to that of the norm set by their eating companion(s) in order to blend in and be part of the group. In this project, we explore nutritional social norms among pregnant women. This population is particularly interesting because they are often subject to unsolicited advice and experience social pressure from their environment. In addition, their pregnancy affects their body composition, eating pattern, and psychosocial status. Pregnancy provides an important window of opportunity to impact health of pregnant women and their child. Nevertheless, the field of nutritional social norms among pregnant women is understudied and more knowledge is needed on whether pregnant women use guidelines from their social environment for their own eating behavior. In this project we aim to fill this research gap by means of an exploratory survey (Study 1) assessing information about social expectations, (mis)perceived social norms and the role of different reference groups such as other pregnant women, family, and friends. In addition, we conduct an online experiment (Study 2) testing to what extent pregnant women are susceptible to social norm-based messages compared to non-pregnant women. Moreover, possible moderators are explored which might impact women

  16. Eating for Two? Protocol of an Exploratory Survey and Experimental Study on Social Norms and Norm-Based Messages Influencing European Pregnant and Non-pregnant Women's Eating Behavior.

    Bevelander, Kirsten E; Herte, Katharina; Kakoulakis, Catherine; Sanguino, Inés; Tebbe, Anna-Lena; Tünte, Markus R

    2018-01-01

    The social context is an important factor underlying unhealthy eating behavior and the development of inappropriate weight gain. Evidence is accumulating that powerful social influences can also be used as a tool to impact people's eating behavior in a positive manner. Social norm-based messages have potential to steer people in making healthier food choices. The research field on nutritional social norms is still emerging and more research is needed to gain insights into why some people adhere to social norms whereas others do not. There are indications stemming from empirical studies on social eating behavior that this may be due to ingratiation purposes and uncertainty reduction. That is, people match their eating behavior to that of the norm set by their eating companion(s) in order to blend in and be part of the group. In this project, we explore nutritional social norms among pregnant women. This population is particularly interesting because they are often subject to unsolicited advice and experience social pressure from their environment. In addition, their pregnancy affects their body composition, eating pattern, and psychosocial status. Pregnancy provides an important window of opportunity to impact health of pregnant women and their child. Nevertheless, the field of nutritional social norms among pregnant women is understudied and more knowledge is needed on whether pregnant women use guidelines from their social environment for their own eating behavior. In this project we aim to fill this research gap by means of an exploratory survey (Study 1) assessing information about social expectations, (mis)perceived social norms and the role of different reference groups such as other pregnant women, family, and friends. In addition, we conduct an online experiment (Study 2) testing to what extent pregnant women are susceptible to social norm-based messages compared to non-pregnant women. Moreover, possible moderators are explored which might impact women

  17. Eating for Two? Protocol of an Exploratory Survey and Experimental Study on Social Norms and Norm-Based Messages Influencing European Pregnant and Non-pregnant Women’s Eating Behavior

    Kirsten E. Bevelander

    2018-05-01

    Full Text Available The social context is an important factor underlying unhealthy eating behavior and the development of inappropriate weight gain. Evidence is accumulating that powerful social influences can also be used as a tool to impact people’s eating behavior in a positive manner. Social norm-based messages have potential to steer people in making healthier food choices. The research field on nutritional social norms is still emerging and more research is needed to gain insights into why some people adhere to social norms whereas others do not. There are indications stemming from empirical studies on social eating behavior that this may be due to ingratiation purposes and uncertainty reduction. That is, people match their eating behavior to that of the norm set by their eating companion(s in order to blend in and be part of the group. In this project, we explore nutritional social norms among pregnant women. This population is particularly interesting because they are often subject to unsolicited advice and experience social pressure from their environment. In addition, their pregnancy affects their body composition, eating pattern, and psychosocial status. Pregnancy provides an important window of opportunity to impact health of pregnant women and their child. Nevertheless, the field of nutritional social norms among pregnant women is understudied and more knowledge is needed on whether pregnant women use guidelines from their social environment for their own eating behavior. In this project we aim to fill this research gap by means of an exploratory survey (Study 1 assessing information about social expectations, (misperceived social norms and the role of different reference groups such as other pregnant women, family, and friends. In addition, we conduct an online experiment (Study 2 testing to what extent pregnant women are susceptible to social norm-based messages compared to non-pregnant women. Moreover, possible moderators are explored which might

  18. ZeroMQ: Messaging Made Simple

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  19. Pulse neutron logging technique

    Bespalov, D.F.; Dylyuk, A.A.

    1975-01-01

    A new method of neutron-burst logging is proposed, residing in irradiating rocks with fast neutron bursts and registering the integrated flux burst of thermal and/or epithermal neutrons, from the moment of its initiation to that of full absorption. The obtaained value is representative of the rock properties (porosity, hydrogen content). The integrated flux in a burst of thermal and epithermal neutrons can be measured both by way of activation of a reference sample of a known chemical composition during the neutron burst and by recording the radiation of induced activity of the sample within an interval between two bursts. The proposed method features high informative value, accuracy and efficiency

  20. Are Instant Messages Speech?

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  1. Microprocessorized message multiplexer

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  2. Grounding in Instant Messaging

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  3. 3. Secure Messaging

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  4. Application Framework with Abstractions for Protocol and Agent Role

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent ...... roles are supported by a simple and expressive application framework....

  5. Does the Screening Status of Message Characters Affect Message Effects?

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  6. Toward Synthesis, Analysis, and Certification of Security Protocols

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  7. Degree sequence in message transfer

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  8. Nova Event Logging System

    Calliger, R.J.; Suski, G.J.

    1981-01-01

    Nova is a 200 terawatt, 10-beam High Energy Glass Laser currently under construction at LLNL. This facility, designed to demonstrate the feasibility of laser driven inertial confinement fusion, contains over 5000 elements requiring coordinated control, data acquisition, and analysis functions. The large amounts of data that will be generated must be maintained over the life of the facility. Often the most useful but inaccessible data is that related to time dependent events associated with, for example, operator actions or experiment activity. We have developed an Event Logging System to synchronously record, maintain, and analyze, in part, this data. We see the system as being particularly useful to the physics and engineering staffs of medium and large facilities in that it is entirely separate from experimental apparatus and control devices. The design criteria, implementation, use, and benefits of such a system will be discussed

  9. Querying Workflow Logs

    Yan Tang

    2018-01-01

    Full Text Available A business process or workflow is an assembly of tasks that accomplishes a business goal. Business process management is the study of the design, configuration/implementation, enactment and monitoring, analysis, and re-design of workflows. The traditional methodology for the re-design and improvement of workflows relies on the well-known sequence of extract, transform, and load (ETL, data/process warehousing, and online analytical processing (OLAP tools. In this paper, we study the ad hoc queryiny of process enactments for (data-centric business processes, bypassing the traditional methodology for more flexibility in querying. We develop an algebraic query language based on “incident patterns” with four operators inspired from Business Process Model and Notation (BPMN representation, allowing the user to formulate ad hoc queries directly over workflow logs. A formal semantics of this query language, a preliminary query evaluation algorithm, and a group of elementary properties of the operators are provided.

  10. Message from Fermilab Director

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  11. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  12. Interpretation of horizontal well production logs: influence of logging tool

    Ozkan, E. [Colorado School of Mines, Boulder, CO (United States); Sarica, C. [Pennsylvania State Univ., College Park, PA (United States); Haci, M. [Drilling Measurements, Inc (United States)

    1998-12-31

    The influence of a production-logging tool on wellbore flow rate and pressure measurements was investigated, focusing on the disturbence caused by the production-logging tool and the coiled tubing on the original flow conditions in the wellbore. The investigation was carried out using an analytical model and single-phase liquid flow was assumed. Results showed that the production-logging tool influenced the measurements as shown by the deviation of the original flow-rate, pressure profiles and low-conductivity wellbores. High production rates increase the effect of the production-logging tool. Recovering or inferring the original flow conditions in the wellbore from the production-logging data is a very complex process which cannot be solved easily. For this reason, the conditions under which the information obtained by production-logging is meaningful is of considerable practical interest. 7 refs., 2 tabs., 15 figs.

  13. Cryptanalysis of the arbitrated quantum signature protocols

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  14. The effect of an interactive weekly mobile phone messaging on retention in prevention of mother to child transmission (PMTCT) of HIV program: study protocol for a randomized controlled trial (WELTEL PMTCT).

    Awiti, Patricia Opondo; Grotta, Alessandra; van der Kop, Mia; Dusabe, John; Thorson, Anna; Mwangi, Jonathan; Belloco, Rino; Lester, Richard; Ternent, Laura; Were, Edwin; Ekström, Anna Mia

    2016-07-11

    Improving retention in prevention of mother to child transmission (PMTCT) of HIV programs is critical to optimize maternal and infant health outcomes, especially now that lifelong treatment is immediate regardless of CD4 cell count). The WelTel strategy of using weekly short message service (SMS) to engage patients in care in Kenya, where mobile coverage even in poor areas is widespread has been shown to improve adherence to antiretroviral therapy (ART) and viral load suppression among those on ART. The aim of this study is to determine the effect of the WelTel SMS intervention compared to standard care on retention in PMTCT program in Kenya. WelTel PMTCT is a four to seven-centers, two-arm open randomized controlled trial (RCT) that will be conducted in urban and rural Kenya. Over 36 months, we plan to recruit 600 pregnant women at their first antenatal care visit and follow the mother-infant pair until they are discharged from the PMTCT program (when infant is aged 24 months). Participants will be randomly allocated to the intervention or control arm (standard care) at a 1:1 ratio. Intervention arm participants will receive an interactive weekly SMS 'How are you?' to which they are supposed to respond within 24 h. Depending on the response (ok, problem or no answer), a PMTCT nurse will follow-up and triage any problems that are identified. The primary outcome will be retention in care defined as the proportion of mother-infant pairs coming for infant HIV testing at 24 months from delivery. Secondary outcomes include a) adherence to WelTel; (b) adherence to antiretroviral medicine; (c) acceptance of WelTel and (d) cost-effectiveness of the WelTel intervention. This trial will provide evidence on the effectiveness of mHealth for PMTCT retention. Trial results and the cost-effectiveness evaluation will be used to inform policy and potential scale-up of mHealth among mothers living with HIV. ISRCTN98818734 ; registered on 9th December 2014.

  15. Improving the capacity of the ping-pong protocol

    Cai, Qing-yu; Li, Bai-wen

    2003-01-01

    We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message aut...

  16. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-04-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  17. Logging concessions enable illegal logging crisis in the Peruvian Amazon.

    Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin

    2014-04-17

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  18. A revised design and implementation of the ATLAS Log Service package

    Murillo Garcia, Raul; Lehamnn Miotto, Giovanna; ATLAS TDAQ Collaboration

    2011-12-01

    This paper presents a revised design and implementation of the Log Service for the ATLAS Trigger and Data Acquisition (TDAQ) framework at CERN. A previous version of this utility was rarely used for various reasons, herein explained. The lessons learned set the grounds and motivation for a new redesign. The Log Service consists of the Logger, the entity that collects logs and stores them in an Oracle database; a set of user utilities to access and maintain the database; and a Java based tool, known as the Log Manager, which provides a compact and intuitive interface for browsing the log messages based on a user defined search criteria. The outline of these software components are explained, including various optimization techniques deployed in order to handle the large volume of entries expected to be stored in the database. Finally, a performance study has been conducted to prove the validity and behavior of the Log Service.

  19. A revised design and implementation of the ATLAS Log Service package

    Murillo García, R; The ATLAS collaboration

    2010-01-01

    This paper presents a revised design and implementation of the Log Service for the ATLAS Trigger and Data Acquisition (TDAQ) framework at CERN. A previous version of this utility was rarely used for various reasons, herein explained. The lessons learned set the grounds and motivation for a new redesign. The Log Service consists of the Logger, the entity that collects logs and stores them in an Oracle database; a set of user utilities to access and maintain the database; and a Java based tool, known as the Log Manager, which provides a compact and intuitive interface for browsing the log messages based on a user defined search criteria. The outline of these software components are explained, including various optimization techniques deployed in order to handle the large volume of entries expected to be stored in the database. Finally, a performance study has been conducted to prove the validity and behavior of the Log Service.

  20. Usage of the hybrid encryption in a cloud instant messages exchange system

    Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek

    2016-09-01

    A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.

  1. SNG-logs at Skjern

    Korsbech, Uffe C C; Petersen, Jesper; Aage, Helle Karina

    1998-01-01

    Spectral Natural Gamma-ray logs have been run in two water supply borings at Skjern. The log data have been examined by a new technique - Noise Adjusted Singular Value Decomposition - in order to get a detailed and reliable picture of the distribution of uranium and thorium gamma-rays from heavy...

  2. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.

    Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton

    2016-01-01

    Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.

  3. Overview of the InterGroup protocols

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  4. A Messaging Infrastructure for WLCG

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  5. Survey of Instant Messaging Applications Encryption Methods

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  6. Instant Messaging for Creating Interactive and Collaborative m-Learning Environments

    James Kadirire

    2007-01-01

    'Instant Messaging' (IM) and 'Presence,' which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of time, a phenomena that also fosters a sense of "online community," that perhaps no other application has done previously (Alvestrand, 2002). This research looks at the us...

  7. Getting Your Message Across: Mobile Phone Text Messaging

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  8. Financial Indicators of Reduced Impact Logging Performance in Brazil: Case Study Comparisons

    Thomas P. Holmes; Frederick Boltz; Douglas R. Carter

    2001-01-01

    Indicators of financial performance are compared for three case studies in the Brazilian Amazon. Each case study presents parameters obtained from monitoring initial harvest entries into primary forests for reduced impact logging (RIL) and conventional logging (CL) operations. Differences in cost definitions and data collection protocols complicate the analysis, and...

  9. An one-time-pad key communication protocol with entanglement

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  10. Engineering aspects of radiometric logging

    Huppert, P.

    1982-01-01

    Engineering problems encountered in the development of nuclear borehole logging techniques are discussed. Spectrometric techniques require electronic stability of the equipment. In addition the electronics must be capable of handling high count rates of randomly distributed pulses of fast rise time from the detector and the systems must be designed so that precise calibration is possible under field operating conditions. Components of a logging system are discussed in detail. They include the logging probe (electronics, detector, high voltage supply, preamplifier), electronic instrumentation for data collection and processing and auxiliary equipment

  11. Log-balanced combinatorial sequences

    Tomislav Došlic

    2005-01-01

    Full Text Available We consider log-convex sequences that satisfy an additional constraint imposed on their rate of growth. We call such sequences log-balanced. It is shown that all such sequences satisfy a pair of double inequalities. Sufficient conditions for log-balancedness are given for the case when the sequence satisfies a two- (or more- term linear recurrence. It is shown that many combinatorially interesting sequences belong to this class, and, as a consequence, that the above-mentioned double inequalities are valid for all of them.

  12. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  13. VT Route Log Points 2017

    Vermont Center for Geographic Information — This data layer is used with VTrans' Integrated Route Log System (IRA). It is also used to calibrate the linear referencing systems, including the End-to-End and...

  14. New materials for fireplace logs

    Kieselback, D. J.; Smock, A. W.

    1971-01-01

    Fibrous insulation and refractory concrete are used for logs as well as fireproof walls, incinerator bricks, planters, and roof shingles. Insulation is lighter and more shock resistant than fireclay. Lightweight slag bonded with refractory concrete serves as aggregrate.

  15. Palm distributions for log Gaussian Cox processes

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus Plenge

    2017-01-01

    This paper establishes a remarkable result regarding Palm distributions for a log Gaussian Cox process: the reduced Palm distribution for a log Gaussian Cox process is itself a log Gaussian Cox process that only differs from the original log Gaussian Cox process in the intensity function. This new...... result is used to study functional summaries for log Gaussian Cox processes....

  16. PUMA Internet Task Logging Using the IDAC-1

    K. N. Tarchanidis

    2014-08-01

    Full Text Available This project uses an IDAC-1 board to sample the joint angle position of the PUMA 76 1 robot and log the results on a computer. The robot is at the task location and the logging computer is located in a different one. The task the robot is performing is based on a Pseudo Stereo Vision System (PSVS. Internet is the transport media. The protocol used in this project is UDP/IP. The actual angle is taken straight from the PUMA controller. High-resolution potentiometers are connected on each robot joint and are buffered and sampled as potential difference on an A/D converter integrated on the IDAC-1. The logging computer through the Internet acting as client asks for the angle set, the IDAC-1 responds as server with the 10-bit resolution sampling of the joint position. The whole task is logged in a file on the logging computer. This application can give the ability to the Internet user to monitor and log the robot tasks anywhere in the Word Wide Web (www.

  17. Log quality enhancement: A systematic assessment of logging company wellsite performance and log quality

    Farnan, R.A.; Mc Hattie, C.M.

    1984-01-01

    To improve the monitoring of logging company performance, computer programs were developed to assess information en masse from log quality check lists completed on wellsite by the service company engineer and Phillips representative. A study of all logging jobs performed by different service companies for Phillips in Oklahoma (panhandle excepted) during 1982 enabled several pertinent and beneficial interpretations to be made. Company A provided the best tool and crew service. Company B incurred an excessive amount of lost time related to tool failure, in particular the neutron-density tool combination. Company C, although used only three times, incurred no lost time. With a reasonable data base valid conclusions were made pertaining, for example, to repeated tool malfunctions. The actual logs were then assessed for quality

  18. Reduced-impact logging and temporal activity of understorey bats in lowland Amazonia

    Ivan Castro Arellano; Steven J. Presley; Michael R. Willig; Joseph M. Wunderle; Luiz N. Saldanha

    2009-01-01

    Because global timber demands continue to threaten tropical rain forests, identification of sustainable use forest management protocols that meet human needs while preserving biodiversity is critical. Reduced-impact logging (RIL) protocols are increasingly common in the tropics and may be a viable option for sustainable forest use; however, few studies have documented...

