WorldWideScience

Sample records for non-realtime messaging systems

  1. Launch Control System Message Reduction

    Science.gov (United States)

    Nguyen, Uyen

    2014-01-01

    System Monitoring and Control (SMC) message browsers receive many messages daily that operators do not need to see. My job is to reduce the number of messages so that warning and emergency messages can be seen easily and therefore, responded to promptly. There are two methods to reduce messages: duplicate and state-based message correlations. With duplicate message correlation, SMC display the message the first time it shows up. The next times it occurs, a duplicate number will count the number of times the message appears. State-based message correlation is a process in which more informative messages acknowledge less useful ones and send them to history. I also work on correcting the severity level and text formats of messages. I follow two SMC message filtering tenets as I'm working on this project. Firstly, before filtering an offending message, a non-conformance (NC) must be created in order to attempt fixing that message through hardware or software. Only after the NC assessment states that it cannot fix an offending message, it can be filtered by SMC. Secondly, per Launch Control System (LCS) Coding Standards, SMC does not send information messages to the active message browser unless it's a response to an operator action.

  2. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  3. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  4. Upgrading messaging system on faculty systems

    OpenAIRE

    Farkaš, Aleš

    2014-01-01

    The graduation thesis provides a solution for the transition a part of mail servers of University of Ljubljana. The transition was carried out from the Microsoft Exchange Server 2003 to Microsoft Exchange Server 2010. Next to upgrade of messaging system, the upgrade of the Active Directory carriers has been needed. For this purpose the upgrade to Windows Server 2008 R2 has been performed. In the first part of the work, the overview of the process of the MS Exchange server and Outlook clie...

  5. The Message Reporting System in the ATLAS DAQ System

    Science.gov (United States)

    Caprini, M.; Fedorko, I.; Kolos, S.

    2008-06-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process communication is achieved using the CORBA technology. The design, architecture and the used technology of MRS are reviewed in this paper.

  6. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  7. Message composition and its application to event- driven system construction

    Directory of Open Access Journals (Sweden)

    A. Colesnicov

    1995-11-01

    Full Text Available Due to the object-oriented technology of event-driven system construction, the message composition may be used. Rules of message composition are alike those of program statement composition. The interpreting message queue is described which produces primitive messages from compound ones. The proposed conception lets to include the information on message dependence to compound messages themselves, which permits to simplify programs.

  8. Instant Apache Camel messaging system

    CERN Document Server

    Sharapov, Evgeniy

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A beginner's guide to Apache Camel that walks you through basic operations like installation and setup right through to developing simple applications.This book is a good starting point for Java developers who have to work on an application dealing with various systems and interfaces but who haven't yet started using Enterprise System Buses or Java Business Integration frameworks.

  9. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  10. The message processing and distribution system development

    Science.gov (United States)

    Whitten, K. L.

    1981-06-01

    A historical approach is used in presenting the life cycle development of the Navy's message processing and distribution system beginning with the planning phase and ending with the integrated logistic support phase. Several maintenance problems which occurred after the system was accepted for fleet use were examined to determine if they resulted from errors in the acquisition process. The critical decision points of the acquisition process are examined and constructive recommendations are made for avoiding the problems which hindered the successful development of this system.

  11. Implementing message systems in multilevel secure environments: Problems and approaches

    Science.gov (United States)

    Martins, G. R.; Gaines, R. S.

    1982-07-01

    A study of the problems of building multilevel secure message systems. The need for such systems in the government and commercial sectors is growing. Designs are strongly affected by (1) the granularity of security protection (at the level of folders, messages, paragraphs, or words) and (2) planned departures from the Bell-LaPadula security model, for user convenience. A Taxonomy of design alternatives is defined, and 16 specific approaches are described and compared.

  12. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    Science.gov (United States)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  13. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    Science.gov (United States)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  14. MMS: An electronic message management system for emergency response

    DEFF Research Database (Denmark)

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    This paper outlines the main features of an electronic communication system, MMS, designed to support coordination and exchange of information in connection with emergency management (EM) efforts, The design. of the MMS has been motivated by interviews with EM decision makers and reviews...... of communication and coordination problems observed during EM efforts and exercises, The system involves the use of a small set of message types designed to match the main categories of acts of communication in the domain of EM. Message tokens related to a sequence of message transactions fan he linked, and links......, Thus, users are able to define filters that capture, for instance, "unanswered requests sent out by me today" or "requests from me that have not been answered by an unconditional 'OK.'" Last, ne describe an associated preparedness plan module, which contains, for a given Ehl organization, its...

  15. Design and Implementation of a Wireless Message Display System

    Directory of Open Access Journals (Sweden)

    M. U. M. Bakura

    2016-08-01

    Full Text Available The technology of displaying message is an important part of communication and advertisement. In recent times, Wireless communication has announced its arrival on big stage and the world is going with Smartphone technology. This work describes the design and implementation of a microcontroller based messaging display system. The messaging display system will be interfaced with an android application which will then be used to display information from the comfort of one‘s phone to an LCD screen using the Bluetooth application interface. The work employs the use of an ATMEGA328p Microcontroller mounted on an Arduino board, a Bluetooth Module (HC-06 and an LCD screen. Most of these electronic display systems were using wired cable connections, the Bluetooth technology used in this work is aimed at solving the problem of wired cable connections.The microcontroller provides all the functionality of the display notices and wireless control. A desired text message from a mobile phone is sent via android mobile application to the Bluetooth module located at the receiving end. The Mobile Application was created using online software called App Inventor. When the entire system was connected and tested, it functioned as designed without any noticeable problems. The Bluetooth module responded to commands being sent from the android application appropriately and in a timely manner. The system was able to display 80 characters on the 4 x 20 LCD within the range of 10m as designated by the Bluetooth datasheet.

  16. User’s Manual for the Secure Military Message System M2 Prototype.

    Science.gov (United States)

    1986-03-28

    Franklin’s inbox . Listed here are the mesefe entries for messages currently in this measqe fi/l. The message entry shows the message’s sender , subject, type...Logout ....................................................... 2 Reading and Filing Mail ................................................... 2 Composing...concepts basic ___--___ to the system: the entity hierarchy, the elec- tronic mail functions, and the security Messages are sent and received in a

  17. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    2001-01-01

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the B

  18. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    2001-01-01

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the B

  19. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the

  20. Remote Monitoring System for Communication Base Based on Short Message

    Directory of Open Access Journals (Sweden)

    Han Yu Fu

    2013-07-01

    Full Text Available This paper presents design and development of an automatic monitoring system of communication base which is an important means to realize modernization of mobile communication base station management. Firstly, this paper proposes the architecture of the monitoring system. The proposed system consists of mocrocontrollers, sensors, GSM module and MFRC500 etc. The value of parameters is measured in the system including terminal is studied and designed, including hardware design based on embedded system and software design. Finally, communication module is discussed. The monitoring system which is designed  based on GSM SMS(short message service can improve the integrity, reliability, flexibility and intellectuality of monitoring system.

  1. Simple Messaging and Collaboration System for Heterogeneous Organizations Operating in Disaster Environments

    Science.gov (United States)

    2011-09-01

    visualization tools (such as mapping and GIS ), blogs, social networks, and sites that enable messaging over web and SMS such as Twitter and GroupMe...Mobile Phones Figure 2. System Components and Path of Messages. When a text message is sent from the phone, the message is geocoded to the users...representative then has an easy way to address the issue: Forward the geocoded message to a military representative who is also physically sitting nearby in

  2. Running a Reliable Messaging Infrastructure for CERN's Control System

    CERN Document Server

    Ehm, F

    2011-01-01

    The current middleware for CERN’s Controls System is based on two implementations: CORBA-based Controls MiddleWare (CMW) and Java Messaging Service (JMS). The JMS service is realized using the open source messaging product ActiveMQ and had became an increasing vital part of beam operations as data need to be transported reliably for various areas such as the beam protection system, post mortem analysis, beam commissioning or the alarm system. The current JMS service is made of 18 brokers running either in clusters or as single nodes. The main service is deployed as a two node cluster providing failover and load balancing capabilities for high availability. Non-critical applications running on virtual machines or desktop machines read data via a third broker to decouple the load from the operational main cluster. This scenario has been introduced last year and the statistics showed an uptime of 99.998% and an average data serving rate of 1.6GByte per minute represented by around 150 messages per second. Depl...

  3. System and Method for Providing a Real Time Audible Message to a Pilot

    Science.gov (United States)

    Johnson, Walter W. (Inventor); Lachter, Joel B. (Inventor); Battiste, Vernol (Inventor); Koteskey, Robert W. (Inventor)

    2016-01-01

    A system and method for providing information to a crew of the aircraft while in-flight. The system includes a module having: a receiver for receiving a message while in-flight; a filter having a set of screening parameters and operative to filter the message based on the set of screening parameters; and a converter for converting the message into an audible message. The message includes a pilot report having at least one of weather information, separation information, congestion information, flight deviation information and destination information. The message is sent to the aircraft by another aircraft or an air traffic controller.

  4. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  5. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  6. Analysis and Design of Instant Message System Based on P2P

    Institute of Scientific and Technical Information of China (English)

    Shen Zhiwei; Ma Shaowu

    2008-01-01

    By analyzing current development conditions of mainstream Instant Message technologies and services, some detailed discussion about technical solution and formal operation deployment strategies of P2P Instant Message Services based on Interact is made. Several crucial problems of P2P Instant Message System about services management, interconnection with other instant message, security and profit-making mode are analyzed,, and how to develop P2P IM Services is proposed.

  7. Error message recording and reporting in the SLC control system

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  8. Error message recording and reporting in the SLC control system

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-10-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  9. Extracting messages masked by chaotic signals of time-delay systems.

    Science.gov (United States)

    Zhou, C; Lai, C H

    1999-07-01

    We show how to extract messages masked by a chaotic signal of a time-delay system with very high dimensions and many positive Lyapunov exponents. Using a special embedding coordinate, the infinite-dimensional phase space of the time-delay system is projected onto a special three-dimensional space, which enables us to identify the time delay of the system from the transmitted signal and reconstruct the chaotic dynamics to unmask the hidden message successfully. The message extraction procedure is illustrated by simulations with the Mackey-Glass time-delay system for two types of masking schemes and different kinds of messages.

  10. Real-time mobile customer short message system design and implementation

    Science.gov (United States)

    Han, Qirui; Sun, Fang

    To expand the current mobile phone short message service, and to make the contact between schools, teachers, parents and feedback of the modern school office system more timely and conveniently, designed and developed the Short Message System based on the Linux platform. The state-of-the-art principles and designed proposals in the Short Message System based on the Linux platform are introduced. Finally we propose an optimized secure access authentication method. At present, many schools,vbusinesses and research institutions ratify the promotion and application the messaging system gradually, which has shown benign market prospects.

  11. Driver performance while text messaging using handheld and in-vehicle systems.

    Science.gov (United States)

    Owens, Justin M; McLaughlin, Shane B; Sudweeks, Jeremy

    2011-05-01

    This study presents an evaluation of driver performance while text messaging via handheld mobile phones and an in-vehicle texting system. Participants sent and received text messages while driving with an experimenter on a closed-road course, using their personal mobile phones and the vehicle's system. The test vehicle was an instrumented 2010 Mercury Mariner equipped with an OEM in-vehicle system that supports text messaging and voice control of mobile devices via Bluetooth, which was modified to allow text message sending during driving. Twenty participants were tested, 11 younger (19-34) and 9 older (39-51). All participants were regular users of the in-vehicle system, although none had experience with the texting functions. Results indicated that handheld text message sending and receiving resulted in higher mental demand, more frequent and longer glances away from the roadway, and degraded steering measures compared to baseline. Using the in-vehicle system to send messages showed less performance degradation, but still had more task-related interior glance time and higher mental demand than baseline; using the system's text-to-speech functionality for incoming messages showed no differences from baseline. These findings suggest that using handheld phones to send and receive text messages may interfere with drivers' visual and steering behaviors; the in-vehicle system showed improvement, but performance was not at baseline levels during message sending.

  12. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for message-passing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  13. Characteristics of electronic patient-provider messaging system utilisation in an urban health care organisation

    Directory of Open Access Journals (Sweden)

    Sean Patrick Mikles

    2014-12-01

    Full Text Available Introduction Research suggests that electronic messaging can improve patient engagement. Studies indicate that a ‘digital divide’ may exist, where certain patient populations may be using electronic messaging less frequently. This study aims to determine which patient characteristics are associated with different levels of usage of an electronic patient-provider messaging system in a diverse urban population.Methods Cross-sectional electronic health record data were extracted for patients 10 years of age or older who live in New York City and who visited a set of clinics between 1 July 2011 and 30 June 2012. Regression analyses determined which participant characteristics were associated with the sending of electronic messages.Results Older, female, English-speaking participants of white race who received more messages, had any diagnoses, more office visits and a provider who sent messages were more likely to send more messages. Non-Millennial, non-white participants who received fewer messages, had more office visits, any diagnoses, a provider who saw fewer patients with patient portal accounts, lived in a low socioeconomic status neighbourhood, and did not have private insurance were more likely to send zero messages.Conclusion This study found significant differences in electronic messaging usage based on demographic, socioeconomic and health-related patient characteristics. Future studies are needed to support these results and determine the causes of observed associations.

  14. HL7 Messaging Engine with Customizable Translation System

    Directory of Open Access Journals (Sweden)

    PRODAN, R.

    2010-05-01

    Full Text Available This paper introduces a new client-server messaging engine used to exchange clinical data between various medical software applications. Our portal uses the HL7 (Health Level Seven messaging standard to provide translated clinical data to HL7 and non-HL7 client applications. We used HL7 because this standard is worldwide used to facilitate the communication between clinical applications.

  15. Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System

    Science.gov (United States)

    Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-01-01

    Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using

  16. A social-based cyber-physical system for distributed message transmission

    Science.gov (United States)

    Chen, Kang; Shen, Haiying

    2014-06-01

    The explosive increase of the availability of personal mobile devices has brought about a significant amount of peer-to-peer communication opportunities upon their encountering, which can be exploited to realize distributed message transmission among mobile devices. However, the opportunistic encountering among mobile devices, which is determined by the mobility of their holders, has introduced great difficulties on efficiently transmitting a message to its designated destination. Actually, people usually present a certain pattern on daily mobility. Further, device holders often belong to a certain social network community. Therefore, in this paper, we propose a social- based cyber-physical system for distributed message transmission, namely SocMessaging, by integrating both the mobility pattern and the social network of device holders. When selecting an encountered node for message relay, in addition to the node's historical encountering records with the destination node, SocMessaging also considers its social closeness with the destination node. Then, the message is always transmitted to the node that is most likely to meet its destination. As a result, SocMessaging closely connects the cyber world (i.e., network), physical world (i.e., people) and social network (i.e., social connection). Finally, our experimental results demonstrate the efficiency of the proposed system in message transmission between device holders.

  17. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  18. Mobile messaging services-based personal electrocardiogram monitoring system.

    Science.gov (United States)

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  19. Using Instant Messaging Systems as a Platform for Electronic Voting

    Science.gov (United States)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  20. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Science.gov (United States)

    Tahat, Ashraf A.

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services. PMID:19707531

  1. A Scalable and Reliable Message Transport Service for the ATLAS Trigger and Data Acquisition System

    CERN Document Server

    Kazarov, A; The ATLAS collaboration; Kolos, S; Lehmann Miotto, G; Soloviev, I

    2014-01-01

    The ATLAS Trigger and Data Acquisition (TDAQ) is a large distributed computing system composed of several thousands of interconnected computers and tens of thousands applications. During a run, TDAQ applications produce a lot of control and information messages with variable rates, addressed to TDAQ operators or to other applications. Reliable, fast and accurate delivery of the messages is important for the functioning of the whole TDAQ system. The Message Transport Service (MTS) provides facilities for the reliable transport, the filtering and the routing of the messages, basing on publish-subscribe-notify communication pattern with content-based message filtering. During the ongoing LHC shutdown, the MTS was re-implemented, taking into account important requirements like reliability, scalability and performance, handling of slow subscribers case and also simplicity of the design and the implementation. MTS uses CORBA middleware, a common layer for TDAQ infrastructure, and provides sending/subscribing APIs i...

  2. Emergency Message Dissemination System for Smartphones During Natural Disasters

    NARCIS (Netherlands)

    Wu, Xian; Mazurowski, Maciej; Chen, Zhen; Meratnia, Nirvana

    This paper revolves around the concept of utilizing the modern smartphone communication capabilities to transmit messages through an ad hoc network during a disaster, which renders the traditional cellular base station inaccessible. Due to dynamic and decentralized nature of the considered

  3. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    Science.gov (United States)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  4. Towards Preserving the Confidentiality of Information in a Local Area Network (LAN Messaging System

    Directory of Open Access Journals (Sweden)

    Aderonke Favour-Bethy THOMPSON

    2013-01-01

    Full Text Available Messaging system remains preeminent as themedium of official communication. The fear of confidentialitybeing breached has led many organizations in developingvarious ways in checking the excesses of unwanted users. In themessaging system designed, users are allowed to send andreceive messages with the options of either encrypting the dataor not. The Substitution Permutation Network (SPN, an AESencryption algorithm, implemented in the messaging systemmakes information sent over the network ‘useless’ whencompromised so as to reduce the damage done wheneversensitive and classified information gets to the wrong hands. Theapplication was implemented and tested and was found to be effective.

