WorldWideScience

Sample records for message passing schemes

  1. Generalized Approximate Message Passing

    DEFF Research Database (Denmark)

    Oxvig, Christian Schou; Arildsen, Thomas; Larsen, Torben

    2017-01-01

    This tech report details a collection of results related to the Generalised Approximate Message Passing (GAMP) algorithm. It is a summary of the results that the authors have found critical in understanding the GAMP algorithm. In particular, emphasis is on the details that are crucial in implemen...

  2. Message Passing Framework for Globally Interconnected Clusters

    International Nuclear Information System (INIS)

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  3. Message Passing Framework for Globally Interconnected Clusters

    Science.gov (United States)

    Hafeez, M.; Asghar, S.; Malik, U. A.; Rehman, A.; Riaz, N.

    2011-12-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  4. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  5. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  6. Tracking particles by passing messages between images

    Energy Technology Data Exchange (ETDEWEB)

    Chertkov, Michael [Los Alamos National Laboratory; Kroc, Lukas [Los Alamos National Laboratory; Zdeborova, Lenka [Los Alamos National Laboratory; Krakala, Florent [ESPCI; Vergassola, M [CNRS

    2009-01-01

    Methods to extract information from the tracking of mobile objects/particles have broad interest in biological and physical sciences. Techniques based on the simple criterion of proximity in time-consecutive snapshots are useful to identify the trajectories of the particles. However, they become problematic as the motility and/or the density of the particles increases because of the uncertainties on the trajectories that particles have followed during the acquisition time of the images. Here, we report efficient methods for learning parameters of the dynamics of the particles from their positions in time-consecutive images. Our algorithm belongs to the class of message-passing algorithms, also known in computer science, information theory and statistical physics under the name of Belief Propagation (BP). The algorithm is distributed, thus allowing parallel implementation suitable for computations on multiple machines without significant inter-machine overhead. We test our method on the model example of particle tracking in turbulent flows, which is particularly challenging due to the strong transport that those flows produce. Our numerical experiments show that the BP algorithm compares in quality with exact Markov Chain Monte-Carlo algorithms, yet BP is far superior in speed. We also suggest and analyze a random-distance model that provides theoretical justification for BP accuracy. Methods developed here systematically formulate the problem of particle tracking and provide fast and reliable tools for its extensive range of applications.

  7. Parallelization of a hydrological model using the message passing interface

    Science.gov (United States)

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  8. Message passing with a limited number of DMA byte counters

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael [Rochester, MN; Chen, Dong [Croton on Hudson, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  9. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  10. Analysis and Design of Binary Message-Passing Decoders

    DEFF Research Database (Denmark)

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2012-01-01

    Binary message-passing decoders for low-density parity-check (LDPC) codes are studied by using extrinsic information transfer (EXIT) charts. The channel delivers hard or soft decisions and the variable node decoder performs all computations in the L-value domain. A hard decision channel results i...

  11. Message Passing on a Time-predictable Multicore Processor

    DEFF Research Database (Denmark)

    Sørensen, Rasmus Bo; Puffitsch, Wolfgang; Schoeberl, Martin

    2015-01-01

    Real-time systems need time-predictable computing platforms. For a multicore processor to be time-predictable, communication between processor cores needs to be time-predictable as well. This paper presents a time-predictable message-passing library for such a platform. We show how to build up...

  12. EXIT Chart Analysis of Binary Message-Passing Decoders

    DEFF Research Database (Denmark)

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2007-01-01

    Binary message-passing decoders for LDPC codes are analyzed using EXIT charts. For the analysis, the variable node decoder performs all computations in the L-value domain. For the special case of a hard decision channel, this leads to the well know Gallager B algorithm, while the analysis can...

  13. A message passing algorithm for the evaluation of social influence

    NARCIS (Netherlands)

    Vassio, Luca; Fagnani, Fabio; Frasca, Paolo; Ozdaglar, Asuman

    2014-01-01

    In this paper, we define a new measure of node centrality in social networks, the Harmonic Influence Centrality, which emerges naturally in the study of social influence over networks. Next, we introduce a distributed message passing algorithm to compute the Harmonic Influence Centrality of each

  14. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first......, that suffer from the state-explosion problem or that otherwise depend on parameters to the program itself. We experimentally evaluated our approach against state-of-the-art tools for MPI to conclude that our approach offers a scalable solution....

  15. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  16. S-AMP: Approximate Message Passing for General Matrix Ensembles

    DEFF Research Database (Denmark)

    Cakmak, Burak; Winther, Ole; Fleury, Bernard H.

    2014-01-01

    We propose a novel iterative estimation algorithm for linear observation models called S-AMP. The fixed points of S-AMP are the stationary points of the exact Gibbs free energy under a set of (first- and second-) moment consistency constraints in the large system limit. S-AMP extends...... the approximate message-passing (AMP) algorithm to general matrix ensembles with a well-defined large system size limit. The generalization is based on the S-transform (in free probability) of the spectrum of the measurement matrix. Furthermore, we show that the optimality of S-AMP follows directly from its...

  17. Quantum cluster variational method and message passing algorithms revisited

    Science.gov (United States)

    Domínguez, E.; Mulet, Roberto

    2018-02-01

    We present a general framework to study quantum disordered systems in the context of the Kikuchi's cluster variational method (CVM). The method relies in the solution of message passing-like equations for single instances or in the iterative solution of complex population dynamic algorithms for an average case scenario. We first show how a standard application of the Kikuchi's CVM can be easily translated to message passing equations for specific instances of the disordered system. We then present an "ad hoc" extension of these equations to a population dynamic algorithm representing an average case scenario. At the Bethe level, these equations are equivalent to the dynamic population equations that can be derived from a proper cavity ansatz. However, at the plaquette approximation, the interpretation is more subtle and we discuss it taking also into account previous results in classical disordered models. Moreover, we develop a formalism to properly deal with the average case scenario using a replica-symmetric ansatz within this CVM for quantum disordered systems. Finally, we present and discuss numerical solutions of the different approximations for the quantum transverse Ising model and the quantum random field Ising model in two-dimensional lattices.

  18. Optimal mapping of neural-network learning on message-passing multicomputers

    Science.gov (United States)

    Chu, Lon-Chan; Wah, Benjamin W.

    1992-01-01

    A minimization of learning-algorithm completion time is sought in the present optimal-mapping study of the learning process in multilayer feed-forward artificial neural networks (ANNs) for message-passing multicomputers. A novel approximation algorithm for mappings of this kind is derived from observations of the dominance of a parallel ANN algorithm over its communication time. Attention is given to both static and dynamic mapping schemes for systems with static and dynamic background workloads, as well as to experimental results obtained for simulated mappings on multicomputers with dynamic background workloads.

  19. Mapping a battlefield simulation onto message-passing parallel architectures

    Science.gov (United States)

    Nicol, David M.

    1987-01-01

    Perhaps the most critical problem in distributed simulation is that of mapping: without an effective mapping of workload to processors the speedup potential of parallel processing cannot be realized. Mapping a simulation onto a message-passing architecture is especially difficult when the computational workload dynamically changes as a function of time and space; this is exactly the situation faced by battlefield simulations. This paper studies an approach where the simulated battlefield domain is first partitioned into many regions of equal size; typically there are more regions than processors. The regions are then assigned to processors; a processor is responsible for performing all simulation activity associated with the regions. The assignment algorithm is quite simple and attempts to balance load by exploiting locality of workload intensity. The performance of this technique is studied on a simple battlefield simulation implemented on the Flex/32 multiprocessor. Measurements show that the proposed method achieves reasonable processor efficiencies. Furthermore, the method shows promise for use in dynamic remapping of the simulation.

  20. Parallelized direct execution simulation of message-passing parallel programs

    Science.gov (United States)

    Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.

    1994-01-01

    As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.

  1. A proposal for a user-level, message passing interface in a distributed memory environment

    Energy Technology Data Exchange (ETDEWEB)

    Dongarra, J.J. (Tennessee Univ., Knoxville, TN (United States). Dept. of Computer Science Oak Ridge National Lab., TN (United States)); Hempel, R. (Gesellschaft fuer Mathematik und Datenverarbeitung mbH Bonn, Sankt Augustin (Germany)); Hey, A.J.G. (Southampton Univ. (United Kingdom). Dept. of Electronics and Computer Science); Walker, D.W. (Oak Ridge National Lab., TN (United States))

    1993-02-01

    This paper describes Message Passing Interface 1 (MPI1), a proposed library interface standard for supporting point-to-point message passing. The intended standard will be provided with Fortran 77 and C interfaces, and will form the basis of a standard high level communication environment featuring collective communication and data distribution transformations. The standard proposed here provides blocking, nonblocking, and synchronized message passing between pairs of processes, with message selectivity by source process and message type. Provision is made for noncontiguous messages. Context control provides a convenient means of avoiding message selectivity conflicts between different phases of an application. The ability to form and manipulate process groups permits task parallelism to be exploited, and is a useful abstraction in controlling certain types of collective communication.

  2. A Fine-Grain, Message-Passing Processing Node,

    Science.gov (United States)

    1987-11-01

    is 2Ons. Wormhole routing (71 [8] [19] is used to give an idle-network latency of 201)+80L ns, where D is the distance in channels and L is the message...The NDFs deliver a message using wormhole routing. Buffering com- presses the message when blockage occurs. to (4,2) is in use). The tail of the message...Parallel Processor Overvie, BBN Report No. 6148, March 1986. [4] Blahut, Richard E., Theory and Practice of Error Control Codes, Addison- Wesley, 1983, pp

  3. Communication strategies for angular domain decomposition of transport calculations on message passing multiprocessors

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1997-01-01

    The effect of three communication schemes for solving Arbitrarily High Order Transport (AHOT) methods of the Nodal type on parallel performance is examined via direct measurements and performance models. The target architecture in this study is Oak Ridge National Laboratory's 128 node Paragon XP/S 5 computer and the parallelization is based on the Parallel Virtual Machine (PVM) library. However, the conclusions reached can be easily generalized to a large class of message passing platforms and communication software. The three schemes considered here are: (1) PVM's global operations (broadcast and reduce) which utilizes the Paragon's native corresponding operations based on a spanning tree routing; (2) the Bucket algorithm wherein the angular domain decomposition of the mesh sweep is complemented with a spatial domain decomposition of the accumulation process of the scalar flux from the angular flux and the convergence test; (3) a distributed memory version of the Bucket algorithm that pushes the spatial domain decomposition one step farther by actually distributing the fixed source and flux iterates over the memories of the participating processes. Their conclusion is that the Bucket algorithm is the most efficient of the three if all participating processes have sufficient memories to hold the entire problem arrays. Otherwise, the third scheme becomes necessary at an additional cost to speedup and parallel efficiency that is quantifiable via the parallel performance model

  4. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  5. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  6. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  7. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

    Science.gov (United States)

    Xu, Ke; Liao, Yongjian; Qiao, Li; Liu, Zhangyun; Yang, Xiaowei

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely.

  8. A study of application sensitivity to variation in message passing latency and bandwidth

    Energy Technology Data Exchange (ETDEWEB)

    Worley, P.H.; Mackay, D.R. [Oak Ridge National Lab., TN (United States); Robinson, A.C. [Sandia National Labs, Albuquerque, NM (United States); Barragy, E.J. [Intel Corp., Beaverton, OR (United States)

    1996-06-01

    This study measures the effects of changes in message latency and bandwidth for production-level codes on a current generation tightly coupled MPP, the Intel Paragon. Messages are sent multiple times to study the application sensitivity to variations in band - width and latency. This method preserves the effects of contention on the interconnection network. Two applications are studied, PCTH, a shock physics code developed at Sandia National Laboratories, and PSTSWM, a spectral shallow water code developed at Oak Ridge National Laboratory and Argonne National Laboratory. These codes are significant in that PCTH is a {open_quote}full physics{close_quotes} application code in production use, while PSTSWM serves as a parallel algorithm test bed and benchmark for production codes used in atmospheric modeling. They are also significant in that the message-passing behavior differs significantly between the two codes, each representing an important class of scientific message-passing applications.

  9. MPWide: a light-weight library for efficient message passing over wide area networks

    Directory of Open Access Journals (Sweden)

    Derek Groen

    2013-12-01

    Full Text Available We present MPWide, a light weight communication library which allows efficient message passing over a distributed network. MPWide has been designed to connect application running on distributed (supercomputing resources, and to maximize the communication performance on wide area networks for those without administrative privileges. It can be used to provide message-passing between application, move files, and make very fast connections in client-server environments. MPWide has already been applied to enable distributed cosmological simulations across up to four supercomputers on two continents, and to couple two different bloodflow simulations to form a multiscale simulation.

  10. McMPI – a managed-code message passing interface library for high performance communication in C#

    OpenAIRE

    Holmes, Daniel John

    2012-01-01

    This work endeavours to achieve technology transfer between established best-practice in academic high-performance computing and current techniques in commercial high-productivity computing. It shows that a credible high-performance message-passing communication library, with semantics and syntax following the Message-Passing Interface (MPI) Standard, can be built in pure C# (one of the .Net suite of computer languages). Message-passing has been the dominant paradigm in high-pe...

  11. Delay-Insensitive Synchronization on a Message-Passing Architecture with an Open Collector Bus

    NARCIS (Netherlands)

    Bekker, H.; Dijkstra, E.J.

    1996-01-01

    The performance of some algorithms, running on a message passing computer; is limited by the high latency of global communications. To increase the performance, a simple open collector bus, operated by delay insensitive programs running on each processor can be used. We illustrate this by an

  12. The Edge-Disjoint Path Problem on Random Graphs by Message-Passing.

    Science.gov (United States)

    Altarelli, Fabrizio; Braunstein, Alfredo; Dall'Asta, Luca; De Bacco, Caterina; Franz, Silvio

    2015-01-01

    We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length.

  13. Unsupervised feature learning from finite data by message passing: Discontinuous versus continuous phase transition.

    Science.gov (United States)

    Huang, Haiping; Toyoizumi, Taro

    2016-12-01

    Unsupervised neural network learning extracts hidden features from unlabeled training data. This is used as a pretraining step for further supervised learning in deep networks. Hence, understanding unsupervised learning is of fundamental importance. Here, we study the unsupervised learning from a finite number of data, based on the restricted Boltzmann machine where only one hidden neuron is considered. Our study inspires an efficient message-passing algorithm to infer the hidden feature and estimate the entropy of candidate features consistent with the data. Our analysis reveals that the learning requires only a few data if the feature is salient and extensively many if the feature is weak. Moreover, the entropy of candidate features monotonically decreases with data size and becomes negative (i.e., entropy crisis) before the message passing becomes unstable, suggesting a discontinuous phase transition. In terms of convergence time of the message-passing algorithm, the unsupervised learning exhibits an easy-hard-easy phenomenon as the training data size increases. All these properties are reproduced in an approximate Hopfield model, with an exception that the entropy crisis is absent, and only continuous phase transition is observed. This key difference is also confirmed in a handwritten digits dataset. This study deepens our understanding of unsupervised learning from a finite number of data and may provide insights into its role in training deep networks.

  14. Main-Branch Structure Iterative Detection Using Approximate Message Passing for Uplink Large-Scale Multiuser MIMO Systems

    Directory of Open Access Journals (Sweden)

    Qifeng Zou

    2016-01-01

    Full Text Available The emerging large-scale/massive multi-input multioutput (MIMO system combined with orthogonal frequency division multiplexing (OFDM is considered a key technology for its advantage of improving the spectral efficiency. In this paper, we introduce an iterative detection algorithm for uplink large-scale multiuser MIMO-OFDM communication systems. We design a Main-Branch structure iterative turbo detector using the Approximate Message Passing algorithm simplified by linear approximation (AMP-LA and using the Mean Square Error (MSE criterion to calculate the correlation coefficients between main detector and branch detector for the given iteration. The complexity of our method is compared with other detection algorithms. The simulation results show that our scheme can achieve better performance than the conventional detection methods and have the acceptable complexity.

  15. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  16. The specification of Stampi, a message passing library for distributed parallel computing

    International Nuclear Information System (INIS)

    Imamura, Toshiyuki; Takemiya, Hiroshi; Koide, Hiroshi

    2000-03-01

    At CCSE, Center for Promotion of Computational Science and Engineering, a new message passing library for heterogeneous and distributed parallel computing has been developed, and it is called as Stampi. Stampi enables us to communicate between any combination of parallel computers as well as workstations. Currently, a Stampi system is constructed from Stampi library and Stampi/Java. It provides functions to connect a Stampi application with not only those on COMPACS, COMplex Parallel Computer System, but also applets which work on WWW browsers. This report summarizes the specifications of Stampi and details the development of its system. (author)

  17. Message and time efficient multi-broadcast schemes

    Directory of Open Access Journals (Sweden)

    Liron Levin

    2013-10-01

    Full Text Available We consider message and time efficient broadcasting and multi-broadcasting in wireless ad-hoc networks, where a subset of nodes, each with a unique rumor, wish to broadcast their rumors to all destinations while minimizing the total number of transmissions and total time until all rumors arrive to their destination. Under centralized settings, we introduce a novel approximation algorithm that provides almost optimal results with respect to the number of transmissions and total time, separately. Later on, we show how to efficiently implement this algorithm under distributed settings, where the nodes have only local information about their surroundings. In addition, we show multiple approximation techniques based on the network collision detection capabilities and explain how to calibrate the algorithms' parameters to produce optimal results for time and messages.

  18. Comparative Study of Message Passing and Shared Memory Parallel Programming Models in Neural Network Training

    Energy Technology Data Exchange (ETDEWEB)

    Vitela, J.; Gordillo, J.; Cortina, L; Hanebutte, U.

    1999-12-14

    It is presented a comparative performance study of a coarse grained parallel neural network training code, implemented in both OpenMP and MPI, standards for shared memory and message passing parallel programming environments, respectively. In addition, these versions of the parallel training code are compared to an implementation utilizing SHMEM the native SGI/CRAY environment for shared memory programming. The multiprocessor platform used is a SGI/Cray Origin 2000 with up to 32 processors. It is shown that in this study, the native CRAY environment outperforms MPI for the entire range of processors used, while OpenMP shows better performance than the other two environments when using more than 19 processors. In this study, the efficiency is always greater than 60% regardless of the parallel programming environment used as well as of the number of processors.

  19. Message passing for integrating and assessing renewable generation in a redundant power grid

    Energy Technology Data Exchange (ETDEWEB)

    Zdeborova, Lenka [Los Alamos National Laboratory; Backhaus, Scott [Los Alamos National Laboratory; Chertkov, Michael [Los Alamos National Laboratory

    2009-01-01

    A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchable so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.

  20. Parallelization of the TRIGRS model for rainfall-induced landslides using the message passing interface

    Science.gov (United States)

    Alvioli, M.; Baum, R.L.

    2016-01-01

    We describe a parallel implementation of TRIGRS, the Transient Rainfall Infiltration and Grid-Based Regional Slope-Stability Model for the timing and distribution of rainfall-induced shallow landslides. We have parallelized the four time-demanding execution modes of TRIGRS, namely both the saturated and unsaturated model with finite and infinite soil depth options, within the Message Passing Interface framework. In addition to new features of the code, we outline details of the parallel implementation and show the performance gain with respect to the serial code. Results are obtained both on commercial hardware and on a high-performance multi-node machine, showing the different limits of applicability of the new code. We also discuss the implications for the application of the model on large-scale areas and as a tool for real-time landslide hazard monitoring.

  1. Approximate message passing for nonconvex sparse regularization with stability and asymptotic analysis

    Science.gov (United States)

    Sakata, Ayaka; Xu, Yingying

    2018-03-01

    We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \

  2. Message passing vs. shared address space on a cluster of SMPs

    International Nuclear Information System (INIS)

    Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak

    2001-01-01

    The emergence of scalable computer architectures using clusters of PCs or PC-SMPs with commodity networking has made them attractive platforms for high-end scientific computing. Currently, message passing (MP) and shared address space (SAS) are the two leading programming paradigms for these systems. MP has been standardized with MPI, and is the most common and mature parallel programming approach. However, MP code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, they compare the performance of and programming effort required for six applications under both programming models on a 32-CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of the applications; however, on certain classes of problems, SAS performance is competitive with MPI

  3. Monitoring Data-Structure Evolution in Distributed Message-Passing Programs

    Science.gov (United States)

    Sarukkai, Sekhar R.; Beers, Andrew; Woodrow, Thomas S. (Technical Monitor)

    1996-01-01

    Monitoring the evolution of data structures in parallel and distributed programs, is critical for debugging its semantics and performance. However, the current state-of-art in tracking and presenting data-structure information on parallel and distributed environments is cumbersome and does not scale. In this paper we present a methodology that automatically tracks memory bindings (not the actual contents) of static and dynamic data-structures of message-passing C programs, using PVM. With the help of a number of examples we show that in addition to determining the impact of memory allocation overheads on program performance, graphical views can help in debugging the semantics of program execution. Scalable animations of virtual address bindings of source-level data-structures are used for debugging the semantics of parallel programs across all processors. In conjunction with light-weight core-files, this technique can be used to complement traditional debuggers on single processors. Detailed information (such as data-structure contents), on specific nodes, can be determined using traditional debuggers after the data structure evolution leading to the semantic error is observed graphically.

  4. Using Partial Reconfiguration and Message Passing to Enable FPGA-Based Generic Computing Platforms

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2012-01-01

    Full Text Available Partial reconfiguration (PR is an FPGA feature that allows the modification of certain parts of an FPGA while the rest of the system continues to operate without disruption. This distinctive characteristic of FPGAs has many potential benefits but also challenges. The lack of good CAD tools and the deep hardware knowledge requirement result in a hard-to-use feature. In this paper, the new partition-based Xilinx PR flow is used to incorporate PR within our MPI-based message-passing framework to allow hardware designers to create template bitstreams, which are predesigned, prerouted, generic bitstreams that can be reused for multiple applications. As an example of the generality of this approach, four different applications that use the same template bitstream are run consecutively, with a PR operation performed at the beginning of each application to instantiate the desired application engine. We demonstrate a simplified, reusable, high-level, and portable PR interface for X86-FPGA hybrid machines. PR issues such as local resets of reconfigurable modules and context saving and restoring are addressed in this paper followed by some examples and preliminary PR overhead measurements.

  5. Implementation of a Message Passing Interface into a Cloud-Resolving Model for Massively Parallel Computing

    Science.gov (United States)

    Juang, Hann-Ming Henry; Tao, Wei-Kuo; Zeng, Xi-Ping; Shie, Chung-Lin; Simpson, Joanne; Lang, Steve

    2004-01-01

    The capability for massively parallel programming (MPP) using a message passing interface (MPI) has been implemented into a three-dimensional version of the Goddard Cumulus Ensemble (GCE) model. The design for the MPP with MPI uses the concept of maintaining similar code structure between the whole domain as well as the portions after decomposition. Hence the model follows the same integration for single and multiple tasks (CPUs). Also, it provides for minimal changes to the original code, so it is easily modified and/or managed by the model developers and users who have little knowledge of MPP. The entire model domain could be sliced into one- or two-dimensional decomposition with a halo regime, which is overlaid on partial domains. The halo regime requires that no data be fetched across tasks during the computational stage, but it must be updated before the next computational stage through data exchange via MPI. For reproducible purposes, transposing data among tasks is required for spectral transform (Fast Fourier Transform, FFT), which is used in the anelastic version of the model for solving the pressure equation. The performance of the MPI-implemented codes (i.e., the compressible and anelastic versions) was tested on three different computing platforms. The major results are: 1) both versions have speedups of about 99% up to 256 tasks but not for 512 tasks; 2) the anelastic version has better speedup and efficiency because it requires more computations than that of the compressible version; 3) equal or approximately-equal numbers of slices between the x- and y- directions provide the fastest integration due to fewer data exchanges; and 4) one-dimensional slices in the x-direction result in the slowest integration due to the need for more memory relocation for computation.

  6. A Survey and Comparative Study of Broadcast Warning Message Dissemination Schemes for VANETs

    Directory of Open Access Journals (Sweden)

    Julio A. Sanguesa

    2016-01-01

    Full Text Available Vehicle-to-vehicle (V2V communications also known as vehicular ad hoc networks (VANETs allow vehicles to cooperate to increase driving efficiency and safety on the roads. In particular, they are forecasted as one of the key technologies to increase traffic safety by providing useful traffic services. In this scope, vehicle-to-vehicle dissemination of warning messages to alert nearby vehicles is one of the most significant and representative solutions. The main goal of the different dissemination strategies available is to reduce the message delivery latency of such information while ensuring the correct reception of warning messages in the vehicle’s neighborhood as soon as a dangerous situation occurs. Despite the fact that several dissemination schemes have been proposed so far, their evaluation has been done under different conditions, using different simulators, making it difficult to determine the optimal dissemination scheme for each particular scenario. In this paper, besides reviewing the most relevant broadcast dissemination schemes available in the recent literature, we also provide a fair comparative analysis by evaluating them under the same environmental conditions, focusing on the same metrics, and using the same simulation platform. Overall, we provide researchers with a clear guideline of the benefits and drawbacks associated with each scheme.

  7. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Science.gov (United States)

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  8. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  9. A High Performance Partially-Parallel Irregular LDPC Decoder Based on Sum-Delta Message Passing Schedule

    Science.gov (United States)

    Ji, Wen; Abe, Yuta; Ikenaga, Takeshi; Goto, Satoshi

    In this paper, we propose a partially-parallel irregular LDPC decoder based on IEEE 802.11n standard targeting high throughput and small area applications. The design is based on a novel sum-delta message passing algorithm characterized as follows: (i) Decoding throughput is greatly improved by utilizing the difference value between the updated and the original value to remove redundant computations. (ii) Registers and memory are optimized to store only the frequently used messages to decrease the hardware cost. (iii) Techniques such as binary sorting, parallel column operation, high performance pipelining are used to further speed up the message passing procedure. The synthesis result in TSMC 0.18 CMOS technology demonstrates that for (648, 324) irregular LDPC code, our decoder achieves 7.5X improvement in throughput, which reaches 402Mbps at the frequency of 200MHz, with 11% area reduction. The synthesis result also demonstrates the competitiveness to the fully-parallel regular LDPC decoders in terms of the tradeoff between throughput, area and power.

  10. Distributed primal–dual interior-point methods for solving tree-structured coupled convex problems using message-passing

    DEFF Research Database (Denmark)

    Khoshfetrat Pakazad, Sina; Hansson, Anders; Andersen, Martin S.

    2017-01-01

    In this paper, we propose a distributed algorithm for solving coupled problems with chordal sparsity or an inherent tree structure which relies on primal–dual interior-point methods. We achieve this by distributing the computations at each iteration, using message-passing. In comparison to existing...... distributed algorithms for solving such problems, this algorithm requires far fewer iterations to converge to a solution with high accuracy. Furthermore, it is possible to compute an upper-bound for the number of required iterations which, unlike existing methods, only depends on the coupling structure...... in the problem. We illustrate the performance of our proposed method using a set of numerical examples....