  19. A Student Teamwork Induction Protocol

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  20. Pulsed neutron generator for logging

    Thibideau, F.D.

    1977-01-01

    A pulsed neutron generator for uranium logging is described. This generator is one component of a prototype uranium logging probe which is being developed by SLA to detect, and assay, uranium by borehole logging. The logging method is based on the measurement of epithermal neutrons resulting from the prompt fissioning of uranium from a pulsed source of 17.6 MeV neutrons. An objective of the prototype probe was that its diameter not exceed 2.75 inches, which would allow its use in conventional rotary drill holes of 4.75-inch diameter. This restriction limited the generator to a maximum 2.375-inch diameter. The performance requirements for the neutron generator specified that it operate with a nominal output of 5 x 10 6 neutrons/pulse at up to 100 pulses/second for a one-hour period. The development of a neutron generator meeting the preliminary design goals was completed and two prototype models were delivered to SLA. These two generators have been used by SLA to log a number of boreholes in field evaluation of the probe. The results of the field evaluations have led to the recommendation of several changes to improve the probe's operation. Some of these changes will require additional development effort on the neutron generator. It is expected that this work will be performed during 1977. The design and operation of the first prototype neutron generators is described

  1. Big data analytics : predicting traffic flow regimes from simulated connected vehicle messages using data analytics and machine learning.

    2016-12-25

    The key objectives of this study were to: 1. Develop advanced analytical techniques that make use of a dynamically configurable connected vehicle message protocol to predict traffic flow regimes in near-real time in a virtual environment and examine ...

  2. GPS Ephemeris Message Broadcast Simulation

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  3. Military Message Experiment. Volume II.

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  4. Hardwood log grades and lumber grade yields for factory lumber logs

    Leland F. Hanks; Glenn L. Gammon; Robert L. Brisbin; Everette D. Rast

    1980-01-01

    The USDA Forest Service Standard Grades for Hardwood Factory Lumber Logs are described, and lumber grade yields for 16 species and 2 species groups are presented by log grade and log diameter. The grades enable foresters, log buyers, and log sellers to select and grade those log suitable for conversion into standard factory grade lumber. By using the apropriate lumber...

  5. The log S -log N distribution of gamma ray brust

    Yamagami, Takamasa; Nishimura, Jun; Fujii, Masami

    1982-01-01

    The relation between the size S and the frequency N of gamma ray burst has been studied. This relation may be determined from the celestial distribution of gamma ray burst sources. The present analysis gives that the log S - log N relation for any direction is determined by the celestial distribution of gamma ray burst sources. The observed bursts were analyzed. The celestial distribution of gamma ray burst sources was observed by the satellites of USSR. The results showed that the distribution seemed to be isotropic. However, the calculated log S - log N relation based on the isotropic distribution wasF in disagreement with the observed ones. As the result of analysis, it was found that the observed bursts missed low energy part because of the threshold of detectors. The levels of discrimination of detection were not clear. When a proper threshold level is set for each type of burst, and the size of bursts is determined, the above mentioned discrepancy will be deleted regardless of luminosity and the spatial distribution of bursts. (Kato, T.)

  6. Mud Logging; Control geologico en perforaciones petroliferas (Mud Logging)

    Pumarega Lafuente, J.C.

    1994-12-31

    Mud Logging is an important activity in the oil field and it is a key job in drilling operations, our duties are the acquisition, collection and interpretation of the geological and engineering data at the wellsite, also inform the client immediately of any significant changes in the well. (Author)

  7. Continuous Tamper-proof Logging using TPM2.0

    2014-06-16

    process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B

  8. Borehole logging for uranium exploration

    1982-01-01

    The present text has been prepared taking into account the requirements of both developing countries, which might be at an incipient stage of uranium exploration, and industrialized countries, where more advanced exploration and resource evaluation techniques are commonly in use. While it was felt necessary to include some discussion of exploration concepts and fundamental physical principles underlying various logging methods, it was not the intention of the consultants to provide a thorough, detailed explanation of the various techniques, or even to give a comprehensive listing thereof. However, a list of references has been included, and it is strongly recommended that the serious student of mineral logging consult this list for further guidance

  9. Pulsed neutron porosity logging system

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1978-01-01

    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations and, during the bursts, the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  10. A VXI-GPIB protocol converter based on DSP

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  11. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  12. Multiparty quantum secret sharing of classical messages based on entanglement swapping

    Zhang Zhanjun; Man Zhongxiao

    2005-01-01

    A multiparty quantum secret sharing (QSS) protocol of classical messages (i.e., classical bits) is proposed by using swapping quantum entanglement of Bell states. The secret messages are imposed on Bell states by local unitary operations. The secret messages are split into several parts, and each part is distributed to a separate party so that no action of a subset of all the parties without the cooperation of the entire group is able to read out the secret messages. In addition, dense coding is used in this protocol to achieve a high efficiency. The security of the present multiparty QSS against eavesdropping has been analyzed and confirmed even in a noisy quantum channel

  13. Logging Work Injuries in Appalachia

    Charles H. Wolf; Gilbert P. Dempsey

    1978-01-01

    Logging accidents are costly. They may bring pain to injured workers, hardship to their families, and higher insurance premiums and lower productivity to their employers. Our analysis of 1,172 injuries in central Appalachia reveals that nearly half of all time lost-and almost all fatalities-resulted from accidents during felling and unloading. The largest proportion of...

  14. Log files for testing usability

    Klein Teeselink, G.; Siepe, A.H.M.; Pijper, de J.R.

    1999-01-01

    The aim of this study is to gain insight in the usefulness of log file analysis as a method to evaluate the usability of individual interface components and their influence on the usability of the overall user interface. We selected a music player as application, with four different interfaces and

  15. Effectiveness and Limitations of E-Mail Security Protocols

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  16. Unconditionally Secure Protocols

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  17. Hardwood log supply: a broader perspective

    Iris Montague; Adri Andersch; Jan Wiedenbeck; Urs. Buehlmann

    2015-01-01

    At regional and state meetings we talk with others in our business about the problems we face: log exports, log quality, log markets, logger shortages, cash flow problems, the weather. These are familiar talking points and real and persistent problems. But what is the relative importance of these problems for log procurement in different regions of...

  18. Unsupervised signature extraction from forensic logs

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  19. A method of estimating log weights.

    Charles N. Mann; Hilton H. Lysons

    1972-01-01

    This paper presents a practical method of estimating the weights of logs before they are yarded. Knowledge of log weights is required to achieve optimum loading of modern yarding equipment. Truckloads of logs are weighed and measured to obtain a local density index (pounds per cubic foot) for a species of logs. The density index is then used to estimate the weights of...

  20. Nondestructive evaluation for sorting red maple logs

    Xiping Wang; Robert J. Ross; David W. Green; Karl Englund; Michael Wolcott

    2000-01-01

    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  1. Nuclear well logging in hydrology

    1971-01-01

    The optimum development of regional and local groundwater resources requires a quantitative evaluation of its aquifers and aquicludes, and of the physical and chemical properties relevant to the recharge to and withdrawal of water from them. If an understanding of the groundwater regime is to be obtained, geological observations at outcrop must be augmented by subsurface measurements of the strata and the waters they contain. Measurements of many hydrological and geological parameters can be made in situ by nuclear geophysical well-logging methods. Very simply, well logging consists of lowering a measuring probe into a well and making a continuous record of the variations of a particular parameter with depth. In most circumstances, repetition of the measurements under differing hydrodynamic conditions results in a better definition of the flow regime in the aquifer. Nuclear well-logging techniques have for some years been capable of solving a number of the sub-surface measurement problems faced by hydrogeologists. However, the present usage of these methods varies from country to country and the literature concerning applications is scattered in the professional journals of several disciplines. The objective of this report is to include in a single reference volume descriptions of the physical principles of nuclear logging methods, their applications to hydrogeological problems and their limitations on a level suitable for the practising hydrologists with a limited knowledge of nuclear physics. The Working Group responsible for compiling the report recommended that it should cover a broad spectrum of hydrogeological investigations and problems. For example, it saw no valid reason to distinguish for the purposes of the report between well-logging applications for water-supply purposes and for water-flooding studies in the petroleum industry. Neutron measurements made for soil-moisture determinations in the unsaturated zone have been specifically omitted, however, as

  2. MessageSpace: a messaging system for health research

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  3. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  4. Bioremediation protocols

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  5. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Sachpazidis, Ilias [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)]. E-mail: Ilias.Sachpazidis@igd.fraunhofer.de; Ohl, Roland [MedCom Gesellschaft fuer medizinische Bildverarbeitung mbH, Runderturmstr. 12, D-64283, Darmstadt (Germany); Kontaxakis, George [Universidad Politecnica de Madrid, ETSI Telecomunicacion, Madrid 28040 (Spain); Sakas, Georgios [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)

    2006-12-20

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  6. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  7. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-01-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber

  8. Reactions to threatening health messages.

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  9. Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service

    Hyeong gon Jo

    2016-07-01

    Full Text Available The Internet of Things (IoT opens up tremendous opportunities to provide location-based applications. However, despite the services around a user being physically adjacent, common IoT platforms use a centralized structure, like a cloud-computing architecture, which transfers large amounts of data to a central server. This raises problems, such as traffic concentration, long service latency, and high communication cost. In this paper, we propose a physical distance-based asynchronous messaging platform that specializes in processing personalized data and location-based messages. The proposed system disperses traffic using a location-based message-delivery protocol, and has high stability.

  10. Extracting messages masked by chaos

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  11. Uranium logging in earth formations

    Givens, W.W.

    1979-01-01

    A technique is provided for assaying the formations surrounding a borehole for uranium. A borehole logging tool cyclically irradiates the formations with neutrons and responds to neutron fluxes produced during the period of time that prompt neutrons are being produced by the neutron fission of uranium in the formations. A borehole calibration tool employs a steady-state (continuous output) neutron source, firstly, to produce a response to neutron fluxes in models having known concentrations of uranium and, secondly, to to produce a response to neutron fluxes in the formations surrounding the borehole. The neutron flux responses of the borehole calibration tool in both the model and the formations surrounding the borehole are utilized to correct the neutron flux response of the borehole logging tool for the effects of epithermal/thermal neutron moderation, scattering, and absorption within the borehole itself

  12. Logística empresarial

    Feres Sahid

    1987-01-01

    RESUMEN El concepto logístico, se pudo ver reflejado con exactitud desde el punto de vista etimológico e histórico a través de la revista de la E.A.N; ya que  tiene cierto carácter militar que lo hace característico a la gestión empresarial y de esto se formula un debate definitivo de este concepto.

  13. Chemical logging of geothermal wells

    Allen, C.A.; McAtee, R.E.

    The presence of geothermal aquifers can be detected while drilling in geothermal formations by maintaining a chemical log of the ratio of the concentrations of calcium to carbonate and bicarbonate ions in the return drilling fluid. A continuous increase in the ratio of the concentrations of calcium to carbonate and bicarbonate ions is indicative of the existence of a warm or hot geothermal aquifer at some increased depth.

  14. Audit Log for Forensic Photography

    Neville, Timothy; Sorell, Matthew

    We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

  15. Logística empresarial

    Feres Sahid

    1987-04-01

    Full Text Available RESUMEN El concepto logístico, se pudo ver reflejado con exactitud desde el punto de vista etimológico e histórico a través de la revista de la E.A.N; ya que  tiene cierto carácter militar que lo hace característico a la gestión empresarial y de esto se formula un debate definitivo de este concepto.

  16. Neutron capture in borehole logging

    Randall, R.R.

    1981-01-01

    The use is described of a pulsed source of fast neutrons and a radiation detector to measure the thermal neutron population decay rate in a well logging instrument. The macroscopic neutron absorption cross-section is calculated by taking the natural logarithm of the ratio of the detected radiation counts occurring within two measurement intervals of fixed duration and starting at a fixed time after a neutron burst. (U.K.)

  17. Recursion vs. Replication in Simple Cryptographic Protocols

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  18. Borehole logging in uranium exploration

    Kulkarni, N.H.

    1992-01-01

    The ultimate objective of exploration by drilling as far as Atomic Minerals Division is concerned is to locate the ore zone in the subsurface, draw samples and analyze them for their metal content. The presence of the ore zone is also indicated by gamma-ray logging of the borehole. A gamma-ray detector is lowered in the borehole and precise depth and grade of the ore zone is established. This helps the geologist in correlating the ore horizon with the surface outcrop or the ore zone intercepted in adjoining boreholes and in deciding about further drilling and location of boreholes. Most commonly, total gamma measurements are made although some units capable of measuring the gamma-ray spectrum are also in use. It is possible to know if the mineralization is due to uranium without waiting for the laboratory results. The present write up gives a brief account of the principles, equipment and methods of borehole gamma-ray logging including density and self-potential logging. (author). 8 refs., 5 figs

  19. Dynamic Planar Convex Hull with Optimal Query Time and O(log n · log log n ) Update Time

    Brodal, Gerth Stølting; Jakob, Riko

    2000-01-01

    The dynamic maintenance of the convex hull of a set of points in the plane is one of the most important problems in computational geometry. We present a data structure supporting point insertions in amortized O(log n · log log log n) time, point deletions in amortized O(log n · log log n) time......, and various queries about the convex hull in optimal O(log n) worst-case time. The data structure requires O(n) space. Applications of the new dynamic convex hull data structure are improved deterministic algorithms for the k-level problem and the red-blue segment intersection problem where all red and all...

  20. Radiating Messages: An International Perspective.

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  1. Re: Design Changing the Message

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  2. Instant Apache Camel message routing

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  3. The Media and the Message.

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  4. Spatial variation in messaging effects

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  5. Design Considerations in Developing a Text Messaging Program Aimed at Smoking Cessation

    Holtrop, Jodi Summers; Bağci Bosi, A Tülay; Emri, Salih

    2012-01-01

    Background Cell phone text messaging is gaining increasing recognition as an important tool that can be harnessed for prevention and intervention programs across a wide variety of health research applications. Despite the growing body of literature reporting positive outcomes, very little is available about the design decisions that scaffold the development of text messaging-based health interventions. What seems to be missing is documentation of the thought process of investigators in the initial stages of protocol and content development. This omission is of particular concern because many researchers seem to view text messaging as the intervention itself instead of simply a delivery mechanism. Certainly, aspects of this technology may increase participant engagement. Like other interventions, however, the content is a central driver of the behavior change. Objective To address this noted gap in the literature, we discuss the protocol decisions and content development for SMS Turkey (or Cebiniz birakin diyor in Turkish), a smoking cessation text messaging program for adult smokers in Turkey. Methods Content was developed in English and translated into Turkish. Efforts were made to ensure that the protocol and content were grounded in evidence-based smoking cessation theory, while also reflective of the cultural aspects of smoking and quitting in Turkey. Results Methodological considerations included whether to provide cell phones and whether to reimburse participants for texting costs; whether to include supplementary intervention resources (eg, personal contact); and whether to utilize unidirectional versus bidirectional messaging. Program design considerations included how messages were tailored to the quitting curve and one’s smoking status after one’s quit date, the number of messages participants received per day, and over what period of time the intervention lasted. Conclusion The content and methods of effective smoking cessation quitline programs were

  6. Semantics and logic for security protocols

    Jacobs, B.P.F.; Hasuo, I.

    2009-01-01

    This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of

  7. Reactions to threatening health messages

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  8. Representing culture in interstellar messages

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  9. Neutron borehole logging correction technique

    Goldman, L.H.

    1978-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for logging earth formations traversed by a borehole in which an earth formation is irradiated with neutrons and gamma radiation produced thereby in the formation and in the borehole is detected. A sleeve or shield for capturing neutrons from the borehole and producing gamma radiation characteristic of that capture is provided to give an indication of the contribution of borehole capture events to the total detected gamma radiation. It is then possible to correct from those borehole effects the total detected gamma radiation and any earth formation parameters determined therefrom

  10. Benchmark neutron porosity log calculations

    Little, R.C.; Michael, M.; Verghese, K.; Gardner, R.P.

    1989-01-01

    Calculations have been made for a benchmark neutron porosity log problem with the general purpose Monte Carlo code MCNP and the specific purpose Monte Carlo code McDNL. For accuracy and timing comparison purposes the CRAY XMP and MicroVax II computers have been used with these codes. The CRAY has been used for an analog version of the MCNP code while the MicroVax II has been used for the optimized variance reduction versions of both codes. Results indicate that the two codes give the same results within calculated standard deviations. Comparisons are given and discussed for accuracy (precision) and computation times for the two codes

  11. 29 CFR 1918.88 - Log operations.

    2010-07-01

    ...) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.88 Log operations. (a) Working in..., the employer shall ensure that employees remain clear of areas where logs being dumped could strike...

  12. Artificial intelligence approach to interwell log correlation

    Lim, Jong-Se [Korea Maritime University, Pusan(Korea); Kang, Joo Myung [Seoul National University, Seoul(Korea); Kim, Jung Whan [Korea National Oil Corp., Anyang(Korea)

    2000-04-30

    This paper describes a new approach to automated interwell log correlation using artificial intelligence and principal component analysis. The approach to correlate wire line logging data is on the basis of a large set of subjective rules that are intended to represent human logical processes. The data processed are mainly the qualitative information such as the characteristics of the shapes extracted along log traces. The apparent geologic zones are identified by pattern recognition for the specific characteristics of log trace collected as a set of objects by object oriented programming. The correlation of zones between wells is made by rule-based inference program. The reliable correlation can be established from the first principal component logs derived from both the important information around well bore and the largest common part of variances of all available well log data. Correlation with field log data shows that this approach can make interwell log correlation more reliable and accurate. (author). 6 refs., 7 figs.