  5. Minimizing the Message Waiting Time in Single-Hop Multichannel Systems

    OpenAIRE

    Martelli, Francesca; Bonuccelli, Maurizio

    2010-01-01

    In this paper, we examine the problem of packet scheduling in a single-hop multichannel systems, with the goal of minimizing the average message waiting time. Such an objective function represents the delay incurred by the users before receiving the desired data. We show that the problem of finding a schedule with minimum message waiting time, is NP-complete, by means of polynomial time reduction of the time table design problem to our problem. We present also several heuristics which result ...

  6. A Message Exchange Protocol in Command and Control Systems Integration, using the JC3IEDM

    Science.gov (United States)

    2014-06-01

    19TH International Command and Control Research and Technology Symposium C2 Agility: Lessons Learned from Research and Operations. A Message...overhead during packets reading. The service-oriented architecture (SOA) with the use of Web Services technology was chosen because of ease of learning ... Enviroments . IEEE Communications Magazine (Feb. 1997), 46-55. A Message Exchange Protocol in Command and Control Systems Integration, using the

  7. Design of Instant Messaging System of Multi-language E-commerce Platform

    Science.gov (United States)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  8. Multiparty Quantum Secret Sharing of Classical Message using Cavity Quantum Electrodynamic System

    Institute of Scientific and Technical Information of China (English)

    HAN Lian-Fang; LIU Yi-Min; ZHANG Zhan-Jun

    2006-01-01

    @@ An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highly-detuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.

  9. Propositional Dynamic Logic for Message-Passing Systems

    CERN Document Server

    Bollig, Benedikt; Meinecke, Ingmar

    2010-01-01

    We examine a bidirectional propositional dynamic logic (PDL) for finite and infinite message sequence charts (MSCs) extending LTL and TLC$^{-}$. By this kind of multi-modal logic we can express properties both in the entire future and in the past of an event. Path expressions strengthen the classical until operator of temporal logic. For every formula defining an MSC language, we construct a communicating finite-state machine (CFM) accepting the same language. The CFM obtained has size exponential in the size of the formula. This synthesis problem is solved in full generality, i.e., also for MSCs with unbounded channels. The model checking problem for CFMs and HMSCs turns out to be in PSPACE for existentially bounded MSCs. Finally, we show that, for PDL with intersection, the semantics of a formula cannot be captured by a CFM anymore.

  10. Multiple node remote messaging

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  11. Effectiveness of a Mobile Short-Message-Service-Based Disease Outbreak Alert System in Kenya.

    Science.gov (United States)

    Toda, Mitsuru; Njeru, Ian; Zurovac, Dejan; O-Tipo, Shikanga; Kareko, David; Mwau, Matilu; Morita, Kouichi

    2016-04-01

    We conducted a randomized, controlled trial to test the effectiveness of a text-messaging system used for notification of disease outbreaks in Kenya. Health facilities that used the system had more timely notifications than those that did not (19.2% vs. 2.6%), indicating that technology can enhance disease surveillance in resource-limited settings.

  12. [mSalUV: a new mobile messaging system for diabetes control in Mexico].

    Science.gov (United States)

    Cabrera Mendoza, Néstor Iván; Castro Enriquez, Pedro Pablo; Demeneghi Marini, Verónica Patricia; Fernández Luque, Luis; Morales Romero, Jaime; Sainz Vazquez, Luis; Ortiz León, María Cristina

    2014-01-01

    Design and develop a mobile messaging system called mSalUV, which reminds patients with type 2 diabetes about taking their medication and attending appointments and promotes healthy lifestyles, and explore patient opinion regarding use of the system. The study had three stages: 1) design and development of mSalUV; 2) design and development of text messages; and 3) exploration of patient opinion regarding use of mSalUV. The mSalUV system was created and around 40 text messages were designed. A total of 1 850 messages were sent during the 45 day intervention. Patients thought that mSalUV helped them to treat their disease and that it was easy to use, they were inclined to continue using the system in the future, and people close to them (family members and support networks) supported them using it. Furthermore, they perceived the system as "someone that cared about them." The results suggest that a system such as mSalUV would be well accepted by its potential users; in this case, people with type 2 diabetes. This presents a very interesting scenario that will enable taking advantage of new technologies for health. Further research is needed to evaluate the system's efficiency and effectiveness.

  13. Multi-Modal Intelligent Traffic Signal Systems Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Data were collected during the Multi-Modal Intelligent Transportation Signal Systems (MMITSS) study. MMITSS is a next-generation traffic signal system that seeks to...

  14. Modeling message sequences for intrusion detection in industrial control systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Petit, Jonathan; Kargl, Frank; Rice, Mason; Shenoi, Sujeet

    2015-01-01

    Compared with standard information technology systems, industrial control systems show more consistent and regular communications patterns. This characteristic contributes to the stability of controlled processes in critical infrastructures such as power plants, electric grids and water treatment fa

  15. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous): Report 2/ 3

    OpenAIRE

    Ellen Kinsel; Merv Roy; Hartley Waldman; Donna (M. M.) Woloschuk; Patrick J. Fahy

    2002-01-01

    This study extends the earlier review of online chat systems (Report 6), by reviewing a further seven products that provide text-based instant messaging (IM). The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  16. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous: Report 2/ 3

    Directory of Open Access Journals (Sweden)

    Ellen Kinsel

    2002-10-01

    Full Text Available This study extends the earlier review of online chat systems (Report 6, by reviewing a further seven products that provide text-based instant messaging (IM. The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  17. A critical analysis of the X.400 model of message handling systems

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Dorregeest, Evert

    1988-01-01

    The CCITT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CCITT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  18. A critial anaysis of the X.400 model of message handling systems

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Dorregeest, E.

    1988-01-01

    The CTIT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CTIT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  19. A privacy protection for an mHealth messaging system

    Science.gov (United States)

    Aaleswara, Lakshmipathi; Akopian, David; Chronopoulos, Anthony T.

    2015-03-01

    In this paper, we propose a new software system that employs features that help the organization to comply with USA HIPAA regulations. The system uses SMS as the primary way of communication to transfer information. Lack of knowledge about some diseases is still a major reason for some harmful diseases spreading. The developed system includes different features that may help to communicate amongst low income people who don't even have access to the internet. Since the software system deals with Personal Health Information (PHI) it is equipped with an access control authentication system mechanism to protect privacy. The system is analyzed for performance to identify how much overhead the privacy rules impose.

  20. The Synthesis Method of Automated System of Operational Planning in Low-Space Communication System Messaging

    Directory of Open Access Journals (Sweden)

    Serhii Kovbasiuk

    2017-04-01

    Full Text Available One of the reasons for the decrease of efficiency in low-speed communication systems, satellite communication, which are based on nanoplatform is a high degree of operational planning centralisation. To overcome this problem the method which carries out the distribution of tasks of communications operational planning minimizing the exchange of information between spatially remote sites, and takes into account the computing performance of software and hardware was developed. The technique is based on the use of methods of structural and parametric synthesis, simulation and statistical analysis of the results. Its use allows to obtain the optimal structure of the automated system of operational planning in low-space communication system messaging evaluation of efficiency in terms of fixed communication of information load.

  1. Configuration of Distributed Message Converter Systems using Performance Modeling

    NARCIS (Netherlands)

    Aberer, Karl; Risse, Thomas; Wombacher, Andreas

    2001-01-01

    To find a configuration of a distributed system satisfying performance goals is a complex search problem that involves many design parameters, like hardware selection, job distribution and process configuration. Performance models are a powerful tools to analyse potential system configurations, howe

  2. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  3. Design and implementation of modular home security system with short messaging system

    Science.gov (United States)

    Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad

    2014-03-01

    Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  4. Sharing Memory Robustly in Message-Passing Systems

    Science.gov (United States)

    1990-02-16

    ust: a very restricted form of communication. Chor and Moscovici ([20]) present a hierarchy of resiliency for problems in shared-memory systems and...1985. [20] B. Chor, and L. Moscovici , Solvability in Asynchronous Environments, Proc. 30th Syrup. on Foun- * dations of Comp. Sc~en ce, pp. 422-427, 1989

  5. Endlessly Circulating Messages in IEEE 1588-2008 Systems

    Science.gov (United States)

    2014-05-13

    National Science Foundation, NSF awards #0720882 ( CSR -EHS: PRET) and #0931843 (ActionWebs), the Naval Research Laboratory (NRL #N0013-12- 1-G015), and...Software Systems (CHESS) at UC Berkeley (supported by the National Science Founda- tion, NSF awards #0720882 ( CSR -EHS: PRET) and #0931843 (ActionWebs), the...IV-B the following observations can be made on the disconnect models shown: • There are definitely conditions that spawn rogue mes- sages. For the

  6. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for messagepassing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  7. Secure Data Network System (SDNS) network, transport, and message security protocols

    Science.gov (United States)

    Dinkel, C.

    1990-03-01

    The Secure Data Network System (SDNS) project, implements computer to computer communications security for distributed applications. The internationally accepted Open Systems Interconnection (OSI) computer networking architecture provides the framework for SDNS. SDNS uses the layering principles of OSI to implement secure data transfers between computer nodes of local area and wide area networks. Four security protocol documents developed by the National Security Agency (NSA) as output from the SDNS project are included. SDN.301 provides the framework for security at layer 3 of the OSI Model. Cryptographic techniques to provide data protection for transport connections or for connectionless-mode transmission are described in SDN.401. Specifications for message security service and protocol are contained in SDN.701. Directory System Specifications for Message Security Protocol are covered in SDN.702.

  8. Technical Evaluation Reports 15. Chat and Instant Messaging Systems (synchronous: Report 3/ 3

    Directory of Open Access Journals (Sweden)

    Brian Ludwig

    2002-10-01

    Full Text Available [Previous reviews of chat and IM systems are presented in Reports 6 and 14 in this series.]A further set of four text-based instant messaging (IM products was evaluated: AT&T Anywhere, Parachat, Sonork, and Yahoo Messenger, all available at no cost. Yahoo Messenger was judged to be the most effective of the three products for use by distance education (DE teachers and students, being compatible with most common operating systems and accommodating up to 50 chat room participants. Yahoo Messenger also possesses integrated audio and video capabilities. AT&T Anywhere is an efficient product, which supports Windows-based operating systems only. Parachat (Basic version is a basic, browser accessed chat board without instant messaging (IM capabilities.

  9. Virtual file system on NoSQL for processing high volumes of HL7 messages.

    Science.gov (United States)

    Kimura, Eizen; Ishihara, Ken

    2015-01-01

    The Standardized Structured Medical Information Exchange (SS-MIX) is intended to be the standard repository for HL7 messages that depend on a local file system. However, its scalability is limited. We implemented a virtual file system using NoSQL to incorporate modern computing technology into SS-MIX and allow the system to integrate local patient IDs from different healthcare systems into a universal system. We discuss its implementation using the database MongoDB and describe its performance in a case study.

  10. A Mobile Message Scheduling and Delivery System using m-Learning framework

    CERN Document Server

    Majumder, Moumita

    2010-01-01

    Wireless data communications in form of Short Message Service (SMS) and Wireless Access Protocols (WAP) browsers have gained global popularity, yet, not much has been done to extend the usage of these devices in electronic learning (e-learning) and information sharing. This project explores the extension of e learning into wireless/ handheld (W/H) computing devices with the help of a mobile learning (m-learning) framework. This framework provides the requirements to develop m-learning application that can be used to share academic and administrative information among people within the university campus. A prototype application has been developed to demonstrate the important functionality of the proposed system in simulated environment. This system is supposed to work both in bulk SMS and interactive SMS delivery mode. Here we have combined both Short Message Service (SMS) and Wireless Access Protocols (WAP) browsers. SMS is used for Short and in time information delivery and WAP is used for detailed informati...

  11. Ontology-Driven Instant Messaging-Based Dialogue System for Device Control

    KAUST Repository

    Noguera-Arnaldos, José Ángel

    2015-10-14

    The im4Things platform aims to develop a communication interface for devices in the Internet of the Things (IoT) through intelligent dialogue based on written natural language over instant messaging services. This type of communication can be established in different ways such as order sending and, status querying. Also, the devices themselves are responsible for alerting users when a change has been produced in the device’s sensors. The system has been validated and it has obtained promising results.

  12. Usage of Message Queueing Technologies in the ATLAS Distributed Data Management System

    Science.gov (United States)

    Calfayan, Philippe; Dongsong, Zang; Garonne, Vincent

    2011-12-01

    The ATLAS Distributed Data Management system is composed of semi-autonomous, heterogeneous, and independently designed subsystems. To achieve successful operation of such a system, the activities of the agents controlling the subsystems have to be coordinated. In addition, external applications can require to synchronize on events relative to data availability. A common way to proceed is to implement polling strategies within the distributed components, which leads to an increase of the load in the overall system. We describe an alternative based on notifications using standard message queuing. The application of this technology in the distributed system has been exercised.

  13. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  14. Message Structures: a modelling technique for information systems analysis and design

    CERN Document Server

    España, Sergio; Pastor, Óscar; Ruiz, Marcela

    2011-01-01

    Despite the increasing maturity of model-driven software development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to improve modelling techniques so that they cover several development stages in an integrated way, and they facilitate the transition from analysis to design. This paper presents Message Structures, a technique for the specification of communicative interactions between the IS and organisational actors. This technique can be used both in the analysis stage and in the design stage. During analysis, it allows abstracting from the technology that will support the IS, and to complement business process diagramming techniques with the specification of the communicational needs of the organisation. During design, Message Structures serves two purposes: (i) it allows to systematically derive a specification of the IS memory (e.g. a UML class diagram), (ii) and it allows to reason the user interface design using abstract patterns. Thi...

  15. The effect of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women

    Directory of Open Access Journals (Sweden)

    Mahdis Vakili

    2015-01-01

    Full Text Available Introduction: Central adiposity and metabolic syndrome are quite common among postmenopausal women. Dietary diversity and healthy food choices have essential role in health and also in prevention of obesity. The main objective of this study was to evaluate the impact of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women. Materials and Methods: This was a randomized controlled trial in which 100 postmenopausal women aged 40-60 years were recruited and assigned to two groups (50 each in the intervention and control groups. Food frequency consumption was measured using a questionnaire. A total of 16 text messages including information about modification of food selection (healthy choices, benefits, methods, etc., were sent to participants in the intervention group during 4 months follow-up (1/week. The Chi-square and independent t-test used for data analysis. Ninety-two women completed the study. Results: The consumption of Vitamin A rich fruits and vegetables significantly increased in the intervention group compared to the control group (P < 0.001. More women in the intervention group consumed fish after intervention (P = 0.02. The consumption of green leafy vegetables showed a nonsignificant increase in the intervention group. Conclusion: Using mobile phone short messaging system can improve the healthy food choices regarding Vitamin A rich fruits and vegetables and fish among postmenopausal women.

  16. The clinical usefulness of a web-based messaging system between patients with Crohn disease and their physicians.

    Science.gov (United States)

    Jeong, Da Eun; Kim, Kyeong Ok; Jang, Byung Ik; Kim, Eun Young; Jung, Jin Tae; Jeon, Seong Woo; Lee, Hyun Seok; Kim, Eun Soo; Park, Kyung Sik; Cho, Kwang Bum

    2016-06-01

    To avoid missing events associated with clinical activity, the authors previously developed a novel, web-based, self-reporting Crohn disease (CD) symptom diary. However, although this diary provided a means of self-checking based on responses to set questions based on Harvey-Bradshaw index scores, it was limited in terms of describing other specific symptoms. Thus, the authors added a space to the questionnaire, which allows patients to send clinicians questions or a description of unpredictable events. The aim of the present study was to assess the clinical usefulness of this messaging system by analyzing patients' messages.The messaging system between patients and their doctors was included in a webpage created for recording patients' symptom diaries (www.cdsd.or.kr). Using this system, patients can send messages easily at any time and doctors can read and respond to these messages immediately using a smart phone or computer. In the present study, the authors retrospectively reviewed 686 messages sent by 152 patients from July 2012 to July 2014 and patient medical records.Mean patient age was 29.0 ± 11.6 years and the male-to-female ratio was 99:53. Most messages regarded symptoms (381 messages, 55.5%), which was followed by self-reports about general condition (195 messages, 28.4%) and questions about treatment (71 messages, 10.3%). With respect to symptoms, abdominal pain was most common (145 cases, 21.1%) followed by hematochezia (36 cases, 5.2%). Problems about medication were the most frequently associated with treatment (65, 91.5%). Patients above 40 years showed a greater tendency to focus on symptoms and treatment (P = 0.025). The doctor answer rate was 56.3% (n = 386), and based on these responses, an early visit was needed in 28 cases (7.3%).Using this web-based messaging system, patients were able to obtain proper advice from their physicians without visiting clinics or searching the Internet, and in addition, 7.3% of messages prompted an early

  17. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  18. Impact of a Collective Intelligence Tailored Messaging System on Smoking Cessation: The Perspect Randomized Experiment.