  11. Design of a Message Passing Model for Use in a Heterogeneous CPU-NFP Framework for Network Analytics

    CSIR Research Space (South Africa)

    Pennefather, S

    2017-09-01

    Full Text Available and Applications Conference (SATNAC) 2017 Process A CT Memory Unit Process B Signal: Data Ready Signal: Data Ready Read: Remote Read and SignalRead Signal: Read Complete Write Signal: Write Complete Fig. 5. Breakdown of synchronous message passing within the NFP... provide support for moving data between microengines. This transfer operation is a subset of the reflect operation set and is performed by one of two types of memory units present on the device [26], [27]. Read and write reflect operations occur by first...

  12. The development and performance of a message-passing version of the PAGOSA shock-wave physics code

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, D.R.; Vaughan, C.T.

    1997-10-01

    A message-passing version of the PAGOSA shock-wave physics code has been developed at Sandia National Laboratories for multiple-instruction, multiple-data stream (MIMD) computers. PAGOSA is an explicit, Eulerian code for modeling the three-dimensional, high-speed hydrodynamic flow of fluids and the dynamic deformation of solids under high rates of strain. It was originally developed at Los Alamos National Laboratory for the single-instruction, multiple-data (SIMD) Connection Machine parallel computers. The performance of Sandia`s message-passing version of PAGOSA has been measured on two MIMD machines, the nCUBE 2 and the Intel Paragon XP/S. No special efforts were made to optimize the code for either machine. The measured scaled speedup (computational time for a single computational node divided by the computational time per node for fixed computational load) and grind time (computational time per cell per time step) show that the MIMD PAGOSA code scales linearly with the number of computational nodes used on a variety of problems, including the simulation of shaped-charge jets perforating an oil well casing. Scaled parallel efficiencies for MIMD PAGOSA are greater than 0.70 when the available memory per node is filled (or nearly filled) on hundreds to a thousand or more computational nodes on these two machines, indicating that the code scales very well. Thus good parallel performance can be achieved for complex and realistic applications when they are first implemented on MIMD parallel computers.

  13. The design of multi-core DSP parallel model based on message passing and multi-level pipeline

    Science.gov (United States)

    Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong

    2017-10-01

    Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.

  14. On the adequacy of message-passing parallel supercomputers for solving neutron transport problems

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1990-01-01

    A coarse-grained, static-scheduling parallelization of the standard iterative scheme used for solving the discrete-ordinates approximation of the neutron transport equation is described. The parallel algorithm is based on a decomposition of the angular domain along the discrete ordinates, thus naturally producing a set of completely uncoupled systems of equations in each iteration. Implementation of the parallel code on Intcl's iPSC/2 hypercube, and solutions to test problems are presented as evidence of the high speedup and efficiency of the parallel code. The performance of the parallel code on the iPSC/2 is analyzed, and a model for the CPU time as a function of the problem size (order of angular quadrature) and the number of participating processors is developed and validated against measured CPU times. The performance model is used to speculate on the potential of massively parallel computers for significantly speeding up real-life transport calculations at acceptable efficiencies. We conclude that parallel computers with a few hundred processors are capable of producing large speedups at very high efficiencies in very large three-dimensional problems. 10 refs., 8 figs

  15. Statistical Physics, Optimization, Inference, and Message-Passing Algorithms : Lecture Notes of the Les Houches School of Physics : Special Issue, October 2013

    CERN Document Server

    Ricci-Tersenghi, Federico; Zdeborova, Lenka; Zecchina, Riccardo; Tramel, Eric W; Cugliandolo, Leticia F

    2015-01-01

    This book contains a collection of the presentations that were given in October 2013 at the Les Houches Autumn School on statistical physics, optimization, inference, and message-passing algorithms. In the last decade, there has been increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization, and inference problems. In particular, much theoretical and applied work in statistical physics and computer science has relied on the use of message-passing algorithms and their connection to the statistical physics of glasses and spin glasses. For example, both the replica and cavity methods have led to recent advances in compressed sensing, sparse estimation, and random constraint satisfaction, to name a few. This book’s detailed pedagogical lectures on statistical inference, computational complexity, the replica and cavity methods, and belief propagation are aimed particularly at PhD students, post-docs, and young researchers desir...

  16. Grading Scheme for Veterinary Student Performance in Pass-Fail Didactic Surgery

    Science.gov (United States)

    Mann, F. A.; March, Zachary; Tomlinson, James L.; Pope, Eric R.; Cook, James L.; Wagner-Mann, Colette C.; Yoon, Hun-Young

    2009-01-01

    A retrospective study was performed to evaluate a satisfactory/unsatisfactory (S/U) grading scheme in a didactic surgery laboratory during the first 3 years of implementation (2002-2004) and identify areas for improvement that might be adapted to this course or similar courses. Each instructor graded six students per session by assigning a…

  17. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  18. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-11-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  19. Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis

    Czech Academy of Sciences Publication Activity Database

    Čelikovský, Sergej; Lynnyk, Volodymyr

    2016-01-01

    Roč. 26, č. 8 (2016), 1650140-1-1650140-15 ISSN 0218-1274 R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Chaotic masking * generalized Lorenz system * message embedded synchronization Subject RIV: BC - Control System s Theory Impact factor: 1.329, year: 2016 http://library.utia.cas.cz/separaty/2016/TR/celikovsky-0461536.pdf

  20. A Rate-Splitting Based Bound-Approaching Transmission Scheme for the Two-User Symmetric Gaussian Interference Channel with Common Messages

    Directory of Open Access Journals (Sweden)

    B. ZHANG

    2012-12-01

    Full Text Available This paper is concerned with a rate-splitting based transmission strategy for the two-user symmetric Gaussian interference channel that contains common messages only. Each transmitter encodes its common message into multiple layers by multiple codebooks that drawn from one separate code book, and transmits the superposition of the messages corresponding to these layers; each receiver decodes the messages from all layers of the two users successively. Two schemes are proposed for decoding order and optimal power allocation among layers respectively. With the proposed decoding order scheme, the sum-rate can be increased by rate-splitting, especially at the optimal number of rate-splitting, using average power allocation in moderate and weak interference regime. With the two proposed schemes at the receiver and the transmitter respectively, the sum-rate achieves the inner bound of HK without time-sharing. Numerical results show that the proposed optimal power allocation scheme with the proposed decoding order can achieve significant improvement of the performance over equal power allocation, and achieve the sum-rate within two bits per channel use (bits/channel use of the sum capacity.

  1. Task-parallel message passing interface implementation of Autodock4 for docking of very large databases of compounds using high-performance super-computers.

    Science.gov (United States)

    Collignon, Barbara; Schulz, Roland; Smith, Jeremy C; Baudry, Jerome

    2011-04-30

    A message passing interface (MPI)-based implementation (Autodock4.lga.MPI) of the grid-based docking program Autodock4 has been developed to allow simultaneous and independent docking of multiple compounds on up to thousands of central processing units (CPUs) using the Lamarkian genetic algorithm. The MPI version reads a single binary file containing precalculated grids that represent the protein-ligand interactions, i.e., van der Waals, electrostatic, and desolvation potentials, and needs only two input parameter files for the entire docking run. In comparison, the serial version of Autodock4 reads ASCII grid files and requires one parameter file per compound. The modifications performed result in significantly reduced input/output activity compared with the serial version. Autodock4.lga.MPI scales up to 8192 CPUs with a maximal overhead of 16.3%, of which two thirds is due to input/output operations and one third originates from MPI operations. The optimal docking strategy, which minimizes docking CPU time without lowering the quality of the database enrichments, comprises the docking of ligands preordered from the most to the least flexible and the assignment of the number of energy evaluations as a function of the number of rotatable bounds. In 24 h, on 8192 high-performance computing CPUs, the present MPI version would allow docking to a rigid protein of about 300K small flexible compounds or 11 million rigid compounds.

  2. On a two-pass scheme without a faraday mirror for free-space relativistic quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kravtsov, K. S.; Radchenko, I. V. [Russian Academy of Sciences, Prokhorov General Physics Institute (Russian Federation); Korol' kov, A. V. [Academy of Cryptography (Russian Federation); Kulik, S. P., E-mail: sergei.kulik@gmail.com [Moscow State University (Russian Federation); Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Academy of Cryptography (Russian Federation)

    2013-05-15

    The stability of destructive interference independent of the input polarization and the state of a quantum communication channel in fiber optic systems used in quantum cryptography plays a principal role in providing the security of communicated keys. A novel optical scheme is proposed that can be used both in relativistic quantum cryptography for communicating keys in open space and for communicating them over fiber optic lines. The scheme ensures stability of destructive interference and admits simple automatic balancing of a fiber interferometer.

  3. Multiple node remote messaging

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  4. Public-channel cryptography based on mutual chaos pass filters.

    Science.gov (United States)

    Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido

    2006-10-01

    We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.

  5. Communication Improvement for the LU NAS Parallel Benchmark: A Model for Efficient Parallel Relaxation Schemes

    Science.gov (United States)

    Yarrow, Maurice; VanderWijngaart, Rob; Kutler, Paul (Technical Monitor)

    1997-01-01

    The first release of the MPI version of the LU NAS Parallel Benchmark (NPB2.0) performed poorly compared to its companion NPB2.0 codes. The later LU release (NPB2.1 & 2.2) runs up to two and a half times faster, thanks to a revised point access scheme and related communications scheme. The new scheme sends substantially fewer messages. is cache "friendly", and has a better load balance. We detail the, observations and modifications that resulted in this efficiency improvement, and show that the poor behavior of the original code resulted from deriving a message passing scheme from an algorithm originally devised for a vector architecture.

  6. Message-passing algorithms for compressed sensing

    Science.gov (United States)

    Donoho, David L.; Maleki, Arian; Montanari, Andrea

    2009-01-01

    Compressed sensing aims to undersample certain high-dimensional signals yet accurately reconstruct them by exploiting signal characteristics. Accurate reconstruction is possible when the object to be recovered is sufficiently sparse in a known basis. Currently, the best known sparsity–undersampling tradeoff is achieved when reconstructing by convex optimization, which is expensive in important large-scale applications. Fast iterative thresholding algorithms have been intensively studied as alternatives to convex optimization for large-scale problems. Unfortunately known fast algorithms offer substantially worse sparsity–undersampling tradeoffs than convex optimization. We introduce a simple costless modification to iterative thresholding making the sparsity–undersampling tradeoff of the new algorithms equivalent to that of the corresponding convex optimization procedures. The new iterative-thresholding algorithms are inspired by belief propagation in graphical models. Our empirical measurements of the sparsity–undersampling tradeoff for the new algorithms agree with theoretical calculations. We show that a state evolution formalism correctly derives the true sparsity–undersampling tradeoff. There is a surprising agreement between earlier calculations based on random convex polytopes and this apparently very different theoretical formalism. PMID:19858495

  7. Passing excellence

    Science.gov (United States)

    Tsoupikova, Daria

    2007-02-01

    This paper describes the research and development of a virtual reality visualization project "Passing excellence" about the world famous architectural ensemble "Kizhi". The Kizhi Pogost is located on an island in Lake Onega in northern Karelia in Russia. It is an authentic museum of an ancient wood building tradition which presents a unique artistic achievement. This ensemble preserves a concentration of masterpieces of the Russian heritage and is included in the List of Most Endangered Sites of the World Monuments Watch protected by World Heritage List of UNESCO. The project strives to create a unique virtual observation of the dynamics of the architectural changes of the museum area beginning from the 15th Century up to the 21st Century. The visualization is being created to restore the original architecture of Kizhi island based on the detailed photographs, architectural and geometric measurements, textural data, video surveys and resources from the Kizhi State Open-Air Museum archives. The project is being developed using Electro, an application development environment for the tiled display high-resolution graphics visualization system and can be shown on the virtual reality systems such as the GeoWall TM and the C-Wall.

  8. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  9. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation......With the rapid growth of new wireless communication standards, a solution that is able to provide a seamless shift between existing wireless protocols and high flexibility as well as capacity is crucial. Software Defined Radio (SDR) technology offers this flexibility. It gives the possibility...

  10. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  11. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  12. Quantum identification schemes with entanglements

    International Nuclear Information System (INIS)

    Mihara, Takashi

    2002-01-01

    We need secure identification schemes because many situations exist in which a person must be identified. In this paper, we propose three quantum identification schemes with entanglements. First, we propose a quantum one-time pad password scheme. In this scheme, entanglements play the role of a one-time pad password. Next, we propose a quantum identification scheme that requires a trusted authority. Finally, we propose a quantum message authentication scheme that is constructed by combining a different quantum cryptosystem with an ordinary authentication tag

  13. Robust second-order scheme for multi-phase flow computations

    Science.gov (United States)

    Shahbazi, Khosro

    2017-06-01

    A robust high-order scheme for the multi-phase flow computations featuring jumps and discontinuities due to shock waves and phase interfaces is presented. The scheme is based on high-order weighted-essentially non-oscillatory (WENO) finite volume schemes and high-order limiters to ensure the maximum principle or positivity of the various field variables including the density, pressure, and order parameters identifying each phase. The two-phase flow model considered besides the Euler equations of gas dynamics consists of advection of two parameters of the stiffened-gas equation of states, characterizing each phase. The design of the high-order limiter is guided by the findings of Zhang and Shu (2011) [36], and is based on limiting the quadrature values of the density, pressure and order parameters reconstructed using a high-order WENO scheme. The proof of positivity-preserving and accuracy is given, and the convergence and the robustness of the scheme are illustrated using the smooth isentropic vortex problem with very small density and pressure. The effectiveness and robustness of the scheme in computing the challenging problem of shock wave interaction with a cluster of tightly packed air or helium bubbles placed in a body of liquid water is also demonstrated. The superior performance of the high-order schemes over the first-order Lax-Friedrichs scheme for computations of shock-bubble interaction is also shown. The scheme is implemented in two-dimensional space on parallel computers using message passing interface (MPI). The proposed scheme with limiter features approximately 50% higher number of inter-processor message communications compared to the corresponding scheme without limiter, but with only 10% higher total CPU time. The scheme is provably second-order accurate in regions requiring positivity enforcement and higher order in the rest of domain.

  14. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  15. Track-stitching using graphical models and message passing

    CSIR Research Space (South Africa)

    Van der Merwe, LJ

    2013-07-01

    Full Text Available state sequence (Viterbi path) using the pointer function, Pt. The probabilities can of course be implemented as costs (inverse probabilities), in this case the Viterbi algorithm aims to minimise the Viterbi cost. The track graph can now be solved... by maximising the association probability for the associations at each node, in each column of the track graph. This is akin to finding the most probable paths (lowest cost) through the track graph, where the paths are all mutually disjoint [10], i.e. the paths...

  16. Optimizing spread dynamics on graphs by message passing

    International Nuclear Information System (INIS)

    Altarelli, F; Braunstein, A; Dall’Asta, L; Zecchina, R

    2013-01-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network). (paper)

  17. Increasing fault resiliency in a message-passing environment.

    Energy Technology Data Exchange (ETDEWEB)

    Stearley, Jon R.; Riesen, Rolf E.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Kordenbrock, Todd (Hewlett-Packard Company); Brightwell, Ronald Brian

    2009-10-01

    Petaflops systems will have tens to hundreds of thousands of compute nodes which increases the likelihood of faults. Applications use checkpoint/restart to recover from these faults, but even under ideal conditions, applications running on more than 30,000 nodes will likely spend more than half of their total run time saving checkpoints, restarting, and redoing work that was lost. We created a library that performs redundant computations on additional nodes allocated to the application. An active node and its redundant partner form a node bundle which will only fail, and cause an application restart, when both nodes in the bundle fail. The goal of this library is to learn whether this can be done entirely at the user level, what requirements this library places on a Reliability, Availability, and Serviceability (RAS) system, and what its impact on performance and run time is. We find that our redundant MPI layer library imposes a relatively modest performance penalty for applications, but that it greatly reduces the number of applications interrupts. This reduction in interrupts leads to huge savings in restart and rework time. For large-scale applications the savings compensate for the performance loss and the additional nodes required for redundant computations.

  18. Algorithms for parallel flow solvers on message passing architectures

    Science.gov (United States)

    Vanderwijngaart, Rob F.

    1995-01-01

    The purpose of this project has been to identify and test suitable technologies for implementation of fluid flow solvers -- possibly coupled with structures and heat equation solvers -- on MIMD parallel computers. In the course of this investigation much attention has been paid to efficient domain decomposition strategies for ADI-type algorithms. Multi-partitioning derives its efficiency from the assignment of several blocks of grid points to each processor in the parallel computer. A coarse-grain parallelism is obtained, and a near-perfect load balance results. In uni-partitioning every processor receives responsibility for exactly one block of grid points instead of several. This necessitates fine-grain pipelined program execution in order to obtain a reasonable load balance. Although fine-grain parallelism is less desirable on many systems, especially high-latency networks of workstations, uni-partition methods are still in wide use in production codes for flow problems. Consequently, it remains important to achieve good efficiency with this technique that has essentially been superseded by multi-partitioning for parallel ADI-type algorithms. Another reason for the concentration on improving the performance of pipeline methods is their applicability in other types of flow solver kernels with stronger implied data dependence. Analytical expressions can be derived for the size of the dynamic load imbalance incurred in traditional pipelines. From these it can be determined what is the optimal first-processor retardation that leads to the shortest total completion time for the pipeline process. Theoretical predictions of pipeline performance with and without optimization match experimental observations on the iPSC/860 very well. Analysis of pipeline performance also highlights the effect of uncareful grid partitioning in flow solvers that employ pipeline algorithms. If grid blocks at boundaries are not at least as large in the wall-normal direction as those immediately adjacent to them, then the first processor in the pipeline will receive a computational load that is less than that of subsequent processors, magnifying the pipeline slowdown effect. Extra compensation is needed for grid boundary effects, even if all grid blocks are equally sized.

  19. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  20. Effects of Targeted Sales Messages on Subscription Sales and Retention.

    Science.gov (United States)

    Gamst, Glenn; And Others

    1987-01-01

    Investigates the effects of targeted sales messages on newspaper subscription sales and retention by combining two large research projects--a demographic market segmentation scheme, and a readership-lifestyle survey. Proposes that the content of sales messages influences new subscriptions but does not affect retention. (MM)

  1. TPG bus passes

    CERN Multimedia

    Staff Association

    2013-01-01

    The CERN Staff Association will stop selling TPG bus passes. All active and retired members of the CERN personnel will be able to purchase Unireso bus passes from the CERN Hostel - Building 39 (Meyrin site) from 1st February 2013. For more information: https://cds.cern.ch/journal/CERNBulletin/2013/04/Announcements/1505279?ln=en

  2. The Argos seismic data message system.

    Science.gov (United States)

    Derr, J.S.; Hunter, R.N.

    1988-01-01

    A reliable, inexpensive method for sending limited daily seismic data messages from remote observatories to the National Earthquake Information Center has been developed for use with the Argos satellite system. Data messages are compressed on a microcomputer and passed automatically to a simple transmitter. About 4 hr later, the data are available at the National Earthquake Information Center, where they are decompressed and reformatted into standard telegrams for use in quick epicenter determinations. Epicenter data are available daily to the international scientific community.-Authors

  3. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  4. Design and simulation of advanced fault tolerant flight control schemes

    Science.gov (United States)

    Gururajan, Srikanth

    This research effort describes the design and simulation of a distributed Neural Network (NN) based fault tolerant flight control scheme and the interface of the scheme within a simulation/visualization environment. The goal of the fault tolerant flight control scheme is to recover an aircraft from failures to its sensors or actuators. A commercially available simulation package, Aviator Visual Design Simulator (AVDS), was used for the purpose of simulation and visualization of the aircraft dynamics and the performance of the control schemes. For the purpose of the sensor failure detection, identification and accommodation (SFDIA) task, it is assumed that the pitch, roll and yaw rate gyros onboard are without physical redundancy. The task is accomplished through the use of a Main Neural Network (MNN) and a set of three De-Centralized Neural Networks (DNNs), providing analytical redundancy for the pitch, roll and yaw gyros. The purpose of the MNN is to detect a sensor failure while the purpose of the DNNs is to identify the failed sensor and then to provide failure accommodation. The actuator failure detection, identification and accommodation (AFDIA) scheme also features the MNN, for detection of actuator failures, along with three Neural Network Controllers (NNCs) for providing the compensating control surface deflections to neutralize the failure induced pitching, rolling and yawing moments. All NNs continue to train on-line, in addition to an offline trained baseline network structure, using the Extended Back-Propagation Algorithm (EBPA), with the flight data provided by the AVDS simulation package. The above mentioned adaptive flight control schemes have been traditionally implemented sequentially on a single computer. This research addresses the implementation of these fault tolerant flight control schemes on parallel and distributed computer architectures, using Berkeley Software Distribution (BSD) sockets and Message Passing Interface (MPI) for inter

  5. An Arbitrated Quantum Signature Scheme without Entanglement"*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  6. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  7. Passing and Catching in Rugby.

    Science.gov (United States)

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  8. One-qubit fingerprinting schemes

    International Nuclear Information System (INIS)

    Beaudrap, J. Niel de

    2004-01-01

    Fingerprinting is a technique in communication complexity in which two parties (Alice and Bob) with large data sets send short messages to a third party (a referee), who attempts to compute some function of the larger data sets. For the equality function, the referee attempts to determine whether Alice's data and Bob's data are the same. In this paper, we consider the extreme scenario of performing fingerprinting where Alice and Bob both send either one bit (classically) or one qubit (in the quantum regime) messages to the referee for the equality problem. Restrictive bounds are demonstrated for the error probability of one-bit fingerprinting schemes, and show that it is easy to construct one-qubit fingerprinting schemes which can outperform any one-bit fingerprinting scheme. The author hopes that this analysis will provide results useful for performing physical experiments, which may help to advance implementations for more general quantum communication protocols

  9. Simple Multi-Authority Attribute-Based Encryption for Short Messages

    OpenAIRE

    Viktoria I. Villanyi

    2016-01-01

    Central authority free multi-authority attribute based encryption scheme for short messages will be presented. Several multi-authority attribute based encryption schemes were recently proposed. We can divide these schemes into two groups, one of them are the ciphertext-policy attribute based encryption schemes (CP-ABE), the another one are the key-policy attribute based encryption schemes (KP-ABE). In our new multi-authority attribute based encryption scheme we combine them: the access struct...

  10. Arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2009-01-01

    In an arbitrated quantum signature scheme, the signatory signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum signature scheme using two-particle entangled Bell states similar to the previous scheme using three-particle entangled Greenberger-Horne-Zeilinger states [G. H. Zeng and C. H. Keitel, Phys. Rev. A 65, 042312 (2002)]. The proposed scheme can preserve the merits in the original scheme while providing a higher efficiency in transmission and reducing the complexity of implementation.

  11. Tactical switched message communications

    Science.gov (United States)

    Homa, S., Jr.

    The task to provide service to users who employ various kinds of procedures in sending and receiving messages over terminal devices of different types presents a formidable challenge. In order to meet this challenge, it was necessary to develop a TRI-TAC system architecture with special characteristics which made it possible to process reliably narrative, data, and graphic messages even in an environment of high circuit noise and degradated signals. The present paper is concerned with the architectural considerations involved in the techniques which are utilized to handle message traffic in the tactical area.

  12. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    OpenAIRE

    Alawi A. Al-Saggaf; Haridas Acharya

    2013-01-01

    By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message). The eff...

  13. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  14. Actors with Multi-Headed Message Receive Patterns

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first......-match and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  15. Controversial Messages on Cancer.

    Science.gov (United States)

    Mustieles, Vicente; Olea, Nicolas; Sanchez, Maria Jose; Fernandez, Mariana F

    2015-01-01

    A direct connection between certain lifestyle factors and an increased risk of cancer has already been established. Despite well-documented associations, controversial messages on causes of cancer often appear without taking into consideration their impact on the general population. While mainstream coverage of cancer research is clearly welcome, consideration must be given to the risk of transmitting provocative messages with serious negative consequences for cancer research and public health. We must avoid becoming a breeding ground for the misinterpretation of scientific information. Polemical results can stimulate scientific research and progress, but controversial messages encourage confusion and impotence in an increasingly disoriented population. The correct communication of health messages is at least as important as research on risk factors.

  16. Hashing of Message

    Directory of Open Access Journals (Sweden)

    Ladislav Schwartz

    2003-01-01

    Full Text Available For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing. Hashing is used at safe put passwords, decode keys, authentication and electronic signature. Important is its one way and resistance for collisions. Most safety are standarts for hashing SHA-1 and RIPEMD-160.

  17. Forgery attack to Kang-Tang digital signature scheme

    Science.gov (United States)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.

  18. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  19. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    International Nuclear Information System (INIS)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; Fermilab

    2007-01-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results

  20. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Energy Technology Data Exchange (ETDEWEB)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; /Fermilab

    2007-04-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results.

  1. TRT Barrel milestones passed

    CERN Multimedia

    Ogren, H

    2004-01-01

    The barrel TRT detector passed three significant milestones this spring. The Barrel Support Structure (BSS) was completed and moved to the SR-1 building on February 24th. On March 12th the first module passed the quality assurance testing in Building 154 and was transported to the assembly site in the SR-1 building for barrel assembly. Then on April 21st the final production module that had been scanned at Hampton University was shipped to CERN. TRT Barrel Module Production The production of the full complement of barrel modules (96 plus 9 total spares) is now complete. This has been a five-year effort by Duke University, Hampton University, and Indiana University. Actual construction of the modules in the United States was completed in the first part of 2004. The production crews at each of the sites in the United States have now completed their missions. They are shown in the following pictures. Duke University: Production crew with the final completed module. Indiana University: Module producti...

  2. Passing the baton

    CERN Multimedia

    2011-01-01

    It was not only in South Korea that batons were being passed last week. While the cream of the world’s athletes were competing in the World Athletics Championships, the cream of the world’s accelerator scientists were on their way to San Sebastian in Spain for the International Particle Accelerator Conference.  One of them was carrying a rather special baton for a handover of a different kind.   When Fermilab’s Vladimir Shiltsev handed the high-energy frontier baton to CERN’s Mike Lamont on Tuesday, it marked the end of an era: a time to look back on the phenomenal contribution the Tevatron has made to particle physics over its 25-year operational lifetime, and the great contribution Fermilab has made over that period to global collaboration in particle physics. There’s always a lot of emotion involved in passing the baton. In athletics, it’s the triumph of wining or the heartbreak of losing. But for this special baton, the...