  13. Face logging in Copenhagen Limestone, Denmark

    Jakobsen, Lisa; Foged, Niels Nielsen; Erichsen, Lars

    2015-01-01

    tunnel in Copenhagen more than 2.5 km face logs were made in 467 locations at underground stations, shafts, caverns and along bored tunnels. Over 160 geotechnical boreholes, many with geophysical logging were executed prior to construction works. The bedrock consists of Paleogene "Copenhagen limestone......The requirement for excavation support can be assessed from face logging. Face logs can also improve our knowledge of lithological and structural conditions within bedrock and supplement information from boreholes and geophysical logs. During the construction of 8 km metro tunnel and 4 km heating....... The induration degrees recorded in face logs and boreholes are compared and correlated. Distinct geophysical log markers are used to divide the limestone into three units. These marker horizons are correlated between face logs and geotechnical boreholes. A 3D model of the strength variations recorded within...

  14. Tucker Wireline Open Hole Wireline Logging; FINAL

    Milliken, M.

    2002-01-01

    The Tucker Wireline unit ran a suite of open hole logs right behind the RMOTC logging contractor for comparison purposes. The tools included Dual Laterolog, Phased Induction, BHC Sonic, and Density-Porosity

  15. Toward Predicting Popularity of Social Marketing Messages

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  16. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  17. Selective logging in the Brazilian Amazon.

    G. P. Asner; D. E. Knapp; E. N. Broadbent; P. J. C. Oliveira; M Keller; J. N. Silva

    2005-01-01

    Amazon deforestation has been measured by remote sensing for three decades. In comparison, selective logging has been mostly invisible to satellites. We developed a large-scale, high-resolution, automated remote-sensing analysis of selective logging in the top five timber-producing states of the Brazilian Amazon. Logged areas ranged from 12,075 to 19,823 square...

  18. Linking log quality with product performance

    D. W. Green; Robert Ross

    1997-01-01

    In the United States, log grading procedures use visual assessment of defects, in relation to the log scaling diameter, to estimate the yield of lumber that maybe expected from the log. This procedure was satisfactory when structural grades were based only on defect size and location. In recent years, however, structural products have increasingly been graded using a...

  19. Selective logging and its relation to deforestation

    Gregory P. Asner; Michael Keller; Marco Lentini; Frank Merry; Souza Jr. Carlos

    2009-01-01

    Selective logging is a major contributor to the social, economic, and ecological dynamics of Brazilian Amazonia. Logging activities have expanded from low-volume floodplain harvests in past centuries to high-volume operations today that take about 25 million m3 of wood from the forest each year. The most common high-impact conventional and often illegal logging...

  20. Pacific Rim log trade: determinants and trends.

    Donald F. Flora; Andrea L. Anderson; Wendy J. McGinnls

    1991-01-01

    Pacific Rim trade in softwood logs amounts to about $3 billion annually, of which the U.S. share is about $2 billion. Log exporting is a significant part of the forest economy in the Pacific Northwest. The 10 major Pacific Rim log-trading client and competitor countries differ widely in their roles in trade and in their policies affecting the industry.

  1. Well logging radioactive detector assembly

    Osburn, T.D.

    1992-01-01

    This patent describes a well logging instrument of the type having a radioactive logging sub having a sealed chamber and have a radioactive source for emitting radioactive energy into the well formation, the instrument having a radioactive energy detector for detecting gamma rays resulting from the emission of the radioactive energy into the well formation, and means for pressing the sub against the well of the well, an improved Dewar flask for the detector. It comprises: an inner housing formed of titanium and containing the detector; an outer housing formed of titanium, having a cylindrical side wall surrounding the inner housing and separated by a clearance which is evacuated, the outer housing being located within the sealed chamber in the sub of the instrument; a window section formed in the side wall of the outer housing adjacent the detector and on a side of the side wall closest to the wall of the well when the sub is pressed against the wall of the well; and wherein the inner housing has a cylindrical side wall that is of lesser wall thickness than the wall thickness of the side wall of the outer housing other than in the window section

  2. Improving Type Error Messages in OCaml

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  3. 78 FR 52166 - Quantitative Messaging Research

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  4. Effects of Text Messaging on Academic Performance

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  5. Message exchange in the building industry

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  6. Advanced Internet Protocols, Services, and Applications

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  7. Evolution of a C2 protocol gateway

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  8. Framing of health information messages.

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  9. Semi-automatic logarithmic converter of logs

    Gol'dman, Z.A.; Bondar's, V.V.

    1974-01-01

    Semi-automatic logarithmic converter of logging charts. An original semi-automatic converter was developed for use in converting BK resistance logging charts and the time interval, ΔT, of acoustic logs from a linear to a logarithmic scale with a specific ratio for subsequent combining of them with neutron-gamma logging charts in operative interpretation of logging materials by a normalization method. The converter can be used to increase productivity by giving curves different from those obtained in manual, pointwise processing. The equipment operates reliably and is simple in use. (author)

  10. Reactions to threatening health messages

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  11. A message to school girls.

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  12. Instant Messaging in Dental Education.

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  13. A Modular Instant Messaging System

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  14. A message-queuing framework for STAR's online monitoring and metadata collection

    Arkhipkin, D; Lauret, J; Betts, W

    2011-01-01

    We report our experience on migrating STARs Online Services (Run Control System, Data Acquisition System, Slow Control System and Subsystem Monitoring) from direct read/write database accesses to a modern non-blocking message-oriented infrastructure. Based on the Advanced Messaging Queuing Protocol (AMQP) and standards, this novel approach does not specify the message data structure, allowing great flexibility in its use. After careful consideration, we chose Google Protocol Buffers as our primary (de)serialization format for structured data exchange. This migration allows us to reduce the overall system complexity and greatly improve the reliability of the metadata collection and the performance of our online services in general. We will present this new framework through its software architecture overview, providing details about our staged and non-disruptive migration process as well as details of the implementation of pluggable components to provide future improvements without compromising stability and availability of services.

  15. A Universal Logging System for LHCb Online

    Nikolaidis, Fotis; Brarda, Loic; Garnier, Jean-Christophe; Neufeld, Niko

    2011-01-01

    A log is recording of system's activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. In large scale infrastructures, such as LHCb Online, where quite a few GB of logs are produced daily, it is impossible for a human to review all of these logs. Moreover, a great percentage of them as just n oise . That makes clear that a more automated and sophisticated approach is needed. In this paper, we present a low-cost centralized logging system which allow us to do in-depth analysis of every log.

  16. A neutron well logging system

    1980-01-01

    A pulsed neutron well logging system using a sealed off neutron generator tube is provided with a programmable digital neutron output control system. The control system monitors the target beam current and compares a function of this current with a pre-programmed control function to develop a control signal for the neutron generator. The control signal is used in a series regulator to control the average replenisher current of the neutron generator tube. The programmable digital control system of the invention also provides digital control signals as a function of time to provide ion source voltages. This arrangement may be utilized to control neutron pulses durations and repetition rates or to produce other modulated wave forms for intensity modulating the output of the neutron generator as a function of time. (Auth.)

  17. Decomposable log-linear models

    Eriksen, Poul Svante

    can be characterized by a structured set of conditional independencies between some variables given some other variables. We term the new model class decomposable log-linear models, which is illustrated to be a much richer class than decomposable graphical models.It covers a wide range of non...... The present paper considers discrete probability models with exact computational properties. In relation to contingency tables this means closed form expressions of the maksimum likelihood estimate and its distribution. The model class includes what is known as decomposable graphicalmodels, which......-hierarchical models, models with structural zeroes, models described by quasi independence and models for level merging. Also, they have a very natural interpretation as they may be formulated by a structured set of conditional independencies between two events given some other event. In relation to contingency...

  18. Well logging, atom and geology

    Serra, O.

    1994-01-01

    Well logging techniques exploit interactions of gamma photons and neutrons with atoms. Interactions of neutrons of different energies with atoms allow the detection and evaluation of the weight percentage of several elements composing the rocks (C, O, Si, Ca, Fe, S); spectrometry of gamma rays produced by thermal neutron absorption allows for the weight percentage determination of Si, Ca, Fe, S, Cl, H, Ti and Gd, etc. High resolution detectors (germanium doped by Li, at liquid nitrogen temperature) allow the recognition of more elements. Other techniques involving neutrons consist in determining the population in epithermal neutrons at a certain distance of the neutron source (measurement of the hydrogen index). By analyzing the intensity of the gamma flux produced by Compton scattering, the electronic and bulk densities of the rocks are measured. All these data lead to the detection and evaluation of ore deposits (uranium and potassium) and coal, and determination of the lithology, the main minerals composing the rocks, petrophysical properties... 1 fig

  19. A critical analysis of the X.400 model of message handling systems

    van Sinderen, Marten J.; Dorregeest, Evert

    1988-01-01

    The CCITT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CCITT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  20. Distributed parallel messaging for multiprocessor systems

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  1. Entity-based Classification of Twitter Messages

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  2. Message Oriented Communication For Ipv6 Enabled Pervasive Devices

    Tomasz Szydlo

    2013-01-01

    Full Text Available An increasing number of electronic devices in our environment is equipped with radio interfaces used for exposing and using their functionality by other devices and applications. Wireless communication in this class of devices is exposed to a number of situations that may occur including limited energy resources, equipment failures, nodes mobility and loss of communication between nodes. It causes that commonly used standards and protocols for sharing services are not practical and do not take into account the occurrence of these problems. The paper presents the concept of communication that relies on the exchange of messages between wireless pervasive devices available in the environment.

  3. Collocated Dataglyphs for large-message storage and retrieval

    Motwani, Rakhi C.; Breidenbach, Jeff A.; Black, John R.

    2004-06-01

    In contrast to the security and integrity of electronic files, printed documents are vulnerable to damage and forgery due to their physical nature. Researchers at Palo Alto Research Center utilize DataGlyph technology to render digital characteristics to printed documents, which provides them with the facility of tamper-proof authentication and damage resistance. This DataGlyph document is known as GlyphSeal. Limited DataGlyph carrying capacity per printed page restricted the application of this technology to a domain of graphically simple and small-sized single-paged documents. In this paper the authors design a protocol motivated by techniques from the networking domain and back-up strategies, which extends the GlyphSeal technology to larger-sized, graphically complex, multi-page documents. This protocol provides fragmentation, sequencing and data loss recovery. The Collocated DataGlyph Protocol renders large glyph messages onto multiple printed pages and recovers the glyph data from rescanned versions of the multi-page documents, even when pages are missing, reordered or damaged. The novelty of this protocol is the application of ideas from RAID to the domain of DataGlyphs. The current revision of this protocol is capable of generating at most 255 pages, if page recovery is desired and does not provide enough data density to store highly detailed images in a reasonable amount of page space.

  4. Guidelines for designing messages in risk communication

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  5. Improving the security of quantum protocols via commit-and-open

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  6. Instant Messaging for Creating Interactive and Collaborative m-Learning Environments

    James Kadirire

    2007-06-01

    Full Text Available 'Instant Messaging' (IM and 'Presence,' which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of time, a phenomena that also fosters a sense of "online community," that perhaps no other application has done previously (Alvestrand, 2002. This research looks at the use of mobile devices to send instant messages that can carry much more information than the short message service (SMS messages, but would be free to use, notwithstanding the price of getting online. We present a prototype IM system that can be used as a viable means of communicating and learning in higher education establishments. There is some evidence to show that learning using mobile devices reduces the formality of the learning experience, and helps engage reluctant learners and raise their self-confidence. In order for the learning process to be successful in online distance learning, unlike in the traditional face-to-face learning, attention must be paid to developing the participants' sense of community within their particular group. Instant messaging – or IM – is a natural medium for online community building and asynchronous/ synchronous peer discussions.

  7. Emulation of Industrial Control Field Device Protocols

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  8. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  9. Geomicrobial Optical Logging Detectors (GOLD)

    Bramall, N. E.; Stoker, C. R.; Price, P. B.; Coates, J. D.; Allamandola, L. J.; Mattioda, A. L.

    2008-12-01

    We will present concepts for downhole instrumentation that could be used in the Deep Underground Science and Engineering Laboratory (DUSEL). We envision optical borehole-logging instruments that could monitor bacterial concentration, mineralogy, aromatic organics, temperature and oxygen concentration, allowing for the in situ monitoring of time-dependent microbial and short-scale geologic processes and provide valuable in situ data on stratigraphy to supplement core analyses, especially where instances of missing or damaged core sections make such studies difficult. Incorporated into these instruments will be a sampling/inoculation tool to allow for the recovery and/or manipulation of particularly interesting sections of the borehole wall for further study, enabling a series of microbiological studies. The borehole tools we will develop revolve around key emerging technologies and methods, some of which are briefly described below: 1) Autofluorescence Spectroscopy: Building on past instruments, we will develop a new borehole logger that searches for microbial life and organics using fluorescence spectroscopy. Many important organic compounds (e.g. PAHs) and biomolecules (e.g. aromatic amino acids, proteins, methanogenic coenzymes) fluoresce when excited with ultraviolet and visible light. Through the careful selection of excitation wavelength(s) and temporal gating parameters, a borehole logging instrument can detect and differentiate between these different compounds and the mineral matrix in which they exist. 2) Raman Spectroscopy: Though less sensitive than fluorescence spectroscopy, Raman spectroscopy is more definitive: it can provide important mineral phase distribution/proportions and other chemical data enabling studies of mineralogy and microbe-mineral interactions (when combined with fluorescence). 3) Borehole Camera: Imaging of the borehole wall with extended information in the UV, visible, and NIR for a more informative view can provide a lot of insight

  10. Effects of Text Messaging on Academic Performance

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  11. California-Nevada uranium logging. Final report

    1981-04-01

    The purpose of this project was to obtain geophysical logs of industry drill holes to assess the uranium resource potential of geologic formations of interest. The work was part of the US Department of Energy's National Uranium Resource Evaluation (NURE) Program. The principal objective of the logging program was to determine radioelement grade of formations through natural gamma ray detectors. Supplementary information was obtained from resistivity (R), self-potential (SP), point resistance (RE), and neutron density (NN) logs for formation interpretation. Additional data for log interpretation was obtained from caliper logs, casing schedules, and downhole temperature. This data was obtained from well operators when available, with new logs obtained where not formerly available. This report contains a summary of the project and data obtained to date

  12. Effects of reduced-impact logging and forest physiognomy on bat populations of lowland Amazonian forest.

    Steven J. Presley; Michael R. Willig; Wunderle Jr. Joseph M.; Luis Nélio. Saldanha

    2008-01-01

    1.As human population size increases, demand for natural resources will increase. Logging pressure related to increasing demands continues to threaten remote areas of Amazonian forest. A harvest protocol is required to provide renewable timber resources that meet consumer needs while minimizing negative effects on biodiversity and ecosystem services. Reduced-impact...

  13. Pembangkitan Data dari Distribusi Log-logistik

    Aceng Komarudin Mutaqin

    2014-11-01

    Full Text Available Distribusi log-logistik merupakan salah satu distribusi yang dapat diaplikasikan untuk data mutu lingkungan. Makalah ini membahas pembangkitan data dari distribusi log-logistik mulai dari pembangunan algoritme sampai pembuatan program komputer pada perangkat lunak MATLAB. Metode pembangkitan datanya menggunakan metode inverse transform. Ada dua jenis data yang dibangkitkan, yaitu data lengkap dan data tersensor kiri. Dalam makalah ini diberikan contoh data yang dibangkitkan dari distribusi log-logistik.

  14. SNG-logs at the Bagsvaerd Lake

    Korsbech, U.

    1992-11-01

    Spectral Natural Gamma-logs (SNG) were taken in old boreholes around Bagsvaerd Lake (Zealand). The purpose of this investigation was to clarify the geologic/lithologic conditions in this region and the potential risks of waste penetration into ground water. Relationship curves for thorium, uranium and potassium concentrations are given. Some special logs which can be useful for evaluating concentration variations or transition forms among various lithological layers are collected. Appendices contain technical information on the boreholes and discussion of differences between results of SNG-logging and the conventional gamma-logging. (EG)

  15. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  16. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.

    Teing Yee Yang

    Full Text Available Instant messaging (IM has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.

  17. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies

    Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton

    2016-01-01

    Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files. PMID:26982207

  18. 32 CFR 700.846 - Status of logs.

    2010-07-01

    ... Officers Afloat § 700.846 Status of logs. The deck log, the engineering log, the compass record, the bearing hooks, the engineer's bell book, and any records generated by automated data logging equipment...

  19. The WLCG Messaging Service and its Future

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  20. Hand hygiene posters: motivators or mixed messages?

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  1. Message Scheduling and Forwarding in Congested DTNs

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  2. Diabetes education via mobile text messaging.

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  3. Message Scheduling and Forwarding in Congested DTNs

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  4. Large family of quantum weak coin-flipping protocols

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  5. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  6. Message Received: Virtual Ethnography in Online Message Boards

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  7. User-friendly matching protocol for online social networks

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  8. The Singapore protocol [for quantum cryptography

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  9. An efficient and reliable multi-hop geographical broadcast protocol in vehicular ad-hoc networks

    Rajendran, R.; Jongh, J. de

    2013-01-01

    In Intelligent Transportation Systems (ITS), disseminating warning messages in a timely and efficient way through wireless short-range communications can save many lives and reduce traffic congestion. A geographical broadcast protocol provides data delivery to specified geographical areas, using

  10. Message framing in social networking sites.

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  11. Evaluation of Sexual Communication Message Strategies

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  12. Remote control of data acquisition devices by means of message oriented middleware

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I.

    2007-01-01

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized

  13. Remote control of data acquisition devices by means of message oriented middleware

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)], E-mail: edi.sanchez@ciemat.es; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)

    2007-10-15

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized.

  14. Influence of borehole-eccentred tools on wireline and logging-while-drilling sonic logging measurements

    Pardo, David; Matuszyk, Paweł Jerzy; Torres-Verdí n, Carlos; Mora Cordova, Angel; Muga, Ignacio; Calo, Victor M.