    Science.gov (United States)

    Sadasivam, Rajani Shankar; Borglund, Erin M; Adams, Roy; Marlin, Benjamin M; Houston, Thomas K

    2016-11-08

    Outside health care, content tailoring is driven algorithmically using machine learning compared to the rule-based approach used in current implementations of computer-tailored health communication (CTHC) systems. A special class of machine learning systems ("recommender systems") are used to select messages by combining the collective intelligence of their users (ie, the observed and inferred preferences of users as they interact with the system) and their user profiles. However, this approach has not been adequately tested for CTHC. Our aim was to compare, in a randomized experiment, a standard, evidence-based, rule-based CTHC (standard CTHC) to a novel machine learning CTHC: Patient Experience Recommender System for Persuasive Communication Tailoring (PERSPeCT). We hypothesized that PERSPeCT will select messages of higher influence than our standard CTHC system. This standard CTHC was proven effective in motivating smoking cessation in a prior randomized trial of 900 smokers (OR 1.70, 95% CI 1.03-2.81). PERSPeCT is an innovative hybrid machine learning recommender system that selects and sends motivational messages using algorithms that learn from message ratings from 846 previous participants (explicit feedback), and the prior explicit ratings of each individual participant. Current smokers (N=120) aged 18 years or older, English speaking, with Internet access were eligible to participate. These smokers were randomized to receive either PERSPeCT (intervention, n=74) or standard CTHC tailored messages (n=46). The study was conducted between October 2014 and January 2015. By randomization, we compared daily message ratings (mean of smoker ratings each day). At 30 days, we assessed the intervention's perceived influence, 30-day cessation, and changes in readiness to quit from baseline. The proportion of days when smokers agreed/strongly agreed (daily rating ≥4) that the messages influenced them to quit was significantly higher for PERSPeCT (73%, 23/30) than

  19. Protokol Interchangeable Data pada VMeS (Vessel Messaging System dan AIS (Automatic Identification System

    Directory of Open Access Journals (Sweden)

    Farid Andhika

    2012-09-01

    Full Text Available VMeS (Vessel Messaging System merupakan komunikasi berbasis radio untuk mengirimkan pesan antara VMeS terminal kapal di laut dengan VMeS gateway di darat. Dalam perkembangan sistem monitoring kapal di laut umumnya menggunakan AIS (Automatic Identification System yang telah digunakan di seluruh pelabuhan untuk memantau kondisi kapal dan mencegah tabrakan antar kapal. Dalam penelitian ini akan dirancang format data yang sesuai untuk VMeS agar bisa dilakukan proses interchangeable ke AIS sehingga bisa dibaca oleh AIS receiver yang ditujukan untuk kapal dengan ukuran dibawah 30 GT (Gross Tonnage. Format data VmeS dirancang dalam tiga jenis yaitu data posisi, data informasi kapal dan data pesan pendek yang akan dilakukan interchangeable dengan AIS tipe 1,4 dan 8. Pengujian kinerja sistem interchangeable menunjukkan bahwa dengan peningkatan periode pengiriman pesan maka lama delay total meningkat tetapi packet loss menurun. Pada pengiriman pesan setiap 5 detik dengan kecepatan 0-40 km/jam, 96,67 % data dapat diterima dengan baik. Data akan mengalami packet loss jika level daya terima dibawah -112 dBm . Jarak terjauh yang dapat dijangkau modem dengan kondisi bergerak yaitu informatika ITS dengan jarak 530 meter terhadap Laboratorium B406 dengan level daya terima -110 dBm.

  20. Patient-to-physician messaging: volume nearly tripled as more patients joined system, but per capita rate plateaued.

    Science.gov (United States)

    Crotty, Bradley H; Tamrat, Yonas; Mostaghimi, Arash; Safran, Charles; Landon, Bruce E

    2014-10-01

    Patients want to be able to communicate with their physicians by e-mail. However, physicians are often concerned about the impact that such communications will have on their time, productivity, and reimbursement. Typically, physicians are not reimbursed for time spent communicating with patients electronically. But under federal meaningful-use criteria for information technology, physicians can receive a modest incentive for such communications. Little is known about trends in secure e-mail messaging between physicians and patients. To understand these trends, we analyzed the volume of messages in a large academic health system's patient portal in the period 2001-10. At the end of 2010, 49,778 patients (22.7 percent of all patients seen within the system) had enrolled in the portal, and 36.9 percent of enrolled patients (8.4 percent of all patients) had sent at least one message to a physician. Physicians in the aggregate saw a near tripling of e-mail messages during the study period. However, the number of messages per hundred patients per month stabilized between 2005 and 2010, at an average of 18.9 messages. As physician reimbursement moves toward global payments, physicians' and patients' participation in secure messaging will likely increase, and electronic communication should be considered part of physicians' job descriptions.

  1. Pop-up messages in order communication systems can increase awareness of osteoporosis among physicians and improve osteoporosis treatment.

    Science.gov (United States)

    Kim, Joon Yub; Yoo, Jeong Hyun; Kim, Ji Wan; Sung, Gwang Young; Jung, Jae Hong; Cho, Yohan; Park, Jai Hyung

    2016-12-01

    The purpose of this study was to verify the effect of pop-up messages (regarding a history of dual-energy X-ray absorptiometry [DXA]) on the identification and management of osteoporosis after osteoporotic hip or spine fractures. We hypothesized that these pop-up messages would increase the awareness and management of osteoporosis among clinicians and patients. We introduced pop-up messages regarding a history of DXA in our Order Communication System (March 2012) and evaluated the records of 404 patients who were treated between January 2011 and December 2012. The patients were categorized as being treated without the pop-up messages (Group I, before March 2012) or with the pop-up messages (Group II, after March 2012). We compared their rates of DXA prescription, osteoporosis medication, exercise, mortality and subsequent refractures during a 2-year follow-up. After introducing the pop-up messages, the DXA prescription rate increased from 35.1 to 57.1% (P pop-up messages positively affected the behaviours of orthopaedic surgeons and were associated with increased rates of prescription of DXA, osteoporosis medication, and might affect the behaviour of patient, increased exercise rate. Therefore, we recommend using this simple and effective method to improve physicians' awareness of osteoporosis. © 2016 John Wiley & Sons, Ltd.

  2. Patient-To-Physician Messaging: Volume Nearly Tripled As More Patients Joined System, But Per Capita Rate Plateaued

    Science.gov (United States)

    Crotty, Bradley H.; Tamrat, Yonas; Mostaghimi, Arash; Safran, Charles; Landon, Bruce E.

    2015-01-01

    Patients want to be able to communicate with their physicians by e-mail. However, physicians are often concerned about the impact that such communications will have on their time, productivity, and reimbursement. Typically, physicians are not reimbursed for time spent communicating with patients electronically. But under federal meaningful-use criteria for information technology, physicians can receive a modest incentive for such communications. Little is known about trends in secure e-mail messaging between physicians and patients. To understand these trends, we analyzed the volume of messages in a large academic health care system’s patient portal in the period 2001–10. At the end of 2010, 49,778 patients (22.7 percent of all patients seen within the system) had enrolled in the portal, and 36.9 percent of enrolled patients (8.4 percent of all patients) had sent at least one message to a physician. Physicians in the aggregate saw a near tripling of e-mail messages during the study period. However, the number of messages per hundred patients per month stabilized between 2005 and 2010, at an average of 18.9 messages. As physician reimbursement moves toward global payments, physicians’ and patients’ participation in secure messaging will likely increase, and electronic communication should be considered part of physicians’ job descriptions. PMID:25288428

  3. Mobile Agents - Smart Messages

    OpenAIRE

    Hurst, Leon; Cunningham, Padraig

    1997-01-01

    Wireless communication with Mobile Computing devices is known to be problematic. It is very different in character from conventional communication over wired networks. Since many distributed applications make assumptions about network characteristics, they may not be used in a hostile mobile environment. We are proposing a new kind of messaging system which incorporates adaptive behaviour into the messages themselves. We call these `Smart Messages?, and implement them using ...

  4. Monitoring polio supplementary immunization activities using an automated short text messaging system in Karachi, Pakistan

    Science.gov (United States)

    Murtaza, A; Khoja, S; Zaidi, AK; Ali, SA

    2014-01-01

    Abstract Problem Polio remains endemic in many areas of Pakistan, including large urban centres such as Karachi. Approach During each of seven supplementary immunization activities against polio in Karachi, mobile phone numbers of the caregivers of a random sample of eligible children were obtained. A computer-based system was developed to send two questions – as short message service (SMS) texts – automatically to each number after the immunization activity: “Did the vaccinator visit your house?” and “Did the enrolled child in your household receive oral polio vaccine?” Persistent non-responders were phoned directly by an investigator. Local setting A cluster sampling technique was used to select representative samples of the caregivers of young children in Karachi in general and of such caregivers in three of the six “high-risk” districts of the city where polio cases were detected in 2011. Relevant changes In most of the supplementary immunization activities investigated, vaccine coverages estimated using the SMS system were very similar to those estimated by interviewing by phone those caregivers who never responded to the SMS messages. In the high-risk districts investigated, coverages estimated using the SMS system were also similar to those recorded – using lot quality assurance sampling – by the World Health Organization. Lessons learnt For the monitoring of coverage in supplementary immunization activities, automated SMS-based systems appear to be an attractive and relatively inexpensive option. Further research is needed to determine if coverage data collected by SMS-based systems provide estimates that are sufficiently accurate. Such systems may be useful in other large-scale immunization campaigns. PMID:24700982

  5. Efficient Messaging through Cluster Coordinators in Decentralized Controlled Material Flow Systems

    Directory of Open Access Journals (Sweden)

    Lieberoth-Leden Christian

    2016-01-01

    Full Text Available The modularization of the hard- and software is one approach handling the demand for increasing flexibility and changeability of automated material flow systems. A control that is distributed across several different hardware controllers leads to a great demand for coordination between the modules while planning for example transports, especially if there is a mutual dependency between the modules on the executing tasks. Short-term changes in planning often initiate a rescheduling chain reaction, which causes a high communication load in the system. In the presented approach, module clusters with a centralized coordinator are automatically formed out of multiple modules and substitutional take over the surrounding communication for the modules. As a result, they minimize exchanged messages by focusing on the essential information.

  6. GSM短信选课系统%Elective system based on GSM message

    Institute of Scientific and Technical Information of China (English)

    刘凤秋; 赵有以; 刘昊; 王建民

    2012-01-01

    The elective system is sometimes inefficient since it heavily depends on internet network. This paper proposes a scheme of elective system based on GSM message, and formulates the hardware and software design of the system. The hardware consists of micro-processor STM32103, GSM module, and some peripherals. The software is designed based on idea of finite state machine, which can receive/decode/store the GSM message and communicate with host computer. The test results show that the proposed system can perform the course election function effectively.%针对高校网络选课系统对网络资源的依赖所造成的选课效率较低的现象,提出一种基于GSM网络的短信选课系统设计方案,并完成系统的软硬件设计。该系统硬件部分主要由STM32103微处理器、GSM短信收发模块以及辅助外设组成。软件部分采用状态机思想进行设计,实现用户选课短消息的接收、解码、存储以及与上位机通信等功能。测试结果表明,该系统能够有效实现选课功能,达到设计预期要求。

  7. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) Environment: Evidence that Size Does Matter in DoD Business Process Engineering

    Science.gov (United States)

    2007-06-01

    data repository that will create a metadata card for each message for use by the federated search catalog as a reference. c. Joint DMS Core Product...yet. Once resolved, NREMS can move forward afloat. The AMHS in concert with NCES will be updated with the federated search capability. AMHS

  8. Information System Of Student Score SMA Negeri 1 Tegal Based On Short Message Service (SMS Gateway

    Directory of Open Access Journals (Sweden)

    Zaenul Arif

    2016-06-01

    Full Text Available Student Score at the agency school is one measure of the success of students in learning the material presented. In the old system the parents have not been getting the value directly from the school except at the end of each semester, making them difficult to know the value of their children's development during school. To provide score transparency to students and parents needed an information system score subjects in an easy and fast data access. By identifying the problem is analyzing the old system to identify the weaknesses of the system. Thus the new system will increase. Analysis of the weakness of the old system using PIECES categories (Performance, Information, Economy, Control, Eficiency, and Service. In fulfilling these conditions, build up lesson student score information system of Short Message Service (SMS Gateway Based. The system is built using Gammu software and using the programming language PHP. By using SMS to obtain the score of the data is expected to provide convenience for parents to monitor learning outcomes of their children’s in school.

  9. A grid-enabled MPI : message passing in heterogeneous distributed computing systems.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Karonis, N. T.

    2000-11-30

    Application development for high-performance distributed computing systems, or computational grids as they are sometimes called, requires grid-enabled tools that hide mundate aspects of the heterogeneous grid environment without compromising performance. As part of an investigation of these issues, they have developed MPICH-G, a grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers at different sites using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the globus grid toolkit. In this paper, they describe the MPICH-G implementation and present preliminary performance results.

  10. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

  11. Implication of auto-generated message reminders system (software and rate of absenteeism in orthodontic clinic: A randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Siddharth Sonwane

    2017-01-01

    Full Text Available Context: Absenteeism is a routine pattern of nonattendance from duty of responsibilities, nonattending to given appointment may have deleterious effect on treatment outcome and revenue generation. Very few studies have been done to know the effect of absenteeism on revenue generation and treatment outcome with the help of postcard, telephone, and text messages as reminder; however, these studies have concluded that there was statistically significant difference found in treatment outcome and revenue generation. Furthermore, our study is the almost first to present with the use of current available reminder tool (software reminder system. Aims: The aim of this study to implicate and evaluate effects of auto-generated message reminder (easy dental software application and previous visit reminder system. Materials and Methods: The sum of 180 patients was selected and divided 90 patients in each group. (1 Study group (Auto-generated message reminder system, (2 control group (previous visit remainder. Auto-generated messages were sent to the study group. No formal information given to control group. Statistical Analysis Used: Student's t-tests were used to compare two groups, and logistic regression was obtained 0.044. Results: In control group, 20% of total sample found to be absent whereas only 10% found to be absent in study group. Student's t-test and logistic regression were seen (P = 0.044. Conclusion: The use of auto-generated message reminder system (easy dental software, reduces the rate of absenteeism and increases clinic economy, proper results with stipulated period, and protect both clinician and patients from unwanted complications.

  12. Evaluation of Simple Causal Message Logging for Large-Scale Fault Tolerant HPC Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; Meneses, E; Kale, L V

    2011-02-25

    The era of petascale computing brought machines with hundreds of thousands of processors. The next generation of exascale supercomputers will make available clusters with millions of processors. In those machines, mean time between failures will range from a few minutes to few tens of minutes, making the crash of a processor the common case, instead of a rarity. Parallel applications running on those large machines will need to simultaneously survive crashes and maintain high productivity. To achieve that, fault tolerance techniques will have to go beyond checkpoint/restart, which requires all processors to roll back in case of a failure. Incorporating some form of message logging will provide a framework where only a subset of processors are rolled back after a crash. In this paper, we discuss why a simple causal message logging protocol seems a promising alternative to provide fault tolerance in large supercomputers. As opposed to pessimistic message logging, it has low latency overhead, especially in collective communication operations. Besides, it saves messages when more than one thread is running per processor. Finally, we demonstrate that a simple causal message logging protocol has a faster recovery and a low performance penalty when compared to checkpoint/restart. Running NAS Parallel Benchmarks (CG, MG and BT) on 1024 processors, simple causal message logging has a latency overhead below 5%.

  13. Trial of real-time locating and messaging system with Bluetooth low energy.

    Science.gov (United States)

    Arisaka, Naoya; Mamorita, Noritaka; Isonaka, Risa; Kawakami, Tadashi; Takeuchi, Akihiro

    2016-09-14

    Hospital real-time location systems (RTLS) are increasing efficiency and reducing operational costs, but room access tags are necessary. We developed three iPhone 5 applications for an RTLS and communications using Bluetooth low energy (BLE). The applications were: Peripheral device tags, Central beacons, and a Monitor. A Peripheral communicated with a Central using BLE. The Central communicated with a Monitor using sockets on TCP/IP (Transmission Control Protocol/Internet Protocol) via a WLAN (wireless local area network). To determine a BLE threshold level for the received signal strength indicator (RSSI), relationships between signal strength and distance were measured in our laboratory and on the terrace. The BLE RSSI threshold was set at -70 dB, about 10 m. While an individual with a Peripheral moved around in a concrete building, the Peripheral was captured in a few 10-sec units at about 10 m from a Central. The Central and Monitor showed and saved the approach events, location, and Peripheral's nickname sequentially in real time. Remote Centrals also interactively communicate with Peripherals by intermediating through Monitors that found the nickname in the event database. Trial applications using BLE on iPhones worked well for patient tracking, and messaging in indoor environments.

  14. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    Directory of Open Access Journals (Sweden)

    Zhenyu Mei

    2012-01-01

    Full Text Available Operators of parking guidance and information systems (PGIS often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs. By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constructed. A mathematical program was formulated to determine the guiding parking reliability of VMS. The procedures were applied to a numerical example, and the factors that affect guiding reliability were analyzed. The quantitative changes of the parking berths and the display conditions of VMS were found to be the most important factors influencing guiding reliability. The parking guiding VMS achieved the best benefit when the parking supply was close to or was less than the demand. The combination of a guiding parking reliability model and parking choice behavior offers potential for PGIS operators to reduce traffic congestion in central city areas.