  3. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  4. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    Science.gov (United States)

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  5. Listening and Message Interpretation

    Science.gov (United States)

    Edwards, Renee

    2011-01-01

    Message interpretation, the notion that individuals assign meaning to stimuli, is related to listening presage, listening process, and listening product. As a central notion of communication, meaning includes (a) denotation and connotation, and (b) content and relational meanings, which can vary in ambiguity and vagueness. Past research on message…

  6. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  7. Research Messages 2014

    Science.gov (United States)

    National Centre for Vocational Education Research (NCVER), 2015

    2015-01-01

    "Research Messages 2014" is a collection of summaries of research published by the National Centre for Vocational Education Research (NCVER) in 2014 in the context of changing economic, industrial, social and education conditions, organised under the following broad categories: (1) Productivity: to sustain and build Australia's human…

  8. Are Instant Messages Speech?

    Science.gov (United States)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  9. 3. Secure Messaging

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  10. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  11. Microprocessorized message multiplexer

    International Nuclear Information System (INIS)

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  12. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium -

  13. San Gorgonio Pass wind energy project, California

    Energy Technology Data Exchange (ETDEWEB)

    1982-06-01

    Construction and operation of large-scale wind-turbine fields on approximately 12,780 acres of public land in the San Gorgonio Pass of Palm Springs, California are proposed. The wind farm systems would be operated by Windfarms Limited, U.S. Windpower, Southern California Edison Company, PanAero Corporation, the city of Riverside, and San Gorgonio Farms, Inc. Implementation of the preferred scheme would allow development of wind turbines on public lands except in those areas that have been identified as having resources that are extremely sensitive to development. Positive and negative impacts of the project are discussed.

  14. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  15. The mushroom message.

    Science.gov (United States)

    Zimmerman, M

    1992-04-28

    A basic law of ecology is that living things are tightly dependent on one another, often in ways that are not easy to imagine. Who, for example, would have predicted that when the last dodo was killed in 1675, that death would lead to the slow extermination of the tambalocoque tree, whose fruits germinate only after passing through the dodo's digestive system? Now no natural strands of tambalocoque younger than 300 years can be found. Or who would have predicted that clear-cutting tropical rainforests would so significantly alter local weather patterns that the tropical rainforest biome itself and its vast diversity of life might not survive? Such interactions are worth noting because of the possible ramifications of a phenomenon that ecologists have just begun to document. Mushrooms worldwide appear to be in a catastrophic state of decline. Throughout Europe, in countries with terrains as diverse as Holland, Germany, Austria, Czechoslovakia, Poland and England, wild mushrooms are becoming increasingly difficult to find. Those fungi that are found are significantly smaller than those found years ago. Preliminary data suggest that the same troubling situation is occurring throughout North American as well. The decline has been so precipitous that biologists have begun to refer to it as a mass extinction. The 2 obvious explanations for the demise of the mushrooms--habitat destruction and overpicking of edible types by an ever growing human population--have been ruled out. Sophisticated sampling schemes designed by ecologists control for the fact that there is less land available for wild mushrooms; they have been declining at a rate that far exceeds the rate at which land is being developed. The fact that the decline has affected both edible and inedible mushrooms equally indicates that humans hunting for tasty treats are not the main cause of the problem. The loss of wild mushrooms worldwide might not seem like that big a deal, but the consequences may well be grave

  16. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    International Nuclear Information System (INIS)

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  17. Remote Asynchronous Message Service Gateway

    Science.gov (United States)

    Wang, Shin-Ywan; Burleigh, Scott C.

    2011-01-01

    The Remote Asynchronous Message Service (RAMS) gateway is a special-purpose AMS application node that enables exchange of AMS messages between nodes residing in different AMS "continua," notionally in different geographical locations. JPL s implementation of RAMS gateway functionality is integrated with the ION (Interplanetary Overlay Network) implementation of the DTN (Delay-Tolerant Networking) bundle protocol, and with JPL s implementation of AMS itself. RAMS protocol data units are encapsulated in ION bundles and are forwarded to the neighboring RAMS gateways identified in the source gateway s AMS management information base. Each RAMS gateway has interfaces in two communication environments: the AMS message space it serves, and the RAMS network - the grid or tree of mutually aware RAMS gateways - that enables AMS messages produced in one message space to be forwarded to other message spaces of the same venture. Each gateway opens persistent, private RAMS network communication channels to the RAMS gateways of other message spaces for the same venture, in other continua. The interconnected RAMS gateways use these communication channels to forward message petition assertions and cancellations among themselves. Each RAMS gateway subscribes locally to all subjects that are of interest in any of the linked message spaces. On receiving its copy of a message on any of these subjects, the RAMS gateway node uses the RAMS network to forward the message to every other RAMS gateway whose message space contains at least one node that has subscribed to messages on that subject. On receiving a message via the RAMS network from some other RAMS gateway, the RAMS gateway node forwards the message to all subscribers in its own message space.

  18. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  19. Message Network Simulation

    Science.gov (United States)

    1990-03-01

    33 Influence of Message Interarrival Time on System Perfoma. Ptrc» ntc ;« of Ractlvtr Butf«r Blocking Capture Tim* 1J ID 3.2 Buffer Holding Tims... 5856 0.4993 52424 4. 2628 5110 1. 7537 0.0251 2.4888 0.4978 3. 6020 0.5013 52524 0. 1691 52524 0.1815 52524 0.1939 52524 4. 3073 2. 4914 1. 8146

  20. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  1. Dialog Antropologis Antaragama dengan Spiritualitas Passing Over

    Directory of Open Access Journals (Sweden)

    Stephanus Turibius Rahmat

    2017-12-01

    Full Text Available Inter-religious dialogue is very important discourse in the context of many religions in Indonesia. Inter-religious dialogue is the efforts to solve the difficulty of a relationship among each other followers of religions in which some conflicts and strained situations often happened. This article is a theoretical study in the purpose to describe the matter of inter-religious dialogue and formulate the model of inter-religious dialogue for creating the tolerance, the harmony, the safeness, and the peace in the religious life. By using the librarian research, the resulting study discovered that any models of inter-religious dialogue can be categorized into two models of inter-religious dialogue that are ‘theological-spiritual dialogue’ and ‘social humanity dialogue’. Theologically and spiritually, all religions have a universal message and passing over spirit (out of the border of religions in greatly committing to the human values. Anthropologically, the presence of all religion aims to bring the enlightenment and the enthusiasm of life among their adherents. It can be concluded that anthropological dialogue based on passing over spirituality is one of the interaction model in inter-religious dialogue, or positive and constructive communication which is oriented to create the safeness and the peace in the religious life, based on passing over spirituality, in which all religions have the initial spirit of the presence that religion plays a role to illuminate (illuminative, save (prophetic, liberate (liberative and transform (transformative. Here, religion has a self-image as rahmatan lil ‘alamīn.

  2. Antioxidant health messages in Canadian women's magazines.

    Science.gov (United States)

    Steinberg, Alissa; Paisley, Judy; Bandayrel, Kristofer

    2011-01-01

    Recently, antioxidants have taken centre stage in media and advertising messages. While 80% of Canadians think they are well-informed about nutrition, many are confused about the health effects of specific nutrients. Forty-six percent of Canadians seek information from newspapers and books, and 67% of women rely on magazines. We examined the content and accuracy of antioxidant health messages in Canadian women's magazines. The top three Canadian magazines targeted at women readers were selected. A screening tool was developed, pilot tested, and used to identify eligible articles. A coding scheme was created to define variables, which were coded and analyzed. Seventy-seven percent of 36 magazine issues contained articles that mentioned antioxidants (n=56). Seventy-one percent (n=40) of articles reported positive health effects related to antioxidant consumption, and 36% and 40% of those articles framed those effects as definite and potential, respectively (p<0.01). The articles sampled conveyed messages about positive antioxidant health effects that are not supported by current evidence. Improved standards of health reporting are needed. Nutrition professionals may need to address this inaccuracy when they develop communications on antioxidants and health risk.

  3. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  4. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    Science.gov (United States)

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  5. WebPASS Explorer (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  6. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  7. Multi-pass spectroscopic ellipsometry

    International Nuclear Information System (INIS)

    Stehle, Jean-Louis; Samartzis, Peter C.; Stamataki, Katerina; Piel, Jean-Philippe; Katsoprinakis, George E.; Papadakis, Vassilis; Schimowski, Xavier; Rakitzis, T. Peter; Loppinet, Benoit

    2014-01-01

    Spectroscopic ellipsometry is an established technique, particularly useful for thickness measurements of thin films. It measures polarization rotation after a single reflection of a beam of light on the measured substrate at a given incidence angle. In this paper, we report the development of multi-pass spectroscopic ellipsometry where the light beam reflects multiple times on the sample. We have investigated both theoretically and experimentally the effect of sample reflectivity, number of reflections (passes), angles of incidence and detector dynamic range on ellipsometric observables tanΨ and cosΔ. The multiple pass approach provides increased sensitivity to small changes in Ψ and Δ, opening the way for single measurement determination of optical thickness T, refractive index n and absorption coefficient k of thin films, a significant improvement over the existing techniques. Based on our results, we discuss the strengths, the weaknesses and possible applications of this technique. - Highlights: • We present multi-pass spectroscopic ellipsometry (MPSE), a multi-pass approach to ellipsometry. • Different detectors, samples, angles of incidence and number of passes were tested. • N passes improve polarization ratio sensitivity to the power of N. • N reflections improve phase shift sensitivity by a factor of N. • MPSE can significantly improve thickness measurements in thin films

  8. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  9. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  10. A Credit-Based Congestion-Aware Incentive Scheme for DTNs

    Directory of Open Access Journals (Sweden)

    Qingfeng Jiang

    2016-12-01

    Full Text Available In Delay-Tolerant Networks (DTNs, nodes may be selfish and reluctant to expend their precious resources on forwarding messages for others. Therefore, an incentive scheme is necessary to motivate selfish nodes to cooperatively forward messages. However, the current incentive schemes mainly focus on encouraging nodes to participate in message forwarding, without considering the node congestion problem. When many messages are forwarded to the nodes with high connection degree, these nodes will become congested and deliberately discard messages, which will seriously degrade the routing performance and reduce the benefits of other nodes. To address this problem, we propose a credit-based congestion-aware incentive scheme (CBCAIS for DTNs. In CBCAIS, a check and punishment mechanism is proposed to prevent forwarding nodes from deliberately discarding message. In addition, a message acceptance selection mechanism is proposed to allow the nodes to decide whether to accept other messages, according to self congestion degree. The experimental results show that CBCAIS can effectively stimulate selfish nodes to cooperatively forward messages, and achieve a higher message delivery ratio with lower overhead ratio, compared with other schemes.

  11. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  12. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  13. San Gorgonio Pass Wind Energy Project, California

    Energy Technology Data Exchange (ETDEWEB)

    1982-07-01

    A final environmental impact statement (EPA No. 820531F) on a proposal to permit a wind farm project in the San Gorgonio Pass in California describes the turbine installations, transmission lines, substations, and other facilities the project would entail. The preferred development scheme recommends competitive and noncompetitive rights-of-way grants on public lands and the use of a variety of wind energy technologies. Restrictions would protect communications facilities and aesthetic and sensitive areas. A maximum of 850 million kWh could serve 121,000 homes and save $52 million a year in imported oil costs. There would also be property tax revenues and technological advances. Negative impacts would involve the use of 1000 acres of flood plain and would interfere with some wilderness areas. Noise pollution and visual and habitat damage would result, as would the loss of birds from collisions. The Federal Land Policy and Management Act of 1976 requires the impact study.

  14. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  15. Comparison of cryogenic low-pass filters

    Science.gov (United States)

    Thalmann, M.; Pernau, H.-F.; Strunk, C.; Scheer, E.; Pietsch, T.

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  16. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  17. Pass-band reconfigurable spoof surface plasmon polaritons

    Science.gov (United States)

    Zhang, Hao Chi; He, Pei Hang; Gao, Xinxin; Tang, Wen Xuan; Cui, Tie Jun

    2018-04-01

    In this paper, we introduce a new scheme to construct the band-pass tunable filter based on the band-pass reconfigurable spoof surface plasmon polaritons (SPPs), whose cut-off frequencies at both sides of the passband can be tuned through changing the direct current (DC) bias of varactors. Compared to traditional technology (e.g. microstrip filters), the spoof SPP structure can provide more tight field confinement and more significant field enhancement, which is extremely valuable for many system applications. In order to achieve this scheme, we proposed a specially designed SPP filter integrated with varactors and DC bias feeding structure to support the spoof SPP passband reconfiguration. Furthermore, the full-wave simulated result verifies the outstanding performance on both efficiency and reconfiguration, which has the potential to be widely used in advanced intelligent systems.

  18. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  19. Patient–Clinician Mobile Communication: Analyzing Text Messaging Between Adolescents with Asthma and Nurse Case Managers

    Science.gov (United States)

    Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V.; Gustafson, David H.

    2015-01-01

    Abstract Background: With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient–clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. Materials and Methods: We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Results: Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Conclusions: Mobile texting messaging has the potential to play an important role in patient–clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication. PMID:25401324

  20. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  1. What motivates consumers to re-tweet brand content? The impact of information, emotion, and traceability on pass-along behavior

    NARCIS (Netherlands)

    Araujo, T.; Neijens, P.; Vliegenthart, R.

    2015-01-01

    How do certain cues influence pass-along behavior (re-Tweeting) of brand messages on Twitter? Analyzing 19,343 global brand messages over a three-year period, the authors of this article found that informational cues were predictors of higher levels of re-Tweeting, particularly product details and

  2. Arbitrated Quantum Signature of Quantum Messages with a Semi-honest Arbitrator

    Science.gov (United States)

    MeiLing, Zhang; YuanHua, Liu; Min, Nie; QingJi, Zheng; Dong, Zheng

    2018-01-01

    A new arbitrated quantum signature of quantum messages with a semi-honest arbitrator is designed by utilizing the chained control-NOT(CNOT) operations encryption and the classical public board. Detailed theoretical analysis show that the proposed scheme satisfies the requirements of unforgeable and undeniable properties. The novelty is that the feasibility of signing quantum messages under the control of a semi-honest arbitrator is demonstrated. And with the help of the decoy technique, shared keys can be reused.

  3. Message transfer in a communication network

    Indian Academy of Sciences (India)

    2015-11-27

    Nov 27, 2015 ... We study message transfer in a 2-d communication network of regular nodes and randomly distributed hubs. We study both single message transfer and multiple message transfer on the lattice. The average travel time for single messages travelling between source and target pairs of fixed separations ...

  4. A Bypass-Ring Scheme for a Fault Tolerant Multicast

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2003-01-01

    Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.

  5. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  6. Subliminal messages in an online environment

    OpenAIRE

    Varga, Luka; Gabrijelčič Tomc, Helena

    2016-01-01

    the paper addresses subliminal messages; more precisely, the e ect of subliminal messages on a user in an online environment. e main goals of the paper were: to research the existing work regarding subliminal messages in di erent environments, to research di erent ways and e ectiveness of subliminal messages implementation, to research the e ects of di erent types of visual subliminal messages on a user within an online environment and to present the most e ective implementation of sublimina...

  7. Message variability and heterogeneity: a core challenge for communication research

    NARCIS (Netherlands)

    Slater, M.D.; Peter, J.; Valkenburg, P.M.; Cohen, E.L.

    2015-01-01

    Messages pose fundamental challenges and opportunities for empirical communication research. To address these challenges and opportunities, we distinguish between message variability (the defined and operationalized features of messages in a given study) and message heterogeneity (all message

  8. Adaptive mobile access protocol (AMAP) for the message service of a land mobile satellite experiment (MSAT-X)

    Science.gov (United States)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSATA-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.

  9. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    DEFF Research Database (Denmark)

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... and future wireless communications systems. By enabling the OFDM receiver experiencing these harsh conditions to locally cancel the interference, our design circumvents the spectral efficiency loss incurred by extending the CP duration, otherwise a straightforward solution. Furthermore, it sets the premises...

  10. rMPI : increasing fault resiliency in a message-passing environment.

    Energy Technology Data Exchange (ETDEWEB)

    Stearley, Jon R.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Riesen, Rolf (IBM Research, Ireland); Brightwell, Ronald Brian

    2011-04-01

    As High-End Computing machines continue to grow in size, issues such as fault tolerance and reliability limit application scalability. Current techniques to ensure progress across faults, like checkpoint-restart, are unsuitable at these scale due to excessive overheads predicted to more than double an applications time to solution. Redundant computation, long used in distributed and mission critical systems, has been suggested as an alternative to checkpoint-restart on its own. In this paper we describe the rMPI library which enables portable and transparent redundant computation for MPI applications. We detail the design of the library as well as two replica consistency protocols, outline the overheads of this library at scale on a number of real-world applications, and finally outline the significant increase in an applications time to solution at extreme scale as well as show the scenarios in which redundant computation makes sense.

  11. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    International Nuclear Information System (INIS)

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef

    2013-01-01

    Current radiation protection is a very sophisticated and elaborate domain where, once the information about the exposure of persons is known in terms of the quantity of the effective dose, we can predict resulting radiological consequences related to the stochastic risk to the health of the exposed persons without a need for other details. In fact, the effective dose contains all pertinent information including the average organ dose distribution and relevant radiation and tissue weighting factors which take into account the specific effects of different types of radiation and selected tissue radiosensitivity. Since the effective dose cannot be measured directly, one has to rely on the monitoring of other appropriate measurable quantities and then do some conversions. The current structure of radiation protection quantities includes too many quantities, the definitions of some of which are not easy to understand and interpret. Moreover, there are numerous quantities based on the dose equivalent, such as the equivalent dose, effective dose, committed equivalent dose, committed effective dose, collective equivalent dose, collective effective dose, personal dose equivalent, ambient dose equivalent and directional dose equivalent, where the only unit of Sv is used.. There are a number of cases in open literature reflecting the difficulties and mistakes in the use of radiation protection quantities. Even more complicated situations are encountered in the field, where the staff responsible for personal and workplace monitoring is confused because of so many different quantities and where the staff may not be qualified and experienced enough to be able to make the relevant conversions and interpretations. The paper summarizes our experience in teaching students and lecturing in various training courses addressing radiation protection where the primary task was to ensure that all radiation protection personnel understood the quantities and units used in radiation protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  12. Parallel Data Mining with the Message Passing Interface Standard on Clusters of Personal Computers

    National Research Council Canada - National Science Library

    Hammack, Lonnie

    1999-01-01

    .... The primary competing operating systems (OIS) in use on PoPCs are Linux and Windows NT. This thesis investigation compares the performance of an NT cluster with that of a Linux cluster, a NOW, and an MPP...

  13. Robust Phase Retrieval with the Swept Approximate Message Passing (prSAMP Algorithm

    Directory of Open Access Journals (Sweden)

    Boshra Rajaei

    2017-01-01

    Full Text Available In phase retrieval, the goal is to recover a complex signal from the magnitude of its linear measurements. While many well-known algorithms guarantee deterministic recovery of the unknown signal using i.i.d. random measurement matrices, they suffer serious convergence issues for some ill-conditioned measurement matrices. As an example, this happens in optical imagers using binary intensity-only spatial light modulators to shape the input wavefront. The problem of ill-conditioned measurement matrices has also been a topic of interest for compressed sensing researchers during the past decade. In this paper, using recent advances in generic compressed sensing, we propose a new phase retrieval algorithm that well-behaves for a large class of measurement matrices, including Gaussian and Bernoulli binary i.i.d. random matrices, using both sparse and dense input signals. This algorithm is also robust to the strong noise levels found in some imaging applications.

  14. ALGORITMA PARALLEL SUPERVISED PNN STRUCTURE DETERMINATION DAN IMPLEMENTASI BERBASIS MESSAGE PASSING INTERFACE

    Directory of Open Access Journals (Sweden)

    Heru Suhartanto

    2012-05-01

    Full Text Available Probabilistic Neural Network (PNN adalah salah satu tipe jaringan neural yang umum digunakan untuk memecahkan permasalahan klasifikasi pola. Di samping struktur jaringan dan metode pelatihan yang sederhana, PNN memiliki kelemahan utama yaitu dalam menentukan struktur jaringan yang terdiri dari penentuan nilai parameter smoothing dan jumlah neuron yang digunakan pada lapisan pola. Dengan adanya kelemahan ini, beberapa peneliti mengajukan algoritma Supervised PNN Structure Determination (SPNN dengan tujuan untuk mempermudah penentuan struktur PNN. Akan tetapi dalam implementasi iteratif yang telah dilaporkan, SPNN masih memerlukan waktu komputasi yang cukup lama untuk menentukan struktur PNN yang baik. Makalah ini menjelaskan usaha perbaikan kinerja waktu proses implementasi SPNN dengan memperhatikan bagian-bagian proses yang independent serta memodifikasi algoritmanya untuk dapat diterapkan pemrosesan secara paralel. Hasil eksperimen menunjukkan percepatan yang cukup berarti.

  15. A Survey of Rollback-Recovery Protocols in Message-Passing Systems

    Science.gov (United States)

    1999-06-01

    and M.A. Castillo. "Checkpointing through garbage collection." Technical report. Departamento de Ciencia de la Computation, Escuela de Ingenieria ...between consecutive checkpoints. It can be implemented by using the dirty-bit of the memory protection hardware or by emulating a dirty-bit in software [4...compare the program’s state with the previous checkpoint in software , and writing the difference in a new checkpoint [46]. The required storage and

  16. Asymptotic analysis of complex LASSO via complex approximate message passing (CAMP)

    NARCIS (Netherlands)

    Maleki, A.; Anitori, L.; Yang, Z.; Baraniuk, R.G.

    2013-01-01

    Recovering a sparse signal from an undersampled set of random linear measurements is the main problem of interest in compressed sensing. In this paper, we consider the case where both the signal and the measurements are complex-valued. We study the popular recovery method of l1- regularized least

  17. Reduction of the effects of the communication delays in scientific algorithms on message passing MIMD architectures

    Science.gov (United States)

    Saltz, J. H.; Naik, V. K.; Nicol, D. M.

    1986-01-01

    The efficient implementation of algorithms on multiprocessor machines requires that the effects of communication delays be minimized. The effects of these delays on the performance of a model problem on a hypercube multiprocessor architecture is investigated and methods are developed for increasing algorithm efficiency. The model problem under investigation is the solution by red-black Successive Over Relaxation YOUN71 of the heat equation; most of the techniques described here also apply equally well to the solution of elliptic partial differential equations by red-black or multicolor SOR methods. Methods for reducing communication traffic and overhead on a multiprocessor are identified and results of testing these methods on the Intel iPSC Hypercube reported. Methods for partitioning a problem's domain across processors, for reducing communication traffic during a global convergence check, for reducing the number of global convergence checks employed during an iteration, and for concurrently iterating on multiple time-steps in a time-dependent problem. Empirical results show that use of these models can markedly reduce a numewrical problem's execution time.

  18. Distributed S-Net: High-level message passing without the hassle

    NARCIS (Netherlands)

    Grelck, C.; Julku, J.; Penczek, F.; Bronevetsky, G.; Ding, C.; Scholz, S.B.; Strout, M.

    2010-01-01

    S-NET is a declarative coordination language and component technology primarily aimed at modern multi-core/many-core chip architectures. It builds on the concept of stream processing to structure dynamically evolving networks of communicating asynchronous components, which themselves are implemented

  19. A model based message passing approach for flexible and scalable home automation controllers

    Energy Technology Data Exchange (ETDEWEB)

    Bienhaus, D. [INNIAS GmbH und Co. KG, Frankenberg (Germany); David, K.; Klein, N.; Kroll, D. [ComTec Kassel Univ., SE Kassel Univ. (Germany); Heerdegen, F.; Jubeh, R.; Zuendorf, A. [Kassel Univ. (Germany). FG Software Engineering; Hofmann, J. [BSC Computer GmbH, Allendorf (Germany)

    2012-07-01

    There is a large variety of home automation systems that are largely proprietary systems from different vendors. In addition, the configuration and administration of home automation systems is frequently a very complex task especially, if more complex functionality shall be achieved. Therefore, an open model for home automation was developed that is especially designed for easy integration of various home automation systems. This solution also provides a simple modeling approach that is inspired by typical home automation components like switches, timers, etc. In addition, a model based technology to achieve rich functionality and usability was implemented. (orig.)

  20. Shared memory and message passing revisited in the many-core era

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    In the 70s, Edsgar Dijkstra, Per Brinch Hansen and C.A.R Hoare introduced the fundamental concepts for concurrent computing. It was clear that concrete communication mechanisms were required in order to achieve effective concurrency. Whether you're developing a multithreaded program running on a single node, or a distributed system spanning over hundreds of thousands cores, the choice of the communication mechanism for your system must be done intelligently because of the implicit programmability, performance and scalability trade-offs. With the emergence of many-core computing architectures many assumptions may not be true anymore. In this talk we will try to provide insight on the characteristics of these communication models by providing basic theoretical background and then focus on concrete practical examples based on indicative use case scenarios. The case studies of this presentation cover popular programming models, operating systems and concurrency frameworks in the context of many-core processors.

  1. Connecticut church passes genetics resolution.

    Science.gov (United States)

    Culliton, B J

    1984-11-09

    The Connecticut Conference of the United Church of Christ, which represents the largest Protestant denomination in the state, has passed a resolution affirming an ethical duty to do research on human gene therapy and is planning to form local church groups to study the scientific and ethical issues involved. The resolution is intended to counter an earlier one proposed by Jeremy Rifkin to ban all efforts at engineering specific traits into the human germline. The Rifkin proposal had been endorsed by a large number of religious leaders, including the head of the U.S. United Church of Christ, but was subsequently characterized by many of the church leaders as overly restrictive.

  2. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  3. Transmitting Abstract Values in Messages.

    Science.gov (United States)

    1980-05-01

    inv~okes array[ infj $put. At the receiving guardian, wheni T$gci peeks at the token at stream address 3, it discovers the token is a back ref’erence to...mechanisms is a major strength of our scheme. Later in this chapter we will compare our scheme to a simpler one that does not provide this kind ofsupport

  4. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  5. Instant Apache Camel message routing

    CERN Document Server

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  6. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  7. WebPASS ICASS (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPASS Joint Administrative Support Platforms Post Administrative Software Suite - U.S. Department of State Executive Officers application suite. Web.PASS is the...

  8. Design of a Secure RFID Authentication Scheme Preceding Market Transactions

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2011-01-01

    Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

  9. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  10. Evaluation on Subliminal Messages and Food Consumption

    OpenAIRE

    SIĞINÇ, Hamza; KOÇ, Beşir

    2017-01-01

    In this study, the effects of subliminal messages on food consumption were investigated.These messages, which are called subliminal messages or subconsciousmessages, are used to direct individuals to specific objects outside of their will.Findings obtained as a result of the investigations have shown that these messagesserve more than their intended purposes. For example, momentary messages thatinseminate people to consume cola and popcorn together being put into a film by a marketing researc...

  11. Deflection routing scheme for GMPLS-based OBS networks

    DEFF Research Database (Denmark)

    Eid, Arafat; Mahmood, Waqar; Alomar, Anwar

    2010-01-01

    is not applicable in such an integrated solution. This is due to the existence of already established Label Switched Paths (LSPs) between edge nodes in a GMPLS-based OBS network which guide the Data Burst Headers (DBHs) through the network. In this paper we propose a novel deflection routing scheme which can...... be implemented in GMPLS-based OBS Control Plane. In this scheme, deflection routes or LSPs are designed and pre-established for the whole network. The ingress nodes are responsible for enabling DBHs for deflection at contending core ports prior to DBHs transmission. Moreover, we propose an object extension...... for Path and Resv messages of the RSVP-TE protocol to be able to utilize both messages for deflection labels dissemination. The scheme simulation results show reduction in data bursts blocking probability....