    2013-01-01

    We describe a numerical study to quantify the influence of tool-eccentricity on wireline (WL) and logging-while-drilling (LWD) sonic logging measurements. Simulations are performed with a height-polynomial-adaptive (hp) Fourier finite-element method

  15. Log canonical thresholds of smooth Fano threefolds

    Cheltsov, Ivan A; Shramov, Konstantin A

    2008-01-01

    The complex singularity exponent is a local invariant of a holomorphic function determined by the integrability of fractional powers of the function. The log canonical thresholds of effective Q-divisors on normal algebraic varieties are algebraic counterparts of complex singularity exponents. For a Fano variety, these invariants have global analogues. In the former case, it is the so-called α-invariant of Tian; in the latter case, it is the global log canonical threshold of the Fano variety, which is the infimum of log canonical thresholds of all effective Q-divisors numerically equivalent to the anticanonical divisor. An appendix to this paper contains a proof that the global log canonical threshold of a smooth Fano variety coincides with its α-invariant of Tian. The purpose of the paper is to compute the global log canonical thresholds of smooth Fano threefolds (altogether, there are 105 deformation families of such threefolds). The global log canonical thresholds are computed for every smooth threefold in 64 deformation families, and the global log canonical thresholds are computed for a general threefold in 20 deformation families. Some bounds for the global log canonical thresholds are computed for 14 deformation families. Appendix A is due to J.-P. Demailly.

  16. Aggregation of log-linear risks

    Embrechts, Paul; Hashorva, Enkeleijd; Mikosch, Thomas Valentin

    2014-01-01

    In this paper we work in the framework of a k-dimensional vector of log-linear risks. Under weak conditions on the marginal tails and the dependence structure of a vector of positive risks, we derive the asymptotic tail behaviour of the aggregated risk {and present} an application concerning log...

  17. Synthetic rope applications in Appalachian logging

    Ben D. Spong; Jingxin Wang

    2008-01-01

    New ultra-high molecular weight polyethylene rope has shown good results as a replacement for wire rope in logging applications in the western United States. A single case study trial was performed in Appalachian forest conditions to assess the appropriateness of this technology for hardwood logging applications. The study focused on use of the rope in West Virginia...

  18. Palm distributions for log Gaussian Cox processes

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus

    This paper reviews useful results related to Palm distributions of spatial point processes and provides a new result regarding the characterization of Palm distributions for the class of log Gaussian Cox processes. This result is used to study functional summary statistics for a log Gaussian Cox...

  19. Log-binomial models: exploring failed convergence.

    Williamson, Tyler; Eliasziw, Misha; Fick, Gordon Hilton

    2013-12-13

    Relative risk is a summary metric that is commonly used in epidemiological investigations. Increasingly, epidemiologists are using log-binomial models to study the impact of a set of predictor variables on a single binary outcome, as they naturally offer relative risks. However, standard statistical software may report failed convergence when attempting to fit log-binomial models in certain settings. The methods that have been proposed in the literature for dealing with failed convergence use approximate solutions to avoid the issue. This research looks directly at the log-likelihood function for the simplest log-binomial model where failed convergence has been observed, a model with a single linear predictor with three levels. The possible causes of failed convergence are explored and potential solutions are presented for some cases. Among the principal causes is a failure of the fitting algorithm to converge despite the log-likelihood function having a single finite maximum. Despite these limitations, log-binomial models are a viable option for epidemiologists wishing to describe the relationship between a set of predictors and a binary outcome where relative risk is the desired summary measure. Epidemiologists are encouraged to continue to use log-binomial models and advocate for improvements to the fitting algorithms to promote the widespread use of log-binomial models.

  20. The nuclear magnetic resonance well logging

    Zhang Yumin; Shen Huitang

    2003-01-01

    In this paper, the characteristic of the nuclear magnetic resonance logging is described at first. Then its development and its principle is presented. Compared with the nuclear magnetic resonance spectrometer, the magnet techniques is the first question that we must solve in the manufacture of the NMR well logging

  1. A semantic perspective on query log analysis

    Hofmann, K.; de Rijke, M.; Huurnink, B.; Meij, E.

    2009-01-01

    We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information

  2. Utilization and cost for animal logging operations

    Suraj P. Shrestha; Bobby L. Lanford

    2001-01-01

    Forest harvesting with animals is a labor-intensive operation. Due to the development of efficient machines and high volume demands from the forest products industry, mechanization of logging developed very fast, leaving behind the traditional horse and mule logging. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically...

  3. Data logging system upgrade for Indus accelerator

    Mishra, R.; Merh, B.N.; Agrawal, R.K.; Fatnani, P.; Navathe, C.P.; Pal, S.

    2012-01-01

    An accelerator has various subsystems like Magnet Power Supply, Beam Diagnostics and Vacuum etc. which are required to work in a stable manner to ensure required machine performance. Logging of system parameters at a faster rate plays a crucial role in analysing and understanding machine behaviour. Logging all the machine parameters consistently at the rate of typically more than 1 Hz has been the aim of a recent data logging system upgrade. Nearly ten thousand parameters are being logged at varying intervals of one second to one minute in Indus accelerator complex. The present logging scheme is augmented to log all these parameters at a rate equal to or more than 1 Hz. The database schema is designed according to the data type of the parameter. The data is distributed into historical table and intermediate table which comprises of recent data. Machine control applications read the parameter values from the control system and store them into the text files of finite time duration for each sub-system. The logging application of each sub-system passes these text files to database for bulk insertion. The detail design of database, logging scheme and its architecture is presented in the paper. (author)

  4. Impacts of extended working hours in logging

    Dana Mitchell; Tom Gallagher

    2008-01-01

    Last year at the 2007 AIM in Minneapolis, MN, the authors presented the human factors impacts to consider when implementing extended working hours in the logging industry. In a continuation of this project, we have researched existing literature to identify possible actions that logging business owners can take to reduce the impact of extended working hours on their...

  5. Neutron logging reliability techniques and apparatus

    Johnstone, C.W.

    1978-01-01

    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data

  6. Neutron logging reliability techniques and apparatus

    Johnstone, C.W.

    1974-01-01

    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data. (author)

  7. Logging methods and peeling of Aspen

    T. Schantz-Hansen

    1948-01-01

    The logging of forest products is influenced by many factors, including the size of the trees, density of the stand, the soundness of the trees, size of the area logged, topography and soil, weather conditions, the degree of utilization, the skill of the logger and the equipment used, the distance from market, etc. Each of these factors influences not only the method...

  8. Log Analysis Using Splunk Hadoop Connect

    2017-06-01

    23 A. INPUT SELECTION ...Conversion Resource Consumption .............................................. 28 Figure 8. Distribution of Events in Years...running a logging service puts a performance tax on the system and may cause the degradation of performance. More thorough 8 logging will cause a

  9. Grading sugar pine saw logs in trees.

    John W. Henley

    1972-01-01

    Small limbs and small overgrown limbs cause problems when grading saw logs in sugar pine trees. Surface characteristics and lumber recovery information for 426 logs from 64 sugar pine trees were examined. Resulting modifications in the grading specification that allow a grader to ignore small limbs and small limb indicators do not appear to decrease the performance of...

  10. Analysis of RIA standard curve by log-logistic and cubic log-logit models

    Yamada, Hideo; Kuroda, Akira; Yatabe, Tami; Inaba, Taeko; Chiba, Kazuo

    1981-01-01

    In order to improve goodness-of-fit in RIA standard analysis, programs for computing log-logistic and cubic log-logit were written in BASIC using personal computer P-6060 (Olivetti). Iterative least square method of Taylor series was applied for non-linear estimation of logistic and log-logistic. Hear ''log-logistic'' represents Y = (a - d)/(1 + (log(X)/c)sup(b)) + d As weights either 1, 1/var(Y) or 1/σ 2 were used in logistic or log-logistic and either Y 2 (1 - Y) 2 , Y 2 (1 - Y) 2 /var(Y), or Y 2 (1 - Y) 2 /σ 2 were used in quadratic or cubic log-logit. The term var(Y) represents squares of pure error and σ 2 represents estimated variance calculated using a following equation log(σ 2 + 1) = log(A) + J log(y). As indicators for goodness-of-fit, MSL/S sub(e)sup(2), CMD% and WRV (see text) were used. Better regression was obtained in case of alpha-fetoprotein by log-logistic than by logistic. Cortisol standard curve was much better fitted with cubic log-logit than quadratic log-logit. Predicted precision of AFP standard curve was below 5% in log-logistic in stead of 8% in logistic analysis. Predicted precision obtained using cubic log-logit was about five times lower than that with quadratic log-logit. Importance of selecting good models in RIA data processing was stressed in conjunction with intrinsic precision of radioimmunoassay system indicated by predicted precision. (author)

  11. Model wells for nuclear well logging

    Tittle, C.W.

    1989-01-01

    Considerations needed in the design and construction of model wells for nuclear log calibration are covered, with special attention to neutron porosity logging and total γ-ray logging. Pulsed neutron decay-time and spectral γ-ray logging are discussed briefly. The American Petroleum Institute calibration facility for nuclear logs is a good starting point for similar or expanded facilities. A few of its shortcomings are mentioned; they are minor. The problem of fluid saturation is emphasized. Attention is given to models made of consolidated rock and those containing unconsolidated material such as Ottawa sand. Needed precautions are listed. A similarity method is presented for estimating the porosity index of formations that are not fully saturated. (author)

  12. Processing of gamma-ray spectrometric logs

    Umiastowski, K.; Dumesnil, P.

    1984-10-01

    CEA (Commissariat a l'Energie Atomique) has developped a gamma-ray spectrometric tool, containing an analog-to-digital converter. This new tool permits to perform very precise uranium logs (natural gamma-ray spectrometry), neutron activation logs and litho-density logs (gamma-gamma spectrometric logs). Specific processing methods were developped to treate the particular problems of down-hole gamma-ray spectrometry. Extraction of the characteristic gamma-ray peak, even if they are superposed on the background radiation of very high intensity, is possible. This processing methode enables also to obtain geological informations contained in the continuous background of the spectrum. Computer programs are written in high level language for SIRIUS (VICTOR) and APOLLO computers. Exemples of uranium and neutron activation logs treatment are presented [fr

  13. Key technologies of the server monitor and control system based on GSM short messages

    Chen Taiwei; Zhou Zhenliu; Liu Baoxu

    2007-01-01

    The network management based on SNMP protocol cannot effectively monitor and control application-system states and key-process states on the computer server. Furthermore, it needs the administrator's longtime surveillance. When the administrator leaves the computer, he can't receive the malfunction message in time. In this paper we present a server monitor and control system based on monitor agents and GSM short messages, introduce the key technology to realize it, and implement a model system in the real network environment. (authors)

  14. Immunochemical protocols

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  15. LOG2MARKUP: State module to transform a Stata text log into a markup document

    2016-01-01

    log2markup extract parts of the text version from the Stata log command and transform the logfile into a markup based document with the same name, but with extension markup (or otherwise specified in option extension) instead of log. The author usually uses markdown for writing documents. However...

  16. Processing well logging data, for example for verification and calibration of well logs

    Suau, J.; Boutemy, Y.

    1981-01-01

    A method is described of machine processing well logging data derived from borehole exploring devices which investigate earth formations traversed by boreholes. The method can be used for verifying and recalibrating logs, reconstructing missing logs and combining the data to form a statistical model of the traversed earth formations. (U.K.)

  17. Expectancy Theory in Media and Message Selection.

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  18. Should We Ban Instant Messaging In School?

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  19. 78 FR 64202 - Quantitative Messaging Research

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  20. Undergraduates' Text Messaging Language and Literacy Skills

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  1. Arbitrated quantum signature scheme with message recovery

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  2. Messages about Sexuality: An Ecological Perspective

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  3. Suspecting Neurological Dysfunction From E Mail Messages ...

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  4. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  5. The WLCG Messaging Service and its Future

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  6. AMS: Area Message Service for SLC

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  7. Factors influencing message dissemination through social media

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  8. Hand hygiene posters: selling the message.

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  9. Logística del transporte

    Robusté Antón, Francesc

    2005-01-01

    La logística se ha conformado como un proceso estratégico para organizar las actividades de producción y de distribución de las empresas. El concepto de sistema logístico ha incluido un amplio espectro de operaciones que condicionan la eficiencia y la competitividad empresarial en el actual contexto de globalización de la economía. En este sentido, este libro afronta y analiza los distintos aspectos que inciden en los procesos de planificación y gestión de los procesos logísticos relacionados...

  10. Supply of Rubber Wood Log in Malaysia

    Noraida, A. W.; Abdul-Rahim, A. S.

    2014-01-01

    Issue on shortage of raw material for wood processing solved by discovery of rubber wood log as one of the substitutes the natural log. This paper examines the supply of rubber wood log in Malaysia. We employ ARDL Bound Approach Test and time series data from 1980 to 2010 which represented the whole Malaysia are used to achieve the established objectives. The result shown, in the long run harvested area and wages have 1% and 10% significant level respectively. While in the short run, there wa...

  11. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  12. Do Fitness Apps Need Text Reminders? An Experiment Testing Goal-Setting Text Message Reminders to Promote Self-Monitoring.

    Liu, Shuang; Willoughby, Jessica F

    2018-01-01

    Fitness tracking apps have the potential to change unhealthy lifestyles, but users' lack of compliance is an issue. The current intervention examined the effectiveness of using goal-setting theory-based text message reminders to promote tracking activities on fitness apps. We conducted a 2-week experiment with pre- and post-tests with young adults (n = 50). Participants were randomly assigned to two groups-a goal-setting text message reminder group and a generic text message reminder group. Participants were asked to use a fitness tracking app to log physical activity and diet for the duration of the study. Participants who received goal-setting reminders logged significantly more physical activities than those who only received generic reminders. Further, participants who received goal-setting reminders liked the messages and showed significantly increased self-efficacy, awareness of personal goals, motivation, and intention to use the app. The study shows that incorporating goal-setting theory-based text message reminders can be useful to boost user compliance with self-monitoring fitness apps by reinforcing users' personal goals and enhancing cognitive factors associated with health behavior change.

  13. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  14. Drilling and logging in uranium exploration

    Anon.

    1976-01-01

    The report reviews drilling and logging practices in exploration of uranium ores and summarizes the papers presented in the panel meeting. Recommendations for further research and development are given

  15. Neutron logging reliability techniques and apparatus

    Johnstone, C.W.

    1975-01-01

    Apparatus and methods for verifying the validity of data derived at least in part by neutron logging of earth formations, and, where indicated, for affording neutron diffusion-corrected values of such data, are disclosed. (WHK)

  16. Nuclear log interpretation by first principle

    Oelgaard, P.L.

    1988-07-01

    A weakness connected to the present interpretation of nuclear borehole logs is that the interdependence of the various logs and physical effects of importance for the tools are not always taken into account in a correct way. Therefore a new approach to the interpretation of nuclear borehole logs is considered. It is based on the logs obtained with the natural gamma, the neutron porosity, the gamma density, and the pulsed neutron tools. For each of these tools a model, taking into account the important physical effects, is established. These models are incorporated into a computer programme which from the tool signals calculates, by use of iteration, a consistent set of the corresponding formation properties. In the paper the models developed for the four tools and the interpretation programme are briefly described. An example of the use of the interpretation programme is given and compared with a conventional interpretation. (author)

  17. LATTE - Log and Time Tracking for Elections

    Office of Personnel Management — LATTE - Log and Time Tracking for Elections is a time tracking and voucher preparation system used to schedule employees to cover elections, to document their time...

  18. Well Logging Equipment Updated in China

    Xu Lili

    1996-01-01

    @@ As one of the ten principal disciplines in the petroleum industry, well logging has been developed for about 55years in China and is playing an increasingly important role in the country's oil and gas exploration and development.

  19. Text messages as a learning tool for midwives | Woods | South ...

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  20. Conversation Threads Hidden within Email Server Logs

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  1. Nuclear borehole logging for oil exploration

    Oelgaard, P.L.

    1989-01-01

    Reactor physics can be applied to the logging of boreholes for the exploration of oil and gas and the results obtained can be interpreted more correctly by use of reactor physics models, e.g. one-dimensional multi-group diffusion theory adapted for gamma quanta. The standard nuclear logging tools are: natural gamma, gamma density, neutron porosity and the pulsed-neutron tool. The models and interpretation procedures are discussed. 1 fig

  2. Geophysical logging of the Harwell boreholes

    Brightman, M.A.

    1983-08-01

    A comprehensive geophysical borehole logging survey was carried out on each of three deep boreholes drilled at the Harwell research site. KOALA and PETRA computer programs were used to analyse and interpret the logs to obtain continuous quantitative estimates of the geological and hydrogeological properties of the sequences penetrated at the Harwell site. Quantitative estimates of the mineral composition and porosity of the cores samples were made. (UK)

  3. Defect core detection in radiata pine logs

    Wallace, G.

    1993-01-01

    Internal defect cores in Pinus radiata logs arise primarily from the practice in New Zealand of pruning trees to increase the amount of clear wood. Realising the benefits of this practice when milling the logs is hampered by the lack of a practical method for detecting the defect cores. This report attempts to establish industry requirements for detections and examine techniques which may be suitable. Some trials of a novel technique are described. (author) 19 refs.; 11 figs

  4. A Message Without a Code?

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  5. Design and Implementation of BDS RTCM SSR Message

    Xiao, Xia; Cheng, Fang; Liu, Feng; Lu, XiaoChun

    2017-09-01

    Based on the real-time differential positioning system of Beidou wide area, a set of Beidou high-precision differential information transmission protocol is studied and designed. After the system generates satellite precise orbit and clock difference products, it needs to be sent to the users in a certain data format through C band GEO communication satellite. The transport protocol should be designed according to the data volume and update rate of the system. At the same time, it is necessary to combine the signal system, satellite resources and the restriction and restriction of the receiver implementation technology. It refers to the relevant fields and international similar systems of technology and standards to design. This paper establishes a set of technical indicators which can measure the pros and cons of differential message organization and broadcasting strategy. Through modeling, simulation and actual test, this paper makes a comprehensive comparison of different strategies. Finally, a transmission protocol design scheme which has good performance and meets the system service requirements is presented.