  15. Error Correction Coding Meets Cyber-Physical Systems: Message-Passing Analysis of Self-Healing Interdependent Networks

    CERN Document Server

    Behfarnia, Ali

    2016-01-01

    Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, which can lead to large-scale cascading failures. However, the \\textit{self-healing} ability emerges as a valuable opportunity where the overlaying cyber network can cure failures in the underlying physical network. To capture both self-healing and contagion, this paper considers a graphical model representation of an interdependent cyber-physical system, in which nodes represent various cyber or physical functionalities, and edges capture the interactions between the nodes. A message-passing algorithm used in low-density parity-check codes is extended to this representation to study the dynamics of failure propagation and healing. By applying a density evolution analysis to this algorithm, network reaction to initial disruptions is investigated. It is proved that as the number of message-passing iterations increases, the network re...

  16. Broadcasting a message in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Charles J; Faraj, Daniel A

    2014-11-18

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  17. Digital communication of two-dimensional messages in a chaotic optical system

    Institute of Scientific and Technical Information of China (English)

    Zhou Yun; Wu Liang; Zhu Shi-Qun

    2005-01-01

    The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.

  18. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  19. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  20. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  1. The potential impact of intelligent systems for mobile health self-management support: Monte Carlo simulations of text message support for medication adherence.

    Science.gov (United States)

    Piette, John D; Farris, Karen B; Newman, Sean; An, Larry; Sussman, Jeremy; Singh, Satinder

    2015-02-01

    Mobile health (mHealth) services cannot easily adapt to users' unique needs. We used simulations of text messaging (SMS) for improving medication adherence to demonstrate benefits of interventions using reinforcement learning (RL). We used Monte Carlo simulations to estimate the relative impact of an intervention using RL to adapt SMS adherence support messages in order to more effectively address each non-adherent patient's adherence barriers, e.g., forgetfulness versus side effect concerns. SMS messages were assumed to improve adherence only when they matched the barriers for that patient. Baseline adherence and the impact of matching messages were estimated from literature review. RL-SMS was compared in common scenarios to simple reminders, random messages, and standard tailoring. RL could produce a 5-14% absolute improvement in adherence compared to current approaches. When adherence barriers are not accurately reported, RL can recognize which barriers are relevant for which patients. When barriers change, RL can adjust message targeting. RL can detect when messages are sent too frequently causing burnout. RL systems could make mHealth services more effective.

  2. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care.

    Science.gov (United States)

    Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.

  3. XMPP Protocol in the Android Instant Messaging System%XMPP协议在Android即时通讯系统中的应用

    Institute of Scientific and Technical Information of China (English)

    李新路

    2013-01-01

    即时通讯是一种基于互联网的网络应用,目前很多即时通讯系统,如MSN,QQ等,但由于使用了不同的协议,各个系统之间不能互联。可扩展消息与存在协议(XMPP)是即时通讯系统通信协议的标准,该文提出一种基于XMPP协议的即时通讯系统方案,并基于Android平台设计实现了即时通讯客户端,有效的解决了即时通讯系统中通信不畅的问题,并为其他类型智能平台间的即时通信提出一种可参考的解决方案。%Instant messaging is an Internet-based network applications,Many instant messaging system,such as MSN,QQ,Can-not be interconnected between the various systems because of using different protocol. Extensible Messaging and Presence Proto-col(XMPP)is the standard of the instant messaging protocol. A XMPP Instant Messaging protocol based on open source was de-signed. Finally, the Android system of the instant messaging client were designed ,effectively solution to the problem of poor communication in the instant messaging system,and provide a Reference solution for real time communication between other types of intelligent platform.

  4. Main-Branch Structure Iterative Detection Using Approximate Message Passing for Uplink Large-Scale Multiuser MIMO Systems

    Directory of Open Access Journals (Sweden)

    Qifeng Zou

    2016-01-01

    Full Text Available The emerging large-scale/massive multi-input multioutput (MIMO system combined with orthogonal frequency division multiplexing (OFDM is considered a key technology for its advantage of improving the spectral efficiency. In this paper, we introduce an iterative detection algorithm for uplink large-scale multiuser MIMO-OFDM communication systems. We design a Main-Branch structure iterative turbo detector using the Approximate Message Passing algorithm simplified by linear approximation (AMP-LA and using the Mean Square Error (MSE criterion to calculate the correlation coefficients between main detector and branch detector for the given iteration. The complexity of our method is compared with other detection algorithms. The simulation results show that our scheme can achieve better performance than the conventional detection methods and have the acceptable complexity.

  5. Management and Archiving e-mail Messages in Governmental Organization

    Directory of Open Access Journals (Sweden)

    Ashraf Mohamed A.Mohsen

    2006-06-01

    Full Text Available The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  6. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  7. A Service Oriented Architecture to Integrate Short Message Service (SMS Notification in Road Traffic Volume Control System

    Directory of Open Access Journals (Sweden)

    Zahi Abu Sarhan

    2013-02-01

    Full Text Available The traffic volume becomes one of the top problems in the world, the volume of traffic spends many time and much money, the traffic volume grows daily, and there is not effective and suitable solutions for grows problem. This paper will present and describe an effective approach to integrate the Service Oriented Architecture with mobile devices and services agents in Traffic Management Systems (TMS. The Traffic Volume Control System (TVCS should enable mobile short message service (SMS notifications. Unfortunately, cellular SMS notification based on services that are not aspect of the TVCS.Developing altered exterior systems and services, to be virtually aspect of TVCS, are one of the most incorporation difficulties. In this paper, a Service Oriented Architecture (SOA approach to includecellular SMS alerts in TVCS is presented. Suggested Structure includes two layers: Service layer and Interface layer. The Service layer includes all the system software. The service layer consists of three sub layers: Orchestration, Application Services, and Agents sub-layers. While the Interface layer interrelates with speed detectors and users via sites, and with exterior organization services via Web services.

  8. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    DEFF Research Database (Denmark)

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... and future wireless communications systems. By enabling the OFDM receiver experiencing these harsh conditions to locally cancel the interference, our design circumvents the spectral efficiency loss incurred by extending the CP duration, otherwise a straightforward solution. Furthermore, it sets the premises...

  9. A Systems Evaluation of a Purposive Message: The "Mulligan Stew" ETV Project.

    Science.gov (United States)

    Olien, C. N.; And Others

    The Mulligan Stew television series on nutritional principles for elementary school students was evaluated using a systems model. The study included student responses in eight schools and evaluation of responses from nutrition specialists, information specialists, television station personnel, and teachers. Agricultural college information…

  10. Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip

    NARCIS (Netherlands)

    Hansson, A.; Goossens, K.; Rãdulescu, A.

    2007-01-01

    Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions intr

  11. A Scheme for the Application of Smart Message Language in a Wireless Meter Reading System

    Directory of Open Access Journals (Sweden)

    O. Homa Keshav

    2012-05-01

    Full Text Available The use of wireless automation in almost all the fields of power, gas and water generation, distribution and billing has come of age. Here with the inclusion of wireless communication with the automation may lead to paradigm change in the current trend. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Apart the use of wireless meter reading with network technologies has become need of the day. The designed system avoids the human intervention in Power Management. The Consumer has to pay the bill in time, if couldn’t, the power connection may be disconnected automatically from the remote server. It displays the corresponding billing information on LCD and data is sent to the server through the GSM Module. The ARM7 based hardware system consists of a processor core board and the peripheral board. The entire programming for microcontroller operation is based on Embedded C Language. This system provides efficient meter reading, avoiding the billing error and reduces the maintenance cost. This paper also addresses advantages of implementing the GSM communication module and design detail and discusses the advanced security of the data communications.

  12. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  13. Message survival and decision dynamics in a class of reactive complex systems subject to external fields

    Science.gov (United States)

    Rodriguez Lucatero, C.; Schaum, A.; Alarcon Ramos, L.; Bernal-Jaquez, R.

    2014-07-01

    In this study, the dynamics of decisions in complex networks subject to external fields are studied within a Markov process framework using nonlinear dynamical systems theory. A mathematical discrete-time model is derived using a set of basic assumptions regarding the convincement mechanisms associated with two competing opinions. The model is analyzed with respect to the multiplicity of critical points and the stability of extinction states. Sufficient conditions for extinction are derived in terms of the convincement probabilities and the maximum eigenvalues of the associated connectivity matrices. The influences of exogenous (e.g., mass media-based) effects on decision behavior are analyzed qualitatively. The current analysis predicts: (i) the presence of fixed-point multiplicity (with a maximum number of four different fixed points), multi-stability, and sensitivity with respect to the process parameters; and (ii) the bounded but significant impact of exogenous perturbations on the decision behavior. These predictions were verified using a set of numerical simulations based on a scale-free network topology.

  14. Prospect: A Picture Exchange Communication System (PECS)-based Instant Messaging Application for Autism Spectrum Condition

    Science.gov (United States)

    Raja, Pravind; Zainuri Saringat, Mohd; Mustapha, Aida; Zainal, Abidah

    2017-08-01

    Autism Spectrum Disorder (ASC) has widely gained the common attention from the public especially autistic communities. Individuals with ASC are said to have poor verbal skills and this affects them in carrying out their daily basis which they are afraid to expose themselves to the world due to their problems. ASC is diagnosed among children ranging from ages 5-12 years old and they suffer from the abnormal functioning of the brain which in turn causes lack of development activities. Thus, studies have shown that diagrammatic approaches help children with ASC to overcome their issues and improvise their visual and verbal skills. Picture Exchange Communication System or PECS consists of a series of illustrated cards and each cards has its own illustration with a caption on it. These children will understand the cards and they can compile several other cards to form sentences. This paper presents a mobile application called the Prospect, which has been developed using the agile development model for digital representation of PECS. The application is hoped to enhance the learning process and a better yielding results.

  15. Joint Damage in ANCA-Associated Systemic Vasculitis Message I. Microscopic Polyangiitis

    Directory of Open Access Journals (Sweden)

    D.V. Pomazan

    2016-08-01

    Full Text Available Articular syndrome is one of the main signs of the microscopic polyangiitis (MPA, which in some regions of the Earth accounts for over 90 % of all systemic vasculitis (SV, associated with antineutrophil cytoplasmic antibodies (ANCA. It was found that 5 years after the manifestation of MPA, a progressive reduction of the para-articular (epiphyseal bone mineral density and destruction of the joints begin to form. Many questions related to the nature of the course of joint pathology in specific ANCA-SV require further study. Objective: to evaluate joint damage in patients with MPA and the relationship with extra-articular pathology. Material and methods. We study involved 89 patients with MPA aged 18–78 years old, among which there were 44 % men and 56 % women. The duration of the disease from the first signs of manifestation was 7 years. Acute or subacute course of MPA has been registered in 27 % of cases, and in the rest — chronic one; I degree of the activity of pathological process has been detected in 10 % of cases, II —in 32 %, III — is 58 %. Results. The joint involvement is observed in 60 % of patients with MPA, in 40 % of cases it occurs in the form of oligoarthritis, depends on the presence of pathology in skeletal muscles, pneumopathy or peripheral neuropathy. Clinical, radiological and sonographic signs of articular pathology in MPA are closely associated with patients’ age, disease duration, lesions of the heart, kidneys and skin. In the pathogenetic structures of arthropathy in patients with MPA, C-reactive protein (CRP and circulating immune complexes (CIC are involved, and the nature of ANCA (antibodies to myeloperoxidase and proteinase-3 is of small value, while the high blood levels of rheumatoid factor (RF have certain prognosis-negative significance in terms of the severity of joint pathology. Conclusion. Unfavorable prognostic criteria for the development of joint pathology in patients with MPA are indicators in the

  16. CHAIRMAN'S WELCOME MESSAGE Chairman's message

    Science.gov (United States)

    Oldham, Mark

    2010-11-01

    Every clinical physicist I have asked readily acknowledges the great desirability of a 3D dosimetry system for the verification of advanced radiation therapy treatments. An accurate and practical 3D dosimetry system would greatly strengthen the foundation of quality assurance in radiation therapy by enabling a rigorous and comprehensive whole system test. Such systems are now emerging, and the innovations and progress that led to them are remarkably captured in the proceedings of five prior DOSGEL conferences, the last three of which are freely available in the Journal of Physics: Conference Series. These meetings included a focus on the technical challenges of various approaches to 3D dosimetry. When considering plans for the present 6th meeting, the scientific committee recognized that the field has matured, and a broader focus was desirable, including a strengthening of the clinical and applications component, while preserving a strong technical component. There was also the desire to embrace a variety of other semi-3D techniques which have also recently emerged to implementation in the clinic. In accordance with these sentiments, the committee approved changing the name of the conference from the International Conference on Radiotherapy Gel Dosimetry (DOSGEL) to the International Conference on 3D Radiation Dosimetry (IC3DDose) and to the following objectives - Conference Objectives: 1. To provide a forum to discuss the latest research and developments in 3D and advanced radiation dosimetry. 2. To elevate the quality of radiation therapy treatments (quality assurance QA) through improved clinical dosimetry. 3. To explore the dosimetric challenges posed by modern radiation treatment techniques 4. To energize and diversify dosimetry research and clinical practice by encouraging interaction and synergy between advanced, 3D, and semi-3D dosimetry techniques The scientific program of the IC3DDose2010 meeting has been crafted to meet the objectives listed above, and

  17. Audio/Video Processing Technology in Instant Messaging System%即时通信系统中的音视频处理技术

    Institute of Scientific and Technical Information of China (English)

    苏育挺; 金富玉; 张承乾

    2012-01-01

    Taking the case of Gstreamer/Farsight framework and Jingle/XMPP protocol, the audio and video communications framework and relevant protocols in instant messaging system is described in detail. Finally, implementation of audio/video processing framework is introduced in the instant messaging system with Pidgin as an example. Effective solution is provided to developers who are developing Audio/Video processing in instant messaging system.%围绕即时通信系统中的音视频处理技术,以Gstreamer/Farsight框架和Jingle/XMPP通信协议为重点,阐述了即时通信中多媒体音视频通信框架及相关协议.最后以Pidgin软件为例介绍音视频处理框架在即时通信客户端中的实现方法,为即时通信系统中音视频处理功能的开发提供了有效的解决方案.

  18. 基于数据流聚类的手机短信监管系统%Monitoring system of short message based on data steam clustering

    Institute of Scientific and Technical Information of China (English)

    綦科; 谢冬青

    2011-01-01

    To solve the problem of personalized needs and source tracking of the short message monitoring, a scheme of monitoring system for short message based on data steam clustering is proposed in which two-layer monitoring model based on receiver and SMS center is designed. By the side of SMS center, the short message is segmented with Chinese lexical analysis system and data stream mining and Bayes classification algorithm are used to realize short message monitoring and source tracking. By the side of receiver, the personalized features library is established and Bayes classification algorithm is used to meet the personalized classification. The experimental results show that the scheme can accurately realize short message monitoring and source tracking in SMS center, and can meet the personalized monitoring needs of short message receiver.%为解决手机短信监管的个性化需求和源头追踪问题,提出了一种基于数据流聚类的手机短信实时监管系统的设计方案,设计了短信客户端和短信中心端互动的二层监管模型:在短信中心端应用中文分词算法对短信文本进行分词,采用数据流聚类算法和Bayes分类算法,利用短信中心可以集中监控发送者的优势,在实现短信的个性化监管和源头跟踪;在短信客户端建立个性化短信特征库,通过对接收的短信文本进行分词和Bayes分类,实现客户端个性化短信分类判别.实验结果表明,该方案可以较为精确的在短信中心端实现集中式短信监管和源头跟踪,同时在客户端可以满足短信接收者的个性化分类需求.

  19. Research and Implementation of Quick Message System for Enterprise%企业快信系统研究与实现

    Institute of Scientific and Technical Information of China (English)

    顾懿爽; 景慎艳

    2015-01-01

    Enterprise short message system to effectively solve the communication problem between enterprises,between enterprises,between enterprises and users of communication become simple and efficient.In the enterprise short message system,enterprise users can on the customer's business card management,on information library information management,provide the user group SMS,e-mail group sending service to the outside of the enterprises,and has sent internal instant message function.%企业快信系统有效地解决企业之间的沟通问题,使企业之间、企业与用户之间的沟通变得简单高效。在企业快信系统中,企业用户可以对客户的名片进行管理、对信息库信息管理,向外部企业用户提供群发短信、群发邮件服务,并具有发送内部即时消息功能。

  20. Eliminating livelock by assigning the same priority state to each message that is input into a flushable routing system during N time intervals

    Science.gov (United States)

    Faber, V.

    1994-11-29

    Livelock-free message routing is provided in a network of interconnected nodes that is flushable in time T. An input message processor generates sequences of at least N time intervals, each of duration T. An input register provides for receiving and holding each input message, where the message is assigned a priority state p during an nth one of the N time intervals. At each of the network nodes a message processor reads the assigned priority state and awards priority to messages with priority state (p-1) during an nth time interval and to messages with priority state p during an (n+1) th time interval. The messages that are awarded priority are output on an output path toward the addressed output message processor. Thus, no message remains in the network for a time longer than T. 4 figures.