  12. Patient Centeredness in Electronic Communication: Evaluation of Patient-to-Health Care Team Secure Messaging

    Science.gov (United States)

    Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G

    2018-01-01

    Background As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Objective Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. Methods We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Results Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70

  13. Patient Centeredness in Electronic Communication: Evaluation of Patient-to-Health Care Team Secure Messaging.

    Science.gov (United States)

    Hogan, Timothy P; Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G

    2018-03-08

    As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70.2%, 262/373 vs 82.0%, 277/338), and

  14. Effects of Text Messaging on Academic Performance

    OpenAIRE

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  15. Message transfer in a communication network

    Indian Academy of Sciences (India)

    time step at the current message holder. If the desired node is still occupied after the waiting time is over, the current node selects any unoccupied node from its remaining neighbours and hands over the message. If all the neighbouring nodes are occupied, the message waits at the current node until one of them is free. If.

  16. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  17. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  18. Usability of ERP Error Messages

    OpenAIRE

    Sadiq, Mazhar; Pirhonen, Antti

    2014-01-01

    Usability of complex information system like enterprise resource planning (ERP) system is still a challenging area. This is why many usability problems have been found in the ERP system. In this article, we tried to highlight the 21 usability problems in ERP error messages by using Nielsen’s heuristics and inquiry questionnaire methods. Nielsen’s heuristics is a better for finding a large number of unique usability problems in different areas. The inquiry questionnaire me...

  19. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  20. Triplets pass their pressure test

    CERN Document Server

    2007-01-01

    All the LHC inner triplets have now been repaired and are in position. The first ones have passed their pressure tests with flying colours. The repaired inner triplet at LHC Point 1, right side (1R). Ranko Ostojic (on the right), who headed the team responsible for repairing the triplets, shows the magnet to Robert Zimmer, President of the University of Chicago and of Fermi Research Alliance, who visited CERN on 20th August.Three cheers for the triplets! All the LHC inner triplets have now been repaired and are in position in the tunnel. Thanks to the mobilisation of a multidisciplinary team from CERN and Fermilab, assisted by the KEK Laboratory and the Lawrence Berkeley National Laboratory (LBNL), a solution has been found, tested, validated and applied. At the end of March this year, one of the inner triplets at Point 5 failed to withstand a pressure test. A fault was identified in the supports of two out of the three quadruple magne...

  1. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  2. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  3. Secure communication based on multi-input multi-output chaotic system with large message amplitude

    International Nuclear Information System (INIS)

    Zheng, G.; Boutat, D.; Floquet, T.; Barbot, J.P.

    2009-01-01

    This paper deals with the problem of secure communication based on multi-input multi-output (MIMO) chaotic systems. Single input secure communication based on chaos can be easily extended to multiple ones by some combinations technologies, however all the combined inputs possess the same risk to be broken. In order to reduce this risk, a new secure communication scheme based on chaos with MIMO is discussed in this paper. Moreover, since the amplitude of messages in traditional schemes is limited because it would affect the quality of synchronization, the proposed scheme is also improved into an amplitude-independent one.

  4. Guidelines for designing messages in risk communication

    International Nuclear Information System (INIS)

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  5. On the security of pairing-free certificateless digital signature schemes using ECC

    Directory of Open Access Journals (Sweden)

    Namita Tiwari

    2015-09-01

    Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.

  6. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...... state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2119 attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity...

  7. The Mawala irrigation scheme

    OpenAIRE

    de Bont, Chris

    2018-01-01

    This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...

  8. A human language corpus for interstellar message construction

    Science.gov (United States)

    Elliott, John

    2011-02-01

    The aim of HuLCC (the human language chorus corpus), is to provide a resource of sufficient size to facilitate inter-language analysis by incorporating languages from all the major language families: for the first time all aspects of typology will be incorporated within a single corpus, adhering to a consistent grammatical classification and granularity, which historically adopt a plethora of disparate schemes. An added feature will be the inclusion of a common text element, which will be translated across all languages, to provide a precise comparable thread for detailed linguistic analysis for translation strategies and a mechanism by which these mappings can be explicitly achieved. Methods developed to solve unambiguous mappings across these languages can then be adopted for any subsequent message authored by the SETI community. Initially, it is planned to provide at least 20,000 words for each chosen language, as this amount of text exceeds the point where randomly generated text can be disambiguated from natural language and is of sufficient size useful for message transmission [1] (Elliot, 2002). This paper details the design of this resource, which ultimately will be made available to SETI upon its completion, and discusses issues 'core' to any message construction.

  9. Effects of Text Messaging on Academic Performance

    Directory of Open Access Journals (Sweden)

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  10. Subliminal messages in an online environment

    Directory of Open Access Journals (Sweden)

    Luka Varga

    2017-04-01

    Full Text Available The paper addresses subliminal messages; more precisely, the e ect of subliminal messages on a user in an online environment. e main goals of the paper were: to research the existing work regarding subliminal messages in di erent environments, to research di erent ways and e ectiveness of subliminal messages implementation, to research the e ects of di erent types of visual subliminal messages on a user within an online environment and to present the most e ective implementation of subliminal messages within the online environment. 60 test subjects and 26 control subjects were used during the course of the research. e subjects estimated their desire to own the featured items based on the usage of website containing negative (20 test subjects, or positive (20 test subjects, or mixed subliminal messages (20 test subjects, or no subliminal messages (26 control subjects. Based on the results, it was deducted that the presence of subliminal messages a ects the desire of having specif- ic items; especially e ective were the positive subliminal messages embedded in the background of the website as the subjects in that scenario on average estimated their desire to own the items was up to almost 50 % smaller than the average estimated desire rated by control subjects which was taken as the objective rating.

  11. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  12. Population message from the village.

    Science.gov (United States)

    Hibler, M

    1979-06-01

    According to a number of participants at the population conference in Ontario, sponsored by the School of Journalism of the Univesity of Western Ontario and the Canadian International Development Agency, the villages, in developing countries, have sent a message to population experts, declaring that the most effective way to motivate individuals toward reducing family size is to improve basic educational and health care services. It has been demonstrated that improvements in these areas, by providing women with educational opportunities and by reducing infant mortality, have a direct impact on fertility. Efforts should be directed toward discovering similar direct correlates. The message dismissed as irrelevant the battle raging between those who advocate that population growth must be halted before poverty can be eliminated, between the developmentalists, who believe that fundamental changes in economic and political conditions will automatically solve the population problem, and between those who declare that family planning and development must be dealt with simultaneously for either to be effective. Despite evidence demonstrating the effectiveness of the 'direct correlate' approach, most developing countries continue to accord top priority to family planning programs and neglect educational and health care services.

  13. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    to carry out a campaign targeted at this segment. The awareness percentage is already 92 % and 67% of the respondents believe they know the meaning of the scheme. But it stands to reason to study whether the respondents actually know what the labelling scheme stands for or if they just think they do...

  14. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  15. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  16. The WLCG Messaging Service and its Future

    International Nuclear Information System (INIS)

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  17. Message Received: Virtual Ethnography in Online Message Boards

    Directory of Open Access Journals (Sweden)

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  18. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  19. Robust Routing Protocol For Digital Messages

    Science.gov (United States)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  20. Low-Noise Band-Pass Amplifier

    Science.gov (United States)

    Kleinberg, L.

    1982-01-01

    Circuit uses standard components to overcome common limitation of JFET amplifiers. Low-noise band-pass amplifier employs JFET and operational amplifier. High gain and band-pass characteristics are achieved with suitable choice of resistances and capacitances. Circuit should find use as low-noise amplifier, for example as first stage instrumentation systems.

  1. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  2. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    Science.gov (United States)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-03-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> ={1}/{√ 2}(|00> +|11> ) or |{Ψ }+> ={1}/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  3. Evaluation of sexual communication message strategies.

    Science.gov (United States)

    Evans, W Douglas; Davis, Kevin C; Umanzor, Cindy; Patel, Kajal; Khan, Munziba

    2011-05-20

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  4. Connection Setup Signaling Scheme with Flooding-Based Path Searching for Diverse-Metric Network

    Science.gov (United States)

    Kikuta, Ko; Ishii, Daisuke; Okamoto, Satoru; Oki, Eiji; Yamanaka, Naoaki

    Connection setup on various computer networks is now achieved by GMPLS. This technology is based on the source-routing approach, which requires the source node to store metric information of the entire network prior to computing a route. Thus all metric information must be distributed to all network nodes and kept up-to-date. However, as metric information become more diverse and generalized, it is hard to update all information due to the huge update overhead. Emerging network services and applications require the network to support diverse metrics for achieving various communication qualities. Increasing the number of metrics supported by the network causes excessive processing of metric update messages. To reduce the number of metric update messages, another scheme is required. This paper proposes a connection setup scheme that uses flooding-based signaling rather than the distribution of metric information. The proposed scheme requires only flooding of signaling messages with requested metric information, no routing protocol is required. Evaluations confirm that the proposed scheme achieves connection establishment without excessive overhead. Our analysis shows that the proposed scheme greatly reduces the number of control messages compared to the conventional scheme, while their blocking probabilities are comparable.

  5. A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Soo Young Moon

    2014-01-01

    Full Text Available Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR. In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR is ≥10%.

  6. A routing path construction method for key dissemination messages in sensor networks.

    Science.gov (United States)

    Moon, Soo Young; Cho, Tae Ho

    2014-01-01

    Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50-70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥ 10%.

  7. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  8. Classmate Peer-Coaching: "A Study Buddy Support Scheme"

    Science.gov (United States)

    Thalluri, Jyothi; O'Flaherty, Jackie A.; Shepherd, Paul L.

    2014-01-01

    This study had two aims: firstly, to determine whether participation in a peer support scheme called Study Buddy Support (SBS) improves pass rates of "at risk" students, and secondly, to examine the advantages of this model over hierarchical models where senior students tutor junior years. Bachelor of Nursing and Midwifery students in a…

  9. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  10. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  11. Signature Scheme Using the Root Extraction Problem on Quaternions

    Directory of Open Access Journals (Sweden)

    Baocang Wang

    2014-01-01

    Full Text Available The root extraction problem over quaternion rings modulo an RSA integer is defined, and the intractability of the problem is examined. A signature scheme is constructed based on the root extraction problem. It is proven that an adversary can forge a signature on a message if and only if he can extract the roots for some quaternion integers. The performance and other security related issues are also discussed.

  12. Text Messaging (SMS) Helping Cancer Care in Patients Undergoing Chemotherapy Treatment: a Pilot Study.

    Science.gov (United States)

    Rico, Timóteo Matthies; Dos Santos Machado, Karina; Fernandes, Vanessa Pellegrini; Madruga, Samanta Winck; Noguez, Patrícia Tuerlinckx; Barcelos, Camila Rose Guadalupe; Santin, Mateus Madail; Petrarca, Cristiane Rios; Dumith, Samuel Carvalho

    2017-10-09

    Cancer treatment is an extremely stressful life experience that is accompanied by a range of psychological, social, physical, and practical difficulties. Cancer patients need to receive information that helps them to better understand the disease, assists them in decision-making, and helps them deal with treatment. Patients are interested in receiving such information. The degree of satisfaction with the information received has been associated with positive health outcomes, specifically regarding quality of life, severity of side effects, and psychological well-being. This study investigates a method of guiding cancer patients, in relation to outpatient chemotherapy treatment, using SMS (short message service) text messaging. A smartphone application called cHEmotHErApp was developed, and its primary function is to send out SMS text messages with guidance for self-care and emotional support for oncology patients undergoing chemotherapy. Thus, the main objective of this study is to evaluate the acceptance and perception of patients of the receipt of these SMS messages, as well as to evaluate the possible benefits reported by the participants. Adult patients diagnosed with cancer, who started the first outpatient chemotherapy treatment scheme between August and November 2016 at the School Hospital (HE) of the Federal University of Pelotas (UFPel), were invited to participate in this pilot study. In total, 14 cancer patients were adherent to this study. Each of these patients received a daily text message on their cell phone with some guidance on encouraging self-care and emotional support. Patients reported that, because of the SMS text messages they received, they felt more confident in their treatment, felt more supported and encouraged, and that the text messages facilitated self-care. In addition, patients reported that the SMS text messages they received helped them to take better care of themselves and to continue further treatment.

  13. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    African Journals Online (AJOL)

    Text messaging is the application of abridged morphological forms in order to communicate and it is one of the fastest means of communication since the emergence of the Global System for Mobile Communication (GSM) in the world. In text messaging, we apply innovative language forms with morpho-syntactic structures ...

  14. 78 FR 64202 - Quantitative Messaging Research

    Science.gov (United States)

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  15. Messages about Sexuality: An Ecological Perspective

    Science.gov (United States)

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  16. Suspecting Neurological Dysfunction From E Mail Messages ...

    African Journals Online (AJOL)

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  17. Message transfer in a communication network

    Indian Academy of Sciences (India)

    This power-law tail arises as a consequence of the log-normal distribution of travel times seen at high hub densities. When many messages travel on the lattice, a congestion-decongestion transition can be seen. The waiting times of messages in the congested phase show a Gaussian distribution, whereas the decongested ...

  18. Addressing Unintended Instructional Messages about Repeated Reading

    Science.gov (United States)

    Frey, Nancy; Fisher, Douglas

    2018-01-01

    The authors analyzed 88 classroom observations to determine whether there were actions that teachers were taking to send a message to students that rereading was not valuable. They identified three practices during shared reading, guided reading, and independent reading that telegraphed messages to students against rereading. The authors also…

  19. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  20. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  1. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  2. How to pass higher English colour

    CERN Document Server

    Bridges, Ann

    2009-01-01

    How to Pass is the Number 1 revision series for Scottish qualifications across the three examination levels of Standard Grade, Intermediate and Higher! Second editions of the books present all of the material in full colour for the first time.

  3. House Passes AHCA; HHS Acts On Regulations.

    Science.gov (United States)

    Jost, Timothy Stoltzfus

    2017-06-01

    As the GOP worked to pass ACA repeal legislation, HHS finalized a market stabilization rule, and the debate over cost-sharing reduction payments continued. Project HOPE—The People-to-People Health Foundation, Inc.

  4. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    International Nuclear Information System (INIS)

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  5. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  6. A Novel Quantum Blind Signature Scheme with Four-particle GHZ States

    Science.gov (United States)

    Fan, Ling; Zhang, Ke-Jia; Qin, Su-Juan; Guo, Fen-Zhuo

    2016-02-01

    In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by using four-particle entangled Greenberger-Horne-Zeilinger (GHZ) states. By using the special relationship of four-particle GHZ states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.

  7. A Novel Quantum Blind Signature Scheme with Four-Particle Cluster States

    Science.gov (United States)

    Fan, Ling

    2016-03-01

    In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by measuring four-particle cluster states and coding. By using the special relationship of four-particle cluster states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.

  8. Understanding the Effects of Stigma Messages: Danger Appraisal and Message Judgments.

    Science.gov (United States)

    Smith, Rachel A; Zhu, Xun; Fink, Edward L

    2017-11-30

    Media coverage of health issues has been criticized for creating health stigmas. The model of stigma communication (MSC, Smith, 2007) provides insights into why this is so, but it has two problems: Some of its mediators have not been supported, and it does not do a good job of predicting the transmission of stigma messages (i.e., social transmission). We present a revised model of stigma message effects in which exposure to stigma messages leads to stigma beliefs and stigmatization as a result of a person-oriented danger appraisal. In addition, message judgments-shock value and common ground-are introduced as mediators of the relationship between danger appraisal and social transmission. Participants (N = 200) were randomly assigned to read a health story written either with or without the intrinsic features of stigma messages. The revised model of stigma-message effects was supported: Reading a health news story written with (vs. without) the intrinsic features of stigma messages resulted in greater danger appraisal, which directly predicted stigma-related outcomes and indirectly predicted social transmission through message judgments. Social transmission varied by message judgment: Shocking messages were shared in ways that facilitate diffusion, but common ground messages were shared with influential others, suggesting different means by which stigma as a collective norm may emerge from interactions among community members.

  9. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Science.gov (United States)

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  10. Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Abhishek Majumder

    2013-01-01

    Full Text Available Seamless mobility management of the mesh clients (MCs in wireless mesh network (WMN has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO, mesh mobility management (M3, and wireless mesh mobility management (WMM have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC’s session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost.

  11. Design and analysis of a dynamic mobility management scheme for wireless mesh network.

    Science.gov (United States)

    Majumder, Abhishek; Roy, Sudipta

    2013-01-01

    Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M(3)), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M(3), and WMM with respect to total cost.

  12. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  13. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ji-Young Jung

    2018-01-01

    Full Text Available A wireless sensor network (WSN is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  14. Highly efficient single-pass sum frequency generation by cascaded nonlinear crystals

    DEFF Research Database (Denmark)

    Hansen, Anders Kragh; Andersen, Peter E.; Jensen, Ole Bjarlin

    2015-01-01

    The cascading of nonlinear crystals has been established as a simple method to greatly increase the conversion efficiency of single-pass second-harmonic generation compared to a single-crystal scheme. Here, we show for the first time that the technique can be extended to sum frequency generation......, despite differences in the phase relations of the involved fields. An unprecedented 5.5 W of continuous-wave diffraction-limited green light is generated from the single-pass sum frequency mixing of two diode lasers in two periodically poled nonlinear crystals (conversion efficiency 50%). The technique...

  15. Communicating Concepts about Altruism in Interstellar Messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2002-01-01

    This project identifies key principles of altruism that can be translated into interstellar messages for communication with extraterrestrial intelligence. The message contents will focus specifically on the evolution of altruism, drawing on recent insights in evolutionary biology, with particular emphasis on sociobiological accounts of kin selection and reciprocal altruism. This focus on altruism for message contents has several advantages. First, the subject can be translated into interstellar messages both via an existing formal interstellar language and via pictorial messages. For example, aspects of reciprocal altruism can be described through mathematical modeling, such as game theoretic approaches, which in turn can be described readily in the interstellar language Lincos. Second, concentrating on altruism as a message content may facilitate communications with extraterrestrial intelligence. Some scientists have argued that humans may be expected to communicate something about their moral status and development in an exchange with extraterrestrials. One of the most salient ways that terrestrial and extraterrestrial civilizations might be expected to evaluate one another is in terms of ethical motivations. Indeed, current search strategies assume some measure of altruism on the part of transmitting civilizations; with no guarantee of a response, the other civilization would be providing information to us with no direct payoff. Thus, concepts about altruism provide an appropriate content for interstellar messages, because the concepts themselves might be understood by extraterrestrial civilizations.

  16. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  17. Message Brokers and RabbitMQ in Action

    OpenAIRE

    Kamppuri, Tsuri

    2014-01-01

    The objectives of this bachelor’s thesis were to study the concept of messaging and messaging systems in the domain of Information Sciences, and to research the applicability of RabbitMQ for Paytrail Oyj as a replacement for pre-existing systems. The thesis discusses the history of messaging and message queues, and the topologies, patterns, internal operational models, and usable protocols for messaging brokers. Theoretical part also compares RabbitMQ and ZeroMQ messaging solutions. The m...

  18. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  19. Compact spreader schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C., E-mail: csun@lbl.gov

    2014-12-21

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  20. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Science.gov (United States)

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  1. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    National Research Council Canada - National Science Library

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  2. The Zen Scavenger Hunt: Constructing and Presenting Persuasive Messages

    Science.gov (United States)

    Hamilton, Heidi

    2017-01-01

    Courses: Persuasion; Persuasive Speaking. Objectives: Students will demonstrate the ability to apply persuasive concepts in constructing persuasive messages creatively, and students will present and analyze their persuasive messages.

  3. Matrix Encryption Scheme

    Directory of Open Access Journals (Sweden)

    Abdelhakim Chillali

    2017-05-01

    Full Text Available In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have constructed an abelian group and, for the cryptographic part in this unreliable group, we then perform the computation corresponding to the algebraic equations, Returning the encrypted result to a receiver. Upon receipt of the result, the receiver can retrieve the sender’s clear message by performing the inverse calculation.

  4. A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    Science.gov (United States)

    Carrilho, Sergio; Esaki, Hiroshi

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  5. Books about Teen Parents: Messages and Omissions.

    Science.gov (United States)

    Davis, Joy B.; MacGillivray, Laurie

    2001-01-01

    Examines narratives and novels written for young adults that deal with teenage pregnancy and parenting. Discusses eight common messages found in 17 such short stories and books, and notes three areas of significant silence. (SR)

  6. Wyoming CV Pilot Traveler Information Message Sample

    Data.gov (United States)

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  7. Inoculating against reactance to persuasive health messages.

    Science.gov (United States)

    Richards, Adam S; Banas, John A

    2015-01-01

    This investigation examined the possibility of decreasing psychological reactance to health campaigns through the use of inoculation messages. It was hypothesized that an inoculation message, which forewarned of the potential of subsequent reactance, would decrease participants' likelihood of reacting negatively to a freedom-threatening message aimed to reduce excessive alcohol consumption. Participants (N = 275) who were inoculated against potential reactance felt less threatened and experienced less reactance compared to those who did not read an inoculation message. Structural equation modeling showed that inoculation indirectly predicted lower intention to drink alcohol via the theorized mediated reactance process. This research suggests that it is possible to inoculate against self-generated cognitions that might otherwise lead toward negative health behaviors.

  8. Two-Pass Channel with Angled Ribs

    Directory of Open Access Journals (Sweden)

    C. W. Park

    1999-01-01

    Full Text Available Experiments have been conducted to study the local heat (mass transfer distributions in a two-pass test model of internal turbine blade cooling passages, with 60 ribs on the leading and trailing walls. For radial outward flow in the first pass, rotation did not significantly increase the local nor the overall heat (mass transfer between consecutive ribs on the trailing wall. Rotation-induced Coriolis force lowered the relative overall heat (mass transfer on the leading wall less in the rib-roughened channel than in a smooth channel. When the rotation number was high, there were twin peaks in the local heat (mass transfer distribution between ribs on the leading wall. For radial inward flow in the second pass, the sharp turn reduced the difference between the heat (mass transfer.on the leading wall and that on the trailing wall.

  9. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  10. Link Monotonic Allocation Schemes

    NARCIS (Netherlands)

    Slikker, M.

    1999-01-01

    A network is a graph where the nodes represent players and the links represent bilateral interaction between the players. A reward game assigns a value to every network on a fixed set of players. An allocation scheme specifies how to distribute the worth of every network among the players. This

  11. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  12. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13 ... Author Affiliations. V Rajaraman1. IBM Professor of Information Technology JNCASR Bangalore 560 064, India.

  13. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit...

  14. Simple monotonic interpolation scheme

    International Nuclear Information System (INIS)

    Greene, N.M.

    1980-01-01

    A procedure for presenting tabular data, such as are contained in the ENDF/B files, that is simpler, more general, and potentially much more compact than the present schemes used with ENDF/B is presented. The method has been successfully used for Bondarenko interpolation in a module of the AMPX system. 1 figure, 1 table

  15. Persuasive Email Messages for Patient Communication

    Science.gov (United States)

    Walji, Muhammad; Johnson-Throop, Kathy; Johnson, Todd; Bernstam, Elmer; Zhang, Jiajie

    2005-01-01

    To improve health and reduce costs, we need to encourage patients to make better health care decisions. Since email is widely available, it may be useful for patient-directed interventions. However, we know little about how the contents of an email message can influence a health-related decision. We propose a model to understand how patients may process persuasive email messages. PMID:16779434

  16. Gender messages in contemporary popular Malay songs

    OpenAIRE

    Collin Jerome

    2013-01-01

    Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 cont...

  17. JEMMRLA - Electron Model of a Muon RLA with Multi-pass Arcs

    Energy Technology Data Exchange (ETDEWEB)

    Bogacz, Slawomir Alex; Krafft, Geoffrey A.; Morozov, Vasiliy S.; Roblin, Yves R.

    2013-06-01

    We propose a demonstration experiment for a new concept of a 'dogbone' RLA with multi-pass return arcs -- JEMMRLA (Jlab Electron Model of Muon RLA). Such an RLA with linear-field multi-pass arcs was introduced for rapid acceleration of muons for the next generation of Muon Facilities. It allows for efficient use of expensive RF while the multi-pass arc design based on linear combined-function magnets exhibits a number of advantages over separate-arc or pulsed-arc designs. Here we describe a test of this concept by scaling a GeV scale muon design for electrons. Scaling muon momenta by the muon-to-electron mass ratio leads to a scheme, in which a 4.5 MeV electron beam is injected in the middle of a 3 MeV/pass linac with two double-pass return arcs and is accelerated to 18 MeV in 4.5 passes. All spatial dimensions including the orbit distortion are scaled by a factor of 7.5, which arises from scaling the 200 MHz muon RF to a readily available 1.5 GHz. The hardware requirements are not very demanding making it straightforward to implement. Such an RLA may have applications going beyond muon acceleration: in medical isotope production, radiation cancer therapy and homeland security.

  18. Setting pass scores for clinical skills assessment.

    Science.gov (United States)

    Liu, Min; Liu, Keh-Min

    2008-12-01

    In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  19. Setting Pass Scores for Clinical Skills Assessment

    Directory of Open Access Journals (Sweden)

    Min Liu

    2008-12-01

    Full Text Available In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  20. A reduced feedback proportional fair multiuser scheduling scheme

    KAUST Repository

    Shaqfeh, Mohammad

    2011-12-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed and ordered scheduling mechanism. A slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we propose a novel proportional fair multiuser switched-diversity scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the per-user feedback thresholds. We demonstrate by numerical examples that our reduced feedback proportional fair scheduler operates within 0.3 bits/sec/Hz from the achievable rates by the conventional full feedback proportional fair scheduler in Rayleigh fading conditions. © 2011 IEEE.

  1. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  2. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  3. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  4. Message-driven factors influencing opening and forwarding of mobile advertising messages

    OpenAIRE

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  5. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  6. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  7. The effect of baroque music on the PassPoints graphical password

    OpenAIRE

    Gao, Haichang; Ren, Zhongjie; Chang, Xiuling; Liu, Xiyang; Aickelin, Uwe

    2013-01-01

    Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are easier to attack. The crux of the problem is users’ memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. We introduce baroque music to the PassPoints graphical password scheme and conduct a laboratory st...