  6. Message Passing Framework for Globally Interconnected Clusters

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  7. Improved Message Authentication and Confidentiality Checking

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  8. Modeling Precipitation Extremes using Log-Histospline

    Huang, W. K.; Nychka, D. W.; Zhang, H.

    2017-12-01

    One of the commonly used approaches to modeling univariate extremes is the peaks-overthreshold (POT) method. The POT method models exceedances over a (sufficiently high/low) threshold as a generalized Pareto distribution (GPD). To apply this method, a threshold has to be chosen and the estimates might be sensitive to the chosen threshold. Here we propose an alternative, the "Log-Histospline", to explore modeling the tail behavior and the remainder of the density in one step using the full range of the data. Log-Histospline applies a smoothing spline model on a finely binned histogram of the log transformed data to estimate its log density. By construction, we are able to preserve the polynomial upper tail behavior, a feature commonly observed in geophysical observations. The Log-Histospline can be extended to the spatial setting by treating the marginal (log) density at each location as spatially indexed functional data, and perform a dimension reduction and spatial smoothing. We illustrate the proposed method by analyzing precipitation data from regional climate model output (North American Regional Climate Change and Assessment Program (NARCCAP)).

  9. Families of quantum fingerprinting protocols

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  10. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  11. Evaluation of Sexual Communication Message Strategies

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  12. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  13. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  14. Study protocol

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  15. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

    Seedorf, Jan; Beckers, Kristian; Huici, Felipe

    The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.

  16. La logística integral como ventaja competitiva y sistema logístico

    Mario Anselmo Martínez gallardo

    2013-07-01

    Full Text Available Esta investigación analiza la logística integral como una ventaja competitiva y el sistema logístico. Es opinión de los autores que la logística integral es esencial para el intercambio de mercancías, toda vez que reduce costos y hace más ágil la actividad comercial. La utilización de esta logística representa una ventaja competitiva con respecto de otras empresas por la optimización del capital y ahorro de tiempo.

  17. Message passing for quantified Boolean formulas

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  18. Anxiety, Construct Differentiation, and Message Production.

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  19. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  20. Photometric requirements for portable changeable message signs.

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  1. Wyoming CV Pilot Traveler Information Message Sample

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  2. Getting the message across: age differences in the positive and negative framing of health care messages.

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  3. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  4. Protocol of networks using energy sharing collisions of bright solitons

    Equations (13a) and (13b) can be satisfied by choosing αk as .... (right) configurations of the two-soliton solution in the Manakov-type system on PSG. .... receivers of messages, the present phase change can be used as protocols of network.

  5. dynamic-threshold-limited timed-token (dtltt) protocol

    2013-03-01

    Mar 1, 2013 ... Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous traffic in ... Keywords: multi-access, multiservice, network, synchronous, asynchronous, traffic, timed-token. 1. Introduction .... Messages generated in the system at run time may be classified as ...

  6. Security Protocol Verification and Optimization by Epistemic Model Checking

    2010-11-05

    Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the

  7. Message-driven factors influencing opening and forwarding of mobile advertising messages

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  8. When message-frame fits salient cultural-frame, messages feel more persuasive

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  9. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  10. Well logging with natural gamma radiation

    Ellis, D.V.

    1983-01-01

    An invention is described for use in natural gamma radiation well logging in which measurements taken in a borehole are used in the search for valuable underground resources such as oil or gas. The invention comprises deriving a log of natural gamma radiation detected in selected energy windows for a selected borehole depth interval and converting it into a log of the selected subsurface materials, e.g. Th, U, K. This log is corrected for the effects of 1) either a gamma ray emitter in the borehole fluid, e.g. potassium salts and/or 2) a gamma ray attenuator in the borehole fluid, e.g. a strong attenuator such as barite and/or hematite. The Th, U, K log is particularly useful in the exploration of oil and gas resources since the Th, U, K concentrations are a good indication as to the presence, type and volume of shale and clay in the formations surrounding the borehole. (U.K.)

  11. AML (Advanced Mud Logging: First Among Equals

    T. Loermans

    2017-09-01

    Full Text Available During the past ten years an enormous development in mud logging technology has been made. Traditional mud logging was only qualitative in nature, and mudlogs could not be used for the petrophysical well evaluations which form the basis for all subsequent activities on wells and fields. AML however can provide quantitative information, logs with a reliability, trueness and precision like LWD and WLL. Hence for well evaluation programmes there are now three different logging methods available, each with its own pros and cons on specific aspects: AML, LWD and WLL. The largest improvements have been made in mud gas analysis and elemental analysis of cuttings. Mud gas analysis can yield hydrocarbon fluid composition for some components with a quality like PVT analysis, hence not only revolutionising the sampling programme so far done with only LWD/WLL, but also making it possible to geosteer on fluid properties. Elemental analysis of cuttings, e.g. with XRF, with an ability well beyond the capabilities of the spectroscopy measurements possible earlier with LWD/WLL tools, is opening up improved ways to evaluate formations, especially of course where the traditional methods are falling short of requirements, such as in unconventional reservoirs. An overview and specific examples of these AML logs is given, from which it may be concluded that AML now ought to be considered as “first among its equals”.

  12. Two-step quantum direct communication protocol using the Einstein- Podolsky-Rosen pair block

    Fu Guo Deng; Xiao Shu Liu; 10.1103/PhysRevA.68.042317

    2003-01-01

    A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed. A set of ordered N EPR pairs is used as a data block for sending secret message directly. The ordered N EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender Alice encodes the secret message directly on the message-coding sequence and sends them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel. (30 refs).

  13. Improving Type Error Messages in OCaml

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  14. Recent computer attacks via Instant Messaging

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  15. Gender messages in contemporary popular Malay songs

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  16. Quantum signature scheme for known quantum messages

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  17. End-to-end Configuration of Wireless Realtime Communication over Heterogeneous Protocols

    Malinowsky, B.; Grønbæk, Jesper; Schwefel, Hans-Peter

    2015-01-01

    This paper describes a wireless real-time communication system design using two Time Division Multiple Access (TDMA) protocols. Messages are subject to prioritization and queuing. For this interoperation scenario, we show a method for end-to-end configuration of protocols and queue sizes. Such co...

  18. Pulsed neutron logging - a modern approach to petroleum exploration

    Navalkar, M.P.

    1978-01-01

    As hydrocarbons have strikingly different properties for neutrons as compared with rocks, neutronic methods are useful to prepare logs of bore holes drilled for petroleum exploration. The earlier neutron logs were based on steady neutron sources, but the superior logs, namely, neutron life time log and neutron induced spectral log are based on pulsed neutron sources. The methods of obtaining these logs, their limitations and the field equipment required are described briefly. As the two logs are complementary, a plea has been made to develop field equipment which can obtain two logs in a single run. (M.G.B.)

  19. Beyond protocols

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  20. Fracture diagnostics with tube wave reflection logs

    Medlin, W.L.

    1991-01-01

    This paper reports on the Tube Wave Reflection Log (TWRL) which is acoustic logging method which provides information about the height, location and conductivity of hydraulically induced fractures behind perforated casing. The TWRL tool consists of a transmitter and closely spaced receiver. The transmitter is driven with a short, low frequency tone burst to generate long wavelength tube waves which are little attenuated in unperforated casing. They are partially reflected when they pass perforated intervals communicating with a hydraulically induced fracture. The tool listens for such reflections for 0.1 seconds following each excitation burst. As the tool is moved uphole at logging speed, the transmitter is excited at each foot of depth. VDL displays of the TWRL records provide reflection traces whose projections define the uppermost and lower-most perforations communicating with the fracture. The strength of the reflections depends on the ease of fluid flow into the fracture and thus, is an indicator of fracture conductivity

  1. Smartphone log data in a qualitative perspective

    Ørmen, Jacob; Thorhauge, Anne Mette

    2015-01-01

    into studies of smartphones in everyday life. Through an illustrative study, we explore a more nuanced perspective on what can be considered “log data” and how these types of data can be collected and analysed. A qualitative approach to log data analysis offers researchers new opportunities to situate......Log data from smartphones have primarily been used in large-scale research designs to draw statistical inferences from hundreds or even thousands of participants. In this article, we argue that more qualitatively oriented designs can also benefit greatly from integrating these rich data sources...... serve as cues to instigate discussion and reflection as well as act as resources for contextualizing and organizing related empirical material. In the discussion, the advantages of a qualitative perspective for research designs are assessed in relation to issues of validity. Further perspectives...

  2. Improving the security of a quantum secret sharing protocol between multiparty and multiparty without entanglement

    Han Lianfang; Liu Yimin; Shi Shouhua; Zhang Zhanjun

    2007-01-01

    Recently Yan and Gao [F.L. Yan, T. Gao, Phys. Rev. A 72 (2005) 012304] have proposed a quantum secret sharing protocol which allows a secret message to be shared between one group of m parties and another group of n parties. The protocol is claimed to be secure. In this Letter, first we show that any subgroup consisting of evil cooperative parties (or one and only one evil party) can successfully cheat other parties to obtain the secret message without being detected. Then we improve the original Yan-Gao protocol such that the insider's cheats are prevented

  3. The ICRP message;Le message de la CIPR

    Ortiz Lopez, P. [Groupe de travail de la CIPR sur la prevention des expositions accidentelles liees a l' utilisation des nouvelles technologies de Radiotherapie par Faisceau Externe, Madrid (Spain)

    2009-12-15

    The ICRP gives its recommendations in the case of use of new technologies in radiotherapy: lessons learned from conventional technologies and also applicable to the new ones. Training, and specialization of the personnel as well as the need in personnel must be evaluated again. Managers of a radiotherapy service should bear in mind that the work environment must focus on concentration and avoid the risk of inattention. Manufacturers, for their part must provide reliable equipment with correct calibration files and documentation. the acquisition and implementation programs must focus not only on devices for treatment but also on treatment planning systems, computer systems and imaging devices used in radiation therapy, software, procedures and whole clinical process. The devices and procedures need to be re-classified after any changes to hardware, including upgrades and updates of software. The dosimetry protocols must be developed specially for the low doses irradiations and non standard irradiations. To increase the dose without increasing a probability of complication in sane tissues it is necessary to use a conformal therapy with a positioning of the patient. Communication is essential, especially concerning the activities of maintenance and repair that must ne notified to the physicists. In the same way, procedures of failures management in the computer systems must be implemented in order to avoid a loss of data susceptible to lead to serious accidental irradiations. The return of experience can be an help and then must be integrated in personnel training that is encouraged to share the experience in matter of incidents by providing information in a data base such the R.O.S.I.S. data base (radiation oncology safety information system). Before introducing new technologies it is recommended to realize probabilistic safety evaluations in order to develop quality assurance programmes integrating risk factors as, by example the analysis of failure modes and

  4. Automatic Generation of Network Protocol Gateways

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  5. Financial feasibility of a log sort yard handling small-diameter logs: A preliminary study

    Han-Sup Han; E. M. (Ted) Bilek; John (Rusty) Dramm; Dan Loeffler; Dave Calkin

    2011-01-01

    The value and use of the trees removed in fuel reduction thinning and restoration treatments could be enhanced if the wood were effectively evaluated and sorted for quality and highest value before delivery to the next manufacturing destination. This article summarizes a preliminary financial feasibility analysis of a log sort yard that would serve as a log market to...

  6. A hazard-independent approach for the standardised multi-channel dissemination of warning messages

    Esbri Palomares, M. A.; Hammitzsch, M.; Lendholt, M.

    2012-04-01

    The tsunami disaster affecting the Indian Ocean region on Christmas 2004 demonstrated very clearly the shortcomings in tsunami detection, public warning processes as well as intergovernmental warning message exchange in the Indian Ocean region. In that regard, early warning systems require that the dissemination of early warning messages has to be executed in way that ensures that the message delivery is timely; the message content is understandable, usable and accurate. To that end, diverse and multiple dissemination channels must be used to increase the chance of the messages reaching all affected persons in a hazard scenario. In addition to this, usage of internationally accepted standards for the warning dissemination such as the Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) Distribution Element specified by the Organization for the Advancement of Structured Information Standards (OASIS) increase the interoperability among different warning systems enabling thus the concept of system-of-systems proposed by GEOSS. The project Distant Early Warning System (DEWS), co-funded by the European Commission under the 6th Framework Programme, aims at strengthening the early warning capacities by building an innovative generation of interoperable tsunami early warning systems based on the above mentioned concepts following a Service-oriented Architecture (SOA) approach. The project focuses on the downstream part of the hazard information processing where customized, user-tailored warning messages and alerts flow from the warning centre to the responsible authorities and/or the public with their different needs and responsibilities. The information logistics services within DEWS generate tailored EDXL-DE/CAP warning messages for each user that must receive the message according to their preferences, e.g., settings for language, interested areas, dissemination channels, etc.. However, the significant difference in the implementation and

  7. Geothermal well log interpretation midterm report

    Sanyal, S.K.; Wells, L.E.; Bickham, R.E.

    1979-02-01

    Reservoir types are defined according to fluid phase and temperature, lithology, geologic province, pore geometry, and salinity and fluid chemistry. Improvements are needed in lithology and porosity definition, fracture detection, and thermal evaluation for more accurate interpretation. Further efforts are directed toward improving diagnostic techniques for relating rock characteristics and log response, developing petrophysical models for geothermal systems, and developing thermal evaluation techniques. The Geothermal Well Log Interpretation study and report has concentrated only on hydrothermal geothermal reservoirs. Other geothermal reservoirs (hot dry rock, geopressured, etc.) are not considered.

  8. New portable neutron generator for well logging

    Chicanov, A.E.; Gromov, E. V.; Gulko, V. M.; Izmailov, A. V.

    1994-01-01

    The information about the design, investigation and testing of new well neutron generator for the pulse neutron logging (PNL) is given in this paper. The main physical characteristics of new PNL apparatus are: Neutron flux 2.10 sup 8 n/s ; Pulse frequency>=400 Hz; Diameter= 90 mm; Logging velocity >200 m/h; Number of probes = 2; Resource > 300 h. The generator were provided by gas-filled neutron accelerative tube named NTF-2. The perspective of application and optimization shown PNL apparatus are considered. (author)

  9. Analyzing Log Files using Data-Mining

    Marius Mihut

    2008-01-01

    Full Text Available Information systems (i.e. servers, applications and communication devices create a large amount of monitoring data that are saved as log files. For analyzing them, a data-mining approach is helpful. This article presents the steps which are necessary for creating an ‘analyzing instrument’, based on an open source software called Waikato Environment for Knowledge Analysis (Weka [1]. For exemplification, a system log file created by a Windows-based operating system, is used as input file.

  10. Kaizen aplicado à logística

    Santos, Ana Catarina Almeida

    2011-01-01

    O presente trabalho propõe alcançar um aumento de produtividade e consequente redução de custos e desperdícios ajudando o departamento logístico da Empresa Revigrés – Industria de Revestimentos de Grés, Lda, a tornar-se mais eficiente, através da aplicação da filosofia kaizen que propõe melhorias no desempenho por implementação de pequenas ações. O objetivo deste projeto é a melhoria do departamento logístico globalmente, para isso houve o recurso a pesquisas e levantamento ...

  11. Geophysical borehole logging test procedure: Final draft

    1986-09-01

    The purpose of geophysical borehole logging from the At-Depth Facility (ADF) is to provide information which will assist in characterizing the site geologic conditions and in classifying the engineering characteristics of the rock mass in the vicinity of the ADF. The direct goals of borehole logging include identification of lithologic units and their correlation from hole to hole, identification of fractured or otherwise porous or permeable zones, quantitative or semi-quantitative estimation of various formation properties, and evaluation of factors such as the borehole diameter and orientation. 11 figs., 4 tabs

  12. CS model coil experimental log book

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  13. Perfil logístico de Colombia

    Cardozo Maglioni, María Victoria; Lozano Suarez, María Goretty

    2012-01-01

    El presente documento ofrece un estudio del perfil logístico de Colombia con la finalidad de dar a conocer el estado de arte de las ciudades, puertos e infraestructura principal para facilitar la toma de decisiones de los empresarios. Para el desarrollo de este trabajo se determinaron a partir de un análisis competitivo del país; las principales ciudades y puertos; logrando establecer un inventario de maquinaria y equipo e infraestructura logística; enmarcados en retos ya establecidos en las ...

  14. Well logging instrumental and methodological research

    Andrassy, L.; Barath, I.; Dorko, R.

    1983-01-01

    This part of the Annual Report of the Roland Eoetvoes Geophysical Institute (ELGI) of Hungary for 1982, summarizes the well logging instrumental and methodological researches of ELGI. The theoretical neutron diffusion fluxes for black and brown coals of Hungarian mines were calculated. A coal probe was developed and tested in boreholes using computerized data processing and interpretation. An X-ray radiometric method was used for the determination of Cu and Fe contents of minerals. Researches in the field of magnetic susceptibility and induced polarization logging are also summarized. A rapid analyzer for bauxite mining and a photorecorder for petroleum industry were developed by ELGI. (D.Gy.)

  15. Mobile Message Services Using Text, Audio or Video for Improving the Learning Infrastructure in Higher Education

    Björn Olof Hedin

    2006-06-01

    Full Text Available This study examines how media files sent to mobile phones can be used to improve education at universities, and describes a prototype implement of such a system using standard components. To accomplish this, university students were equipped with mobile phones and software that allowed teachers to send text-based, audio-based and video-based messages to the students. Data was collected using questionnaires, focus groups and log files. The conclusions were that students preferred to have information and learning content sent as text, rather than audio or video. Text messages sent to phones should be no longer than 2000 characters. The most appreciated services were notifications of changes in course schedules, short lecture introductions and reminders. The prototype showed that this functionality is easy to implement using standard components.

  16. Comparing tailored and untailored text messages for smoking cessation

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  17. Art messaging to engage homeless young adults.