  1. 集中管理式公用电话计费系统%Centralized manageable message accounting system of public telephone

    Institute of Scientific and Technical Information of China (English)

    闫晓明; 杨秀华; 程荣

    2000-01-01

    简要介绍了集中管理式公用电话计费系统的组成及功能。系统由公用电话集中管理中心与集中管理式电话计费器组成。集中管理中心与集中管理式电话计费器之间可通过公众电话网以拨号方式建立双向通信链路,从而实现对集中管理式电话计费器的远程管理。文中对集中管理式公用电话计费器的硬件设计作了系统的描述。自己设计了电话计费器与电话线的独特接口电路。对计费器软件的重点,即摘、挂机及拨号脉冲识别程序的设计,提出了一套完整的理论依据。%This paper introduces simply the composition and function of the centralized manageable message accounting system of public telephone. The system consists of the centralized management center and the centralized manageable message accounting devices. Between the center and the devices, the duplex communication links are created through the public switched telephone network, thus the remote management for the devices is realized. It describes the structure of the message accounting device. We design the special interface circuit between the message accounting device and the telephone wire. A piece of completely theoretical basis is presented in order to resolve the software design emphasis of the accounting device, such as the procedure design of off-hook and on-hook and dialing pulse recognition.

  2. 基于XMPP协议的Android即时通信系统设计%Design of Android Instant Messaging system based on XMPP agreement

    Institute of Scientific and Technical Information of China (English)

    黄伟敏

    2011-01-01

    即时通信通过互联网给人们提供了便捷的通信手段,针对手机覆盖区域和效果的不断提升,提出一种在流行的Android手机操作系统上,实现客户端与客户端之间的即时通信的设计方案.设计基于开源的XMPP即时通信协议,采用C/S体系结构,通过GPRS无线网络用TCP协议连接到服务器,以架设开源的Openfire服务器作为即时通讯平台,极大地方便了互联网通信不畅的用户.%Instant Messaging over the Intemet to provide a convenient means of communication, aiming at constant rise of mobile coverage area and the effects, on the pop Android mobile operating system, a design scheme was presented to achieve instant communication between the client and the client program. A XMPP Instant Messaging protocol based on open source was designed, it used C/S architectureand TCP protocol to connect to the server via GPRS wireless network, to set up Openfire server as open source instant messaging platform, which greatly facilitated the user whose Intemet communication is not smooth.

  3. What's in a Message?

    CERN Document Server

    Afantenos, Stergos D

    2009-01-01

    In this paper we present the first step in a larger series of experiments for the induction of predicate/argument structures. The structures that we are inducing are very similar to the conceptual structures that are used in Frame Semantics (such as FrameNet). Those structures are called messages and they were previously used in the context of a multi-document summarization system of evolving events. The series of experiments that we are proposing are essentially composed from two stages. In the first stage we are trying to extract a representative vocabulary of words. This vocabulary is later used in the second stage, during which we apply to it various clustering approaches in order to identify the clusters of predicates and arguments--or frames and semantic roles, to use the jargon of Frame Semantics. This paper presents in detail and evaluates the first stage.

  4. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  5. Message in a molecule.

    Science.gov (United States)

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-05-03

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively.

  6. Message in a molecule

    Science.gov (United States)

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-01-01

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively. PMID:27138465

  7. Motion Detection Notification System by Short Messaging Service Using Network Camera and Global System for Mobile Modem

    CERN Document Server

    Mohd, Mohd Norzali Haji; Ariffin, Siti Khairulnisa

    2010-01-01

    As the technology rapidly grows, the trend is clear that the use of mobile devices is gain an attention nowadays, thus designing a system by integrating it with notification feature is becoming an important aspect especially in tracking and monitoring system. Conventional security surveillance systems require the constant attention from the user, to monitor the location concurrently. In order to reduce the cost of computing power and advance technology of mobile phone in widespread acceptance of the Internet as a viable communication medium, this paper is aimed to design a low cost web-based system as a platform to view the image captured. When the network camera detects any movement from the intruders, it automatically captures the image and sends it to the database of the web-based directly by the network through File Transfer Protocol (FTP). The camera is attached through an Ethernet connection and power source. Therefore, the camera can be viewed from either standard Web browser or cell phone. Nowadays, w...

  8. Self-regulating Message Throughput in Enterprise Messaging Servers – A Feedback Control Solution

    Directory of Open Access Journals (Sweden)

    Ravi Kumar G

    2012-01-01

    Full Text Available Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit high performance to meet the Service Level Agreements (SLAs. There are investigations in this area of managing the performance of the distributed computing systems in different ways such as the IT administrators configuring and tuning the Messaging Servers parameters, implement complex conditional programming to handle the workload dynamics. But in practice it is extremely difficult to handle such dynamics of changing workloads in order to meet the performance requirements. Additionally it is challenging to cater to the future resource requirements based on the future workloads. Though there have been attempts to self-regulate the performance of Enterprise Messaging Servers, there is a limited investigation done in exploring feedback control systems theory in managing the Messaging Servers performance. We propose an adaptive control based solution to not only manage the performance of the servers to meet SLAs but also to pro-actively self-regulate the performance such that the Messaging Servers are capable to meet the current and future workloads. We implemented and evaluated our solution and observed that the control theory based solution will improve the performance of Enterprise Messaging Servers significantly.

  9. Message passing with a limited number of DMA byte counters

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael (Rochester, MN); Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN)

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  10. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  11. Syndromic classification of Twitter messages

    CERN Document Server

    Collier, Nigel

    2011-01-01

    Recent studies have shown strong correlation between social networking data and national influenza rates. We expanded upon this success to develop an automated text mining system that classifies Twitter messages in real time into six syndromic categories based on key terms from a public health ontology. 10-fold cross validation tests were used to compare Naive Bayes (NB) and Support Vector Machine (SVM) models on a corpus of 7431 Twitter messages. SVM performed better than NB on 4 out of 6 syndromes. The best performing classifiers showed moderately strong F1 scores: respiratory = 86.2 (NB); gastrointestinal = 85.4 (SVM polynomial kernel degree 2); neurological = 88.6 (SVM polynomial kernel degree 1); rash = 86.0 (SVM polynomial kernel degree 1); constitutional = 89.3 (SVM polynomial kernel degree 1); hemorrhagic = 89.9 (NB). The resulting classifiers were deployed together with an EARS C2 aberration detection algorithm in an experimental online system.

  12. School Health Message

    Science.gov (United States)

    Califano, Joseph A., Jr.

    1977-01-01

    This article presents the message delivered to the National School Health Association Conference by the Secretary of the Department of Health, Education, and Welfare in May 1977 and the response of the participants in the conference. (JD)

  13. Design of Message Receiving/Sending Program in Smart Home System%智能家居系统中的短信收发程序设计

    Institute of Scientific and Technical Information of China (English)

    冯金超; 张秀娟

    2012-01-01

    Aiming at the demands including real-time receiving/sending of security alarm information and home appliance remote control in Smart Home system, a solution is put forward to receive/send message using 3G module, and a software architecture is designed to realize message receiving/sending at the same time. Experimental results show the design is simple and practical, and it can meet the requirements of Smart Home system.%针对智能家居系统中安防报警信息实时收发及家电远程控制的需求,提出使用3G模块收发短信的方法,并设计了实现短信同时收发功能的软件架构。实验结果表明,该方法简单实用,能够满足智能家居系统的要求。

  14. Multi-message Voice Record and Playback System Based on MOU%单片机的多段语音组合录放系统设计

    Institute of Scientific and Technical Information of China (English)

    温洪昌; 黄应强; 傅贵兴

    2011-01-01

    A kind of multi-message voice record and playback system is designed based on MCUSTC89C52RC and voice chip ISD1730, The paper introduces the process realization, including voice circuits design, multi-message voice recording, locating, editing and cornbi nation outputting. Also, a temperature measuring instrument with voice output function is produced. Experiments indicate that this in strument is easier to operate and use.%介绍一种基于单片机STC89C52RC、语音芯片ISD1730组成的多段语音录放系统设计方案。描述了语音电路设计、语音分段录入、语音段定位、语音段剪辑、多段语音组合输出等的实现方法;并制作了一个具有语音输出功能的温度测量仪。实验表明,具有语音输出功能的温度测量仪器更便于操作和使用。

  15. Quantum interactive proofs with short messages

    CERN Document Server

    Beigi, Salman; Watrous, John

    2010-01-01

    This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be exchanged, but where the combined length of all the messages is logarithmic; and the third variant is one in which the verifier sends polynomially many random bits to the prover, who responds with a short quantum message. We prove that in all of these cases the short messages can be eliminated without changing the power of the model, so the first variant has the expressive power of QMA and the second and third variants have the expressive power of BQP. These facts are proved through the use of quantum state tomography, along with the finite quantum de Finetti theorem for the first variant.

  16. Oral messages improve visual search

    CERN Document Server

    Kieffer, Suzanne

    2007-01-01

    Input multimodality combining speech and hand gestures has motivated numerous usability studies. Contrastingly, issues relating to the design and ergonomic evaluation of multimodal output messages combining speech with visual modalities have not yet been addressed extensively. The experimental study presented here addresses one of these issues. Its aim is to assess the actual efficiency and usability of oral system messages including brief spatial information for helping users to locate objects on crowded displays rapidly. Target presentation mode, scene spatial structure and task difficulty were chosen as independent variables. Two conditions were defined: the visual target presentation mode (VP condition) and the multimodal target presentation mode (MP condition). Each participant carried out two blocks of visual search tasks (120 tasks per block, and one block per condition). Scene target presentation mode, scene structure and task difficulty were found to be significant factors. Multimodal target presenta...

  17. 基于数字身份认证系统的即时通讯系统应用探讨%Application of Instant Messaging System Based on Digital Identity Authentication System

    Institute of Scientific and Technical Information of China (English)

    黄锐; 张洋; 刘福春

    2014-01-01

    This article introduces the technical framework of instant messaging system and digital identity authentication system of Haihe River Water Conservancy Commission (HWCC). From the perspectives of theory, methods, steps, workload, system security and user acceptance, it gives a detail analysis on two solutions:one is a combination of the instant messaging system with the universal user management system by log in username/password, and another is to log in with a UKEY on the basis of a deep integration of the instant messaging system and the CA system. In the end, the solution of logging in by inputting username/password on the basis of a combination of the instant messaging system and a third-party universal user management system is chosen to upgrade the instant messaging system of HWCC. The upgraded system improved the function of the offline file handling stability and organization flexibility. It greatly guarantees the safety and no leak of users’ personal information and working file.%介绍海河水利委员会即时通讯、数字身份认证等系统的技术架构,对即时通讯系统升级的2种方案:即时通讯系统与统一用户管理系统结合通过用户名/密码方式进行登录,和即时通讯系统与认证系统深度集成通过USB Key 登录的方案,从原理、实现方法、实施步骤、开发工作量、系统安全性、用户接受程度等方面进行详细分析,最终选择即时通讯系统与第三方统一用户管理系统结合,通过用户名/密码方式进行登录的方案对海河水利委员会即时通讯系统进行升级改造,升级后的系统完善了离线文件处理稳定性、组织机构排序灵活性等功能,极大地保障用户个人信息及工作文件的安全与不外泄。

  18. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  19. 基于MQTT协议的移动IM系统设计与实现%Design and Implementation of Mobile Instant Messaging System Based on MQTT Protocol

    Institute of Scientific and Technical Information of China (English)

    崔东欢; 郭立君; 张荣; 周丰平

    2016-01-01

    为降低移动即时通讯应用的功耗和流量消耗,设计并实现了一个基于MQTT协议的移动即时通讯系统。在保持MQTT标准控制报文结构的基础上,扩展PUBLISH控制报文的有效载荷,设计了即时通讯协议MQTT-IM,通过设计主题订阅,对MQTT的开源实现Moquette进行扩展,增加Moquette-IM模块实现了通讯录、即时通信、状态呈现等系统核心功能。通过数据对比显示,该系统可有效降低功耗和流量消耗,具有很高的实用价值。%A system based on MQTT protocol was designed and implemented to reduce the power consumption and data trafifc for mobile instant messaging applications. The MQTT-IM protocol was designed through expending the payload of the PUBLISH control packet and maintaining the MQTT standard control packet at the same time. The critical functions of the system including the address book, instant messaging and the state presentation were implemented through topics subscription design and extension of Moquette, an open source implementation of MQTT, and adding Moquette-IM module. Comparison experiments showed that the proposed system can effectively reduce the power consumption and data trafifc and has a high practical value.

  20. Mining Opinion in Online Messages

    Directory of Open Access Journals (Sweden)

    Norlela Samsudin

    2013-09-01

    Full Text Available The number of messages that can be mined from online entries increases as the number of online application users increases. In Malaysia, online messages are written in mixed languages known as ‘Bahasa Rojak’. Therefore, mining opinion using natural language processing activities is difficult. This study introduces a Malay Mixed Text Normalization Approach (MyTNA and a feature selection technique based on Immune Network System (FS-INS in the opinion mining process using machine learning approach. The purpose of MyTNA is to normalize noisy texts in online messages. In addition, FS-INS will automatically select relevant features for the opinion mining process. Several experiments involving 1000 positive movies feedback and 1000 negative movies feedback have been conducted. The results show that accuracy values of opinion mining using Naïve Bayes (NB, k-Nearest Neighbor (kNN and Sequential Minimal Optimization (SMO increase after the introduction of MyTNA and FS-INS.

  1. Making your message competitive

    Energy Technology Data Exchange (ETDEWEB)

    Burns, D.B.; Ulick, B.D.; Bradford, D.M. [SAIC, Las Vegas, NV (United States)

    1994-12-31

    Even in the best of situations, effective communication can be difficult to achieve. For those working in fields that are highly controversial and technical, where an ability to communicate effectively with the general public is fundamental to the success of a project or program, this task can be particularly onerous. This is especially true for communicators working in the nuclear arena, such as the US Department of Energy`s Yucca Mountain Site Characterization Project (YMP). Although these difficulties exist as a part of daily communications, numerous lessons have been learned that may be applicable for others in the field. A variety of factors can influence the effectiveness of communications. These include a message`s relative complexity, its salience, competing messages, verbal and nonverbal cues, and, perhaps most importantly, the role played by the news media. To communicate effectively with one`s audience, it is essential that each of these factors be considered and used to advantage.

  2. Entropy Message Passing Algorithm

    CERN Document Server

    Ilic, Velimir M; Branimir, Todorovic T

    2009-01-01

    Message passing over factor graph can be considered as generalization of many well known algorithms for efficient marginalization of multivariate function. A specific instance of the algorithm is obtained by choosing an appropriate commutative semiring for the range of the function to be marginalized. Some examples are Viterbi algorithm, obtained on max-product semiring and forward-backward algorithm obtained on sum-product semiring. In this paper, Entropy Message Passing algorithm (EMP) is developed. It operates over entropy semiring, previously introduced in automata theory. It is shown how EMP extends the use of message passing over factor graphs to probabilistic model algorithms such as Expectation Maximization algorithm, gradient methods and computation of model entropy, unifying the work of different authors.

  3. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  4. Message passing for quantified Boolean formulas

    CERN Document Server

    Zhang, Pan; Zdeborová, Lenka; Zecchina, Riccardo

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis-Putnam Logemann-Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics gives robust exponential efficiency gain with respect to the state-of-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this our study sheds light on using message passing in small systems and as subroutines in complete solvers.

  5. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  6. Short Message Service using SMS Gateway

    Directory of Open Access Journals (Sweden)

    Veena K.Katankar

    2010-08-01

    Full Text Available Short message service (SMS will play a very vital role in the future business areas whose are popularly known as mobile banking, organizational marketing system etc. For this future, SMS could make a mobile device in a business tool as it has the availability and the effectiveness. This thesis is about software development that is based on short messaging service (SMS system for delivering messages through SMS gateway. Main goal of proposed system is to provide multi level local authentication to the SMS gateway service. This service can be implemented in any multi departmental organization whereSMS service is used for notification system and marketing purpose. Proposed system has web interface and the encryption method for providing service.

  7. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium -

  8. Understanding Telex Messages.

    Science.gov (United States)

    Kitto, Michael

    1984-01-01

    Examines the problems of writing grammatical rules for the writing of telexes and makes some suggestions as to how to teach comprehension of telex messages. Emphasizes the inconsistency in style, length, and form of telexes, and the impact this has had on international correspondence, which involves many nonnative speakers of English. (SL)

  9. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  10. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium - understo

  11. The Message from Boston

    Institute of Scientific and Technical Information of China (English)

    Wang Wenfeng

    2004-01-01

    @@ The election program entitled "A Strong Nation Respected in the World " came out in Boston at the July 26-29 Democratic National Convention along with the nomination of John Kerry and John Edwards as the presidential and vice presidential candidates of the party. What message do the Democrats want to convey from Boston?