  8. Feasibility study of multi-pass respiratory-gated helical tomotherapy of a moving target via binary MLC closure.

    Science.gov (United States)

    Kim, Bryan; Chen, Jeff; Kron, Tomas; Battista, Jerry

    2010-11-21

    Gated radiotherapy of lung lesions is particularly complex for helical tomotherapy, due to the simultaneous motions of its three subsystems (gantry, couch and collimator). We propose a new way to implement gating for helical tomotherapy, namely multi-pass respiratory gating. In this method, gating is achieved by delivering only the beam projections that occur within a respiratory gating window, while blocking the rest of the beam projections by fully closing all collimator leaves. Due to the continuous couch motion, the planned beam projections must be delivered over multiple passes of radiation deliveries. After each pass, the patient couch is reset to its starting position, and the treatment recommences at a different phase of tumour motion to 'fill in' the previously blocked beam projections. The gating process may be repeated until the plan dose is delivered (full gating), or halted after a certain number of passes, with the entire remaining dose delivered in a final pass without gating (partial gating). The feasibility of the full gating approach was first tested for sinusoidal target motion, through experimental measurements with film and computer simulation. The optimal gating parameters for full and partial gating methods were then determined for various fractionation schemes through computer simulation, using a patient respiratory waveform. For sinusoidal motion, the PTV dose deviations of -29 to 5% observed without gating were reduced to range from -1 to 3% for a single fraction, with a 4 pass full gating. For a patient waveform, partial gating required fewer passes than full gating for all fractionation schemes. For a single fraction, the maximum allowed residual motion was only 4 mm, requiring large numbers of passes for both full (12) and partial (7 + 1) gating methods. The number of required passes decreased significantly for 3 and 30 fractions, allowing residual motion up to 7 mm. Overall, the multi-pass gating technique was shown to be a promising

  9. Feasibility study of multi-pass respiratory-gated helical tomotherapy of a moving target via binary MLC closure

    Science.gov (United States)

    Kim, Bryan; Chen, Jeff; Kron, Tomas; Battista, Jerry

    2010-11-01

    Gated radiotherapy of lung lesions is particularly complex for helical tomotherapy, due to the simultaneous motions of its three subsystems (gantry, couch and collimator). We propose a new way to implement gating for helical tomotherapy, namely multi-pass respiratory gating. In this method, gating is achieved by delivering only the beam projections that occur within a respiratory gating window, while blocking the rest of the beam projections by fully closing all collimator leaves. Due to the continuous couch motion, the planned beam projections must be delivered over multiple passes of radiation deliveries. After each pass, the patient couch is reset to its starting position, and the treatment recommences at a different phase of tumour motion to 'fill in' the previously blocked beam projections. The gating process may be repeated until the plan dose is delivered (full gating), or halted after a certain number of passes, with the entire remaining dose delivered in a final pass without gating (partial gating). The feasibility of the full gating approach was first tested for sinusoidal target motion, through experimental measurements with film and computer simulation. The optimal gating parameters for full and partial gating methods were then determined for various fractionation schemes through computer simulation, using a patient respiratory waveform. For sinusoidal motion, the PTV dose deviations of -29 to 5% observed without gating were reduced to range from -1 to 3% for a single fraction, with a 4 pass full gating. For a patient waveform, partial gating required fewer passes than full gating for all fractionation schemes. For a single fraction, the maximum allowed residual motion was only 4 mm, requiring large numbers of passes for both full (12) and partial (7 + 1) gating methods. The number of required passes decreased significantly for 3 and 30 fractions, allowing residual motion up to 7 mm. Overall, the multi-pass gating technique was shown to be a promising

  10. Modeling drivers' passing duration and distance in a virtual environment

    Directory of Open Access Journals (Sweden)

    Haneen Farah

    2013-07-01

    The main contribution of this paper is in the empirical models developed for passing duration and distance which highlights the factors that affect drivers' passing behavior and can be used to enhance the passing models in simulation programs.

  11. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  12. The Physics of "String Passing through Ice"

    Science.gov (United States)

    Mohazzabi, Pirooz

    2011-01-01

    One of the oldest yet interesting experiments related to heat and thermodynamics is placing a string on a block of ice and hanging two masses from the ends of the string. Sometime later, it is discovered that the string has passed through the ice without cutting it in half. A simple explanation of this effect is that the pressure caused by the…

  13. Passing the Bond Issue (with Related Video)

    Science.gov (United States)

    Erickson, Paul W.

    2011-01-01

    When a bond referendum comes around for a school district, it often is the culmination of years of planning, strategizing and communicating to the public. Especially in these economic times, passing a building referendum is challenging. Complete transparency among the superintendent, school board and community is essential to communicate the…

  14. EMISAR single pass topographic SAR interferometer modes

    DEFF Research Database (Denmark)

    Madsen, Søren Nørvang; Skou, Niels; Woelders, Kim

    1996-01-01

    The Danish Center for Remote Sensing (DCRS) has augmented its dual-frequency polarimetric synthetic aperture radar system (EMISAR) with single pass across-track interferometric (XTI) modes. This paper describes the system configuration, specifications and the operating modes. Analysis of data acq...

  15. The PASS Model Project: Administrative Handbook.

    Science.gov (United States)

    George Peabody Coll. for Teachers, Nashville, TN.

    Described is the PASS (Psychoeducational Agency-School System) Project, a collaborative effort between the Metropolitan Nashville Public Schools and the Child Study Center of George Peabody College for Teachers to demonstrate how agency and school system resources may be combined in an integrated service delivery system for learning disabled (LD)…

  16. TREsPASS Book 3: Creative Engagements

    NARCIS (Netherlands)

    Coles-Kemp, Lizzie; Hall, Peter

    2016-01-01

    In this book we examine the role that creative security engagements have played in the TREsPASS project. These engagements are part of a wider creative securities approach that explores the contributions that social practices make to protection of data and information. Our most popular creative

  17. PASS: Creating Physically Active School Systems

    Science.gov (United States)

    Ciotto, Carol M.; Fede, Marybeth H.

    2014-01-01

    PASS, a Physically Active School System, is a program by which school districts and schools utilize opportunities for school-based physical activity that enhance overall fitness and cognition, which can be broken down into four integral parts consisting of connecting, communicating, collaborating, and cooperating. There needs to be an…

  18. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  19. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  20. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  1. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  2. A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

    NARCIS (Netherlands)

    Ibraimi, L.; Tang, Qiang; Hartel, Pieter H.; Jonker, Willem

    2008-01-01

    Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the

  3. Gambling warning messages: The impact of winning and losing on message reception across a gambling session.

    Science.gov (United States)

    Ginley, Meredith K; Whelan, James P; Keating, Holly A; Meyers, Andrew W

    2016-12-01

    Gambling warning messages have been shown to lead to prevention and modification of risk-taking behaviors. Laboratory studies have shown messages can increase a player's knowledge about gambling specific risks, modify their gambling-related cognitive distortions, and even change play. In the present laboratory study, participants were randomly assigned to a winning or losing slot machine gambling experience where they either viewed periodic warning messages or not. It was hypothesized that those in the message conditions would place smaller bets, spend more time considering bets, and spend less time gambling than those in the control conditions. We also hypothesized participants would play differently across the contexts of winning or losing. The results showed those who received warning messages while winning made the fewest number of spins and did not speed up their bet rate over the course of play as much as those in other conditions. Players who received warning messages while losing decreased the size of their bets over the course of play compared to those who received messages while winning. Despite receiving warning messages, losing players did not decrease their number of spins or rate of betting. Winning or losing during slot machine play appears to have significant consequences on the impact of a warning message. Whereas a message to change gambling behavior may encourage a winning gambler to stop play, the same message for a losing player may lead to a small minimization in harm by helping them to decrease bet size, though not their rate of betting. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. Art messaging to engage homeless young adults.

    Science.gov (United States)

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  5. Beyond Scheme F

    Energy Technology Data Exchange (ETDEWEB)

    Elliott, C.J.; Fisher, H.; Pepin, J. [Los Alamos National Lab., NM (United States); Gillmann, R. [Federal Highway Administration, Washington, DC (United States)

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  6. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  7. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  8. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  9. Positive messaging promotes walking in older adults.

    Science.gov (United States)

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  10. Emotional flow in persuasive health messages.

    Science.gov (United States)

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  11. A Scheme for the Application of Smart Message Language in a Wireless Meter Reading System

    OpenAIRE

    O. Homa Keshav; B. Abdul Rahim

    2012-01-01

    The use of wireless automation in almost all the fields of power, gas and water generation, distribution and billing has come of age. Here with the inclusion of wireless communication with the automation may lead to paradigm change in the current trend. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Apart the use of wireless meter reading with network technologies has become need of the day. The designed...

  12. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    Directory of Open Access Journals (Sweden)

    Anfeng Liu

    2015-12-01

    Full Text Available In this paper, a Per-Hop Acknowledgement (PHACK-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  13. Contact conditions in skin-pass rolling

    DEFF Research Database (Denmark)

    Kijima, Hideo; Bay, Niels

    2007-01-01

    The special contact conditions in skin-pass rolling of steel strip is analysed by studying plane strain upsetting of thin sheet with low reduction applying long narrow tools and dry friction conditions. An extended sticking region is estimated by an elasto-plastic FEM analysis of the plane strain...... upsetting. This sticking region causes a highly inhomogeneous elasto-plastic deformation with large influence of work-hardening and friction. A numerical analysis of skin-pass rolling shows the same contact conditions, i.e. an extended sticking region around the center of the contact zone. The calculated...... size of the sticking region with varying contact length and pressure/reduction is experimentally verified by plane strain upsetting tests measuring the local surface deformation of the work pieces after unloading....

  14. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    In the auxiliary input model an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information-theoretically re......In the auxiliary input model an adversary is allowed to see a computationally hard-to-invert function of the secret key. The auxiliary input model weakens the bounded leakage assumption commonly made in leakage resilient cryptography as the hard-to-invert function may information......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input...

  15. Single Pass Albumin Dialysis in Hepatorenal Syndrome

    Directory of Open Access Journals (Sweden)

    Rahman Ebadur

    2008-01-01

    Full Text Available Hepatorenal syndrome (HRS is the most appalling complication of acute or chronic liver disease with 90% mortality rate. Single pass albumin dialysis (SPAD can be considered as a noble liver support technique in HRS. Here, we present a case of a young healthy patient who developed hyperacute fulminant liver failure that progressed to HRS. The patient was offered SPAD as a bridge to liver transplantation, however, it resulted in an excellent recovery.

  16. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  17. EDITORIAL: Message from the Editor Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2010-02-01

    passing away of the following former members of the Board of Editors: Ravindra Sudan (1975 to 1984), Joe Di Marco (1984 to 1991) and Roy Bickerton (1975 to 1986). The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria Bergamini-Roedler, Katja Haslinger, Sophy Le Masurier, Yasmin McGlashan, Caroline Wilkinson, Sarah Ryder, Rachael Kriefman and Katie Gerrard for the support that they have given to me, the authors and the referees. Season's Greetings The January special edition delayed this editorial for a month. Nevertheless, I would like belatedly to wish our readers, authors, referees and Board of Editors the season's greetings and thank them for their contributions to Nuclear Fusion in 2009.

  18. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  19. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  20. A systematic review of three approaches for constructing physical activity messages: What messages work and what improvements are needed?

    Directory of Open Access Journals (Sweden)

    Brawley Lawrence R

    2010-05-01

    Full Text Available Abstract Background To motivate individuals to adhere to a regular physical activity regime, guidelines must be supplemented with persuasive messages that are disseminated widely. While substantial research has examined effective strategies for disseminating physical activity messages, there has been no systematic effort to examine optimal message content. This paper reviews studies that evaluate the effectiveness of three approaches for constructing physical activity messages including tailoring messages to suit individual characteristics of message recipients (message tailoring, framing messages in terms of gains versus losses (message framing, and targeting messages to affect change in self-efficacy (i.e., a theoretical determinant of behavior change. Methods We searched the MEDLINE, PsycINFO, EMBASE and CINAHL databases up to July 2008. Relevant reference lists also were searched. We included intervention trials, field experiments, and laboratory-based studies that aimed to test the efficacy or effectiveness of tailored messages, framed messages and self-efficacy change messages among healthy adults. We used a descriptive approach to analyze emerging patterns in research findings. Based on this evidence we made recommendations for practice and future research. Results Twenty-two studies were identified. Twelve studies evaluated message tailoring. In 10 of these studies, tailored messages resulted in greater physical activity than a control message. Six studies evaluated framed messages. Five of these studies demonstrated that gain-framed messages lead to stronger intentions to be active compared to a control message. Moreover, a gain-frame advantage was evident in three of the four studies that assessed physical activity. Four studies evaluated self-efficacy change messages. The two studies that used an experimental design provide a clear indication that individuals' beliefs can be affected by messages that incorporate types of information

  1. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  2. A comprehensive bibliography on Normalization, Social Role Valorization, PASS, and PASSING, 1969-1999

    OpenAIRE

    St-Denis, Carole; Flynn, Robert J.

    2017-01-01

    This comprehensive bibliography includes approximately 800 items. We created it as a working tool for the reader interested in the extensive literature on Normalization, Social Role Valorization, PASS, and PASSING. The bibliography covers the literature in English and French for a 30-year period, beginning in 1969, the year of publication of Kugel and Wolfensberger’s classic monograph, Changing Patterns in Residential Services for the Mentally Retarded, in which Nirje’s celebrated article on ...

  3. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  4. Upon a Message-Oriented Trading API

    Directory of Open Access Journals (Sweden)

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  5. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  6. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  7. 47 CFR 80.95 - Message charges.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Message charges. 80.95 Section 80.95... charges. (a) Except as specified in § 20.15(c) of this chapter with respect to commercial mobile radio service providers, charges must not be made for service of: (1) Any public coast station unless tariffs...

  8. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  9. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  10. Influences of Product Involvement, Environmental Message and ...

    African Journals Online (AJOL)

    This study probes into the influence of interaction among Product Involvement, Environmental Message and Green Advertising Appeals on attitude towards advertising. The study employs an empirical research by 2x2x2 between subject factorial design. The result demonstrates that high-involvement subjects, with or without ...

  11. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...... services offer a less demanding, potentially less confrontational alternative to traditional forms of counselling and treatment....

  12. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  13. Princess Picture Books: Content and Messages

    Science.gov (United States)

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  14. Sending a message to the other side

    Science.gov (United States)

    2017-05-01

    A range of mechanisms have evolved for communicating information across cell membranes, but designing synthetic analogues is far from trivial. A collection of articles in this issue discuss different methods of passing chemical information across lipid bilayers using artificial systems.

  15. Creative Analytics of Mission Ops Event Messages

    Science.gov (United States)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non

  16. Pass-transistor asynchronous sequential circuits

    Science.gov (United States)

    Whitaker, Sterling R.; Maki, Gary K.

    1989-01-01

    Design methods for asynchronous sequential pass-transistor circuits, which result in circuits that are hazard- and critical-race-free and which have added degrees of freedom for the input signals, are discussed. The design procedures are straightforward and easy to implement. Two single-transition-time state assignment methods are presented, and hardware bounds for each are established. A surprising result is that the hardware realizations for each next state variable and output variable is identical for a given flow table. Thus, a state machine with N states and M outputs can be constructed using a single layout replicated N + M times.

  17. Droplets passing through a soap film

    Science.gov (United States)

    Zou, Jun; Wang, Wei; Ji, Chen; Pan, Min

    2017-06-01

    Here, we report an experimental study of droplets colliding with a soap film. The behavior of the droplet is found to be dependent on the impact velocity. The threshold for a droplet to pass through the soap film is influenced by the droplet diameter. The contact time decreases with increasing impact velocity. Emphasis is placed on whether the outer shell remains intact. When the dimensionless contact time approaches 1, collapse of the shell begins. However, the shell does not collapse with further increasing impact velocity.

  18. Two-pass greedy regular expression parsing

    DEFF Research Database (Denmark)

    Grathwohl, Niels Bjørn Bugge; Henglein, Fritz; Nielsen, Lasse

    2013-01-01

    by: operating in only 2 passes; using only O(m) words of random-access memory (independent of n); requiring only kn bits of sequentially written and read log storage, where k ...We present new algorithms for producing greedy parses for regular expressions (REs) in a semi-streaming fashion. Our lean-log algorithm executes in time O(mn) for REs of size m and input strings of size n and outputs a compact bit-coded parse tree representation. It improves on previous algorithms...

  19. Security analysis of the unrestricted identity-based aggregate signature scheme.

    Directory of Open Access Journals (Sweden)

    Kwangsu Lee

    Full Text Available Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.

  20. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  1. An experimental evaluation of multi-pass solar air heaters

    Energy Technology Data Exchange (ETDEWEB)

    Satcunanathan, S.; Persad, P.

    1980-12-01

    Three collectors of identical dimensions but operating in the single-pass, two-pass and three-pass modes were tested simultaneously under ambient conditions. It was found that the two-pass air heater was consistently better than the single-pass air heater over the day for the range of mass flow rates considered. It was also found that at a mass flow rate of 0.0095 kg s/sup -1/ m/sup -2/, the thermal performances of the two-pass and three-pass collectors were identical, but at higher flow rates the two-pass collector was superior to the three-pass collector, the superiority decreasing with increasing mass flow rate.

  2. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    Science.gov (United States)

    Saibaba, N.

    2008-12-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties.

  3. Effectiveness of safety and public service announcement messages on dynamic message signs.

    Science.gov (United States)

    2014-07-01

    The number of transportation agencies that use dynamic message signs (DMS) to provide traffic information to motorists has increased dramatically over the past four decades. This growing trend of DMS deployment is a reflection of the public interest ...

  4. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    Directory of Open Access Journals (Sweden)

    P Gokulakrishnan

    Full Text Available A Road Accident Prevention (RAP scheme based on Vehicular Backbone Network (VBN structure is proposed in this paper for Vehicular Ad-hoc Network (VANET. The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i the Road Side Unit (RSU constructs a Prediction Report (PR based on the status of the vehicles and traffic in the highway roads, (ii the RSU generates an Emergency Warning Message (EWM based on an abnormal PR, (iii the RSU forms a VBN structure and (iv the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF and travels in High Risk Zone (HRZ. These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure. The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  5. Common pass decentered annular ring resonator

    Energy Technology Data Exchange (ETDEWEB)

    Holmes, D. A.; Waite, T. R.

    1985-04-30

    An optical resonator having an annular cylindrical gain region for use in a chemical laser or the like in which two ring-shaped mirrors having substantially conical reflecting surfaces are spaced apart along a common axis of revolution of the respective conical surfaces. A central conical mirror reflects incident light directed along said axis radially outwardly to the reflecting surface of a first one of the ring-shaped mirrors. The radial light rays are reflected by the first ring mirror to the second ring mirror within an annular cylindrical volume concentric with said common axis and forming a gain region. Light rays impinging on the second ring mirror are reflected to diametrically opposite points on the same conical mirror surfaces and back to the first ring mirror through the same annular cylindrical volume. The return rays are then reflected by the conical mirror surface of the first ring mirror back to the central conical mirror. The mirror surfaces are angled such that the return rays are reflected back along the common axis by the central mirror in a concentric annular cylindrical volume. A scraper mirror having a central opening centered on said axis and an offset opening reflects all but the rays passing through the two openings in an output beam. The rays passing through the second opening are reflected back through the first opening to provide feedback.

  6. PASSING STANDARDIZED ASSESSMENTS WITH FADING PROMPTS

    Directory of Open Access Journals (Sweden)

    Amy Marie GREENE

    2015-11-01

    Full Text Available Introduction: No Child Left Behind Act of 2001 mandates that all students perform at a level of proficient on state assessments. This includes students with learning and intellectual disabilities who are inherently performing below grade level. Given that schools are held accountable for meeting these goals and some states are not allowing students to graduate if they do not pass the assessments, this is a large concern for students, parents, teachers, and administration Method: Forty-five students with a disability in writing or an intellectual disability participated in this quasi-experimental, single-group, pretest-posttest design that evaluated the effectiveness of the Fading Prompts through Graphic Organizers method for students with learning and intellectual disabilities in written expression as measured according to the Pennsylvania System of School Assessment. Results: Data analyses were conducted through the use of four dichotomies for percent differences, which compared teacher administered pretests and posttests, pretests and the state administered PSSA, teacher administered posttests and the PSSA, and the participants’ PSSA and the average state PSSA score. All forty-five students performed at a below basic level during baseline and a proficient level on the posttest. The learned skills generalized to the PSSA with forty-three students earning a passing score of proficient, while two students advanced to basic. Conclusion: Based on the outcomes of this study, it is highly recommended that this program be utilized at least for students with learning and intellectual disabilities until further research can be done.

  7. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Directory of Open Access Journals (Sweden)

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  8. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  9. Flexible Multi-Authority Attribute-Based Signature Schemes for Expressive Policy

    Directory of Open Access Journals (Sweden)

    Dan Cao

    2012-01-01

    Full Text Available Attribute-based signature (ABS is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But many applications may require a user obtaining attributes from different authorities, which calls for multi-authority ABS schemes.

  10. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  11. Effects of Instant Messaging on School Performance in Adolescents.

    Science.gov (United States)

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  12. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  13. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  14. A Multifunction Filter for Realizing Gain Variable Low-Pass and Band-Pass Responses

    Directory of Open Access Journals (Sweden)

    Halil ALPASLAN

    2010-02-01

    Full Text Available The second generation current conveyors (CCIIs as active circuit devices are widely used for designing current-mode (CM filters. In this paper, a single input multi output filter employing only plus-type CCIIs (CCII+s and grounded capacitors, and for providing variable gain low-pass and band-pass responses, is suggested. The proposed filter is free from critical passive component matching conditions. Therefore, it is suitable for integrated circuit (IC technology. Further, developed filter configuration can be easily realized with commercially available active devices such as AD844s. The circuit performance is demonstrated by means of SPICE simulation and experimental test results.

  15. Two notes about Ponzi schemes

    OpenAIRE

    Patrick Honohan

    1987-01-01

    A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...

  16. The Effect of Sound Spatialization on Responses to Overlapping Messages

    Science.gov (United States)

    2002-06-01

    study that required listeners to attend to both of two overlapping messages . They used air traffic control operators as participants and graded their...component that indicates who a speaker is addressing or even the full text conversion of speech. 61 APPENDIX A. MESSAGES This...list of call signs, coordinate system illustration, and sample message text . - Tell the participant that they will be listening for messages

  17. Entropy conservative finite element schemes

    Science.gov (United States)

    Tadmor, E.

    1986-01-01

    The question of entropy stability for discrete approximations to hyperbolic systems of conservation laws is studied. The amount of numerical viscosity present in such schemes is quantified and related to their entropy stability by means of comparison. To this end, two main ingredients are used: entropy variables and the construction of certain entropy conservative schemes in terms of piecewise-linear finite element approximations. It is then shown that conservative schemes are entropy stable, if and (for three-point schemes) only if, they contain more numerical viscosity than the abovementioned entropy conservation ones.

  18. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    in a distributed fashion increases. Second, attempting to answer queries on vertices of a graph stored in a distributed fashion can be significantly more complicated. In order to lay theoretical foundations to the first penalty mentioned a large body of work concentrated on labeling schemes. A labeling scheme...... evaluation of fully dynamic labeling schemes. Due to a connection between adjacency labeling schemes and the graph theoretical study of induced universal graphs, we study these in depth and show novel results for bounded degree graphs and power-law graphs. We also survey and make progress on the related...

  19. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  20. How The Message Becomes Part Of The Communication Process

    Directory of Open Access Journals (Sweden)

    Stefan Vladutescu

    2016-12-01

    Full Text Available This study argues in favour of the thesis according to which the message is not directly perceived and it does not occur immediately within the communication process. We can notice that, in order to receive and understand the message, we need to follow a process concerned with the initiation into the process of comprehending the message

  1. Lol: New Language and Spelling in Instant Messaging

    Science.gov (United States)

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  2. Phonological Variation in Short Message Service (SMS) in Kenya ...

    African Journals Online (AJOL)

    Phonological Variation in Short Message Service (SMS) in Kenya. NA Ong'onda, O Oketch, PM Matu. Abstract. In this paper, we analyze the sociolinguistic aspect of Short Message Service (SMS) with a view to identifying phonological variations in Kenyan text messages. The widespread use of cell phones has led to the ...

  3. Understanding health food messages on Twitter for health literacy promotion.

    Science.gov (United States)

    Zhou, J; Liu, F; Zhou, H

    2018-03-01

    With the popularity of social media, Twitter has become an important tool to promote health literacy. However, many health-related messages on Twitter are dead-ended and cannot reach many people. This is unhelpful for health literacy promotion. This article aims to examine the features of online health food messages that people like to retweet. We adopted rumour theory as our theoretical foundation and extracted seven characteristics (i.e. emotional valence, attractiveness, sender's authoritativeness, external evidence, argument length, hashtags, and direct messages). A total of 10,025 health-related messages on Twitter were collected, and 1496 messages were randomly selected for further analysis. Each message was treated as one unit and then coded. All the hypotheses were tested with logistic regression. Emotional valence, attractiveness, sender's authoritativeness, argument length, and direct messages in a Twitter message had positive effects on people's retweet behaviour. The effect of external evidence was negative. Hashtags had no significant effect after consideration of other variables. Online health food messages containing positive emotions, including pictures, containing direct messages, having an authoritative sender, having longer arguments, or not containing external URLs are more likely to be retweeted. However, a message only containing positive or negative emotions or including direct messages without any support information will not be retweeted.

  4. Driver memory for in-vehicle visual and auditory messages

    Science.gov (United States)

    1999-12-01

    Three experiments were conducted in a driving simulator to evaluate effects of in-vehicle message modality and message format on comprehension and memory for younger and older drivers. Visual icons and text messages were effective in terms of high co...

  5. Internet and Mobile Phone Text Messaging Intervention for College Smokers

    Science.gov (United States)

    Riley, William; Obermayer, Jami; Jean-Mary, Jersino

    2008-01-01

    Objective: The authors developed a smoking cessation program using mobile phone text messaging to provide tailored and stage-specific messages to college smokers. Participants and Methods: The authors recruited 31 daily smokers who desired to quit from a college campus and asked them to use an Internet and mobile phone text messaging program to…

  6. 19 CFR 4.7d - Container status messages.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements pursuant...

  7. Review Media messaging: a synthesis of lessons from the literature ...

    African Journals Online (AJOL)

    Young people should not only be the 'target' of messaging initiatives but should play a central role in their design and implementation. Exposure to media messaging is not a proxy for behaviour change. Initiatives should be based on explicit theories of the complex relationship between messaging and behaviour change.

  8. hybrid modulation scheme fo rid modulation scheme fo dulation ...

    African Journals Online (AJOL)

    eobe

    This work proposes a switching technique for ca proposes a switching technique for ca. (SCSPWM) scheme is employed in the generation circulation schemes are presented for this concepts, it is now possible to generate equal ave pts, it is now possible to generate equal ave semiconductor switches. This results in equal ...

  9. Applications of Short Message Service and WAP in Operating Remotely Triggered Laboratories

    Directory of Open Access Journals (Sweden)

    Ananda Maiti

    2011-11-01

    Full Text Available Mobile devices are becoming more powerful, reliable and common every year. Hence we can use mobile devices for conducting laboratory sessions in distance education. This paper discusses issues of integrating Short Message Service (SMS to operate instruments of hardware-based remotely triggered laboratories. Components of the system include searching an experiment, performing experiment, result handling, error handling and method of exchanging information. It is designed using the National Instruments (NI Laboratory Virtual Instrument Engineering Workbench (LabVIEW development system and web services. The scheme will enable students to conduct hardware experiments with mobile devices using SMS from anywhere and anytime.