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  18. Live chat alternative security protocol

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  19. Extracting useful knowledge from event logs

    Djenouri, Youcef; Belhadi, Asma; Fournier-Viger, Philippe

    2018-01-01

    Business process analysis is a key activity that aims at increasing the efficiency of business operations. In recent years, several data mining based methods have been designed for discovering interesting patterns in event logs. A popular type of methods consists of applying frequent itemset mini...

  20. Potential for shared log transport services

    Tim McDonald; Steve Taylor; Jorge Valenzuela

    2001-01-01

    A simulation model of a log transport logistics network was developed. The model could be structured to either share truck capacity among a group of loggers, or to assign a fixed number of trucks to individual loggers. Another variation of the model allowed the use of a staging yard to set out loaded trailers and deliver them to destinations using dedicated shuttle...

  1. Identifying unstable sites on logging roads

    R. M. Rice; J. Lewis

    1986-01-01

    Logging roads are an important source of forestry-related erosion. The amount of erosion on a forest road is determined by the interaction between how the road is constructed and maintained and the environment in which it is built. The roads in this study were constructed with large bulldozers, and most excavated material was sidecast. The roads studied were...

  2. Narrating Illegal Logging Across the Globe

    Winkel, Georg; Leipold, Sina; Buhmann, Karin

    2017-01-01

    In the last decade illegal logging has triggered the attention of policy makers and scholars of international forest governance. The issue is multifaceted, involving aspects of social and environmental sustainability, development, trade, access to markets and competitiveness. A vivid academic deb...

  3. Modelling tropical forests response to logging

    Cazzolla Gatti, Roberto; Di Paola, Arianna; Valentini, Riccardo; Paparella, Francesco

    2013-04-01

    Tropical rainforests are among the most threatened ecosystems by large-scale fragmentation due to human activity such as heavy logging and agricultural clearance. Although, they provide crucial ecosystem goods and services, such as sequestering carbon from the atmosphere, protecting watersheds and conserving biodiversity. In several countries forest resource extraction has experienced a shift from clearcutting to selective logging to maintain a significant forest cover and understock of living biomass. However the knowledge on the short and long-term effects of removing selected species in tropical rainforest are scarce and need to be further investigated. One of the main effects of selective logging on forest dynamics seems to be the local disturbance which involve the invasion of open space by weed, vines and climbers at the expense of the late-successional state cenosis. We present a simple deterministic model that describes the dynamics of tropical rainforest subject to selective logging to understand how and why weeds displace native species. We argue that the selective removal of tallest tropical trees carries out gaps of light that allow weeds, vines and climbers to prevail on native species, inhibiting the possibility of recovery of the original vegetation. Our results show that different regime shifts may occur depending on the type of forest management adopted. This hypothesis is supported by a dataset of trees height and weed/vines cover that we collected from 9 plots located in Central and West Africa both in untouched and managed areas.

  4. ADN* Density log estimation Using Rockcell*

    Okuku, C.; Iloghalu, Emeka. M.; Omotayo, O.

    2003-01-01

    This work is intended to inform on the possibilities of estimating good density data in zones associated with sliding in a reservoir with ADN* tool with or without ADOS in string in cases where repeat sections were not done, possibly due to hole stability or directional concerns. This procedure has been equally used to obtain a better density data in corkscrew holes. Density data (ROBB) was recomputed using neural network in RockCell* to estimate the density over zones of interest. RockCell* is a Schlumberger software that has neural network functionally which can be used to estimate missing logs using the combination of the responses of other log curves and intervals that are not affected by sliding. In this work, an interval was selected and within this interval twelve litho zones were defined using the unsupervised neural network. From this a training set was selected based on intervals of very good log responses outside the sliding zones. This training set was used to train and run the neural network for a specific lithostratigraphic interval. The results matched the known good density curve. Then after this, an estimation of the density curve was done using the supervised neural network. The output from this estimation matched very closely in the good portions of the log, thus providing some density measurements in the sliding zone. This methodology provides a scientific solution to missing data during the process of Formation evaluation

  5. Changes in the Logging Labor Force

    Charles H. Wolf; Jean W. Nolley

    1977-01-01

    Employment in the logging industry dropped 28 percent between 1950 and 1970, while output of industrial roundwood increased 31 percent. Today's loggers are older, better educated, and more skilled. A large proportion are self-employed, many work less than a full year, and a substantial number have incomes below the poverty level. Mechanization of timber harvesting...

  6. Alaska midgrade logs: supply and offshore demand.

    Donald F. Flora; Wendy J. McGinnis

    1989-01-01

    The outlook for shipments and prices of export logs from Alaska differs significantly by grade (quality class). For the majority lying in the middle of the value range, the trend of prices is projected to increase $200 per thousand board feet, or about 55 percent, by 2000. Shipments are expected to rise about 30 percent by 1995 and then subside about 10 percent. These...

  7. Analyzing Grid Log Data with Affinity Propagation

    Modena, G.; van Someren, M.W.; Ali, M; Bosse, T.; Hindriks, K.V.; Hoogendoorn, M.; Jonker, C.M; Treur, J.

    2013-01-01

    In this paper we present an unsupervised learning approach to detect meaningful job traffic patterns in Grid log data. Manual anomaly detection on modern Grid environments is troublesome given their increasing complexity, the distributed, dynamic topology of the network and heterogeneity of the jobs

  8. Exploration and grade control neutron logging

    Eisler, P.L.

    1982-01-01

    Techniques used in neutron logging in boreholes are discussed. They include the application of neutron probes to porosity measurements, to lithological determinations based on macroscopic cross-section measurements and measurements of the concentration of chemical constituents in rocks and ores

  9. Explorations in statistics: the log transformation.

    Curran-Everett, Douglas

    2018-06-01

    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This thirteenth installment of Explorations in Statistics explores the log transformation, an established technique that rescales the actual observations from an experiment so that the assumptions of some statistical analysis are better met. A general assumption in statistics is that the variability of some response Y is homogeneous across groups or across some predictor variable X. If the variability-the standard deviation-varies in rough proportion to the mean value of Y, a log transformation can equalize the standard deviations. Moreover, if the actual observations from an experiment conform to a skewed distribution, then a log transformation can make the theoretical distribution of the sample mean more consistent with a normal distribution. This is important: the results of a one-sample t test are meaningful only if the theoretical distribution of the sample mean is roughly normal. If we log-transform our observations, then we want to confirm the transformation was useful. We can do this if we use the Box-Cox method, if we bootstrap the sample mean and the statistic t itself, and if we assess the residual plots from the statistical model of the actual and transformed sample observations.

  10. Apache Flume distributed log collection for Hadoop

    D'Souza, Subas

    2013-01-01

    A starter guide that covers Apache Flume in detail.Apache Flume: Distributed Log Collection for Hadoop is intended for people who are responsible for moving datasets into Hadoop in a timely and reliable manner like software engineers, database administrators, and data warehouse administrators

  11. 47 CFR 80.409 - Station logs.

    2010-10-01

    ... primary office or available to the Commission via secured access to the licensee's Internet web site. Logs..., together with the time of such observation or occurrence and the position of the ship or other mobile unit... devices which do not have integral navigation receivers, including: VHF DSC, MF DSC, satellite EPIRB and...

  12. Geophysical logging for mineral exploration and development

    Plouffe, R.D.

    1981-01-01

    It is possible to retrieve from small-diameter holes geophysical data for qualitative interpretation in exploration and quantitative interpretation in the development of orebodies. The primary objectives in the exploration stage are to identify where, within a hole, economic minerals are, and to help in lithological interpretations. Other aspects, which are more quantitative, are the interpretation of downhole logs for parameters which can be used in surface geophysical methods (i.e. density for gravity surveys, acoustic velocities for seismic surveys, and magnetic susceptibility for airborne and ground magnetic surveys). Recent advances in equipment design, portability and durability have made downhole logging in exploration more inexpensive and reliable. This new equipment is being used to generate very precise quantitative results. This is especially true on uranium development projects. The interpretation of gamma logs for eU 3 O 8 values has finally become precise enough that they have begun to replace chemical values in reserve calculations. Another part of development data is density and equilibrium information, which, with today's technology, is being derived from downhole probing. In the years to come, the trends for many metals are toward neutron activation techniques, or in-situ assaying, and the use of multiple logs for better lithological and physical rock property determinations. (auth)

  13. Information needs for increasing log transport efficiency

    Timothy P. McDonald; Steven E. Taylor; Robert B. Rummer; Jorge Valenzuela

    2001-01-01

    Three methods of dispatching trucks to loggers were tested using a log transport simulation model: random allocation, fixed assignment of trucks to loggers, and dispatch based on knowledge of the current status of trucks and loggers within the system. This 'informed' dispatch algorithm attempted to minimize the difference in time between when a logger would...

  14. Root cause analysis with enriched process logs

    Suriadi, S.; Ouyang, C.; Aalst, van der W.M.P.; Hofstede, ter A.H.M.; La Rosa, M.; Soffer, P.

    2013-01-01

    n the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from

  15. Mining process performance from event logs

    Adriansyah, A.; Buijs, J.C.A.M.; La Rosa, M.; Soffer, P.

    2013-01-01

    In systems where process executions are not strictly enforced by a predefined process model, obtaining reliable performance information is not trivial. In this paper, we analyzed an event log of a real-life process, taken from a Dutch financial institute, using process mining techniques. In

  16. Lianas and logging in West Africa

    Parren, M.P.E.

    2003-01-01

    The role of lianas in relation to logging activities is analysed in a lowland moist forest in Cameroon. Lianas are an abundant, diverse, and conspicuous growth form in nearly all tropical forests. Lianas are mostly seen as a nuisance by foresters. Cutting of liana stems is an important operation in

  17. Maximally efficient protocols for direct secure quantum communication

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  18. Emotional flow in persuasive health messages.

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  19. Effects of Electronic Word - of - Mouth Messages

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  20. AMS: Area Message Service for SLC

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  1. Supervising simulations with the Prodiguer Messaging Platform

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  2. Positive messaging promotes walking in older adults.

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  3. SAMP: Application Messaging for Desktop and Web Applications

    Taylor, M. B.; Boch, T.; Fay, J.; Fitzpatrick, M.; Paioro, L.

    2012-09-01

    SAMP, the Simple Application Messaging Protocol, is a technology which allows tools to communicate. It is deployed in a number of desktop astronomy applications including ds9, Aladin, TOPCAT, World Wide Telescope and numerous others, and makes it straightforward for a user to treat a selection of these tools as a loosely-integrated suite, combining the most powerful features of each. It has been widely used within Virtual Observatory contexts, but is equally suitable for non-VO use. Enabling SAMP communication from web-based content has long been desirable. An obvious use case is arranging for a click on a web page link to deliver an image, table or spectrum to a desktop viewer, but more sophisticated two-way interaction with rich internet applications would also be possible. Use from the web however presents some problems related to browser sandboxing. We explain how the SAMP Web Profile, introduced in version 1.3 of the SAMP protocol, addresses these issues, and discuss the resulting security implications.

  4. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  5. Requirements-Driven Log Analysis Extended Abstract

    Havelund, Klaus

    2012-01-01

    Imagine that you are tasked to help a project improve their testing effort. In a realistic scenario it will quickly become clear, that having an impact is diffcult. First of all, it will likely be a challenge to suggest an alternative approach which is significantly more automated and/or more effective than current practice. The reality is that an average software system has a complex input/output behavior. An automated testing approach will have to auto-generate test cases, each being a pair (i; o) consisting of a test input i and an oracle o. The test input i has to be somewhat meaningful, and the oracle o can be very complicated to compute. Second, even in case where some testing technology has been developed that might improve current practice, it is then likely difficult to completely change the current behavior of the testing team unless the technique is obviously superior and does everything already done by existing technology. So is there an easier way to incorporate formal methods-based approaches than the full edged test revolution? Fortunately the answer is affirmative. A relatively simple approach is to benefit from possibly already existing logging infrastructure, which after all is part of most systems put in production. A log is a sequence of events, generated by special log recording statements, most often manually inserted in the code by the programmers. An event can be considered as a data record: a mapping from field names to values. We can analyze such a log using formal methods, for example checking it against a formal specification. This separates running the system for analyzing its behavior. It is not meant as an alternative to testing since it does not address the important in- put generation problem. However, it offers a solution which testing teams might accept since it has low impact on the existing process. A single person might be assigned to perform such log analysis, compared to the entire testing team changing behavior.

  6. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    Gao, Gan

    2014-01-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol. (paper)

  7. Anomalous self potential (sp) log signatures observed in a water ...

    Geophysical logging was done after drilling had been completed in a water well at Okwudor, South Eastern Nigeria. Three electric logs were run viz: Self Potential (SP), Resistivity N16″ and N64″ logs. An anomaly was observed in the SP log. The SP results from this well show some deviation from the standard norm.

  8. Using Web Server Logs in Evaluating Instructional Web Sites.

    Ingram, Albert L.

    2000-01-01

    Web server logs contain a great deal of information about who uses a Web site and how they use it. This article discusses the analysis of Web logs for instructional Web sites; reviews the data stored in most Web server logs; demonstrates what further information can be gleaned from the logs; and discusses analyzing that information for the…

  9. Stress wave sorting of red maple logs for structural quality

    Xiping Wang; Robert J. Ross; David W. Green; Brian Brashaw; Karl Englund; Michael Wolcott

    2004-01-01

    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  10. Tradeoffs and interdependence in the Alaska cant and log markets.

    Donald Flora; Una Woller; Michael. Neergaard

    1990-01-01

    During the 1980s, log exports from Alaska have risen while cant (lumber) exports have declined. Eight explanations for the difference between cant and log market behavior are explored. It seems that declining demand for wood products in Japan and a surge of private-sector log harvests in Alaska are enough to account for the apparent substitution of logs for cants. It...

  11. Performance of sampling methods to estimate log characteristics for wildlife.

    Lisa J. Bate; Torolf R. Torgersen; Michael J. Wisdom; Edward O. Garton

    2004-01-01

    Accurate estimation of the characteristics of log resources, or coarse woody debris (CWD), is critical to effective management of wildlife and other forest resources. Despite the importance of logs as wildlife habitat, methods for sampling logs have traditionally focused on silvicultural and fire applications. These applications have emphasized estimates of log volume...

  12. Advanced of X-ray fluorescence logging technique in China

    Zhou Sichun; Ge Liangquan; Lai Wanchang; Yang Qiang

    2010-01-01

    The paper discuses principle of X-ray fluorescence logging, and introduces advanced of X-ray fluorescence logging technique in China. By 2009, third generation XRF logging instrument has been developed in China, and good logging result has been obtained in Lala copper mine. (authors)

  13. Logging utilization in Idaho: Current and past trends

    Eric A. Simmons; Todd A. Morgan; Erik C. Berg; Stanley J. Zarnoch; Steven W. Hayes; Mike T. Thompson

    2014-01-01

    A study of commercial timber-harvesting activities in Idaho was conducted during 2008 and 2011 to characterize current tree utilization, logging operations, and changes from previous Idaho logging utilization studies. A two-stage simple random sampling design was used to select sites and felled trees for measurement within active logging sites. Thirty-three logging...

  14. Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks

    Vinod Namboodiri

    2011-01-01

    Full Text Available Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. We present Alert, a MAC protocol for collecting event-triggered urgent messages from a group of sensor nodes with minimum latency and without requiring any cooperation or prescheduling among the senders or between senders and receiver during protocol execution. Alert is designed to handle multiple simultaneous messages from different nodes efficiently and reliably, minimizing the overall delay to collect all messages along with the delay to get the first message. Moreover, the ability of the network to handle a large number of simultaneous messages does not come at the cost of excessive delays when only a few messages need to be handled. We analyze Alert and evaluate its feasibility and performance with an implementation on commodity hardware. We further compare Alert with existing approaches through simulations and show the performance improvement possible through Alert.

  15. Broadcasting a message in a parallel computer

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  16. EDITORIAL: Message from the Editor

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  17. Limitations and developing directions of pulsed neutron logging

    Wu Wensheng; Xiao Lizhi

    2007-01-01

    The paper explains briefly the principle of pulsed neutron logging method, summarizes the system and uses of the method in petroleum logging. The paper points out the limitations of pulsed neutron logging such as low precise measurements, low logging speed, plenty of influence factors, low vertical resolution, bad adaptability, difficult logging interpretation and so on, and expounds its developing directions in hardware, software, method and principle. (authors)

  18. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  19. Cacades: A reliable dissemination protocol for data collection sensor network

    Peng, Y.; Song, W.; Huang, R.; Xu, M.; Shirazi, B.; LaHusen, R.; Pei, G.

    2009-01-01

    In this paper, we propose a fast and reliable data dissemination protocol Cascades to disseminate data from the sink(base station) to all or a subset of nodes in a data collection sensor network. Cascades makes use of the parentmonitor-children analogy to ensure reliable dissemination. Each node monitors whether or not its children have received the broadcast messages through snooping children's rebroadcasts or waiting for explicit ACKs. If a node detects a gap in its message sequences, it can fetch the missing messages from its neighbours reactively. Cascades also considers many practical issues for field deployment, such as dynamic topology, link/node failure, etc.. It therefore guarantees that a disseminated message from the sink will reach all intended receivers and the dissemination is terminated in a short time period. Notice that, all existing dissemination protocols either do not guarantee reliability or do not terminate [1, 2], which does not meet the requirement of real-time command control. We conducted experiment evaluations in both TOSSIM simulator and a sensor network testbed to compare Cascades with those existing dissemination protocols in TinyOS sensor networks, which show that Cascades achieves a higher degree of reliability, lower communication cost, and less delivery delay. ??2009 IEEE.