  12. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  13. Research and application of high-reliability instant messaging system in mobile network%移动网络下高可靠即时通信系统的研究与应用

    Institute of Scientific and Technical Information of China (English)

    莫足琴

    2016-01-01

    随着移动互联网时代的到来,出现了大量优秀的即时通信软件,其中成熟的即时通信技术都不公开,而开源的即时通信框架存在较多问题,容易出现丢包、消息延迟。针对上述问题,设计了移动网络下高可靠即时通信系统,弥补了开源通信框架设计中的不足,并提出对通用即时通信技术的改进方法。首先提出了高性能通信长链接和时间片轮转算法,采用了消息握手协议和消息加密的方法,同时改进了通信链接状态检测算法,并提出双服务权限认证方法,保证了即时通信系统的安全性。实验中测试系统包含了设计的即时通信框架,实验结果证明了系统的即时性和高可靠性。%With the advent of the mobile Internet era,a lot of excellent instant messaging softwares appear. Since the ma⁃ture instant messaging technology is unopened,and the instant messaging framework with open source exists many problems, the communication system is prone to appear packet loss and message delay. In view of the above problems,a high⁃reliability in⁃stant communication system in mobile network was designed to make up the deficiency of open⁃source communication framework design. The improved method of general instant communication technology is put forward,in which the high⁃performance commu⁃nication long link and time slice round algorithm are proposed,the message handshake protocol and message encryption method are adopted,and the communication link state detection algorithm is improved. The double service authentication method is pro⁃posed to ensure the safety of instant messaging system. The test system in the experiment includes the designed instant messaging framework. The experimental results can prove the instantaneity and high reliability of the systemy.

  14. 服装企业协调管理系统的体系结构研究%Architecture research of garments enterprise message management system

    Institute of Scientific and Technical Information of China (English)

    赵钢

    2012-01-01

    为了解决服装企业各职能部门问的协同工作,本论文提出了基于Web Service技术的解决方案来实现服装企业异地职能部门之间的信息集成,并实现了服装企业信息管理系统,文章详细的介绍了该系统的体系模型、框架结构、软件系统等内容,对于实际的应用有较高的参考价值。%In order to solve the interoperability between the various functional departments of the garment enterprises, this paper proposed information integration based on Web Service technology solutions to the garment enterprises in different places between the functional departments, and clothing Garments Enterprise Message Management System, the article described in detail system model, framework, software and other content of the system, for the practical application of high reference value.

  15. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  16. 47 CFR 11.44 - EAS message priorities.

    Science.gov (United States)

    2010-10-01

    ... Messages; second, State Messages; and third, National Information Center (NIC) Messages. (c) Key EAS... distribution of Presidential Messages. NIC messages received from national networks which are not broadcast...

  17. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Science.gov (United States)

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  18. Quantum Message Distribution

    Institute of Scientific and Technical Information of China (English)

    LUO Ming-Xing; CHEN Xiu-Bo; DENG Yun; Yang Yi-Xian

    2013-01-01

    The semiquantum techniques have been explored recently to bridge the classical communications and the quantum communications.In this paper,we present one scheme to distribute the messages from one quantum participate to one weak quantum participate who can only measure the quantum states.It is proved to be robust by combining the classical coding encryption,quantum coding and other quantum techniques.

  19. Solving a System of Nonlinear Algebraic Equations You Only Get Error Messages--What to Do Next?

    Science.gov (United States)

    Shacham, Mordechai; Brauner, Neima

    2017-01-01

    Chemical engineering problems often involve the solution of systems of nonlinear algebraic equations (NLE). There are several software packages that can be used for solving NLE systems, but they may occasionally fail, especially in cases where the mathematical model contains discontinuities and/or regions where some of the functions are undefined.…

  20. International Students, University Health Centers, and Memorable Messages about Health

    Science.gov (United States)

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  1. The Information Ecology of Personal Health Record Systems: Secure Messaging as Catalyst and Its Evolving Impact on Use and Consequences

    Science.gov (United States)

    Nazi, Kim M.

    2012-01-01

    Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…

  2. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  3. Astronaut Franklin Chang-Diaz organizes shuttle mail message

    Science.gov (United States)

    1994-01-01

    On Discovery's aft flight deck, Astronaut Franklin R. Chang-Diaz begins to organize what was believed to be among the longest mail messages in Shuttle history. Though early Shuttle flights could brag of longer teleprinted messages, the Thermal Imaging Printing Systems's day four correspondence, most of which is out of frame here, is a record length for recent flights.

  4. Enhancing the security of chaotic signals in binary message transmission

    OpenAIRE

    Kostenko, Pavlo Yu.; Symonenko, S. N.; S.G. Semenov; Vasiuta, K. S.

    2009-01-01

    A technique for inserting a binary message into chaotic carrier has been proposed that enhances the security of data transmission systems at the expense of destructing the behavior typical for chaotic processes on the phase plane. An algorithm for recovery of the transmitted message was obtained and its quality for different signal-to-noise levels was estimated.

  5. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  6. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but mot

  7. Creating buzz: the neural correlates of effective message propagation.

    Science.gov (United States)

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  8. Event Driven Messaging with Role-Based Subscriptions

    Science.gov (United States)

    Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed

    2009-01-01

    Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).

  9. Pregnancy and menopause in patients with systemic lupus erythematosus and/or antiphospholipid syndrome. Practical messages from the EULAR guidelines.

    Science.gov (United States)

    Vagelli, Roberta; Tani, Chiara; Mosca, Marta

    2017-01-25

    Over the last few decades, reproductive medicine has observed an improvement in the management and outcome of pregnancy in connective tissue diseases, such as systemic lupus erythematosus (SLE) and antiphospholipid syndrome (APS). However, pregnancy and related issues remain a challenge in these patients. In routine clinical practice, health professionals dealing with SLE and APS need to consider the numerous aspects of the reproductive life of their patients, such as pregnancy, family planning, fertility, contraception, cancer surveillance, and menopause. The new European League Against Rheumatism recommendations for women's health and family planning reflect the need for a novel approach to communication in the patient-physician relationship. Preconception counseling is essential to ensure optimal pregnancy outcomes through a careful risk stratification involving disease activity, organ involvement, autoantibody profile, use of drugs, and previous pregnancy outcomes, as well as to ensure better preventive and therapeutic strategies to limit complications. In patients with stable/inactive disease and low risk of thrombosis, adequate hormonal contraception and menopausal replacement therapy should be recommended. Assisted reproductive techniques can be safely used in these patients, but anticoagulation or low-dose aspirin (or both) should be added in those with positive antiphospholipid antibody titers. All menstruating women should be counseled on the possibility to preserve fertility with gonadotropin- ‑releasing hormone analogues if receiving alkylating agents. Strict clinical, serological, laboratory, and multidisciplinary monitoring during pregnancy is mandatory to early recognize and effectively treat disease flares or obstetric complications. Doppler ultrasonography and fetal biometry should be regularly performed, especially in the second and third trimesters. Physicians should recommend screening for cervical dysplasia related to human papillomavirus

  10. 家庭安防系统中手机彩信报警的实现%Realization of multimedia messaging service of home safety alarm system

    Institute of Scientific and Technical Information of China (English)

    张光异; 王会清; 程勇

    2013-01-01

    利用 LabVIEW 软件开发了集现场数据采集、传送及远程监视于一体的彩信实时报警系统。当监控现场有非法侵入时,控制主机收到被触发的探测器报警信号后立即启动相应的模块采集现场的声音与图像,经信号处理后以最直观的彩信形式,通过 GPRS 网络发送到用户设定的手机。系统运行结果表明,数据发送稳定、实时性好,声音和图像清晰,可以作为传统报警方式的补充,也可应用于其他方面的远程监控。%A multimedia messaging service real-time alarm system of onsite data collection, transmission and remote monitoring has been established using LabVIEW development tools. As soon as the probes are triggered by illegal intruder , control host immediately starts the data collection of live sound and image by related module, and after signal processing, the data are sent to the appointed mobile phone. Testing results show that the data transmission is stable, time lag is short, the sound and the image are clear. The MMS can be used as an enhanced assembly to the traditional alarm system , as well as to other remote monitoring.

  11. Creative Analytics of Mission Ops Event Messages

    Science.gov (United States)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non

  12. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  13. Short Message System (SMS) revisited

    DEFF Research Database (Denmark)

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    both students and educators are changing. There is a risk of information overload and difficulty ensuring, that important information passes through to all relevant individuals. This provides a challenge to institutions, which have an urgent need to pass on personal important information. One way......In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... route was chosen as part of improving the digital communication and information environment at the faculty. A SMS service was implemented and tested in three settings: course communication tool, University administration tool and as examination result tool....

  14. Short Message System (SMS) revisited

    DEFF Research Database (Denmark)

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... to meet this challenge is to make use of new technological achievements in some novel way (CMS, LMS, VLE, RSS etc.). Another way is to take one step backwards, and employ an older technology that is stable and which people are familiar with. At the Faculty of Health, Aarhus University, Denmark, the latter...

  15. Short Message Monitoring System Based on Social Network Mechanism%基于社交网络机理的短信息监控系统

    Institute of Scientific and Technical Information of China (English)

    仲玉芳; 王慧芬; 叶星; 吴明光

    2011-01-01

    短信息实时过滤基于社交网络机理,从社交网络的聚类现象切入,通过确认发送者的身份实现短信息实时监控过滤.首先根据接收者与发送者之间是否存在通信历史对发送的短信进行预处理,进而根据接收者与发送者、接收者之间的通信历史记录实施二度实时过滤,确认发送者身份,拦截文本或多媒体形式的垃圾短信.并行过滤算法在对称多处理(SMP)的硬件平台上运行.%Real-time monitoring and filtering for mobile short message service (SMS) system is in terms of the clustering phenomenon of social network to check the sender's identify. At first pre-process SMS based on whether there are historical records between the sender and receiver, then take two degrees of real-time filtering in the light of statistics of both historical records from receivers to the sender and those among receivers. Parallel filtering algorithm and multinuclear hardware platform with symmetric multiprocessor (SMP) structure are used. It can be expected to solve the problem of filtering junk SMS, like text, sound and media in any language radically.

  16. Navigation message designing with high accuracy for NAV

    Institute of Scientific and Technical Information of China (English)

    Wang Luxiao; Huang Zhigang; Zhao Yun

    2014-01-01

    Navigation message designing with high accuracy guarantee is the key to efficient navi-gation message distribution in the global navigation satellite system (GNSS). Developing high accu-racy-aware navigation message designing algorithms is an important topic. This paper investigates the high-accuracy navigation message designing problem with the message structure unchanged. The contributions made in this paper include a heuristic that employs the concept of the estimated range deviation (ERD) to improve the existing well-known navigation message on L1 frequency (NAV) of global positioning system (GPS) for good accuracy service; a numerical analysis approximation method (NAAM) to evaluate the range error due to truncation (RET) of different navigation messages; and a basic positioning parameters designing algorithm in the limited space allocation. Based on the predicted ultra-rapid data from the ultra-rapid data from the international GPS service for geodynamic (IGU), ERDs are generated in real time for error correction. Simulations show that the algorithms developed in this paper are general and flexible, and thus are applicable to NAV improvement and other navigation message designs.

  17. Enhancement of Delivery of Warning Messages for Mobile Networks

    Directory of Open Access Journals (Sweden)

    Chia-Sheng Tsai

    2008-07-01

    Full Text Available Vehicle-to-vehicle (V2V communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning messages (alarms between vehicles without additional roadside infrastructure. Thus, messages can be sent faster than through base stations. Because of these advantages, researchers worldwide are exploring how this technology can improve traffic safety. However, the various V2V schemes proposed thus far share the same problem: (1 unnecessary repetition of warning messages and (2 transmission to inapplicable respondents. This study proposes a new method for delivering V2V warning messages which reduces the redundant messages common in current schemes. Here, three schemes to deliver alarms are considered. One is blind flooding to broadcast alarms. Warning messages are routed by AODV protocol. Another is called Two Lanes. The broadcasting region of alarms is limited in two traffic lanes nearby a traffic accident only. And the last one is the proposed strategy where a warning message received by a car will be simply checked the prime number carried within the alarm header and decided whether the car is responsible to deliver it. If necessary, it will be forwarded to the next nodes. Otherwise, the redundant warning message shall be discarded to release system load and avoid to suspend other normal transmission proceeding. The results reveal that minimizing the delays caused by such redundant messages enables warnings to be sent to drivers more rapidly. Also, it prioritizes warning messages so that drivers are apprised of the most serious and dangerous traffic accidents. Moreover, another key finding in this paper is that the radii of the broadcasting coverage shall be adjusted carefully and adaptively to optimize the system performance.

  18. Construction of High Performance Instant Messaging System Based on Socket.io+Node.js+Redis%基于Socket.io+Node.js+Redis构建高效即时通讯系统

    Institute of Scientific and Technical Information of China (English)

    黄经赢

    2014-01-01

    随着互联网技术的发展,市场上已有一些比较成熟的即时通讯系统,但大多数都是基于C/S结构,而基于B/S结构的即时通讯系统还处于发展阶段,主要受制于不同浏览器版本的兼容问题,且该类系统对高并发和数据快速存取有着较高的要求。而基于Socket.io、Node.js和Redis的技术,可以较好地解决B/S结构所遇到的问题。%With the development of Internet, there have been some mature instant messaging systems on the market, but most of them are based on C/S structure, the instant messaging system based on B/S structure is still developing, the main reason is subject to the different versions of browser compatibility issues, and the instant messaging system require high concurrency and fast data access. Based on Socket.io, Node.js and Redis technology can be better to solve the problem of B/S structure encountered.

  19. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  20. 短信仿伪系统在中小型企业的应用%Application of Short Message Autifalse System in Small and Medium Enterprise

    Institute of Scientific and Technical Information of China (English)

    葛森; 田荣凤; 李丽萍

    2011-01-01

    企业为了保护自己和消费者的利益,大多数企业对自己的产品都采取了防伪技术.目前,短信防伪系统以其不受现场条件影响、全天候、全方位,消费者只需通过手机输入防伪号码,随时随地可以查询鉴别产品的真伪,越来越受到消费者和企业的青睐.短信防伪系统在企业对产品进行防伪,保护产品品牌的实际工作中,发挥越来越重要的作用.对于基于GSM-MODEL构造的短信防伪系统与以其投入低、维护成本低、无需申请接入号码,短信息资费低的特点,在中小型企业中,具有广泛的应用价值.%Enterprise in order to protect ourselves and the interests of the consumer,most companies in their products by adopting a anti-counterfeiting technology(--most businesses have taken their anti-counterfeiting technology products).At present,SMS autifalse system with its from site condition the influence,all-weather,all-round,consumer simply enter anti-counterfeiting number through the mobile phone,anytime,anywhere can check the authenticity of identification products,more and more get the favour of consumers and businesses.SMS anti-counterfeiting system in the enterprise product anti-fake,protect product brand in the actual work,play more and more important role.For the structure based on GSM-MODEL with anti-counterfeiting system and its low investment,low maintenance,no need to apply the access number,short message fee low characteristics has wide application value in small and medium enterprises.

  1. ICE在模拟训练系统消息中间件中的应用%Application of ICE to Message-Oriented Middleware in Simulation Training System

    Institute of Scientific and Technical Information of China (English)

    祝义荣

    2016-01-01

    Message-oriented middleware which provides good quality of service and self-adaptive ability becomes the key in simulation training systems. This paper points out the ICE(Internet Communications Engine)in detail. It de-signs and implements a message-oriented middleware based on ICE,which provides a suit of reliable and universal method for sending and receiving messages in distributed simulation training systems.%如何提供一种高服务质量、自适应能力强的信息中间件,成为模拟训练研究的重要组成部分。本文在对ICE(Internet Communications Engine)进行深入研究的基础上,设计并实现了一种消息中间件系统,为分布式模拟训练系统中数据收发提供了一套可靠通用的机制。

  2. Unified messaging solution for biosurveillance and disease surveillance.

    Science.gov (United States)

    Abellera, John P; Srinivasan, Arunkumar; Danos, C Scott; McNabb, Scott; Rhodes, Barry

    2007-10-11

    Biosurveillance and disease surveillance systems serve different purposes. However, the richness and quality of an existing data stream and infrastructure used in biosurveillance may prove beneficial for any state-based electronic disease surveillance system, especially if an electronic laboratory data feed does not exist between a hospital and state-based system. The use of an Enterprise Application Integration(EAI) engine, such as the BioSense Integrator,will be necessary to map heterogeneous messages into standard representations, then validate and route them [1] to a disparate system. This poster illustrates the use of an existing BioSense Integrator in order to create a unified message to support the exchange of electronic lab messages necessary for reportable disease notification. An evaluation of the infrastructure for data messaging will be examined and presented, along with a cost and benefit analysis between hospital and state-based system.

  3. 48 CFR 52.223-18 - Contractor Policy to Ban Text Messaging While Driving.

    Science.gov (United States)

    2010-10-01

    ... Text Messaging While Driving. 52.223-18 Section 52.223-18 Federal Acquisition Regulations System... Text of Provisions and Clauses 52.223-18 Contractor Policy to Ban Text Messaging While Driving. As prescribed in 23.1105, insert the following clause: CONTRACTOR POLICY TO BAN TEXT MESSAGING WHILE...