  10. The Pension Fund passes important milestones

    CERN Multimedia

    2012-01-01

    In this column, the Chairman of the Pension Fund Governing Board (PFGB) presents the Board's latest main decisions, initiatives and accomplishments to the Fund's members and beneficiaries.   Since my last report in October, the PFGB has passed several milestones in actuarial, technical and investment matters. The PFGB has completed an analysis of a request by the European Organisation for Astronomical Research in the Southern Hemisphere (ESO) to reduce the increased cost of pension insurance for new ESO recruits that has been caused by the increased CHF/€ exchange ratio. Currently the staff of ESO are admitted to the CERN Pension Fund, pursuant to a co-operation agreement between CERN and ESO dating back to 1968. This analysis assessed the actuarial, financial, administrative and legal implications, and is scheduled to be presented to the CERN Council and the Finance Committee in December. After an open tendering process the PFGB has selected Buck Consultants Limited...

  11. The baton passes to the LHC

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    Held in the picturesque mountain setting of La Thuile in the Italian Alps, the international conference “Rencontres de Moriond” showed how the baton of discovery in the field of high-energy physics is definitely passing to the LHC experiments. In the well-known spirit of Moriond, the conference was an important platform for young students to present their latest results. The Higgs boson might well be within reach this year and the jet-quenching phenomenon might reveal new things soon…   New physics discussed over the Italian Alps during the "Les rencontres de Moriond" conference.  (Photographer: Paul Gerritsen. Adapted by Katarina Anthony) Known by physicists as one of the most important winter conferences, “Les rencontres de Moriond” are actually a series of conferences spread over two weeks covering the main themes of electroweak interactions, QCD and high-energy interactions, cosmology, gravitation, astropar...

  12. Mobile text messaging solutions for obesity prevention

    Science.gov (United States)

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  13. Content analysis of antismoking videos on YouTube: message sensation value, message appeals, and their relationships with viewer responses.

    Science.gov (United States)

    Paek, Hye-Jin; Kim, Kyongseok; Hove, Thomas

    2010-12-01

    Focusing on several message features that are prominent in antismoking campaign literature, this content-analytic study examines 934 antismoking video clips on YouTube for the following characteristics: message sensation value (MSV) and three types of message appeal (threat, social and humor). These four characteristics are then linked to YouTube's interactive audience response mechanisms (number of viewers, viewer ratings and number of comments) to capture message reach, viewer preference and viewer engagement. The findings suggest the following: (i) antismoking messages are prevalent on YouTube, (ii) MSV levels of online antismoking videos are relatively low compared with MSV levels of televised antismoking messages, (iii) threat appeals are the videos' predominant message strategy and (iv) message characteristics are related to viewer reach and viewer preference.

  14. The perfect message at the perfect moment.

    Science.gov (United States)

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  15. Design and Implementation of BDS RTCM SSR Message

    Science.gov (United States)

    Xiao, Xia; Cheng, Fang; Liu, Feng; Lu, XiaoChun

    2017-09-01

    Based on the real-time differential positioning system of Beidou wide area, a set of Beidou high-precision differential information transmission protocol is studied and designed. After the system generates satellite precise orbit and clock difference products, it needs to be sent to the users in a certain data format through C band GEO communication satellite. The transport protocol should be designed according to the data volume and update rate of the system. At the same time, it is necessary to combine the signal system, satellite resources and the restriction and restriction of the receiver implementation technology. It refers to the relevant fields and international similar systems of technology and standards to design. This paper establishes a set of technical indicators which can measure the pros and cons of differential message organization and broadcasting strategy. Through modeling, simulation and actual test, this paper makes a comprehensive comparison of different strategies. Finally, a transmission protocol design scheme which has good performance and meets the system service requirements is presented.

  16. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  17. ZeroMQ: Messaging Made Simple

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  18. Audience readings of media messages about MRSA.

    Science.gov (United States)

    Washer, P; Joffe, H; Solberg, C

    2008-09-01

    This paper explores whether, and to what extent, national newspaper messages tally with public perceptions about meticillin-resistant Staphylococcus aureus (MRSA). It compares research on media messages about MRSA with interview data gathered from a demographically diverse sample of 60 people interviewed from the Greater London area. Across the interview sample there was a shared consensus that most people associated MRSA not with the history of antibiotic use, but with dirty and poorly managed hospitals. Some media messages, such as blaming MRSA on the alleged 'management culture' of the NHS, seemed to capture the Zeitgeist, whereas others, in particular the 'celebrity victims' of MRSA, did not seem to resonate with the audience. This study also found that ideas based on scientific understandings about germ theory and the immune system were held alongside folklore such as miasmic theory. The comparison of media and mind thus points to the existence of pre-scientific understandings of germs, contagion and blame in parallel with the biomedical story in the minds of the public. The findings contribute to our understanding of the public and patients' views of this infection.

  19. How Message Fatigue toward Health Messages Leads to Ineffective Persuasive Outcomes: Examining the Mediating Roles of Reactance and Inattention.

    Science.gov (United States)

    Kim, Soela; So, Jiyeon

    2018-01-01

    Message fatigue refers to a state of being exhausted and tired of prolonged exposure to similarly-themed messages (e.g., anti-obesity messages; So, Kim, & Cohen, 2017). This study tests a mediational model that accounts for how one's preexisting fatigue toward anti-obesity messages may contribute to two different types of resistance-reactance and disengagement-toward an incoming anti-obesity message, which, in turn, reduce intention to adopt weight-management behaviors advocated in the message. The proposed model was tested in an experimental study (N = 312) involving a sample of overweight or obese adults in the United States. In the meditational model, reactance significantly mediated the negative effects of message fatigue on intention to adopt only one of four weight-management behaviors promoted in the message. However, inattention, which was an operationalization of disengagement, significantly mediated the negative effects of message fatigue on behavioral intention to adopt all four weight-management behaviors. This study urges future research on message fatigue and resistance to persuasion to consider disengagement with a message as a significant barrier to effective health communication and to devise ways to increase engagement with messages communicating "overtaught" health issues.

  20. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give better results than Euler backward method and trapezoidal method near a singular point. KEY WORDS: backward differentiation scheme, collocation, initial value problems.

  1. Diagnosis diagrams for passing signals on an automatic block signaling railway section

    Science.gov (United States)

    Spunei, E.; Piroi, I.; Chioncel, C. P.; Piroi, F.

    2018-01-01

    This work presents a diagnosis method for railway traffic security installations. More specifically, the authors present a series of diagnosis charts for passing signals on a railway block equipped with an automatic block signaling installation. These charts are based on the exploitation electric schemes, and are subsequently used to develop a diagnosis software package. The thus developed software package contributes substantially to a reduction of failure detection and remedy for these types of installation faults. The use of the software package eliminates making wrong decisions in the fault detection process, decisions that may result in longer remedy times and, sometimes, to railway traffic events.

  2. The prototype message broadcast system for the Superconducting Super Collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab

  3. An Ultra-light PRNG Passing Strict Randomness Tests and Suitable for Low Cost Tags

    Directory of Open Access Journals (Sweden)

    OZCANHAN, M. H.

    2016-08-01

    Full Text Available A pseudo-random number generator for low-cost RFID tags is presented. The scheme is simple, sequential and secure, yet has a high performance. Despite its lowest hardware complexity, our proposal represents a better alternative than previous proposals for low-cost tags. The scheme is based on the well-founded pseudo random number generator, Mersenne Twister. The proposed generator takes low-entropy seeds extracted from a physical characteristic of the tag and produces outputs that pass popular randomness tests. Contrarily, previous proposal tests are based on random number inputs from a popular online source, which are simply unavailable to tags. The high performance and satisfactory randomness of present work are supported by extensive test results and compared with similar previous works. Comparison using proven estimation formulae indicates that our proposal has the best hardware complexity, power consumption, and the least cost.

  4. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  5. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  6. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  7. Analysis of Biomechanical Structure and Passing Techniques in Basketball

    OpenAIRE

    Ricardo E. Izzo; Luca Russo

    2011-01-01

    The basketball is a complex sport, which these days has become increasingly linked to its’ psychophysical aspects rather than to the technical ones. Therefore, it is important to make a through study of the passing techniques from the point of view of the type of the pass and its’ biomechanics. From the point of view of the type of the used passes, the most used is the two-handed chest pass with a frequency of 39.9%. This is followed, in terms of frequency, by one-handed passes – the baseball...

  8. Multiple-pass trajectories for an aeroassisted orbital transfer vehicle

    Science.gov (United States)

    Rehder, J. J.

    1984-01-01

    This paper investigates the use of multiple-pass trajectories for aeroassisted orbital transfer vehicles (AOTV) as a means of reducing the severe aeroheating environment and the extreme sensitivity to off-nominal trajectory and atmospheric conditions. One-, two-, and three-pass trajectories were calculated for AOTV's with ballistic coefficients ranging from 5 to 150 psf. Compared to the single-pass case, the maximum heat rate was reduced by 30 percent for two passes and 45 percent for three passes, while the maximum acceleration was reduced by 40 percent and 55 percent, respectively. The sensitivity of the trajectories to variations in atmospheric and orbital parameters was not significantly reduced.

  9. Effects of subliminal backward-recorded messages on attitudes.

    Science.gov (United States)

    Swart, L C; Morgan, C L

    1992-12-01

    This study was designed to measure the effects of subliminal backward messages on attitudes. It was hypothesized that subliminal backward-recorded messages would influence the attitudes of listeners. Three subliminal backward-recorded messages from a popular song were used. 82 undergraduates were randomly assigned to one of four conditions: a three-message group heard a tape containing the backward messages recorded three times in succession, a six-message group heard a tape with the same backward messages recorded six times in succession, two control groups heard nonbackward recorded music. No statistically significant differences were found between the groups on a posttape attitude questionnaire. The results are discussed in terms of unconscious processing and the tricomponent theory of attitudes and attitude change.

  10. Message generalizations that support evidence-based persuasive message design: specifying the evidentiary requirements.

    Science.gov (United States)

    O'Keefe, Daniel J

    2015-01-01

    Evidence-based persuasive message design can be informed by dependable research-based generalizations about the relative persuasiveness of alternative message-design options. Five propositions are offered as specifying what constitutes the best evidence to underwrite such generalizations: (1) The evidence should take the form of replicated randomized trials in which message features are varied. (2) Results should be described in terms of effect sizes and confidence intervals, not statistical significance. (3) The results should be synthesized using random-effects meta-analytic procedures. (4) The analysis should treat attitudinal, intention, and behavioral assessments as yielding equivalent indices of relative persuasiveness. (5) The replications included in research syntheses should not be limited to published studies or to English-language studies.

  11. Mobile phone messaging for preventive health care.

    Science.gov (United States)

    Vodopivec-Jamsek, Vlasta; de Jongh, Thyra; Gurol-Urganci, Ipek; Atun, Rifat; Car, Josip

    2012-12-12

    Preventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care. To assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes. We searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features

  12. Anon-Pass: Practical Anonymous Subscriptions

    Science.gov (United States)

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  13. How My Program Passed the Turing Test

    Science.gov (United States)

    Humphrys, Mark

    In 1989, the author put an ELIZA-like chatbot on the Internet. The conversations this program had can be seen - depending on how one defines the rules (and how seriously one takes the idea of the test itself) - as a passing of the Turing Test. This is the first time this event has been properly written. This chatbot succeeded due to profanity, relentless aggression, prurient queries about the user, and implying that they were a liar when they responded. The element of surprise was also crucial. Most chatbots exist in an environment where people expectto find some bots among the humans. Not this one. What was also novel was the onlineelement. This was certainly one of the first AI programs online. It seems to have been the first (a) AI real-time chat program, which (b) had the element of surprise, and (c) was on the Internet. We conclude with some speculation that the future of all of AI is on the Internet, and a description of the "World- Wide-Mind" project that aims to bring this about.

  14. Distributed Programming via Safe Closure Passing

    Directory of Open Access Journals (Sweden)

    Philipp Haller

    2016-02-01

    Full Text Available Programming systems incorporating aspects of functional programming, e.g., higher-order functions, are becoming increasingly popular for large-scale distributed programming. New frameworks such as Apache Spark leverage functional techniques to provide high-level, declarative APIs for in-memory data analytics, often outperforming traditional "big data" frameworks like Hadoop MapReduce. However, widely-used programming models remain rather ad-hoc; aspects such as implementation trade-offs, static typing, and semantics are not yet well-understood. We present a new asynchronous programming model that has at its core several principles facilitating functional processing of distributed data. The emphasis of our model is on simplicity, performance, and expressiveness. The primary means of communication is by passing functions (closures to distributed, immutable data. To ensure safe and efficient distribution of closures, our model leverages both syntactic and type-based restrictions. We report on a prototype implementation in Scala. Finally, we present preliminary experimental results evaluating the performance impact of a static, type-based optimization of serialization.

  15. Vat leaching test in Ningyo pass mine

    International Nuclear Information System (INIS)

    Sugihara, Kozo; Sugitsue, Yozo

    1981-01-01

    Power Reactor and Nuclear Fuel Development Corp. has tested inplace and heap leaching methods considered to be the means to efficiently and economically recover useful metals from low grade ores in developing uranium mines. It has once considered to try heap leaching test in Ningyo pass mines, but re-arranged the plan in which it will first develop the vast leaching to use leaching vats to accumulate the data and experience, then the heap leaching, from the viewpoint of environmental preservation and extraction maximum. Until December, 1980, approximately 6,000 t of crude ores were tested. The leaching test process is composed of five sub-processes of filling, leaching, washing, neutralization and carrying-out. Then the summary of the vast leaching facility is described, following the process flow. In the test results in the fiscal year of 1980, the first circulation days in leaching process are considered as 8 to 10 days, and in the following circulation, 5 days, and the amount of sulfuric acid required was estimated as 20 to 35 kg/t-ore. The relation of the change of uranium concentration expressed logarithmically to the amount of water in washing process was approximately linear. Though the recovery rate was about 95% in the ion exchange process test because the result includes the test run data, it will be 99% or more in steady operation. (Wakatsuki, Y.)

  16. A modified chaos-based communication scheme using Hamiltonian forms and observer

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Mancilla, D [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103, Carretera Tijuana-Ensenada, 22860, Ensenada, B.C. (Mexico); Cruz-Hernandez, C [Telematics Direction, Scientific Research and Advanced Studies of Ensenada (CICESE), Km. 107 Carretera Tijuana-Ensenada, 22860 Ensenada, B.C. (Mexico); Posadas-Castillo, C [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103, Carretera Tijuana-Ensenada, 22860, Ensenada, B.C. (Mexico); Faculty of Engineering Mechanic and Electrical (FIME), Nuevo Leon Autonomous University (UANL), Pedro de alba s/n Cd. Universitaria San Nicolas de los Garza N.L. (Mexico)

    2005-01-01

    In this work, a modified chaos-based communication scheme is presented. In particular, we use the modified scheme proposed by Lopez-Mancilla and Cruz-Hernandez (2005), that improves the basic scheme for chaotic masking using a single transmission channel proposed by Cuomo and coworkers (1993). It is extended for a special class of Generalized Hamiltonian systems. Substantial differences that significantly affect the reception quality of the sent message, with or without considering noise effect in the transmission channel are given. We use two Hamiltonian Lorenz systems unidirectionally coupled, the first like a master/transmitter system and the other like a slave/receiver system in order to illustrate with numerical simulations the effectiveness of the modified scheme, using chaos synchronization with Hamiltonian forms and observer.

  17. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    Science.gov (United States)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  18. When communications collide with recipients' actions: effects of post-message behavior on intentions to follow the message recommendation.

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B; Kumkale, G Tarcan

    2003-07-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance.

  19. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  20. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  1. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages.

    Science.gov (United States)

    Cole, Galen E; Keller, Punam A; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-03-01

    The Centers for Disease Control and Prevention's Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces.

  2. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  3. Electronic folklore among teenagers: SMS messages

    Directory of Open Access Journals (Sweden)

    Cvjetićanin Tijana

    2006-01-01

    Full Text Available The development of ICT media made way for a new form of folklore communication. Newly developed media, such as mobile phones, make it possible for their users to participate in electronically mediated communication, thus approaching the form of oral communication. The exchange of special type of SMS text messages represents a new way of transmitting contemporary folklore short forms. These messages use poetic language, they have standard style themes, patterns and formulas, and they form different genres and categories corresponding with already existing familiar folklore forms. The communication process that happens during the exchange of these messages also has folklore’s characteristics: it takes place within small groups, the communication is informal, the texts circulate in chain style, and undergo different transformation which generates the making of variants, etc. This form of electronic folklore is especially popular among teenagers, where it’s social functions and meanings are also most emphasized. Within this population, it adds to an older tradition of children’s written folklore poetry albums. Like poetry albums, SMS exchange influences the development of girls’ gender identity, providing also a socially defined channel for contacts between the sexes. It also functions as a mechanism of socialization and stratification within the group. At the same time, it creates a new field of meaning, which derives from the very media’s novelty and significance. In this sense, the exchange of SMS represents a symbolic act of acknowledging one’s belonging to the group of mobile telephone users. In this way, a new phenomenon is being symbolically processed through a new form of folklore.

  4. Getting your message out with social marketing.

    Science.gov (United States)

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  5. Spectral scheme for spacetime physics

    International Nuclear Information System (INIS)

    Seriu, Masafumi

    2002-01-01

    Based on the spectral representation of spatial geometry, we construct an analysis scheme for spacetime physics and cosmology, which enables us to compare two or more universes with each other. In this scheme the spectral distance plays a central role, which is the measure of closeness between two geometries defined in terms of the spectra. We apply this scheme for analyzing the averaging problem in cosmology; we explicitly investigate the time evolution of the spectra, distance between two nearby spatial geometries, simulating the relation between the real Universe and its model. We then formulate the criteria for a model to be a suitable one

  6. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  7. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  8. Hyperpolarized13C urea myocardial first-pass perfusion imaging using velocity-selective excitation.

    Science.gov (United States)

    Fuetterer, Maximilian; Busch, Julia; Peereboom, Sophie M; von Deuster, Constantin; Wissmann, Lukas; Lipiski, Miriam; Fleischmann, Thea; Cesarovic, Nikola; Stoeck, Christian T; Kozerke, Sebastian

    2017-06-21

    A velocity-selective binomial excitation scheme for myocardial first-pass perfusion measurements with hyperpolarized 13 C substrates, which preserves bolus magnetization inside the blood pool, is presented. The proposed method is evaluated against gadolinium-enhanced 1 H measurements in-vivo. The proposed excitation with an echo-planar imaging readout was implemented on a clinical CMR system. Dynamic myocardial stress perfusion images were acquired in six healthy pigs after bolus injection of hyperpolarized 13 C urea with the velocity-selective vs. conventional excitation, as well as standard 1 H gadolinium-enhanced images. Signal-to-noise, contrast-to-noise (CNR) and homogeneity of semi-quantitative perfusion measures were compared between methods based on first-pass signal-intensity time curves extracted from a mid-ventricular slice. Diagnostic feasibility is demonstrated in a case of septal infarction. Velocity-selective excitation provides over three-fold reduction in blood pool signal with a two-fold increase in myocardial CNR. Extracted first-pass perfusion curves reveal a significantly reduced variability of semi-quantitative first-pass perfusion measures (12-20%) for velocity-selective excitation compared to conventional excitation (28-93%), comparable to that of reference 1 H gadolinium data (9-15%). Overall image quality appears comparable between the velocity-selective hyperpolarized and gadolinium-enhanced imaging. The feasibility of hyperpolarized 13 C first-pass perfusion CMR has been demonstrated in swine. Comparison with reference 1 H gadolinium data revealed sufficient data quality and indicates the potential of hyperpolarized perfusion imaging for human applications.

  9. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  10. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  11. An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine

    Directory of Open Access Journals (Sweden)

    B. Ravi Kumar

    2015-12-01

    Full Text Available Cryptography is the science of writing messages in unknown form using mathematical models. In Cryptography, several ciphers were introduced for the encryption schemes. Recent research focusing on designing various mathematical models in such a way that tracing the inverse of the designed mathematical models is infeasible for the eve droppers. In the present work, the ELGamal encryption scheme is executed using the generator of a cyclic group formed by the points on choosing elliptic curve, finite state machines and key matrices obtained from the Fibonacci sequences.

  12. A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-02-01

    Full Text Available This paper presents a privacy-preserving path-authentication method for supply chain management using RFID. Compared with previous works, our scheme employs only symmetric encryption and message authentication codes. This reduces computation and communication overhead. The proposed method also supports high-level privacy without the need for tamper-proof tags as compared with the previous methods. Performance analysis demonstrates that the proposed scheme requires far less computation resource than recent works, proving that less than 1 minute is enough to verify 100000 RFIDs in a conventional reader environment.

  13. Multimodality of filmic message in the subtitling

    Directory of Open Access Journals (Sweden)

    Paulina Borowczyk

    2016-03-01

    Full Text Available Audiovisual programs are meant to be seen and heard simultaneously. Screen translators have to take the verbal, acoustic and visual elements of audiovisual works into consideration. However they translate only the verbal content of the message. In the following article we focus on one of the main modalities for audiovisual translation, namely the subtitling. Our aim is to describe the specificity of screen translation and to think about the impact of subtitling process on the final product, that is on translation. We will show how translators take advantage of the presence of the verbal (dialogues and the visual (screen codes with the aim of reducing an original text.

  14. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    This article presents the results of a study of two SMS services aimed at providing young people with information on cannabis and helping them to reduce their consumption of the drug. The attitude of the 12 participants in the study towards the SMS services is generally positive, but they prefer...... factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...

  15. Neuroscience and education: myths and messages.

    Science.gov (United States)

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.

  16. Passing waves from atomistic to continuum

    Science.gov (United States)

    Chen, Xiang; Diaz, Adrian; Xiong, Liming; McDowell, David L.; Chen, Youping

    2018-02-01

    Progress in the development of coupled atomistic-continuum methods for simulations of critical dynamic material behavior has been hampered by a spurious wave reflection problem at the atomistic-continuum interface. This problem is mainly caused by the difference in material descriptions between the atomistic and continuum models, which results in a mismatch in phonon dispersion relations. In this work, we introduce a new method based on atomistic dynamics of lattice coupled with a concurrent atomistic-continuum method to enable a full phonon representation in the continuum description. This permits the passage of short-wavelength, high-frequency phonon waves from the atomistic to continuum regions. The benchmark examples presented in this work demonstrate that the new scheme enables the passage of all allowable phonons through the atomistic-continuum interface; it also preserves the wave coherency and energy conservation after phonons transport across multiple atomistic-continuum interfaces. This work is the first step towards developing a concurrent atomistic-continuum simulation tool for non-equilibrium phonon-mediated thermal transport in materials with microstructural complexity.

  17. Real Time Assessment of Young Adults' Attitudes toward Tobacco Messages.

    Science.gov (United States)

    Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L

    2018-01-01

    We used ecological momentary assessment (EMA) to examine young adults' attitudes towards pro-tobacco messages encountered in real time and their association with intentions to use tobacco. Young adults (N = 92, ages 18-29) recorded sightings of marketing or social media related to tobacco in real time via mobile app for 28 days. Participants reported message characteristics, their attitudes towards the message, and intentions to use the depicted product for each submission. We used generalized linear mixed models to examine factors related to attitude towards message and intentions to use tobacco. Messages depicting e-cigarettes (p < .001) or hookah (p < .05) were associated with significantly more favorable attitudes compared with traditional cigarettes. Positive attitude towards the message was significantly associated with intention to use the depicted product (p < .001). Messages depicting e-cigarettes and hookah were significantly associated with higher intention to use. Message source was not significantly related to attitudes towards the message or product use intentions. Marketing featuring e-cigarettes and hookah is an important target for future regulation. Given that pro-tobacco and e-cigarette messages are prevalent online, future research should consider the Internet and social media as important venues for counter-marketing and intervention efforts.

  18. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  19. Evaluations of dieting prevention messages by adolescent girls.

    Science.gov (United States)

    Paxton, Susan J; Wertheim, Eleanor H; Pilawski, Angela; Durkin, Sarah; Holt, Tracey

    2002-11-01

    Dieting prevention interventions have been relatively unsuccessful and may be more effective if they concentrate on messages known to be relatively high on persuasive properties. We aimed to identify anti-dieting messages rated most strongly on persuasive dimensions and participant characteristics that predicted message evaluations in adolescent girls. Grade 7 and 8 girls completed questionnaires assessing risk factors for, and early symptoms of, eating disorders. Two weeks later, participants viewed on video seven messages (each 2-3 minutes long) frequently used to dissuade against dieting in prevention interventions and one control message. After viewing each message, participants rated it on a scale assessing the persuasive dimensions of Relevance, Believability, Emotional Response, and Intention to Diet. A quarter to a third of participants felt less likely to go on a diet after viewing the messages. "Skipping meals makes you feel starved so you overeat and feel bad" and "Don't be fooled by the fad diets promoted in the media" were rated most strongly. Higher dieting, body dissatisfaction, and negative affect were generally associated with lower persuasive ratings, suggesting the importance of intervention prior to the establishment of dieting behaviors after which there is more message resistance. Age was also a predictor of Believability for some messages, supporting the importance of ensuring the age appropriateness of messages.

  20. Rabin-$p$ Cryptosystem: Practical and Efficient Method for Rabin based Encryption Scheme

    OpenAIRE

    Asbullah, Muhammad Asyraf; Ariffin, Muhammad Rezal Kamel

    2014-01-01

    In this work, we introduce a new, efficient and practical scheme based on the Rabin cryptosystem without using the Jacobi symbol, message redundancy technique or the needs of extra bits in order to specify the correct plaintext. Our system involves only a single prime number as the decryption key and does only one modular exponentiation. Consequently, this will practically reduce the computational efforts during decryption process. We demonstrate that the decryption is unique and proven to be...

  1. Portsmouth Atmospheric Science School (PASS) Project

    Science.gov (United States)

    Coleman, Clarence D.; Hathaway, Roger (Technical Monitor)

    2002-01-01

    The Portsmouth Atmospheric Science School Project (PASS) Project was granted a one-year no cost extension for 2001-2002. In year three of the project, objectives and strategies were modified based on the previous year-end evaluation. The recommendations were incorporated and the program was replicated within most of the remaining elementary schools in Portsmouth, Virginia and continued in the four middle schools. The Portsmouth Atmospheric Science School Project is a partnership, which includes Norfolk State University, Cooperating Hampton Roads Organizations for Minorities in Engineering (CHROME), NASA Langley Research Center, and the City of Portsmouth, Virginia Public Schools. The project seeks to strengthen the knowledge of Portsmouth Public Schools students in the field of atmospheric sciences and enhance teacher awareness of hands on activities in the atmospheric sciences. The project specifically seeks to: 1) increase the interest and participation of elementary and middle school students in science and mathematics; 2) strengthen existing science programs; and 3) facilitate greater achievement in core subjects, which are necessary for math, science, and technical careers. Emphasis was placed on providing training activities, materials and resources for elementary students (grades 3 - 5) and middle school students (grades 6 - 8), and teachers through a CHROME club structure. The first year of the project focused on introducing elementary students to concepts and activities in atmospheric science. Year two of the project built on the first year's activities and utilizes advanced topics and activities appropriate for middle school students. During the third year of the project, in addition to the approaches used in years one and two, emphasis was placed on activities that enhanced the Virginia Standards of Learning (SOL).