  20. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  1. Hashtag (# as Message Identity in Virtual Community

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  2. Nuclear fuel cycle modelling using MESSAGE

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  3. Upon a Message-Oriented Trading API

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  4. A Simple XML Producer-Consumer Protocol

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    performance data. These standard protocols and representations must support tasks such as profiling parallel applications, monitoring the status of computers and networks, and monitoring the performance of services provided by a computational grid. This paper describes a proposed protocol and data representation for the exchange of events in a distributed system. The protocol exchanges messages formatted in XML and it can be layered atop any low-level communication protocol such as TCP or UDP Further, we describe Java and C++ implementations of this protocol and discuss their performance. The next section will provide some further background information. Section 3 describes the main communication patterns of our protocol. Section 4 describes how we represent events and related information using XML. Section 5 describes our protocol and Section 6 discusses the performance of two implementations of the protocol. Finally, an appendix provides the XML Schema definition of our protocol and event information.

  5. Theoretical and Numerical Study of Seismoelectric Logs for Logging While Drilling (LWD

    Sun Xiang-Yang

    2017-01-01

    Full Text Available When the acoustic field propagates in the porous medium, the electromagnetic wave can be induced by the seismoelectric effects which can be used in the logging. This paper studies the seismoelectric wave field and deduces the formulations of the acoustic and electromagnetic field of the liquid in the well, and gives the acoustic and electromagnetic boundary conditions between the driller collar and the log liquid, when the driller collar is added. We also do the numerical simulation of the seismoelectric wave field excited by monopole source, study the velocity dispersion characteristics of the acoustic and electromagnetic field, and investigate the detective depth of the seismoelectric logs. Through the simulation we know the seismoelectric logs can avoid the interference of drill collar wave. This paper also provides theoretical guidance for the design of receiving antenna.

  6. Comparative analysis of nuclear magnetic resonance well logging and nuclear magnetic resonance mud logging

    Yuan Zugui

    2008-01-01

    The hydrogen atoms in oil and water are able to resonate and generate signals in the magnetic field, which is used by the NMR (nuclear magnetic resonance) technology in petroleum engineering to research and evaluate rock characteristics. NMR well logging was used to measure the physical property parameters of the strata in well bore, whereas NMR mud logging was used to analyze (while drilling) the physical property parameters of cores, cuttings and sidewall coring samples on surface (drilling site). Based on the comparative analysis of the porosity and permeability parameters obtained by NMR well logging and those from analysis of the cores, cuttings and sidewall coring samples by NMR mud logging in the same depth of 13 wells, these two methods are of certain difference, but their integral tendency is relatively good. (authors)

  7. Developing effective messages about potable recycled water: The importance of message structure and content

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  8. Improving the capacity of the Bostroem-Felbinger protocol

    Cai Qingyu; Li Baiwen

    2004-01-01

    We show that the capacity of the Bostroem-Felbinger (ping-pong) protocol [Phys. Rev. Lett. 89, 187902 (2002)] can be doubled by introducing two additional unitary operations. In message mode, Alice can use one of the four unitary operations to encode two classical bits of information. Bob can decode Alice's information by using a Bell-basis measurement. Security against eavesdropping attack can be ensured by using two conjugate measurement bases in control mode. A message authentification method can protect this communication against a man-in-the-middle attack without eavesdropping

  9. CS model coil experimental log book

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  10. High resolution gamma spectroscopy well logging system

    Giles, J.R.; Dooley, K.J.

    1997-01-01

    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. The absolute counting efficiencies of the GSLS detectors were determined using cylindrical reference sources. More complex borehole geometries were modeled using commercially available shielding software and correction factors were developed based on relative gamma-ray fluence rates. Examination of varying porosity and moisture content showed that as porosity increases, and as the formation saturation ratio decreases, relative gamma-ray fluence rates increase linearly for all energies. Correction factors for iron and water cylindrical shields were found to agree well with correction factors determined during previous studies allowing for the development of correction factors for type-304 stainless steel and low-carbon steel casings. Regression analyses of correction factor data produced equations for determining correction factors applicable to spectral gamma-ray well logs acquired under non-standard borehole conditions

  11. Well logging system with linearity control

    Jones, J.M.

    1973-01-01

    Apparatus is described for controlling the gain of a nuclear well logging system comprising: (1) means for measuring the energy spectrum of gamma rays produced by earth formation materials surrounding a well borehole; (2) means for measuring the number of counts of a gamma rays having an energy falling within each of at least two predetermined energy band portions of the gamma ray energy spectrum; (3) means for generating a signal proportional to the ratio of the gamma ray counts and for comparing the ratio signal with at least one constant ratio calibration signal; (4) means for generating an error signal representative of the difference of the ratio signal and the constant ratio calibration signal; and (5) means for using the error signal to control the linearity of the well logging system. (author)

  12. Assessment of radiation safety in well logging

    Alles, A.; Pérez, Y.; Duménigo, C.

    2015-01-01

    Radiation safety assessments required by current regulations are a means to verify compliance with the requirements. Different methods have been used for this purpose. In the paper the results of applying the method of risk matrices, applied for the first time in the practice of well logging are exposed. For each initiating event frequency of occurrence, the severity of its consequences and the probability of failure of the barriers identified were evaluated. Starting from these assumptions, the risk associated is determined for each of the identified accident sequences, using for this the SEVRRA code 'Risk Assessment System', originally designed for use in radiotherapy. As an result sequences increased risk associated with the practice of well logging were identified, which is the starting point for the further implementation of a coherent program of dose optimization in practice. [es

  13. No chiral truncation of quantum log gravity?

    Andrade, Tomás; Marolf, Donald

    2010-03-01

    At the classical level, chiral gravity may be constructed as a consistent truncation of a larger theory called log gravity by requiring that left-moving charges vanish. In turn, log gravity is the limit of topologically massive gravity (TMG) at a special value of the coupling (the chiral point). We study the situation at the level of linearized quantum fields, focussing on a unitary quantization. While the TMG Hilbert space is continuous at the chiral point, the left-moving Virasoro generators become ill-defined and cannot be used to define a chiral truncation. In a sense, the left-moving asymptotic symmetries are spontaneously broken at the chiral point. In contrast, in a non-unitary quantization of TMG, both the Hilbert space and charges are continuous at the chiral point and define a unitary theory of chiral gravity at the linearized level.

  14. Modelo de custos logísticos

    José Vanderlei Silva Borba

    2010-05-01

    Full Text Available Em contexto de globalização, a distância física entre produtores de bens e de serviços e consumidores deixa de ser relevante. Isso determina que o gerenciamento de custos logísticos venha agregar valor relevante aos produtos comercializados, pois procura identificar e determinar a eficácia dos recursos consumidos internamente pela empresa e, externamente, procura fazer a análise da cadeia de valor. Nessa perspectiva, a definição das variáveis de custos está além de seus muros. Este trabalho propõe um modelo de apuração de custos logísticos, que atenda, simultaneamente, os custos de suprimentos e os custos de distribuição, com impactos sobre o processo de tomada de decisão.

  15. Development of a digital log ratemeter

    Domienikan, Claudio; Brito, Andreia; Toledo, Fabio de; Zahn, Guilherme S.

    2011-01-01

    A compact log ratemeter that measures and displays an average count rate through a microcomputer is presented. This ratemeter was developed to be used to monitor a laboratory of production of radioactive samples and also for teaching purposes. The main features are log measurement range from .1 to 1.000 counts/sec and adjustable level alarm. The electronic circuit uses a Geiger tube LND7224, and the processed signal is applied to a National Instruments Multifunction I/O USB-6008 connected to a PC through USB input. A program developed in LabView allows storage of data and real-time observation of the rate of radiation evolution. This ratemeter was designed and constructed in the IPEN-CNEN/SP. (author)

  16. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  17. Glass scintillator pair for compensation neutron logging

    Ji Changsong; Li Xuezhi; Yiu Guangduo

    1985-01-01

    Glass scintillator pair types ST 1604 and ST 1605 for compensation of neutron logging is developed. The neutron sensitive material used is multistick lithium glass scintillators 3 and 4 mm in diameter respectively. Thermoneutron detection efficiencies are 50-60% and 100% respectively. The detection efficiency for 60 Co γ ray is lower than 0.3%. The type ST 1604 and ST 1605 may also be used as high sensitive neutron detectors in an intensive γ ray field

  18. Log Gaussian Cox processes on the sphere

    Pacheco, Francisco Andrés Cuevas; Møller, Jesper

    We define and study the existence of log Gaussian Cox processes (LGCPs) for the description of inhomogeneous and aggregated/clustered point patterns on the d-dimensional sphere, with d = 2 of primary interest. Useful theoretical properties of LGCPs are studied and applied for the description of sky...... positions of galaxies, in comparison with previous analysis using a Thomas process. We focus on simple estimation procedures and model checking based on functional summary statistics and the global envelope test....

  19. Log-Concavity Properties of Minkowski Valuations

    Berg, Astrid; Parapatits, Lukas; Schuster, Franz E.; Weberndorfer, Manuel

    2014-01-01

    New Orlicz Brunn-Minkowski inequalities are established for rigid motion compatible Minkowski valuations of arbitrary degree. These extend classical log-concavity properties of intrinsic volumes and generalize seminal results of Lutwak and others. Two different approaches which refine previously employed techniques are explored. It is shown that both lead to the same class of Minkowski valuations for which these inequalities hold. An appendix by Semyon Alesker contains the proof of a new clas...

  20. Methods for calibrating radioactivity well logging tools

    Waggoner, J.A.; Turcotte, R.E.; Hunt-Grubbe, R.H.

    1981-01-01

    Field-calibrating of well-logging tools is achieved by means of a sleeve, which has radioactive material distributed therein, and which envelopes the portion of the tool housing containing the detector. Accurate calibration can be performed and the source can be made considerably weaker than those now in use as it can be brought very close to the detector thus lessening errors. (U.K.)

  1. SDSS Log Viewer: visual exploratory analysis of large-volume SQL log data

    Zhang, Jian; Chen, Chaomei; Vogeley, Michael S.; Pan, Danny; Thakar, Ani; Raddick, Jordan

    2012-01-01

    User-generated Structured Query Language (SQL) queries are a rich source of information for database analysts, information scientists, and the end users of databases. In this study a group of scientists in astronomy and computer and information scientists work together to analyze a large volume of SQL log data generated by users of the Sloan Digital Sky Survey (SDSS) data archive in order to better understand users' data seeking behavior. While statistical analysis of such logs is useful at aggregated levels, efficiently exploring specific patterns of queries is often a challenging task due to the typically large volume of the data, multivariate features, and data requirements specified in SQL queries. To enable and facilitate effective and efficient exploration of the SDSS log data, we designed an interactive visualization tool, called the SDSS Log Viewer, which integrates time series visualization, text visualization, and dynamic query techniques. We describe two analysis scenarios of visual exploration of SDSS log data, including understanding unusually high daily query traffic and modeling the types of data seeking behaviors of massive query generators. The two scenarios demonstrate that the SDSS Log Viewer provides a novel and potentially valuable approach to support these targeted tasks.

  2. Estimation of the non records logs from existing logs using artificial neural networks

    Mehdi Mohammad Salehi

    2017-12-01

    Full Text Available Finding the information of the hydrocarbon reservoirs from well logs is one of the main objectives of the engineers. But, missing the log records (due to many reasons such as broken instruments, unsuitable borehole and etc. is a major challenge to achieve it. Prediction of the density and resistivity logs (Rt, DT and LLS from the conventional wire-line logs in one of the Iranian southwest oil fields is the main purpose of this study. Multilayer neural network was applied to develop an intelligent predictive model for prediction of the logs. A total of 3000 data sets from 3 wells (A, B and C of the studied field were used. Among them, the data of A, B and C wells were used to constructing and testing the model, respectively. To evaluate the performance of the model, the mean square error (MSE and correlation coefficient (R2 in the test data were calculated. A comparison between the MSE of the proposed model and recently intelligent models shows that the proposed model is more accurate than others. Acceptable accuracy and using conventional well logging data are the highlight advantages of the proposed intelligent model.

  3. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.

    Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos

    2018-03-23

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  4. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

    Ali Balador

    2018-03-01

    Full Text Available Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  5. Chiral gravity, log gravity, and extremal CFT

    Maloney, Alexander; Song Wei; Strominger, Andrew

    2010-01-01

    We show that the linearization of all exact solutions of classical chiral gravity around the AdS 3 vacuum have positive energy. Nonchiral and negative-energy solutions of the linearized equations are infrared divergent at second order, and so are removed from the spectrum. In other words, chirality is confined and the equations of motion have linearization instabilities. We prove that the only stationary, axially symmetric solutions of chiral gravity are BTZ black holes, which have positive energy. It is further shown that classical log gravity--the theory with logarithmically relaxed boundary conditions--has finite asymptotic symmetry generators but is not chiral and hence may be dual at the quantum level to a logarithmic conformal field theories (CFT). Moreover we show that log gravity contains chiral gravity within it as a decoupled charge superselection sector. We formally evaluate the Euclidean sum over geometries of chiral gravity and show that it gives precisely the holomorphic extremal CFT partition function. The modular invariance and integrality of the expansion coefficients of this partition function are consistent with the existence of an exact quantum theory of chiral gravity. We argue that the problem of quantizing chiral gravity is the holographic dual of the problem of constructing an extremal CFT, while quantizing log gravity is dual to the problem of constructing a logarithmic extremal CFT.

  6. Gerencia logística y global

    Pablo Cesar Ocampo Vélez

    2009-04-01

    Full Text Available La logística es una filosofía que se encarga de aplicar las buenas pá¡cticas en los macroprocesos, procesos, procedimientos, tareas y productos dentro de una organización, con el fin de satisfacer las necesidades del cliente, quien es la razón de ser de la empresa. Existen entes internacionales que velan porque las compañias en todo el mundo utilicen y difundan las diferentes disciplinas logísticas en toda la red de valor y tengan un mismo enfoque estratégico.El objetivo de este artículo es explicar la existencia de procesos y macroprocesos de clase mundial en la logística, gracias a los cuales hay una gran oportunidad de mejora para los empresarios colombianos, con el fin de reestructurar los procesos estratégicos, tácticos y operacionales de cada Unidad de Negocio, para que sean organizaciones más competitivas, que puedan enfrentar los tratados de libre comercio, brindando mayor sostenibilidad y óptimo nivel de servicio.

  7. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  8. University Advertising and Universality in Messaging

    Diel, Stan R.; Katsinas, Stephen

    2018-01-01

    University and college institutional advertisements, which typically are broadcast as public service announcements during the halftime of football games, were the subject of a quantitative analysis focused on commonality in messaging and employment of the semiotic theory of brand advertising. Findings indicate advertisements focus on students'…

  9. Message transfer in a communication network

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  10. Message passing with parallel queue traversal

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  11. Message Integrity Model for Wireless Sensor Networks

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  12. Picture Book Soldiers: Men and Messages.

    Desai, Christina M.

    2001-01-01

    Examines children's picture books about soldiers and war, including fiction, folktales, and historical fiction, analyzing their implicit and explicit messages about war and the military, and evaluating them for gender stereotyping. Finds that the soldiers conform almost uniformly to an exaggerated male stereotype. Shows different value judgments…

  13. An approach for message exchange using archetypes.

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  14. Graphical route information on variable message signs

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  15. Princess Picture Books: Content and Messages

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  16. Interactive or interruptive? Instant messaging at work

    Ou, C.X.J.; Davison, R.M.

    2011-01-01

    The use of instant messaging (IM) technology at work is controversial, due to the interruptions it may cause and the difficulties associated with quantifying its benefits for individuals, teams and organizations. In this study, we investigate the use and impact of IM tools in the workplace. Based on

  17. Using Instant Messaging for Online Reference Service

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  18. A history of nuclear well logging in the oil industry

    Tittle, C.W.

    1989-01-01

    Spurred by an interest in logging through steel casing γ-ray logging began in the late 1930s followed soon by neutron logging for porosity. These were the first two nuclear well logs. Gamma-gamma density logging was developed during the 1950s. Pulsed neutron lifetime logging appeared in the 1960s; the slim tools came in the early 1970s. Developments since then have included dual detector devices of several types which offered improved measurements or interpretation, γ-ray spectrometry logging (natural and neutron-induced) which identifies certain chemical elements, induced radioactivity logging, and the photoelectric absorption log, which, combined with the density log in a single tool, is known as litho-density logging. A combination of several γ-ray spectrometers in one tool, designed to determine 10 formation elements, was recently introduced, and a new neutron porosity tool measuring epithermal neutron die-away time has been developed. Digital transmission of logging data was a step forward in about 1975. Also, log interpretation techniques have greatly expanded since the advent of digital computers, and the microcomputer has had a distinct impact. It is now practical and economical to do iterative analysis on a suite of logs to obtain an optimum overall interpretation. (author)

  19. Unification of acoustic drillhole logging data

    Oehman, I.; Palmen, J.; Heikkinen, E.

    2009-04-01

    Posiva Oy prepares for disposal of spent nuclear fuel in bedrock in Olkiluoto, Eurajoki. This is in accordance of the application filed in 1999, the Decision-in-Principle of the State Council in 2000, and ratification by the Parliament in 2001. The site characterization at Olkiluoto has included comprehensive geological, hydrological, geochemical and geophysical investigations airborne, on ground and in drillholes since 1988. One of key techniques in geophysical drillhole surveys has been acoustic full waveform logging, which has been implemented since 1994. Various tools have been used in acquisition of acoustic data and several processing techniques have been applied. The logging work and processing to P and S wave velocities has been previously carried out on single drillhole basis. Comparisons to actual values and levels have not been made, and the results have not been calibrated. Therefore results for different drillholes have not been comparable. Resolution of the P and S wave velocity has been rather coarse, and depth correlation to the core data has been on tentative level. As the investigation data has been accumulating, it has become possible to correlate the results to geological and laboratory control data and to calibrate the results of separate measurement campaigns and different drillholes together onto same reference level and resolution. The presented technique has been applied for drillhole OL-KR29 onwards and has set the processing standard, settings and reference levels for later surveys. This approach will further assist the application of the method for mapping and numerical description of lithology variation and possible effect of alteration and deformation on it. Further on, the P and S wave velocity data together with density can be used in computing of dynamic in situ rock mechanical parameters, and possibly in correlating rock strength laboratory data to P and S wave velocity logging data. The acoustic logging data from drillholes OL-KR1

  20. A Lightweight Protocol for Secure Video Streaming.

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  1. Supporting Adaptation of Wireless Communication Protocols

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  2. An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution

    2012-02-01

    INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN // CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR...of the messages passed, and that the time to prepare or separate the message information is negligible . Finally, for this experiment all errors...of interactions becomes negligible . In fact, of the three protocols, experiments performed here have shown that Winnow produces the highest average

  3. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  4. Effectiveness of safety and public service announcement messages on dynamic message signs.