  4. Generating Coherent Messages in Real-time Decision Support Exploiting Discourse Theory for Discourse Practice

    CERN Document Server

    Carberry, S; Carberry, Sandra; Harvey, Terrence

    1997-01-01

    This paper presents a message planner, TraumaGEN, that draws on rhetorical structure and discourse theory to address the problem of producing integrated messages from individual critiques, each of which is designed to achieve its own communicative goal. TraumaGEN takes into account the purpose of the messages, the situation in which the messages will be received, and the social role of the system.

  5. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  6. Patient-clinician mobile communication: analyzing text messaging between adolescents with asthma and nurse case managers.

    Science.gov (United States)

    Yoo, Woohyun; Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V; Gustafson, David H

    2015-01-01

    With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient-clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Mobile texting messaging has the potential to play an important role in patient-clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication.

  7. Message Correlation Analysis Tool for NOvA

    CERN Document Server

    CERN. Geneva

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic realtime correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the DAQ of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  8. Assisted entry mitigates text messaging-based driving detriment.

    Science.gov (United States)

    Sawyer, Benjamin D; Hancock, Peter A

    2012-01-01

    Previous research using cell phones indicates that manual manipulation is not a principal component of text messaging relating driving detriment. This paper suggests that manipulation of a phone in conjunction with the cognitive need to compose the message itself co-act to contribute to driving degradation. This being so, drivers sending text messages might experience reduced interference to the driving task if the text messaging itself were assisted through the predictive T9 system. We evaluated undergraduate drivers in a simulator who drove and texted using either Assisted Text entry, via Nokia's T9 system, or unassisted entry via the multitap interface. Results supported the superiority of the T9 system over the multitap system implying that specific assistive technologies can modulate the degradation of capacity which texting tragically induces.

  9. Advanced Steganography Algorithm using Encrypted secret message

    Directory of Open Access Journals (Sweden)

    Joyshree Nath

    2011-03-01

    Full Text Available In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al(1. For hiding secret message we have used a method proposed by Nath et al(2. In MSA(1 method we have modified the idea of Play fair method into a new platform where we can encrypt or decrypt any file. We have introduced a new randomization method for generating the randomized key matrix to encrypt plain text file and to decrypt cipher text file. We have also introduced a new algorithm for encrypting the plain text multiple times. Our method is totally dependent on the random text_key which is to be supplied by the user. The maximum length of the text_key can be of 16 characters long and it may contain any character(ASCII code 0 to 255. We have developed an algorithm to calculate the randomization number and the encryption number from the given text_key. The size of the encryption key matrix is 16x16 and the total number of matrices can be formed from 16 x 16 is 256! which is quite large and hence if someone applies the brute force method then he/she has to give trail for 256! times which is quite absurd. Moreover the multiple encryption method makes the system further secured. For hiding secret message in the cover file we have inserted the 8 bits of each character of encrypted message file in 8 consecutive bytes of the cover file. We have introduced password for hiding data in the cover file. We propose that our new method could be most appropriate for hiding any file in any standard cover file such as image, audio, video files. Because the hidden message is encrypted hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded cover file. This method may be the most secured method in digital water marking.

  10. Priority nutrition messages.

    Science.gov (United States)

    1991-01-01

    The Philippine Food and Nutrition Program deliver priority short, simple, clear, and action filled nutrition messages in different languages and dialects to different audiences. Its 1st priority task is to promote breast feeding. It informs mothers that breast milk is the most nutritious food for infants and that it protects them from infectious diseases. The program also encourages breast feeding as long as possible. If mothers cannot breast feed, they should talk to an infant nutrition expert to help them choose the best formula and learn about proper preparation. A 4-6 month infant needs to begin eating small amounts of semisolid nutritious foods. Moreover these foods must include body building foods, such as meat and eggs, and energy providing foods, such as corn and rice. Mothers must 1st attend to food needs of infants and preschoolers since they are more likely to suffer malnutrition than older children and adults. This is especially important when they suffer from an infection. Specifically, the very young need a variety of foods each day including the vitamin and mineral rich vegetables and fruits. In fact, families should grow their own fruits and vegetables to ensure an adequate supply. Hands must be cleaned with soap and water after defecation and before preparing foods. Mothers should add fats and oils when preparing foods because they provide concentrated energy, fatty acids, and fat soluble vitamins. Pregnant mothers must consume increased amounts of fish, beans, and other body building foods as well as regulating foods (vegetables and fruits). Mothers must also space births. They should weigh children each month to monitor nutritional levels. Moreover they must pay attention to signs indicating inadequate and insufficient food intake e.g., underweight and night blindness.

  11. 基于短消息平台的气象卫星业务维护管理系统%Business maintenance management system for meteorological satellite based on short message service platform

    Institute of Scientific and Technical Information of China (English)

    郭强; 谢利子; 赵磊; 康宁; 冯小虎

    2014-01-01

    为满足静止气象卫星地面应用系统的运行管理需求,保证业务系统的高可靠性和维护响应的高时效性,设计了一套基于短消息平台的业务维护管理系统。该系统由短消息平台、实时业务监测和自动维护管理三部分组成,能够实时监测多套卫星系统的业务关键点,及时发现业务故障和特殊事件,利用短消息平台实现消息的集中管理和即时发送,同时具备故障策略管理、维护调度管理和自动化维护响应等功能。实施效果表明该系统具备良好的适用性和可扩展性,能有效减轻维护管理人员的工作压力,为高时效和高可靠要求的大型系统维护管理工作提供有效的技术手段。%In order to meet the operation management requirement of geostationary meteorological satellite ground application system, the authors proposed a business maintenance management system based on short message service platform to guarantee high reliability of business system and high efficiency of maintenance response. The functions of this system included short message service platform, real-time monitoring and automatic maintenance management. The system can provide real-time monitoring service for multiple satellite systems, discover business faults and special events in time, and send the messages through short message service platform. It also has fault strategy management, maintenance dispatching management and automatic response functions. The application results show that the system has good extensibility and maintainability, can effectively reduce the pressure of maintenance personnel, and provide effective technical approach for maintenance management work of high reliability and high efficiency system.

  12. The classification on short message

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper discusses the importance of the classification of short message, and details some key technologies related. Through implementing a fundamental prototype, some basic models and technical references are provided.

  13. Text messaging during simulated driving.

    Science.gov (United States)

    Drews, Frank A; Yazdani, Hina; Godfrey, Celeste N; Cooper, Joel M; Strayer, David L

    2009-10-01

    This research aims to identify the impact of text messaging on simulated driving performance. In the past decade, a number of on-road, epidemiological, and simulator-based studies reported the negative impact of talking on a cell phone on driving behavior. However, the impact of text messaging on simulated driving performance is still not fully understood. Forty participants engaged in both a single task (driving) and a dual task (driving and text messaging) in a high-fidelity driving simulator. Analysis of driving performance revealed that participants in the dual-task condition responded more slowly to the onset of braking lights and showed impairments in forward and lateral control compared with a driving-only condition. Moreover, text-messaging drivers were involved in more crashes than drivers not engaged in text messaging. Text messaging while driving has a negative impact on simulated driving performance. This negative impact appears to exceed the impact of conversing on a cell phone while driving. The results increase our understanding of driver distraction and have potential implications for public safety and device development.

  14. 基于消息中间件的制造执行系统的设计与实现%DESIGN AND IMPLEMENTATION OF MESSAGE-ORIENTED MIDDLEWARE-BASED MANUFACTURING EXECUTION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    张政; 侍守创

    2016-01-01

    Through analysing the characteristics of traditional discrete manufacturing production and the advantages & disadvantages of manufacturing execution system (MES)at home and abroad in its user-defined degree and openness,combining the principle and mechanism of message-oriented middleware we proposed the message-oriented middleware-based MES architecture.The MES can realise functions such as distributed deployment,message service agent and unified messaging management.Besides,it has the key technologies including report self-defining,process self-defining,production lines virtualisation and manufacturing Kanban self-defining,etc.Through testing and acquiring the manufacturing Kanban information in the workshop manufacturing and processing spare parts of ahead blind flange of engines,it is proved that the design of MES based on message-oriented middleware can provide efficient and reliable solution for the production mode with multiple varieties and small batch.%通过分析传统离散型制造的生产特点以及国内外制造执行系统(MES)在自定义程度和开放性等方面的优缺点,结合消息中间件原理机制,提出基于消息中间件的 MES 体系结构。该 MES 可实现分布式部署、消息服务代理和消息统一管理等功能,具有报表自定义、流程自定义、产线虚拟化及生产看板自定义等关键技术。通过对发动机前盖板零部件加工生产车间的生产看板信息的测试获取,证明基于消息中间件的 MES 设计能够为多品种小批量的生产模式提供高效可靠的解决方案。

  15. RESEARCH ON kNN METHOD FOR SHORT MESSAGES FILTERING SYSTEM WITH UNBALANCED TRAINING SET%不均衡训练集下短信过滤系统 kNN方法的研究

    Institute of Scientific and Technical Information of China (English)

    徐山; 杜卫锋

    2013-01-01

    The overrunning of the unwanted short messages seriously impacts the social ethos and disrupts the normal life order of people .It has considerable practical value to research and develop the filtering technology of harmful short messages .In this paper, ICTCLAS segmentation system developed by the Institute of Computing Technology of CAS is applied to realise the transition of short message text to the eigenvectors in combination with keywords extraction using TFIDF word right metrics , then the kNN method is adopted to realise the discriminant of short messagescategories, thus the filtration of bad short messages is realised .In addition, according to the unbalanced distribution of training set, we apply the density-based improved method to solve the case of original classification results which are prone to the categories of big sample quite efficiently.Experiments show that the accuracy rate of the improved method reaches about 79.18%, a 1.23% increase compared with the originalmethod.This method is able to more effectively filter the unwanted short messages , and has certain practical value .%不良短信的泛滥,严重影响了社会风气,干扰了人们正常的生活秩序,研发不良短信过滤技术具有相当的实用价值。应用中科院计算所研制开发的ICTCLAS分词系统,结合TFIDF词权度量指标提取关键词,实现短信文本到特征向量的转换,然后采用kNN方法实现短信的类别判断,从而实现不良短信的过滤。另外,针对训练集分布不均衡的情况,应用基于密度的改进方法,较为有效地处理了原来分类结果倾向于大类别样本的情况。实验表明,改进后的方法的准确率约79.18%,比原方法提升了约1.23%。该方法能够比较有效地过滤不良短信,具有一定的实用价值。

  16. Clandestine Message Passing in Virtual Environments

    Science.gov (United States)

    2008-09-01

    Steganography Hiding messages in pictures, audio , packets Place messages in clothing textures, object files Bots Automate the logic and control of...information will be developed along with proof of concepts. Visual cues, steganography and autonomous bots will be examined. Monitoring techniques are...14. SUBJECT TERMS Message Passing, Virtual Environments, Steganography , Second Life, Internet Terrorism, Honeyworld, Sun MPK20, Clandestine Messages

  17. Short-Message Quantize-Forward Network Coding

    CERN Document Server

    Kramer, Gerhard

    2011-01-01

    Compression via quantization and hashing lets relays form distributed "multi-output" nodes of a multi-input, multi-output (MIMO) system. Recent work shows that quantize-forward (QF) with long-message encoding and decoding achieves the same reliable rates as short-message compress-forward (CF). It is shown that short-message QF with backward or pipelined (sliding-window) decoding also achieve the same rates for a single-relay channel. The price paid is a more restrictive quantization that degrades performance for slow-fading channels with outage. For many relays and sources, short-message QF with backward decoding achieves the same rates as long-message QF, although again with a more restrictive quantization. Several practical advantages of short-message encoding are pointed out, e.g., reduced delay (enabling streaming) and simplified modulation (without requiring additional hashing). Furthermore, short-message encoding lets relays use decode-forward (DF) if their channel quality is good, and therefore enables...

  18. Research and Implementation of Short Message Technology in Traffic Condition Publishing System%短消息在交通信息发布系统中的应用与研究

    Institute of Scientific and Technical Information of China (English)

    郑林江; 王锦锦; 廖孝勇; 马庆禄

    2011-01-01

    Based on the advanced Traffic Data Collection System and combined with individuation and diversification demand of travelers, the dynamic short message publishing mode for the city real-time traffic information has been studied in order to meet the travelers' demands for traffic information. In view of Short Message Gateway Interface Protocol,employing self-defining application layer protocol,as well as the designed two serving ways of publishing which include servo and push modes,a better cooperation performance of mobile phone terminal and transportation information platform is exhibited. The real-time dynamic short message publishing system, which was built on the base of the Java - open source software, extends the existing basic functions of Traffic Information Publishing System.%为满足出行者时实时交通信息的需求,在已获得交通信息的基础上,结合出行者需求的个性化、多样化等特点,研究了实时交通信息的短消息动态发布模式.以通用SMIP协议为承载,采用自定义的应用层协议;设计伺服和推送两种发布服务方式,达到更好的手机终端与交通信息平台之间的信息协同效果.最后,以Java开源软件为平台开发交通信息的短消息动态发布子系统,使已有交通信息发布系统的基本功能得到进一步的拓展.

  19. Design and Implementation of Android System Short Message Encryption based on 3DES and RSA%基于3DES和RSA的Android系统短信加密设计与实现

    Institute of Scientific and Technical Information of China (English)

    马玉琢; 郭玉翠

    2016-01-01

    Android System, as an open source system, is more and more popular.At the same time, its security and user privacy face a great challenge.This paper puts forward an encryption scheme to protect the privacy of short mes-sage. Starting from the overall architecture and hierarchical idea of Android system, a new encryption scheme based on the hybrid encryption algorithm is proposed in this paper through the analysis and research on the 3DES symmetric encryption algorithm and RSA non symmetric encryption algorithm. The process of realizing algorithmis introduced in detail. The test by using the Android simulator to send and receive the short message proves the feasibility of the short message encryption scheme.%Android系统作为开源的系统,受到越来越多的青睐,同时其安全性及用户的隐私也受到了极大的考验。本文提出了一种针对短信隐私保护的加密方案。从 Android 系统的整体架构及分层思想出发,通过对3DES 对称加密算法及 RSA非对称加密算法的原理进行分析与研究,提出了一种新型的针对 Android系统的混合加密算法的短信加密方案,详细地介绍了具体的实现过程。使用Android模拟器进行的收发仿真实验,证明了短信加密方案的可行性。

  20. Pilot and feasibility test of adolescent-controlled text messaging reminders.

    Science.gov (United States)

    Britto, Maria T; Munafo, Jennifer Knopf; Schoettker, Pamela J; Vockell, Anna-Liisa B; Wimberg, Janet A; Yi, Michael S

    2012-02-01

    This pilot study assessed the feasibility, acceptability, and utility of a text messaging system that allowed teenagers with asthma to generate and control medical reminders sent to their mobile phones. The 12 teens in the study group were able to create their own reminder text messages, add or change reminders, and determine when and how often the messages were sent to their cell phone. In total, 18 of the 21 unique messages created were reminders to take medication. No teen made changes to their original text messages or delivery schedule on their own. They gave high ratings on the usefulness, acceptability, and ease of use of the text messaging system. Self-reported asthma control at baseline was similar for both the study and comparison groups and did not change significantly. Allowing teens to control the timing and content of reminder text messages may support self-management of chronic disease.

  1. Design and Implementation of the Message Push Function of Real-time Based on DNC Workshop System%DNC车间管理系统的消息实时推送功能的设计与实现∗

    Institute of Scientific and Technical Information of China (English)

    安涛; 胡毅; 张腾飞; 王帅; 郭安

    2016-01-01

    In the process of industrial control ,the acquisition of a variety of real-time messages are increas-ingly demanding, the push mechanism are more important on mobile application development. As for sol-ving the overload problem of data update at job shop manage systems, we design and implement a data transfer system ,which mainly depend on a message push mechanism, based on the Distributed Numerical Control( DNC) system in the analysis of traditional push mechanism’ insufficient. In our system, users only choose the messages that need to send instead of every information which may contain some useless informa-tion, aim to improve the real-time performance and reliability, cater the user’ s experience, finally make the message transmission much more humility.%在工业控制过程中,各种数据消息的获取的实时性要求越来越高,推送功能在手机应用开发中显得越来越重要。文章在分析了传统推送功能不足的前提下,在实现了DNC车间管理系统的基础上,设计并实现了车床状态消息实时推送的功能,有效的解决了车间管理系统消息实时更新带来的客户端的负荷问题。用户可以自己选择要接收的消息,避免了传统消息推送中过多的无效消息,有效的提高了对车间进行监控的实时性和可靠性,增加用户的体验感,提供更加人性化的推送。

  2. Direct Deposit -- When Message Passing Meets Shared Memory

    Science.gov (United States)

    2000-05-19

    by H. Karl in [64]. The paper implements the pure DSM code, the pure message passing code and a few intermediate forms on the Charlotte DSM system [8...ASPLOS VI), pages 51–60, San Jose, October 1994. ACM. [64] H. Karl . Bridging the gap between distributed shared memory and message passing. Concurrency...pages 94 – 101, 1988. [73] P.N. Loewenstein and D.L. Dill. Verification of a multiprocessor cache protocol using simulation relations and higher-order

  3. Math on MXit: the medium is the message

    CSIR Research Space (South Africa)

    Butgereit, L

    2007-07-01

    Full Text Available are delivered and received immediately. Instant messaging systems have already successfully been used at university level in distance learning situations [5]. Instant messaging is considered a state-of-the-art communication method. A North West province... with one tutor. As the project grew, however, we recruited tutors from the University of Pretoria. The Faculty of Engineering, Built-Environment and Information Technology have a compulsory module for all undergraduates which...