  2. Relaxation schemes for Chebyshev spectral multigrid methods

    Science.gov (United States)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  3. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  4. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  5. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so

  6. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  7. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    . While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...... requirements and provided little information about why these requirements were considered relevant. This stands in contrast to the discussions at the project meetings where the software engineers made frequent use of both abstract goal descriptions and concrete examples to make sense of the requirements...

  8. Comics: a medium for today's development messages.

    Science.gov (United States)

    Opilas, E A

    1978-03-01

    Filipino illustrated magazines, or the comics, may yet prove to be the most effective media, if not the most effective, for spreading the country's development messages. Long criticized by intellectuals and the social elite, the comics have been grossly underrated in their potential to inform, persuade, and even influence the life-style of the people. The government's Commission on Population (Popcom) has developed an information-education-communication program using the comics, among other media, to disseminate stories on family planning, responsible parenthood, and related topics. Its best quality is popular appeal, and for publishers and distribution outlets, the comics provide good business. A review of these materials shows that their themes reflect the following topics or issues: 1) population trends and consequences; 2) socioeconomic benefits of family planning; 3) customs which influence family planning; 4) family planning concepts; 5) family planning methods; 6) human sexuality and reproduction; 7) the husband-wife relationship; 8) guides for family planning motivation or communication; and 9) guides for teaching family planning. The materials were developed with 4 qualities in mind so as to attract audience or reader interest: simplicity, familiarity, realism, and attractiveness of materials. The consensus is that in the comics, population and development agencies may have found a "secret weapon" in getting these messages across, and that this new-found use for the illustrated magazines may be giving them a new respectability without in any way diminishing their popular appeal.

  9. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  10. Breast cancer messaging for younger women: gender, femininity, and risk.

    Science.gov (United States)

    Haines, Rebecca J; Bottorff, Joan L; Barclay McKeown, Stephanie; Ptolemy, Erin; Carey, Joanne; Sullivan, Kelli

    2010-06-01

    Evidence linking both active smoking and secondhand smoke exposure to premenopausal breast cancer makes the development of health messages specific to younger women a pressing priority. To determine how to communicate information about this modifiable breast cancer risk to young women, we analyzed a selection of 32 recent English-language breast cancer messages and campaigns that targeted young women. In addition, we obtained young women's responses to three breast cancer campaign images during focus group discussions. A visual analysis of messages points to an explicitly gendered discourse within contemporary campaigns, one that entails conflicting messages regarding breast cancer, health, feminine beauty, and risk. Although the intent might be to educate and empower young women to "fight" against breast cancer, paradoxically, the messages employ imagery that sexually objectifies young women's breasts and bodies. Recommendations are made for messaging about tobacco and breast cancer risk to avoid reproducing one-dimensional or stereotypical presentations of gender and femininity.

  11. VISUAL ART AND REGULATORY FIT MESSAGES ON CONSUMER EVALUATIONS

    Directory of Open Access Journals (Sweden)

    Danielle Mantovani

    2016-03-01

    Full Text Available In this study, we demonstrate that the art infusion effect, in which the presence of visual art causes a positive impact on consumers’ perceptions of products and advertising messages, might have a moderation effect on regulatory fit and non-fit messages. We investigate the impact of visual art on advertisement evaluations in regulatory (non- fit conditions. Regulatory focus theory suggests that consumers rely on their motivational focus (prevention vs. promotion for their evaluations and decisions. Usually, consumers prefer products that fit with their personal motivational focus. In the present study, the results of three experiments indicate that using visual art with a promotion or prevention fit message is recommended, while non-art images increase message persuasiveness when non-fit messages are presented. Therefore, not all information compatible with the consumer’s motivational focus are best evaluated. When non-art images are presented, non-fit messages might be more persuasive.

  12. Experimental investigation at 10 Gb/s of the noise suppression capabilities in a pass-through configuration in SOA-based interferometric structures

    DEFF Research Database (Denmark)

    Wolfson, David; Fjelde, Tina; Kloch, Allan

    2000-01-01

    We experimentally investigate a pass-through scheme for all-optical noise suppression in a SOA-based interferometric structure at 10 Gb/s. An input power dynamic range of ~8 dB as well as a noise suppression capability of ~4.5 dB has been demonstrated. Furthermore, the transmission properties have...

  13. Calculation of trajectory parameters of long pass in basketball.

    Directory of Open Access Journals (Sweden)

    Charikova K.M.

    2011-08-01

    Full Text Available Values of a ball's flight trajectory parameters depending on a distance of long pass, a corner of a ball's start and height of a throwing point are submitted in article. Coordinates of reference points installation for training to long pass with an optimum trajectory of a ball's flight are designed. Requirements to simulators design are determined. Corners of ball's long pass performance in various game situations are recommended.

  14. Monetary Policy with Incomplete Exchange Rate Pass-Through

    OpenAIRE

    Adolfson, Malin

    2001-01-01

    The central bank's optimal reaction to foreign and domestic shocks is analyzed in an inflation targeting model allowing for incomplete exchange rate pass-through. Limited pass-through is incorporated through nominal rigidities in an aggregate supply-aggregate demand model derived from some microfoundations. Three main results are obtained. First, the results suggest that the interest rate response to foreign shocks is smaller when pass-through is low. Second, the inflation-output variability ...

  15. Chelyabinsk fireball and Dyatlov pass tragedy

    Science.gov (United States)

    Kochemasov, G. G.

    2013-09-01

    The Chelyabinsk bolide as well as the Kunashak meteorite in 1949 (Fig. 3, black square) hit ground in ectonically peculiar place in the Ural Mountains. The main explosion was followed by a series of weaker bangs. The long Uralian fold belt (Pz) separates two subsectors (1 & 2, Fig. 1) of the Eurasian sector (1+2) of the Eastern hemisphere sectoral structure (Fig. 1). At the Pamirs-Hindukush massif (the "Pamirs' cross") meet four tectonic sectors of this structure: two opposite differently uplifted (Africa-Mediterranean ++ and Asian +) and separating them two opposite differently subsided (Eurasian - and Indooceanic - -). Tectonic bisectors divide the sectors into two differently tectonically elevated subsectors. The Ural Mountains is one of these bisectors dividing the somewhat risen East-European subsector and the relatively fallen West-Siberian one. Even more important is the sharp tectonic boundary between subsided Eurasian sector and uplifted Asian one (between 2 and 3, Fig. 1). Fig. 3 shows distribution of electrophonic bolides over USSR [1]. Observations numbers are in circles. The total of 343 observations is distributed at relevant districts; accompanied meteorites were found only in 23-24 cases; in the chart are excluded background values of 1-2 observations per district. Two areas are obviously anomalous. These of the Urals, and the Eurasia-Asia sectoral contact (Novosibirsk - Yenisei R. - Tunguska). A location in the long Uralian belt is determined by its intersection with the Timan fold belt coming from the northwest (Fig. 3). The catastrophic Dyatlov pass where nine people mysteriously died at once occurs there (triangle in Fig. 3). Mancy aborigines know this place as deadly where killing white shining spheres appear. Moreover this belt intersection is well known among hunters for UFO as the Permian triangle (Fig. 2). They meet there to observe unusual atmospheric shining and other anomalous phenomena. In the Yenisei-Tunguska-Baikal region lightning

  16. Message Order Effects in Persuasion: An Attitude Strength Perspective.

    OpenAIRE

    Haugtvedt, Curtis P; Wegener, Duane T

    1994-01-01

    Contemporary research on attitude change processes is reviewed for implications regarding the relative influence of successive opposing messages on final judgements. Based on this review, extent of message relevant elaboration is offered as a moderator of primacy versus recency effects in prior research. Support for this view is derived from the ability to explain the results of pervious studies and from two experiments in which message presentation order and personal relevance of the topic a...

  17. Tendency to Message Delivery in Internet Viral Marketing

    OpenAIRE

    Mostafa Ghazizadeh; Ahmad Sardari; Seyyed Reza Shojaee; Mehdi Samizadeh

    2011-01-01

    Abstract The main goal of this research is to review and determine the factors associated with tendency to forward the marketing messages in viral marketing plans of Fast-food industries. In other words, in this study, the effects of three critical determinants, i.e. commercial intention, attractiveness, and media richness have been examined on receivers' intention to forward marketing message in Tehran, Isfahan and Shiraz. Findings imply that receivers’ attitude toward the message has pos...

  18. A message queue based event notification system : football lottery system

    OpenAIRE

    Xu, Yunpeng

    2010-01-01

    Master's thesis in Computer science The event notification service enables user of getting informed about the occurrence of their events of interest. Message queue technology provides asynchronous message exchange functions between computer processes. This thesis presents a solution of building event notification system using the message queue approach. The events in the experiment are generated during the football match and used for both stateless and stateful processing. ...

  19. TXT@WORK: pediatric hospitalists and text messaging.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  20. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, Lise; Ringgaard, L W; Dalum, Peter

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... consecutively randomized to versions of the program that offered either tailored or untailored text messages. Thirty-day point abstinence from smoking was measured self-reportedly at 12-months follow-up. Response rates were 36.3% and 38.1% in the tailored and untailored group, respectively. We analyzed...

  1. Mental health message appeals and audience engagement: Evidence from Australia.

    Science.gov (United States)

    Yap, Jo En; Zubcevic-Basic, Nives; Johnson, Lester W; Lodewyckx, Michaela A

    2017-09-07

    Social media platforms are increasingly used to disseminate social marketing messages about mental health and wellbeing. This study presents a range of message appeals used in social media enabled mental health promotion and stigma reduction messages. Furthermore, it examines the relationship between the type of message appeals and audience engagement. A content analysis of 65 organisation-generated YouTube videos about depression and anxiety and stigma reduction was conducted. The most utilised message appeal was Sorrow, followed by Affiliation, Ease/Convenience, Hope, Humour, Guilt/Shame, Heroic/Successful, and Fear. Multiple regression analysis was used to examine the relationship between the type of message appeals and audience engagement in terms of the number of likes, comments, and shares. The analysis revealed that Sorrow is the most useful message appeal for generating audience comments. However, Sorrow is negatively associated with the number of likes and shares. The results suggest that mental health promotion messages may engage a larger audience through Affiliation and Hope as they have a positive impact on the number of shares. This could, in effect, turn audiences into vocal advocates for mental health promotion and stigma reduction messages. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Radiation Protection Officer certification scheme. Malaysian experience

    International Nuclear Information System (INIS)

    Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah

    2011-01-01

    In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)

  3. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  4. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  5. The Conservation of Architecture: Sensitive Matter & Messages.

    Directory of Open Access Journals (Sweden)

    Calilla Mileto

    2006-12-01

    Full Text Available Architecture conceived as the superposition of historic contributions and safeguard of the traces and fragments of memory has a unique, irreproducible character in its matter and messages that must be respected by the architect. Now that the concept of restoration as functional, mechanical or typological repairs to the building and the need to correct, amend or formally improve the monument from a contemporary viewpoint has been transcended and a really respectful symbiosis of contemporary methodology has been achieved, the time has come for a sensitive approach, half-way between reason and sentiment, making it possible to minimise the impact of the restoration works on the character and sensitive experience of architecture.

  6. Framing political messages to fit the audience's regulatory orientation: how to improve the efficacy of the same message content.

    Science.gov (United States)

    Mannetti, Lucia; Brizi, Ambra; Giacomantonio, Mauro; Higgins, E Tory

    2013-01-01

    This research investigates how the impact of persuasive messages in the political domain can be improved when fit is created by subliminally priming recipients' regulatory focus (either promotion or prevention) and by linguistic framing of the message (either strategic approach framing or strategic avoidance framing). Results of two studies show that regulatory fit: a) increases the impact of a political message favoring nuclear energy on implicit attitudes of the target audience (Study 1); and b) induces a more positive evaluation of, and intentions to vote for, the political candidate who is delivering a message concerning immigration policies (Study 2).

  7. Bilingual Text Messaging Translation: Translating Text Messages From English Into Spanish for the Text4Walking Program.

    Science.gov (United States)

    Buchholz, Susan Weber; Sandi, Giselle; Ingram, Diana; Welch, Mary Jane; Ocampo, Edith V

    2015-05-06

    Hispanic adults in the United States are at particular risk for diabetes and inadequate blood pressure control. Physical activity improves these health problems; however Hispanic adults also have a low rate of recommended aerobic physical activity. To address improving physical inactivity, one area of rapidly growing technology that can be utilized is text messaging (short message service, SMS). A physical activity research team, Text4Walking, had previously developed an initial database of motivational physical activity text messages in English that could be used for physical activity text messaging interventions. However, the team needed to translate these existing English physical activity text messages into Spanish in order to have culturally meaningful and useful text messages for those adults within the Hispanic population who would prefer to receive text messages in Spanish. The aim of this study was to translate a database of English motivational physical activity messages into Spanish and review these text messages with a group of Spanish speaking adults to inform the use of these text messages in an intervention study. The consent form and study documents, including the existing English physical activity text messages, were translated from English into Spanish, and received translation certification as well as Institutional Review Board approval. The translated text messages were placed into PowerPoint, accompanied by a set of culturally appropriate photos depicting barriers to walking, as well as walking scenarios. At the focus group, eligibility criteria for this study included being an adult between 30 to 65 years old who spoke Spanish as their primary language. After a general group introduction, participants were placed into smaller groups of two or three. Each small group was asked to review a segment of the translated text messages for accuracy and meaningfulness. After the break out, the group was brought back together to review the text messages

  8. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  9. "The Museum Pass Game and its Value" Revisited

    NARCIS (Netherlands)

    Estevez Fernandez, M.A.; Borm, P.E.M.; Hamers, H.J.M.

    2004-01-01

    This paper is a reaction on Ginsburgh and Zang (2003).It reconsiders the problem where a group of museums offer a pass such that the owner can visit these museums an unlimited number of times during a fixed period of time.The problem addressed is how to share the total joint income of this pass

  10. Safety analysis of passing maneuvers using extreme value theory

    Directory of Open Access Journals (Sweden)

    Haneen Farah

    2017-04-01

    The results indicate that this is a promising approach for safety evaluation. On-going work of the authors will attempt to generalize this method to other safety measures related to passing maneuvers, test it for the detailed analysis of the effect of demographic factors on passing maneuvers' crash probability and for its usefulness in a traffic simulation environment.

  11. Mourning the passing of longstanding IDRC partner Faleh A. Jabar ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2018-03-05

    Mar 5, 2018 ... It is with great sadness that we announce the sudden passing of Dr Faleh A. Jabar on February 26. Jabar, who needs little introduction in Iraq and the Middle East, was conducting a TV interview when he fell ill; he passed away hours later in hospital in Beirut. Jabar was a political sociologist (PhD University ...

  12. Analysis of Biomechanical Structure and Passing Techniques in Basketball

    Directory of Open Access Journals (Sweden)

    Ricardo E. Izzo

    2011-06-01

    Full Text Available The basketball is a complex sport, which these days has become increasingly linked to its’ psychophysical aspects rather than to the technical ones. Therefore, it is important to make a through study of the passing techniques from the point of view of the type of the pass and its’ biomechanics. From the point of view of the type of the used passes, the most used is the two-handed chest pass with a frequency of 39.9%. This is followed, in terms of frequency, by one-handed passes – the baseball, with 20.9 % – and by the two-handed over the head pass, with 18.2 %, and finally, one- or two-handed indirect passes (bounces, with 11.2 % and 9.8 %. Considering the most used pass in basketball, from the biomechanical point of view, the muscles involved in the correct movement consider all the muscles of the upper extremity, adding also the shoulder muscles as well as the body fixators (abdominals, hip flexors, knee extensors, and dorsal flexors of the foot. The technical and conditional analysis considers the throwing speed, the throw height and the air resistance. In conclusion, the aim of this study is to give some guidelines to improve the mechanical execution of the movements in training, without neglecting the importance of the harmony of the movements themselves.

  13. Passing for English Fluent: Latino Immigrant Children Masking Language Proficiency

    Science.gov (United States)

    Monzo, Lilia D.; Rueda, Robert

    2009-01-01

    This article describes passing for English fluent among Latino immigrant children. A two-year ethnography of eight Latino immigrant families was conducted in which fifth-grade children were followed in home, school, and community contexts. This article presents passing as a consequence of U.S. race relations. Their reasons for presenting…

  14. Teaching Strategies for the Forearm Pass in Volleyball

    Science.gov (United States)

    Casebolt, Kevin; Zhang, Peng; Brett, Christine

    2014-01-01

    This article shares teaching strategies for the forearm pass in the game of volleyball and identifies how they will help students improve their performance and development of forearm passing skills. The article also provides an assessment rubric to facilitate student understanding of the skill.

  15. 78 FR 18479 - Drawbridge Operation Regulations; Pass Manchac, LA

    Science.gov (United States)

    2013-03-27

    ... governing the operation of the Canadian National (CN) Railroad automated bascule span drawbridge across Pass... deviation from the operating schedule for the automated bascule Span Bridge across Pass Manchac, mile 6.7... of eight feet above mean high water, elevation 1.82 feet above Mean Sea Level in the closed-to...

  16. 47 CFR 7.9 - Information pass through.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Information pass through. 7.9 Section 7.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL ACCESS TO VOICEMAIL AND INTERACTIVE MENU SERVICES AND... through. Telecommunications equipment and customer premises equipment shall pass through cross...

  17. 47 CFR 6.9 - Information pass through.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Information pass through. 6.9 Section 6.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL ACCESS TO TELECOMMUNICATIONS SERVICE, TELECOMMUNICATIONS... Entities Do? § 6.9 Information pass through. Telecommunications equipment and customer premises equipment...

  18. Exchange Rate Pass-Through And Monetary Policy

    OpenAIRE

    Frederic S. Mishkin

    2008-01-01

    This paper discusses what recent economic research tells us about exchange rate pass-through and what this suggests for the control of monetary policy. It first focuses on exchange rate pass-through from a macroeconomic perspective and then examines the microeconomic evidence. In light of this evidence, it then discusses the implications of exchange rate movements on the conduct of monetary policy.

  19. Value passing for Communicating Piecewise Deterministic Markov Processes

    NARCIS (Netherlands)

    Strubbe, Stefan; Schaft, Arjan van der; Julius, Agung

    2006-01-01

    In this paper we extend the CPDP model, which is used for compositional specification of PDP-type stochastic hybrid systems, to the value passing CPDP model. With value passing we can express communication of values of continuous variables between CPDP components. We show that the class of value

  20. An intelligent robotics control scheme

    Science.gov (United States)

    Orlando, N. E.

    1984-01-01

    The problem of robot control is viewed at the level of communicating high-level commands produced by intelligent algorithms to the actuator/sensor controllers. Four topics are considered in the design of an integrated control and communications scheme for an intelligent robotic system: the use of abstraction spaces, hierarchical versus heterarchical control, distributed processing, and the interleaving of the steps of plan creation and plan execution. A scheme is presented for an n-level distributed hierarchical/heterarchical control system that effectively interleaves intelligent planning, execution, and sensory feedback. A three-level version of this scheme has been successfully implemented in the Intelligent Systems Research Lab at NASA Langley Research Center. This implementation forms the control structure for DAISIE (Distributed Artificially Intelligent System for Interacting with the Environment), a testbed system integrating AI software with robotics hardware.

  1. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  2. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    injection schemes have been compared: vertical pi- n junction through a current post structure as in1 and lateral p-i-n junction with either uniform material as in2 or with a buried heterostructure (BH) as in3. To allow a direct comparison of the three schemes the same active material composition consisting......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  3. Simple scheme for gauge mediation

    International Nuclear Information System (INIS)

    Murayama, Hitoshi; Nomura, Yasunori

    2007-01-01

    We present a simple scheme for constructing models that achieve successful gauge mediation of supersymmetry breaking. In addition to our previous work [H. Murayama and Y. Nomura, Phys. Rev. Lett. 98, 151803 (2007)] that proposed drastically simplified models using metastable vacua of supersymmetry breaking in vectorlike theories, we show there are many other successful models using various types of supersymmetry-breaking mechanisms that rely on enhanced low-energy U(1) R symmetries. In models where supersymmetry is broken by elementary singlets, one needs to assume U(1) R violating effects are accidentally small, while in models where composite fields break supersymmetry, emergence of approximate low-energy U(1) R symmetries can be understood simply on dimensional grounds. Even though the scheme still requires somewhat small parameters to sufficiently suppress gravity mediation, we discuss their possible origins due to dimensional transmutation. The scheme accommodates a wide range of the gravitino mass to avoid cosmological problems

  4. An objective scatter index based on double-pass retinal images of a point source to classify cataracts.

    Directory of Open Access Journals (Sweden)

    Pablo Artal

    Full Text Available PURPOSE: To propose a new objective scatter index (OSI based in the analysis of double-pass images of a point source to rank and classify cataract patients. This classification scheme is compared with a current subjective system. METHODS: We selected a population including a group of normal young eyes as control and patients diagnosed with cataract (grades NO2, NO3 and NO4 according to the Lens Opacities Classification System (LOCS III. For each eye, we recorded double-pass retinal images of a point source. In each patient, we determined an objective scatter index (OSI as the ratio of the intensity at an eccentric location in the image and the central part. This index provides information on the relevant forward scatter affecting vision. Since the double-pass retinal images are affected by both ocular aberrations and intraocular scattering, an analysis was performed to show the ranges of contributions of aberrations to the OSI. RESULTS: We used the OSI values to classify each eye according to the degree of scatter. The young normal eyes of the control group had OSI values below 1, while the OSI for subjects in LOCS grade II were around 1 to 2. The use of the objective index showed some of the weakness of subjective classification schemes. In particular, several subjects initially classified independently as grade NO2 or NO3 had similar OSI values, and in some cases even higher than subjects classified as grade NO4. A new classification scheme based in OSI is proposed. CONCLUSIONS: We introduced an objective index based in the analysis of double-pass retinal images to classify cataract patients. The method is robust and fully based in objective measurements; i.e., not depending on subjective decisions. This procedure could be used in combination with standard current methods to improve cataract patient surgery scheduling.

  5. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  6. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  7. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Erico Leão

    2017-01-01

    Full Text Available The use ofWireless Sensor Network (WSN technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found in precision agriculture, environmental monitoring and industrial automation. The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable topology to build wide-scale WSNs. Despite some of its known advantages, including timing synchronisation and duty-cycle operation, cluster-tree networks may suffer from severe network congestion problems due to the convergecast pattern of its communication traffic. Therefore, the careful adjustment of transmission opportunities (superframe durations allocated to the cluster-heads is an important research issue. This paper proposes a set of proportional Superframe Duration Allocation (SDA schemes, based on well-defined protocol and timing models, and on the message load imposed by child nodes (Load-SDA scheme, or by number of descendant nodes (Nodes-SDA scheme of each cluster-head. The underlying reasoning is to adequately allocate transmission opportunities (superframe durations and parametrize buffer sizes, in order to improve the network throughput and avoid typical problems, such as: network congestion, high end-to-end communication delays and discarded messages due to buffer overflows. Simulation assessments show how proposed allocation schemes may clearly improve the operation of wide-scale cluster-tree networks.

  8. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-01-27

    The use ofWireless Sensor Network (WSN) technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found in precision agriculture, environmental monitoring and industrial automation. The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable topology to build wide-scale WSNs. Despite some of its known advantages, including timing synchronisation and duty-cycle operation, cluster-tree networks may suffer from severe network congestion problems due to the convergecast pattern of its communication traffic. Therefore, the careful adjustment of transmission opportunities (superframe durations) allocated to the cluster-heads is an important research issue. This paper proposes a set of proportional Superframe Duration Allocation (SDA) schemes, based on well-defined protocol and timing models, and on the message load imposed by child nodes (Load-SDA scheme), or by number of descendant nodes (Nodes-SDA scheme) of each cluster-head. The underlying reasoning is to adequately allocate transmission opportunities (superframe durations) and parametrize buffer sizes, in order to improve the network throughput and avoid typical problems, such as: network congestion, high end-to-end communication delays and discarded messages due to buffer overflows. Simulation assessments show how proposed allocation schemes may clearly improve the operation of wide-scale cluster-tree networks.

  9. A study of the spreading scheme for viral marketing based on a complex network model

    Science.gov (United States)

    Yang, Jianmei; Yao, Canzhong; Ma, Weicheng; Chen, Guanrong

    2010-02-01

    Buzzword-based viral marketing, known also as digital word-of-mouth marketing, is a marketing mode attached to some carriers on the Internet, which can rapidly copy marketing information at a low cost. Viral marketing actually uses a pre-existing social network where, however, the scale of the pre-existing network is believed to be so large and so random, so that its theoretical analysis is intractable and unmanageable. There are very few reports in the literature on how to design a spreading scheme for viral marketing on real social networks according to the traditional marketing theory or the relatively new network marketing theory. Complex network theory provides a new model for the study of large-scale complex systems, using the latest developments of graph theory and computing techniques. From this perspective, the present paper extends the complex network theory and modeling into the research of general viral marketing and develops a specific spreading scheme for viral marking and an approach to design the scheme based on a real complex network on the QQ instant messaging system. This approach is shown to be rather universal and can be further extended to the design of various spreading schemes for viral marketing based on different instant messaging systems.

  10. Short message service or disService: issues with text messaging in a complex medical environment.

    Science.gov (United States)

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  12. Exchanging Second Language Messages Online: Developing an Intercultural Communicative Competence?

    Science.gov (United States)

    Schuetze, Ulf

    2008-01-01

    This article reports on a study carried out twice on an online second language course that was set up between a Canadian University and a German University. In that course, students of German in Canada and students of English in Germany exchanged 2,412 messages in 2004 and 1,831 messages in 2005. A list of processing criteria for assessment was…

  13. Mass media messages and domestic violence in Nigeria | Dauda ...

    African Journals Online (AJOL)

    This article therefore shows the portrayals of women in different messages in the media. Against these backdrops of emerging trends globally and in Nigeria, this article provides an insightful ethnography of mass media messages directed at eradicating domestic violence and as a tool for advocating for violence against ...

  14. Refusals and Rejections: Designing Messages to Serve Multiple Goals.

    Science.gov (United States)

    Saeki, Mimako; O'Keefe, Barbara J.