    2014-07-01

    The number of transportation agencies that use dynamic message signs (DMS) to provide traffic information to motorists has increased dramatically over the past four decades. This growing trend of DMS deployment is a reflection of the public interest ...

  5. A randomized trial of maternal influenza immunization decision-making: A test of persuasive messaging models.

    Frew, Paula M; Kriss, Jennifer L; Chamberlain, Allison T; Malik, Fauzia; Chung, Yunmi; Cortés, Marielysse; Omer, Saad B

    2016-08-02

    We sought to examine the effectiveness of persuasive communication interventions on influenza vaccination uptake among black/African American pregnant women in Atlanta, Georgia. We recruited black/African American pregnant women ages 18 to 50 y from Atlanta, GA to participate in a prospective, randomized controlled trial of influenza immunization messaging conducted from January to April 2013. Eligible participants were randomized to 3 study arms. We conducted follow-up questionnaires on influenza immunization at 30-days post-partum with all groups. Chi-square and t tests evaluated group differences, and outcome intention-to-treat assessment utilized log-binomial regression models. Of the 106 enrolled, 95 women completed the study (90% retention), of which 31 were randomly assigned to affective messaging intervention ("Pregnant Pause" video), 30 to cognitive messaging intervention ("Vaccines for a Healthy Pregnancy" video), and 34 to a comparison condition (receipt of the Influenza Vaccine Information Statement). The three groups were balanced on baseline demographic characteristics and reported health behaviors. At baseline, most women (63%, n = 60) reported no receipt of seasonal influenza immunization during the previous 5 y. They expressed a low likelihood (2.1 ± 2.8 on 0-10 scale) of obtaining influenza immunization during their current pregnancy. At 30-days postpartum follow-up, influenza immunization was low among all participants (7-13%) demonstrating no effect after a single exposure to either affective messaging (RR = 1.10; 95% CI: 0.30-4.01) or cognitive messaging interventions (RR = 0.57; 95% CI: 0.11-2.88). Women cited various reasons for not obtaining maternal influenza immunizations. These included concern about vaccine harm (47%, n = 40), low perceived influenza infection risk (31%, n = 26), and a history of immunization nonreceipt (24%, n = 20). The findings reflect the limitations associated with a single exposure to varying maternal influenza

  6. Fault-Tolerant Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Malekpour, Mahyar R. (Inventor)

    2014-01-01

    A self-stabilizing network in the form of an arbitrary, non-partitioned digraph includes K nodes having a synchronizer executing a protocol. K-1 monitors of each node may receive a Sync message transmitted from a directly connected node. When the Sync message is received, the logical clock value for the receiving node is set to between 0 and a communication latency value (gamma) if the clock value is less than a minimum event-response delay (D). A new Sync message is also transmitted to any directly connected nodes if the clock value is greater than or equal to both D and a graph threshold (T(sub S)). When the Sync message is not received the synchronizer increments the clock value if the clock value is less than a resynchronization period (P), and resets the clock value and transmits a new Sync message to all directly connected nodes when the clock value equals or exceeds P.

  7. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  8. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  9. Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS

    Onyisi, Peter; The ATLAS collaboration

    2015-01-01

    During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.

  10. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  11. Preventing messaging queue deadlocks in a DMA environment

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  12. Outpatient blood pressure monitoring using bi-directional text messaging.

    Anthony, Chris A; Polgreen, Linnea A; Chounramany, James; Foster, Eric D; Goerdt, Christopher J; Miller, Michelle L; Suneja, Manish; Segre, Alberto M; Carter, Barry L; Polgreen, Philip M

    2015-05-01

    To diagnose hypertension, multiple blood pressure (BP) measurements are recommended. We randomized patients into three groups: EMR-only (patients recorded BP measurements in an electronic medical record [EMR] web portal), EMR + reminders (patients were sent text message reminders to record their BP measurements in the EMR), and bi-directional text messaging (patients were sent a text message asking them to respond with their current BP). Subjects were asked to complete 14 measurements. Automated messages were sent to each patient in the bi-directional text messaging and EMR + reminder groups twice daily. Among 121 patients, those in the bi-directional text messaging group reported the full 14 measurements more often than both the EMR-only group (P text messaging is an effective way to gather patient BP data. Text-message-based reminders alone are an effective way to encourage patients to record BP measurements. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  13. Effects of Instant Messaging on School Performance in Adolescents.

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  14. A synchronous serial bus for multidimensional array acoustic logging tool

    Men, Baiyong; Ju, Xiaodong; Lu, Junqiang; Qiao, Wenxiao

    2016-12-01

    In high-temperature and spatial borehole applications, a distributed structure is employed in a multidimensional array acoustic logging tool (MDALT) based on a phased array technique for electronic systems. However, new challenges, such as synchronous multichannel data acquisition, multinode real-time control and bulk data transmission in a limited interval, have emerged. To address these challenges, we developed a synchronous serial bus (SSB) in this study. SSB works in a half-duplex mode via a master-slave architecture. It also consists of a single master, several slaves, a differential clock line and a differential data line. The clock line is simplex, whereas the data line is half-duplex and synchronous to the clock line. A reliable communication between the master and the slaves with real-time adjustment of synchronisation is achieved by rationally designing the frame format and protocol of communication and by introducing a scramble code and a Hamming error-correcting code. The control logic of the master and the slaves is realized in field programmable gate array (FPGA) or complex programmable logic device (CPLD). The clock speed of SSB is 10 MHz, the effective data rate of the bulk data transmission is over 99%, and the synchronous errors amongst the slaves are less than 10 ns. Room-temperature test, high-temperature test (175 °C) and field test demonstrate that the proposed SSB is qualified for MDALT.

  15. The Effectiveness of Campaign Messages on Turnout and Vote Choice

    Friedel, Sylvia

    2013-01-01

    In this dissertation, I study campaign effects on turnout and vote choice. I analyze different campaign messages and the way they affect voters across various situations. First, through an online survey experiment, I study the impact of campaign messages and ideological cues on voters as they make inferences on candidates. Next, through a field experiment, I test whether microtargeted messages or general messages on the economy have any effect on turnout. Lastly, using online survey data, I e...

  16. Flow of emotional messages in artificial social networks

    Chmiel, Anna; Holyst, Janusz A.

    2010-01-01

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account t...

  17. Generalized localization for the double trigonometric Fourier series and the Walsh-Fourier series of functions in L log +L log + log +L

    Bloshanskaya, S K; Bloshanskii, I L; Roslova, T Y

    1998-01-01

    For an arbitrary open set Ω subset of I 2 =[0,1) 2 and an arbitrary function f element of L log + L log + log + L(I 2 ) such that f=0 on Ω the double Fourier series of f with respect to the trigonometric system Ψ=E and the Walsh-Paley system Ψ=W is shown to converge to zero (over rectangles) almost everywhere on Ω. Thus, it is proved that generalized localization almost everywhere holds on arbitrary open subsets of the square I 2 for the double trigonometric Fourier series and the Walsh-Fourier series of functions in the class L log + L log + log + L (in the case of summation over rectangles). It is also established that such localization breaks down on arbitrary sets that are not dense in I 2 , in the classes Φ Ψ (L)(I 2 ) for the orthonormal system Ψ=E and an arbitrary function such that Φ E (u)=o(u log + log + u) as u→∞ or for Φ W (u)=u( log + log + u) 1-ε , 0<ε<1

  18. Permeability log using new lifetime measurements

    Dowling, D.J.; Boyd, J.F.; Fuchs, J.A.

    1975-01-01

    Comparative measurements of thermal neutron decay time are obtained for a formation after irradiation with a pulsed neutron source. Chloride ions in formation fluids are concentrated by the electrosmosis effect using charged poles on a well logging sonde. The formation is irradiated with fast neutrons and a first comparative measure of the thermal neutron decay time or neutron lifetime is taken. The chloride ions are then dispersed by acoustic pumping with a magnetostrictive transducer. The formation is then again irradiated with fast neutrons and a comparative measure of neutron lifetime is taken. The comparison is a function of the variation in chloride concentration between the two measurements which is related to formation permeability

  19. Pulsed neutron source well logging system

    Dillingham, M.E.

    1975-01-01

    A pulsed neutron source arrangement is provided in which a sealed cylindrical chamber encloses a rotatable rotor member carrying a plurality of elongated target strips of material which emits neutrons when bombarded with alpha particles emitted by the plurality of source material strips. The rotor may be locked in a so-called ON position by an electromagnetic clutch drive mechanism controllable from the earth's surface so as to permit the making of various types of logs utilizing a continuously emitting neutron source. (Patent Office Record)

  20. On conditional independence and log-convexity

    Matúš, František

    2012-01-01

    Roč. 48, č. 4 (2012), s. 1137-1147 ISSN 0246-0203 R&D Projects: GA AV ČR IAA100750603; GA ČR GA201/08/0539 Institutional support: RVO:67985556 Keywords : Conditional independence * Markov properties * factorizable distributions * graphical Markov models * log-convexity * Gibbs- Markov equivalence * Markov fields * Gaussian distributions * positive definite matrices * covariance selection model Subject RIV: BA - General Mathematics Impact factor: 0.933, year: 2012 http://library.utia.cas.cz/separaty/2013/MTR/matus-0386229.pdf

  1. New radio meteor detecting and logging software

    Kaufmann, Wolfgang

    2017-08-01

    A new piece of software ``Meteor Logger'' for the radio observation of meteors is described. It analyses an incoming audio stream in the frequency domain to detect a radio meteor signal on the basis of its signature, instead of applying an amplitude threshold. For that reason the distribution of the three frequencies with the highest spectral power are considered over the time (3f method). An auto notch algorithm is developed to prevent the radio meteor signal detection from being jammed by a present interference line. The results of an exemplary logging session are discussed.

  2. Zope based electronic operation log system - Zlog

    Yoshii, K.; Satoh, Y.; Kitabayashi, T.

    2004-01-01

    Since January 2004, the Zope based electronic operation logging system, named Zlog, has been running at the KEKB and AR accelerator facilities. Since Zope is the python based open source web application server software and python language is familiar for the members in the KEKB accelerator control group, we have developed the Zlog system rapidly. In this paper, we report the development history and the present status of Zlog system. Also we show some general plug-in components, called Zope products, have been useful for our Zlog development. (author)

  3. Well logging. Acquisition and applications; Diagraphies. Acquisition et applications

    Serra, O.; Serra, L.

    2001-07-01

    This reference book on wire-line and LWD well logging covers all geophysical methods of underground survey in a synthetic, visual and dynamical way. It treats of: the physical principle of well logging measurements, the different types of existing probes, the factors that can influence the measurements, and the applications of these measurements. The following well-logging methods are reviewed: resistivity; electromagnetic wave propagation; magnetic susceptibility and magnetic field; spontaneous potential; nuclear logging: natural gamma radioactivity, density logging, photoelectric index, neutron emission probes, hydrogen index or neutron porosity, neutron induced gamma spectroscopy, neutron relaxation time, NMR; acoustic measurements: sonic logging, seismic profiles; texture, structure and stratigraphy data acquisition; borehole diameter measurement; temperature measurement; wire sampling methods; place and role of well-logging in petroleum exploration; well-logging programs. (J.S.)

  4. Shiitake mushroom production on small diameter oak logs in Ohio

    S.M. Bratkovich

    1991-01-01

    Yields of different strains of shiitake mushrooms (Lentinus edodes) were evaluated when produced on small diameter oak logs in Ohio. Logs averaging between 3-4 inches in diameter were inoculated with four spawn strains in 1985.

  5. Teaching Students the Persuasive Message through Small Group Activity

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  6. Using Text-Messaging in the Secondary Classroom

    Thomas, Kevin; Orthober, Corrie

    2011-01-01

    To examine the potential uses of and barriers to text-messaging in secondary schools, three classes (66 students) of high school students used their personal mobile phones to receive out of school, course-related text-messages from teachers. Forty-six students (70%) agreed to receive text-messages. Findings indicate that participants found…

  7. Driver memory for in-vehicle visual and auditory messages

    1999-12-01

    Three experiments were conducted in a driving simulator to evaluate effects of in-vehicle message modality and message format on comprehension and memory for younger and older drivers. Visual icons and text messages were effective in terms of high co...

  8. Understanding health food messages on Twitter for health literacy promotion.

    Zhou, J; Liu, F; Zhou, H

    2018-05-01

    With the popularity of social media, Twitter has become an important tool to promote health literacy. However, many health-related messages on Twitter are dead-ended and cannot reach many people. This is unhelpful for health literacy promotion. This article aims to examine the features of online health food messages that people like to retweet. We adopted rumour theory as our theoretical foundation and extracted seven characteristics (i.e. emotional valence, attractiveness, sender's authoritativeness, external evidence, argument length, hashtags, and direct messages). A total of 10,025 health-related messages on Twitter were collected, and 1496 messages were randomly selected for further analysis. Each message was treated as one unit and then coded. All the hypotheses were tested with logistic regression. Emotional valence, attractiveness, sender's authoritativeness, argument length, and direct messages in a Twitter message had positive effects on people's retweet behaviour. The effect of external evidence was negative. Hashtags had no significant effect after consideration of other variables. Online health food messages containing positive emotions, including pictures, containing direct messages, having an authoritative sender, having longer arguments, or not containing external URLs are more likely to be retweeted. However, a message only containing positive or negative emotions or including direct messages without any support information will not be retweeted.

  9. Lol: New Language and Spelling in Instant Messaging

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  10. 19 CFR 4.7d - Container status messages.

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements pursuant...

  11. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive

  12. MMS: An electronic message management system for emergency response

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    among messages can be viewed in a graphic tree-like display. By employing the extensive filtration facilities offered by the MMS. users are able to monitor the current status of messages. And, in general, filtration provides users with means of surveying a possibly large number of responses to messages...... contingency plan and procedures to be applied during predefined stages of an emergency....

  13. Log and tree sawing times for hardwood mills

    Everette D. Rast

    1974-01-01

    Data on 6,850 logs and 1,181 trees were analyzed to predict sawing times. For both logs and trees, regression equations were derived that express (in minutes) sawing time per log or tree and per Mbf. For trees, merchantable height is expressed in number of logs as well as in feet. One of the major uses for the tables of average sawing times is as a bench mark against...

  14. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  15. Politeness Strategies Used in Text Messaging

    Shahrzad Eshghinejad

    2016-03-01

    Full Text Available One aspect of short message service (SMS communication through a cell phone is use of politeness strategies. As it is extensively argued that females are more polite language users, the present study sought to describe the strategies used by these two groups and to find out whether there is any significant difference between male and female English as a foreign language (EFL learners in the use of positive and negative politeness strategies in sending SMS to their professors, considering that there is an asymmetric power relation and social distance between them. To this end, a corpus of 300 L1 (Persian and L2 (English request messages was compiled. Results of qualitative and quantitative data analysis showed no significant difference between the two groups. Results of the study have implication in politeness research.

  16. Text Messaging for Addiction: A Review

    Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P.

    2015-01-01

    Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published randomized controlled trials (RCTs) evaluating text messaging-based interventions for tobacco smoking, 4 studies for reducing alcohol consumption, 1 pilot study in former methamphetamine (MA) users, and 1 study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at 6 and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems. PMID:25950596

  17. Mobile text messaging solutions for obesity prevention

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  18. A qualitative analysis of messages to promote smoking cessation among pregnant women.

    Hoek, Janet; Gifford, Heather; Maubach, Ninya; Newcombe, Rhiannon

    2014-11-27

    Although aware that smoking while pregnant presents serious risks to their unborn children, some women continue to smoke and rationalise their dissonance rather than quit. We explored metaphors women used to frame smoking and quitting, then developed cessation messages that drew on these metaphors and examined the perceived effectiveness of these. We used a two-phase qualitative study. Phase one involved 13 in-depth interviews with women who were smoking (or who had smoked) while pregnant. Phase two comprised 22 in-depth interviews with a new sample drawn from the same population. Data were analysed using thematic analysis, which promoted theme identification independently of the research protocol. Participants often described smoking as a choice, a frame that explicitly asserted control over their behaviour. This stance allowed them to counter-argue messages to quit, and distanced them from the risks they created and faced. Messages tested in phase 2 used strong affective appeals as well as themes that stimulated cognitive reflection. Without exception, the messages depicting unwell or distressed children elicited strong emotional responses, were more powerful cessation stimuli, and elicited fewer counter-arguments. Cessation messages that evoke strong affective responses capitalise on the dissonance many women feel when smoking while pregnant and stimulate stronger consideration of quitting. Given the importance of promoting cessation among pregnant women, future campaigns could make greater use of emotional appeals and place less emphasis on informational approaches, which often prompt vigorous counter-arguments. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. Log-Log Convexity of Type-Token Growth in Zipf's Systems

    Font-Clos, Francesc; Corral, Álvaro

    2015-06-01

    It is traditionally assumed that Zipf's law implies the power-law growth of the number of different elements with the total number of elements in a system—the so-called Heaps' law. We show that a careful definition of Zipf's law leads to the violation of Heaps' law in random systems, with growth curves that have a convex shape in log-log scale. These curves fulfill universal data collapse that only depends on the value of Zipf's exponent. We observe that real books behave very much in the same way as random systems, despite the presence of burstiness in word occurrence. We advance an explanation for this unexpected correspondence.

  20. Data Cleaning Methods for Client and Proxy Logs

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a