    1994-01-01

    Tests a rational model of the elaboration of themes found in rejection messages, using Japanese and American participants. Finds partial support for the initial rational model but notes two key revisions: identifies two new themes in rejection messages and suggests substantial differences in the way Americans and Japanese elaborate themes to serve…

  15. Tracing How Normative Messages May Influence Physical Activity Intention.

    Science.gov (United States)

    van Bavel, René; Esposito, Gabriele; Baranowski, Tom; Duch-Brown, Néstor

    2017-04-01

    Normative messages have been shown to increase intention to do physical activity. We traced how "positive" and "negative" normative messages influenced physical activity intention by comparing constructs of the model of goal-directed behavior with descriptive norms (MGDB + DNs) across control and treatment groups in an experiment. For this purpose, 16-24-year-old respondents (n = 1,200) in Bulgaria, Croatia, and Romania were asked about their age, sex, and levels of physical activity before being exposed to positive and negative normative messages and completing a questionnaire with MGDB + DNs scales. Different MGDB + DNs constructs were influenced by the normative messages: compared with the control, the negative message group showed stronger attitudes (p = .003) and the positive message group showed higher positive anticipated emotions (p = .005). The positive message's effect is consistent with the literature on conformity to social norms. The negative message's effect lends itself to interpretations based on social identity and deviance regulation theories.

  16. International Students, University Health Centers, and Memorable Messages about Health

    Science.gov (United States)

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  17. Preferred breast cancer message sources and frames amongst ...

    African Journals Online (AJOL)

    This descriptive study set out to verify the Kenyan women's knowledge of the various risk factors associated with breast cancer, their preferred framing of the breast cancer messages and their preferred channels for receiving those messages. Three hundred and ninety-three (393) women aged 20-64 years from the Kisumu ...

  18. Media messages about cancer: what do people understand?

    Science.gov (United States)

    Mazor, Kathleen M; Calvi, Josephine; Cowan, Rebecca; Costanza, Mary E; Han, Paul K J; Greene, Sarah M; Saccoccio, Laura; Cove, Erica; Roblin, Douglas; Williams, Andrew

    2010-01-01

    Health messages on television and other mass media have the potential to significantly influence the public's health-related knowledge and behaviors, but little is known about people's ability to comprehend such messages. To investigate whether people understood the spoken information in media messages about cancer prevention and screening, we recruited 44 adults from 3 sites to view 6 messages aired on television and the internet. Participants were asked to paraphrase main points and selected phrases. Qualitative analysis methods were used to identify what content was correctly and accurately recalled and paraphrased, and to describe misunderstandings and misconceptions. While most participants accurately recalled and paraphrased the gist of the messages used here, overgeneralization (e.g., believing preventative behaviors to be more protective than stated), loss of details (e.g., misremembering the recommended age for screening), and confusion or misunderstandings around specific concepts (e.g., interpreting "early stage" as the stage in one's life rather than cancer stage) were common. Variability in the public's ability to understand spoken media messages may limit the effectiveness of both pubic health campaigns and provider-patient communication. Additional research is needed to identify message characteristics that enhance understandability and improve comprehension of spoken media messages about cancer.

  19. Advertising Message Customisation/Standardisation And Corporate And Consumer Culture

    Directory of Open Access Journals (Sweden)

    Cristea Sanda Ligia

    2015-11-01

    Full Text Available Advertising translators should be familiarised with the cultural conventions in the target market so that they can re-create the message conveyed in ads. However, advertising message adaptation depends not only on the customer profile but also on corporate culture. The paper focuses on the correlation between these elements and the linguistic choices made by some copywriters.

  20. Instant messaging at the hospital: supporting articulation work?

    Science.gov (United States)

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  1. The Message Is the Massage: Orality and Literacy Once More.

    Science.gov (United States)

    Brandt, Deborah

    1989-01-01

    Reappraises conventional distinctions between oral-like and literate-like discourse, particularly Tannen's distinction between involvement focus and message focus. Treats message as an embodiment of involvement, and cohesion as an aspect of a developing writer-reader relationship. Offers speculations for rethinking "literate…

  2. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  3. Resonant Messages to Prevent Prescription Drug Misuse by Teens

    Science.gov (United States)

    Twombly, Eric C.; Holtz, Kristen D.; Agnew, Christine B.

    2011-01-01

    Prescription drug misuse is a major health problem, particularly among teens. A key step in curbing misuse is the development of effective prescription drug prevention messages. This paper explores the elements of prescription drug misuse prevention messages that resonate with teens using data from focus groups with seventh and eighth grade…

  4. Seventh Grade Students and the Visual Messages They Love

    Science.gov (United States)

    De Abreu, Belinha

    2008-01-01

    Most seventh grade students partially define themselves through everyday media messages. As a part of understanding how these images and the media impacts their lives, the author collaborated with her colleagues to develop a unit to help teens learn how visual messages such as those in pictures, media icons, logos, slogans, clothing, toys, and…

  5. Navigation message designing with high accuracy for NAV

    Directory of Open Access Journals (Sweden)

    Wang Luxiao

    2014-08-01

    Full Text Available Navigation message designing with high accuracy guarantee is the key to efficient navigation message distribution in the global navigation satellite system (GNSS. Developing high accuracy-aware navigation message designing algorithms is an important topic. This paper investigates the high-accuracy navigation message designing problem with the message structure unchanged. The contributions made in this paper include a heuristic that employs the concept of the estimated range deviation (ERD to improve the existing well-known navigation message on L1 frequency (NAV of global positioning system (GPS for good accuracy service; a numerical analysis approximation method (NAAM to evaluate the range error due to truncation (RET of different navigation messages; and a basic positioning parameters designing algorithm in the limited space allocation. Based on the predicted ultra-rapid data from the ultra-rapid data from the international GPS service for geodynamic (IGU, ERDs are generated in real time for error correction. Simulations show that the algorithms developed in this paper are general and flexible, and thus are applicable to NAV improvement and other navigation message designs.

  6. Exploring the influence of instant messaging and video conferencing ...

    African Journals Online (AJOL)

    Some results showed that the use of both instant messaging and video conferencing in projects is moderate and both improve the quality of communication in virtual teams, however in different ways. Keywords: Project communication, computer-mediated communication, instant messaging, video conferencing, virtual teams ...

  7. Children's Text Messaging: Abbreviations, Input Methods and Links with Literacy

    Science.gov (United States)

    Kemp, N.; Bushnell, C.

    2011-01-01

    This study investigated the effects of mobile phone text-messaging method (predictive and multi-press) and experience (in texters and non-texters) on children's textism use and understanding. It also examined popular claims that the use of text-message abbreviations, or "textese" spelling, is associated with poor literacy skills. A sample of 86…

  8. Effective Compiler Error Message Enhancement for Novice Programming Students

    Science.gov (United States)

    Becker, Brett A.; Glanville, Graham; Iwashima, Ricardo; McDonnell, Claire; Goslin, Kyle; Mooney, Catherine

    2016-01-01

    Programming is an essential skill that many computing students are expected to master. However, programming can be difficult to learn. Successfully interpreting compiler error messages (CEMs) is crucial for correcting errors and progressing toward success in programming. Yet these messages are often difficult to understand and pose a barrier to…

  9. Using BDH for the Message Authentication in VANET

    Directory of Open Access Journals (Sweden)

    Mei-Wen Huang

    2014-01-01

    Full Text Available The transport message security provided by vehicles in VANETs is quite important; vehicle message should be real-time and it will be not complicated to validate message calculation. The method proposed in the essay is mainly to validate the identity by means of Bilinear Diffie-Hellman method, and make vehicles validate the authenticity of RSU and TA’s identity and the effectiveness of key. RSU and TA only need to validate vehicle identity, without helping vehicles produce any key. When vehicle identity validation is completed, vehicles will produce public value and transmit it to other RSU and vehicles, while other vehicles could validate the identity through the message from the sender and public value from RSU. The advantages of the method proposed in this essay are listed as follows. (1 Vehicles, RSU, and TA can validate mutual identities and the effectiveness of keys. (2 Vehicles can produce public value functions automatically, thus reducing key control risks. (3 Vehicles do not need to show certificates to validate their identities, preventing the certificates from attacking because of long-term exposure. (4 Vehicles adopt a pseudonym ID challenge to validate their own identities during the process of handoff. (5 Vehicle messages can be validated using the Bilinear Diffie-Hellman (BDH method without waiting for the RSU to validate messages, thus improving the instantaneity of messaging. The method proposed in the essay can satisfy source authentication, message integrity, nonrepudiation, privacy, and conditional untraceability requirements.

  10. Designing Skin Cancer Prevention Messages: Should We Emphasize Gains or Losses? Message Framing, Risk Type, and Prior Experience.

    Science.gov (United States)

    Lee, Moon J; Kang, Hannah

    2018-05-01

    To test whether message framing (ie, gain vs. loss) and risk type (ie, health vs appearance risk) in skin cancer prevention messages interact with one's prior experience. Two experiments with a 2 (message framing: gain vs loss) × 2 (risk type: health vs appearance risk) factorial design were conducted. The participants were given a URL to the experiment website via e-mail. On the first page of the website, the participants were told that they would be asked to evaluate a skin cancer print public service announcement (PSA): Online experiments. A total of 397 individuals participated (236 for experiment 1 and 161 for experiment 2). Apparatus: Four versions of the skin cancer print PSAs were developed. Four PSAs were identical except for the 2 manipulated components: message framing and risk type. Measures were adopted from Cho and Boster (message framing), Jones and Leary and Kiene et al. (risk type), De Vries, Mesters, van't Riet, Willems, and Reubsaet and Knight, Kirincich, Farmer, and Hood (prior experience), and Hammond, Fong, Zanna, Thrasher, and Borland and Hoffner and Ye (behavioral intent). General linear models were used to test hypotheses. Three-way interactions among message framing, risk type, and prior experience were found: When the intent of the message was to encourage sunscreen use, the effects of message framing and risk type were shown to be the exact opposite directions from when the intent was to discourage indoor/outdoor tanning. To discourage tanning among those with prior experience, messages emphasizing losses in terms of one's health will work better. For those with no prior experience, messages emphasizing potential appearance losses will work better for discouraging tanning while messages emphasizing gains like improving appearance will do a better job in encouraging sunscreen use.

  11. Enhancing the effectiveness of media messages promoting regular breast self-examination: messages based on innovation adoption principles.

    Science.gov (United States)

    Howe, H L

    1981-01-01

    As public health departments have come to rely more and more on the mass media for the promotion of healthful behavior, it has become increasingly desirable to determine the motivating capability of the messages used in this promotion. A fact that is well understood is that many times any message at all is better than none. However, the effectiveness of various media health messages has not been well researched.A study was therefore undertaken of the comparative effectiveness of two different messages describing how to do a breast self-examination. An "experimental message" for the study was designed by applying the principles that facilitate innovation adoption to the message's format and presentation. This message's impact was then compared with that of the American Cancer Society's pamphlet "How To Examine Your Breasts." This pamphlet had been mailed to a sample of women similar to those receiving the experimental message, but who lived in a different geographic area. The use in each area of control groups who had received no messages afforded an opportunity to study maturation effects (other factors than the mailings that might have influenced study results).The experimental message proved more successful in persuading women to adopt breast self-examination than the comparison message. The women who reported a change in breast self-examination practice following the mailing could be characterized as having a more extensive social support system to promote breast examinations and as having a pre-experiment perception that breast self-examination was a complex practice to perform repeatedly at regular intervals.

  12. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  13. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  14. Framing Effects in Narrative and Non-Narrative Risk Messages.

    Science.gov (United States)

    Steinhardt, Joseph; Shapiro, Michael A

    2015-08-01

    Narrative messages are increasingly popular in health and risk campaigns, yet gain/loss framing effects have never been tested with such messages. Three experiments examined framing in narrative messages. Experiment 1 found that only the character's decision, not framing, influenced judgments about characters in a narrative derived from a prospect theory context. Experiment 2 found that a framing effect that occurred when presented in a decision format did not occur when the same situation was presented as a narrative. Using a different story/decision context, Experiment 3 found no significant difference in preference for surgery over radiation therapy in a narrative presentation compared to a non-narrative presentation. The results suggest that health and risk campaigns cannot assume that framing effects will be the same in narrative messages and non-narrative messages. Potential reasons for these differences and suggestions for future research are discussed. © 2015 Society for Risk Analysis.

  15. Impact of nutrition messages on children's food choice: pilot study.

    Science.gov (United States)

    Bannon, Katie; Schwartz, Marlene B

    2006-03-01

    This pilot study tested the influence of nutrition message framing on snack choice among kindergarteners. Three classrooms were randomly assigned to watch one of the following 60s videos: (a) a gain-framed nutrition message (i.e. the positive benefits of eating apples) (n=14); (b) a loss-framed message (i.e. the negative consequences of not eating apples) (n=18); or (c) a control scene (children playing a game) (n=18). Following this, the children were offered a choice between animal crackers and an apple for their snack. Among the children who saw one of the nutrition message videos, 56% chose apples rather than animal crackers; in the control condition only 33% chose apples. This difference was statistically significant (chi2=7.56, p<0.01). These results suggest that videos containing nutritional messages may have a positive influence on children's short-term food choices.

  16. Tradable credit scheme for rush hour travel choice with heterogeneous commuters

    Directory of Open Access Journals (Sweden)

    Ling-Ling Xiao

    2015-10-01

    Full Text Available This article proposes a tradable credit scheme for managing commuters’ travel choices. The scheme considers bottleneck congestion and modal split in a competitive highway–transit network with heterogeneous commuters who are distinguished by their valuation of travel time. The scheme charges all auto travelers who pass the bottleneck during a peak-time window in the form of mobility credits. Those who avoid the peak-time window, by either traveling outside the peak-time window or switching to the transit mode, may be rewarded credits. An artificial market is created so that the travelers may trade these credits with each other. We formulate the credit price and the rewarded and charged credits under tradable credit scheme. Our analyses indicate that the optimal tradable credit scheme can achieve nearly 40% efficiency gains depending on the level of commuters’ heterogeneity. In addition, this scheme distributes the benefits among all the commuters directly through the credit trading. Our results suggest that in assessing the efficiency of tradable credit scheme, it is important to take into account the commuters’ heterogeneity. Numerical experiments are conducted to examine the sensitivity of tradable credit scheme designs to various system parameters.

  17. Efficient adaptive fuzzy control scheme

    NARCIS (Netherlands)

    Papp, Z.; Driessen, B.J.F.

    1995-01-01

    The paper presents an adaptive nonlinear (state-) feedback control structure, where the nonlinearities are implemented as smooth fuzzy mappings defined as rule sets. The fine tuning and adaption of the controller is realized by an indirect adaptive scheme, which modifies the parameters of the fuzzy

  18. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  19. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  20. A data seamless interaction scheme between electric power secondary business systems

    Science.gov (United States)

    Ai, Wenkai; Qian, Feng

    2018-03-01

    At present, the data interaction of electric power secondary business systems is very high, and it is not universal to develop programs when data interaction is carried out by different manufacturers' electric power secondary business systems. There are different interaction schemes for electric power secondary business systems with different manufacturers, which lead to high development cost, low reusability and high maintenance difficulty. This paper introduces a new data seamless interaction scheme between electric power secondary business systems. The scheme adopts the international common Java message service protocol as the transmission protocol, adopts the common JavaScript object symbol format as the data interactive format, unified electric power secondary business systems data interactive way, improve reusability, reduce complexity, monitor the operation of the electric power secondary business systems construction has laid a solid foundation.

  1. Short Message Service (SMS) Texting Symbols: A Functional Analysis of 10,000 Cellular Phone Text Messages

    Science.gov (United States)

    Beasley, Robert E.

    2009-01-01

    The purpose of this study was to investigate the use of symbolic expressions (e.g., "BTW," "LOL," "UR") in an SMS text messaging corpus consisting of over 10,000 text messages. More specifically, the purpose was to determine, not only how frequently these symbolic expressions are used, but how they are utilized in terms of the language functions…

  2. Scientific Message Translation and the Heuristic Systematic Model: Insights for Designing Educational Messages About Progesterone and Breast Cancer Risks.

    Science.gov (United States)

    Hitt, Rose; Perrault, Evan; Smith, Sandi; Keating, David M; Nazione, Samantha; Silk, Kami; Russell, Jessica

    2016-06-01

    Results of ongoing scientific research on environmental determinants of breast cancer are not typically presented to the public in ways they can easily understand and use to take preventive actions. In this study, results of scientific studies on progesterone exposure as a risk factor for breast cancer were translated into high and low literacy level messages. Using the heuristic systematic model, this study examined how ability, motivation, and message processing (heuristic and systematic) influenced perceptions of risk beliefs and negative attitudes about progesterone exposure among women who read the translated scientific messages. Among the 1254 participants, those given the higher literacy level message had greater perceptions of risk about progesterone. Heuristic message cues of source credibility and perceived message quality, as well as motivation, also predicted risk beliefs. Finally, risk beliefs were a strong predictor of negative attitudes about exposure to progesterone. The results can help improve health education message design in terms of practitioners having better knowledge of message features that are the most persuasive to the target audiences on this topic.

  3. Effect of Reinforcement of Oral Health Education Message through Short Messaging Service in Mobile Phones: A Quasi-Experimental Trial.

    Science.gov (United States)

    Jadhav, Harish C; Dodamani, Arun S; Karibasappa, G N; Naik, Rahul G; Khairnar, Mahesh R; Deshmukh, Manjiri A; Vishwakarma, Prashanth

    2016-01-01

    Objective. This paper aims to assess the effectiveness of reinforcement of oral health education message through short messaging service (SMS) in mobile phones. Material and Methods. 400 subjects from two colleges (200 from each college) belonging to 18-20 years age group possessing mobile phones were randomly selected and baseline examination of oral hygiene and gingival status was carried out using Oral Hygiene Index (OHI) and Gingival Index (GI). Oral health education was provided to all the subjects. Oral health education message was reinforced through short messaging service (SMS) in mobile phones for the subjects belonging to the intervention group. There was no such reinforcement for the control group. Follow-up examinations were done at the end of 1st, 2nd, 3rd, and 6th month. After the 3rd month, subjects of the intervention group did not receive oral health education message through short messaging service (SMS) and were followed up after next three months. Compiled data was analyzed using SPSS version 16 statistical software. Result. Mean OHI and GI scores in intervention group were significantly (p < 0.01) less than those of control group after the 2nd, 3rd, and 6th month. Conclusion. Reinforcement of oral health education message through short messaging service (SMS) is effective media to improve oral health.

  4. Effect of Reinforcement of Oral Health Education Message through Short Messaging Service in Mobile Phones: A Quasi-Experimental Trial

    Directory of Open Access Journals (Sweden)

    Harish C. Jadhav

    2016-01-01

    Full Text Available Objective. This paper aims to assess the effectiveness of reinforcement of oral health education message through short messaging service (SMS in mobile phones. Material and Methods. 400 subjects from two colleges (200 from each college belonging to 18–20 years age group possessing mobile phones were randomly selected and baseline examination of oral hygiene and gingival status was carried out using Oral Hygiene Index (OHI and Gingival Index (GI. Oral health education was provided to all the subjects. Oral health education message was reinforced through short messaging service (SMS in mobile phones for the subjects belonging to the intervention group. There was no such reinforcement for the control group. Follow-up examinations were done at the end of 1st, 2nd, 3rd, and 6th month. After the 3rd month, subjects of the intervention group did not receive oral health education message through short messaging service (SMS and were followed up after next three months. Compiled data was analyzed using SPSS version 16 statistical software. Result. Mean OHI and GI scores in intervention group were significantly (p<0.01 less than those of control group after the 2nd, 3rd, and 6th month. Conclusion. Reinforcement of oral health education message through short messaging service (SMS is effective media to improve oral health.

  5. Instant Messaging (IM used in the Workplace

    Directory of Open Access Journals (Sweden)

    Norizah Aripin

    2011-09-01

    Full Text Available Developments in information communication technologies (ICT is growing rapidly and organizations use the ICT for business tasks. Group organization consists of various levels of management receive technology development to ensure the management and administration to be more effective and efficient. Organizations now have the equipment of modern technology which allows the task is done by using electronic devices to ensure increased productivity among lower, higher and professional management. Computer mediated communication, such as Instant Messaging (IM used in the workplace other than the use of e-mail. This study discusses the frequency and patterns of use of IM in the workplace. Quantitative methods of survey questionnaires and qualitative methods of conversation analysis used in this study. For survey questionnaire, 379 organizations status MSC involved as respondents. Meanwhile, the conversation analysis approach, using five examples of IM conversations from five different organizations for sample analysis. Data was then analyzed using descriptive (survey questionnaire and thematic analysis (analysis of IM conversations to identify the specific themes on IM usage motive at work. The study found that 279 respondents have used IM in organization. Motives intended use of IM to provide work orders, obtain information, maintain relationship together and express feelings.

  6. A Provably-Secure Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen

    2016-11-01

    Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.

  7. 1998 Physical Acoustics Summer School (PASS 98). Volume 1: Transcripts

    National Research Council Canada - National Science Library

    1998-01-01

    These are the Proceedings of the 1998 Physical Acoustics Summer School (PASS 98). The lectures were recorded and most of the verbatim transcripts were subsequently edited by the authors for publication here...

  8. 1998 Physical Acoustics Summer School (PASS 98). Volume II: Transparencies

    National Research Council Canada - National Science Library

    1998-01-01

    These are the Proceedings of the 1998 Physical Acoustics Summer School (PASS 98). The lectures were recorded and most of the verbatim transcripts were subsequently edited by the authors for publication here...

  9. Axioms for behavioural congruence of single-pass instruction sequences

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2017-01-01

    In program algebra, an algebraic theory of single-pass instruction sequences, three congruences on instruction sequences are paid attention to: instruction sequence congruence, structural congruence, and behavioural congruence. Sound and complete axiom systems for the first two congruences were

  10. Number of Migration Scenarios Passing through each HUC (future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — Forest dwelling neotropical migratory birds require intact forested stopovers during migration. The number of paths that pass through a HUC highlight that huc's...

  11. Number of Migration Scenarios Passing through each HUC

    Data.gov (United States)

    U.S. Environmental Protection Agency — Forest dwelling neotropical migratory birds require intact forested stopovers during migration. The number of paths that pass through a HUC highlight that huc's...

  12. Power Peaking Effect of OTTO Fuel Scheme Pebble Bed Reactor

    Science.gov (United States)

    Setiadipura, T.; Suwoto; Zuhair; Bakhri, S.; Sunaryo, G. R.

    2018-02-01

    Pebble Bed Reactor (PBR) type of Hight Temperature Gas-cooled Reactor (HTGR) is a very interesting nuclear reactor design to fulfill the growing electricity and heat demand with a superior passive safety features. Effort to introduce the PBR design to the market can be strengthen by simplifying its system with the Once-through-then-out (OTTO) cycle PBR in which the pebble fuel only pass the core once. Important challenge in the OTTO fuel scheme is the power peaking effect which limit the maximum nominal power or burnup of the design. Parametric survey is perform in this study to investigate the contribution of different design parameters to power peaking effect of OTTO cycle PBR. PEBBED code is utilized in this study to perform the equilibrium PBR core analysis for different design parameter and fuel scheme. The parameters include its core diameter, height-per-diameter (H/D), power density, and core nominal power. Results of this study show that diameter and H/D effectsare stronger compare to the power density and nominal core power. Results of this study might become an importance guidance for design optimization of OTTO fuel scheme PBR.

  13. Gestalt-like representations hijack Chunk-and-Pass processing.

    Science.gov (United States)

    Dumitru, Magda L

    2016-01-01

    Christiansen & Chater (C&C) make two related and somewhat contradictory claims, namely that the ever abstract language representations built during Chunk-and-Pass processing allow for ever greater interference from extra-linguistic information, and that it is nevertheless the language system that re-codes incoming information into abstract representations. I analyse these claims and discuss evidence suggesting that Gestalt-like representations hijack Chunk-and-Pass processing.

  14. Single-pass multi-view volume rendering

    OpenAIRE

    Hübner, T; Pajarola, R

    2007-01-01

    In this paper, we introduce a new direct volume rendering (DVR) algorithm for multi-view auto-stereoscopic displays. Common multi-view methods perform multi-pass rendering (one pass for each view) and subsequent image compositing and masking for generating multiple views. The rendering time increases therefore linearly with the number of views, but sufficient frame-rates are achieved by sub-resolution rendering, at the expense of degraded image quality. To overcome these disadvantages for DVR...

  15. Virtual token-passing Ethernet proposal using programmable hardware

    OpenAIRE

    Francisco Carreiro; José Alberto Fonseca; Francisco Vasques; Valter Silva

    2005-01-01

    This paper presents the design and first experimentalresults of VTPE (Virtual Token-passing Ethernet). VTPEis a deterministic protocol for real-time applicationsbased on shared Ethernet, aimed to be used either in smallprocessing power processors or in powerful ones. It isbased on implicit token rotation similar to the virtualtoken-passing used in the P-NET protocol. The VTPEimplementation leads to reduced program code, thusfitting in small microcontrollers' memory and imposinglow communicati...

  16. Battle of Kasserine Pass: Defeat is a Matter of Scale

    Science.gov (United States)

    2016-05-26

    historiography of the battle does little to illuminate the context surrounding the Battle of Kasserine Pass, or what operational level effects the battle...used to describe the Battle of Kasserine Pass appropriate? What effect does the declassification of the ULTRA intercepts have on the historiography of...when it is used to analyze the constituent elements of war, to distinguish precisely what at first sight seems fused, to explain in full the

  17. Pass-through Mach-Zehnder topologies for macroscopic quantum measurements

    International Nuclear Information System (INIS)

    Khalili, F. Ya.

    2011-01-01

    Several relatively small-scale experimental setups, aimed on prototyping of future laser gravitational-wave detectors and testing of new methods of quantum measurements with macroscopic mechanical objects, are under development now. In these devices, not devoted directly to the gravitational-wave detection, Mach-Zehnder interferometer with pass-through Fabry-Perot cavities in the arms can be used instead of the standard Michelson/Fabry-Perot one. The advantage of this topology is that it does not contain high-reflectivity end mirrors with multilayer coatings, which Brownian noise could constitute the major part of the noise budget of the Michelson/Fabry-Perot interferometers. We consider here two variants of this topology: the 'ordinary' position meter scheme, and a new variant of the quantum speed meter.

  18. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  19. Finite volume schemes for Vlasov

    Directory of Open Access Journals (Sweden)

    Crouseilles Nicolas

    2013-01-01

    Full Text Available We present finite volume schemes for the numerical approximation of the one-dimensional Vlasov-Poisson equation (FOV CEMRACS 2011 project. Stability analysis is performed for the linear advection and links with semi-Lagrangian schemes are made. Finally, numerical results enable to compare the different methods using classical plasma test cases. Des schémas de type volumes finis sont étudiés ici pour l’approximation de l’équation de Vlasov-Poisson (projet FOV, CEMRACS 2011. Une analyse de stabilité est effectuée dans le cas de l’advection linéaire et plusieurs liens sont faits entre les méthodes volumes finis et semi-Lagrangiennes. Enfin, les méthodes sont comparées sur des cas tests académiques de la physique des plasmas.

  20. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...