  4. Physics/computer science. Passing messages between disciplines.

    Science.gov (United States)

    Mézard, Marc

    2003-09-19

    Problems in computer science, such as error correction in information transfer and "satisfiability" in optimization, show phase transitions familiar from solid-state physics. In his Perspective, Mézard explains how recent advances in these three fields originate in similar "message passing" procedures. The exchange of elaborate messages between different variables and constraints, used in the study of phase transitions in physical systems, helps to make error correction and satisfiability codes more efficient.

  5. ZeroMQ: Messaging Made Simple

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  6. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  7. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  8. Design and Implementation of Secret Message Monitoring and Analysis System for Android Mobile Phone%面向android手机的涉密短信监控与分析系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    石子言; 赵国林; 刘剑豪

    2014-01-01

    In today's mobile phone short message not only brought convenience, but also brings security risks, the main security problems reflected in the mobile phone user security awareness is not strong, the message content relates to security sensitive in⁃formation, such as the internal information of enterprise, government and other confidential information. This paper mainly intro⁃duces the design and implementation of a Android oriented mobile phone secret SMS monitoring and analysis system, the system adopts a proactive defense thought, constructed by the secret message monitoring short message security monitoring subsystem and the server of the mobile phone client and analysis subsystem SMS monitoring and analysis platform for effective monitoring and management how to send SMS to achieve efficient access, is the focus of this research.%当今手机短信不仅给人们带来了方便,同时也带来了安全隐患,主要安全问题体现在手机使用者安全防范意识不强,短信内容涉及一些安全敏感信息,如企业内部资料信息,政府保密资料等。该文主要介绍了一个面向android手机的涉密短信监控与分析系统的设计与实现,该系统采用了一种积极主动的防御思想,构建了由手机客户端的短信安全监测子系统和服务端的涉密短信监控与分析子系统构成的短信监控和分析平台,如何对手机短信的发送情况进行有效的监控和管理,实现高效访问是本文的研究重点。

  9. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)

    Science.gov (United States)

    Xu, Ke; Liao, Yongjian; Qiao, Li

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely. PMID:26629817

  10. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

    Science.gov (United States)

    Xu, Ke; Liao, Yongjian; Qiao, Li; Liu, Zhangyun; Yang, Xiaowei

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely.

  11. Snap-Stabilizing Linear Message Forwarding

    CERN Document Server

    Lamani, Anissa; Dubois, Swan; Petit, Franck; Villain, Vincent

    2010-01-01

    In this paper, we present the first snap-stabilizing message forwarding protocol that uses a number of buffers per node being inde- pendent of any global parameter, that is 4 buffers per link. The protocol works on a linear chain of nodes, that is possibly an overlay on a large- scale and dynamic system, e.g., Peer-to-Peer systems, Grids. . . Provided that the topology remains a linear chain and that nodes join and leave "neatly", the protocol tolerates topology changes. We expect that this protocol will be the base to get similar results on more general topologies.

  12. Automatic Sarcasm Detection in Twitter Messages

    OpenAIRE

    Ræder, Johan Georg Cyrus Mazaher

    2016-01-01

    In the past decade, social media like Twitter have become popular and a part of everyday life for many people. Opinion mining of the thoughts and opinions they share can be of interest to, e.g., companies and organizations. The sentiment of a text can be drastically altered when figurative language such as sarcasm is used. This thesis presents a system for automatic sarcasm detection in Twitter messages. To get a better understanding of the field, state-of-the-art systems fo...

  13. Polymorphic Endpoint Types for Copyless Message Passing

    Directory of Open Access Journals (Sweden)

    Viviana Bono

    2011-07-01

    Full Text Available We present PolySing#, a calculus that models process interaction based on copyless message passing, in the style of Singularity OS. We equip the calculus with a type system that accommodates polymorphic endpoint types, which are a variant of polymorphic session types, and we show that well-typed processes are free from faults, leaks, and communication errors. The type system is essentially linear, although linearity alone may leave room for scenarios where well-typed processes leak memory. We identify a condition on endpoint types that prevents these leaks from occurring.

  14. Short message aided NAT traversal for mobile P2 P system%短信辅助的移动对等系统NAT穿越

    Institute of Scientific and Technical Information of China (English)

    黄保华; 谢统义

    2014-01-01

    In order to resolve the problem that smart phone terminals isolated by NAT devices can not communicate through network in Peer-to-Peer model, a short message aided ICE protocol named SMAICE is proposed. Because short messages can be sent between smart phones directly, the proto-col can help the negotiation procedure of ICE to simplify the function of rendezvous server and re-duce the demands of the server. The design, program and testing of SMAICE based on Android plateform show that SMAICE has simple negotiation procedure and is easy to implement. Multiple times of NAT traversal tests with commonly used softwares are suceessful, which means that SMAICE has high success rate in NAT traversal.%为了解决被NAT设备隔离的智能手机终端难以进行对等网络通信的问题,设计了短信辅助的ICE协议SMAICE。该协议利用手机短信可在终端间直达的特性,用短信辅助ICE协商过程,能够简化集结服务器功能并降低对服务器的要求。基于Android平台的系统设计、编程实现和测试结果表明:SMAICE交互过程简单,容易编程实现;常用软件的多次NAT穿越测试均获成功,因此该协议具有很高的NAT穿越成功率。

  15. Message framing, it does a body good: effects of message framing and motivational orientation on young women's calcium consumption.

    Science.gov (United States)

    Gerend, Mary A; Shepherd, Melissa A

    2013-10-01

    We investigated the effects of gain-framed versus loss-framed messages and motivational orientation on calcium consumption. After completing a motivational orientation scale (behavioral inhibition system/behavioral activation system), undergraduate women (N = 141) were randomly assigned to read a gain-framed or loss-framed pamphlet promoting calcium consumption. Calcium consumption was assessed 1 month later. For calcium supplement behavior, a gain-framed advantage was observed for behavioral activation system-oriented individuals, whereas a loss-framed advantage was observed for behavioral inhibition system-oriented individuals. For dietary calcium intake, a gain-framed advantage was observed among behavioral activation system-oriented individuals; however, no framing effect emerged for behavioral inhibition system-oriented individuals. The success of framed messages depends on the message recipient's motivational orientation.

  16. Hierarchical message bus-based software architectural style

    Institute of Scientific and Technical Information of China (English)

    张世琨; 王立福; 杨芙清

    2002-01-01

    As the size and complexity of software systems increase,the design and specification of overall system structure become more significant issues than the choice of algorithms and data structures of computation.An appropriate architecture for a system is a key element of its success.Based on the practice of Jadebird software production line,this paper proposes a software architectural style based on hierarchical message buses,named JB/HMB.In this style,the component model consists of external interfaces,static structure and dynamic behavior,which depicts a component from different aspects.Supported by message buses,components interact with one another by messages,which can be used to describe distributed and concurrent systems well.JB/HMB style supports stepwise decomposition and refinement,and runtime system evolution.Finally,characteristics of JB/HMB style are summarized as a conclusion,and future research directions are specified.``

  17. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  18. Applications of quantum message sealing

    CERN Document Server

    Worley, G G

    2005-01-01

    In 2003, Bechmann-Pasquinucci introduced the concept of quantum seals, a quantum analogue to wax seals used to close letters and envelopes. Since then, some improvements on the method have been found. We first review the current quantum sealing techniques, then introduce and discuss potential applications of quantum message sealing, and conclude with some discussion of the limitations of quantum seals.

  19. Message from the Editor

    OpenAIRE

    Haque, Abida K.; Samadani, Ayaz M.; Syed, Labiq Hossain; Ahmed, Syed; Abdel-Ghany, Naima; Nadeemullah, Mohammad; Zahir, Khalique; Bawani, Mohammad H.; Bawany, Muhammed Z.; Akmal, Mohammad; Arutyounian, N.; Kaptein, Elain M.; Khan, Sumiya; Saeed, Ziena; Diwan, Hanifa Hameed

    2011-01-01

    Objective: To study the prevalence of cardiac and pulmonary and other organ system diseases in obese patients. For the past several decades, the global prevalence of obesity has been rising, with the greatest increase seen in the United States. Recent data indicate that 190 million Americans are either obese or overweight. The treatment of obesity-related diseases is estimated to be $147 billion a year. Between 280,000 and 325,000 deaths annually are attributable to obesity. Left ventricular ...

  20. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  1. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages art_science/2003>. Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  2. 基于NS3的分布式消息系统 Kafka的仿真实现%Simulate and Implement of Kafka distributed message system based on NS3

    Institute of Scientific and Technical Information of China (English)

    马浩然

    2015-01-01

    As data has penetrated into most fields of our life,the use of Data mining is more frequently. Distributed messaging system, which shares data on message basis,become the core technology gradually. With the extreme growing of information recently, the traditional system which focus on small account of data, cannot meet our demands for data processing. A high-throughput distributed messaging system with the function of real-time consumption become necessary. Kafka is such arequirement. This paper summarizes the characteristics and framework design of Kafka, then modelswith the network simulator tool NS3 and simulates the behavior of actual system, at last make conclusion through analysis the simu-lation result in order to realize and evaluate Kafka.%在数据已渗透到我们生活的各个领域的时代,人们对于数据的挖掘和使用愈发频繁。作为以消息为单位进行数据共享的分布式架构,分布式消息系统成为数据处理的核心技术。传统的分布式消息系统大多用于处理数据量小的关键性数据,然而在信息剧增的今天,人们对信息的关注领域在不断扩大,挖掘的信息量在不断增多,传统的消息处理架构已不能满足我们对数据的处理需求,一个高吞吐量,可实时消费的高性能分布式消息系统成为必需。Kafka 即是一种处理海量数据的分布式消息系统[1]。本文总结了Kafka系统的特征和架构策略,对其进行抽象建模,通过网络仿真工具NS3[2],设计实际系统的场景部署,最后运行仿真系统,得出数据并分析,以帮助我们理解和评估Kafka分布式消息系统。

  3. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  4. Language Models for Handwritten Short Message Services

    CERN Document Server

    Prochasson, Emmanuel Ep; Morin, Emmanuel

    2009-01-01

    Handwriting is an alternative method for entering texts composing Short Message Services. However, a whole new language features the texts which are produced. They include for instance abbreviations and other consonantal writing which sprung up for time saving and fashion. We have collected and processed a significant number of such handwriting SMS, and used various strategies to tackle this challenging area of handwriting recognition. We proposed to study more specifically three different phenomena: consonant skeleton, rebus, and phonetic writing. For each of them, we compare the rough results produced by a standard recognition system with those obtained when using a specific language model.

  5. Do oral messages help visual search?

    CERN Document Server

    Carbonell, Noëlle

    2005-01-01

    A preliminary experimental study is presented, that aims at eliciting the contribution of oral messages to facilitating visual search tasks on crowded visual displays. Results of quantitative and qualitative analyses suggest that appropriate verbal messages can improve both target selection time and accuracy. In particular, multimodal messages including a visual presentation of the isolated target together with absolute spatial oral information on its location in the displayed scene seem most effective. These messages also got top-ranking ratings from most subjects.

  6. 基于一种固定电话监测终端的挂机短信系统设计%Design of on-hook message system based on fixed-line telephone monitoring terminal

    Institute of Scientific and Technical Information of China (English)

    李本龙; 李欣

    2015-01-01

    固定电话在政府、企事业单位、家庭广泛应用,其是最大众化的公众通信工具和接入门户。固定电话的拥有者通常需要在通话结束时以短信的形式给对方传递一种信息。在已设计的以ATmega16单片机为核心的固定电话监测终端硬件平台的基础上实现挂机短信系统设计。该系统采用无连接的UDP协议以及自定义的TCP/IP模型应用层协议实现监测终端和实时监控软件网络通信。监测终端将检测到的PSTN网络中固定电话端的信令转换成数据包发送到实时监控软件进行处理,从而实现短信触发和话务的电子化管理。%The fixed⁃line telephone which is a most popular communication tool and public access portal is widely used in the government,enterprises and families. Owners of fixed⁃line telephone usually convey a message to the others at the time of hanging up telephone. On the hardware platform of the fixed⁃line telephone monitoring terminal which takes ATmega16 microcon⁃troller as the core,a kind of on⁃hook massage system was designed. In the system,the monitoring terminal communicates with the real⁃time monitoring software by the UDP which is the TCP/IP transport layer protocol and the custom TCP/IP application lay⁃er protocol. The fixed⁃line telephone monitoring terminal converts signaling which has been detected at the telephone in the PSTN network into data packets,and then transmits them to the real⁃time monitoring software. The real⁃time monitoring software handles them,and then triggers messages. Therefore the system has the functions of sending messages and electronization manag⁃ing calling.

  7. Prevalence and Risk Profile Of Unread Messages To Patients In A Patient Web Portal

    Science.gov (United States)

    Mostaghimi, A.; O’Brien, J.; Bajracharya, A.; Safran, C.; Landon, B.E.

    2015-01-01

    Summary Background Excitement around the adoption of electronic communication between physicians and patients is tempered by the possibility of increased clinical and legal risk. If patients do not read messages in a timely fashion, duplicative communication efforts may be required and patient safety may be jeopardized. Objective We sought to assess the prevalence and risk profile of unread messages in a mature patient portal. Methods We analyzed six years of messages (2005–2010) from physicians to patients to determine the prevalence and associated characteristics of unread messages in a patient portal. We focused on clinical messages, and excluded announcements. Because some physicians sent clinical messages to groups of patients, we labeled messages sent to more than 5 patients as “outreach” messages and excluded them from general analyses. We performed a chart review of 75 clinical messages to assess for harm. Results We found that 3% of clinical messages were unread after 21 days. Messages arriving outside of business hours were slightly more likely to go unread (RR 1.15 95% CI 1.11–1.19). Patients who were male (OR 1.14 CI 1.04–1.26) African American (OR 1.69 CI 1.29–2.22) or Hispanic (OR 1.74 CI 1.17–2.59), or in the lowest income group (OR 1.72 CI 1.19–2.49) were more likely to have unread messages. Chart review showed no evidence of harm, but 13% of sampled unread messages were associated with potential delays in care. Incidentally, we found 50% of the physician-initiated outreach messages were unread. Conclusions Overall, secure messaging appears a safe form of communication, but systems to notify senders when messages are unread may have value. While most clinical messages were read, many outreach messages were not, providing caution for relying on such systems for information dissemination. Similar to other studies, differences by race and income were observed and require further study. PMID:26171082

  8. Intelligent controller system about oil machine based on short message service%基于手机短消息的无线智能油机监控系统

    Institute of Scientific and Technical Information of China (English)

    张敬普; 郑均辉

    2012-01-01

    基于手机短消息的通讯方式,它具有开发方便、费用低、免维护、可靠性高等特点。文中介绍了笔者开发的一套基于手机短消息的远程无线监控系统,该系统能够实时在线监测油机的参数,能及时发现故障并报警。文中对通讯方式、系统结构、工作原理及软件构成进行了详细的说明,并给出了其中关键的程序。结果表明,该系统可以准确、实时地实现GSM网络的远程数据传输。%The communication method based on short message service has the merits of easy development, low cost, free service and high reliability. In this paper a newly developed remote wireless control system based on short message service is introduced. The real-time online monitoring of oil machine parameters includes a variety of reahime fault diagnosis, timely detection and alarm. It focuses on the introduction of the working principle, system components, functions and software to achieve key code. The results indicated that this system can realize accurate and real time remote data transmission by GSM networks.

  9. 基于消息重发的电信在线计费系统可靠性提升研究%Research on Enhancement of Reliability of Telecom Online Charging System Based on Message Retransmission

    Institute of Scientific and Technical Information of China (English)

    敖锦蓉; 王小峰; 古英杰; 周卫星

    2016-01-01

    The enhancement method of reliability of telecom online charging system (OCS) was studied in this paper. The enhancement of reliability of OCS brought by message retransmission mechanism was analyzed from aspects of system architecture, service lfow, concurrency pressure and system deployment. A architecture design of OCS based on both message retransmission and buffer was presented, which was technically verified and supported. It not only provides a technical reference to enterprise to build reliable OCS, but also well supports the real-time billing requirements of telecom operators in the era of Internet.%通过对电信在线计费系统可靠性提升方法的研究,分别从系统架构、业务流程、并发压力、系统部署等方面进行剖析,论证了引入消息重发机制对在线计费系统可靠性带来的提升,提出了基于消息重发和缓存的在线计费系统架构设计,并得到充分的技术验证支撑,为企业构建高可靠性的在线计费系统提供技术参考,同时较好地支持了互联网时代下电信运营商实时计费需求。

  10. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  11. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  12. The mushroom message.

    Science.gov (United States)

    Zimmerman, M

    1992-04-28

    A basic law of ecology is that living things are tightly dependent on one another, often in ways that are not easy to imagine. Who, for example, would have predicted that when the last dodo was killed in 1675, that death would lead to the slow extermination of the tambalocoque tree, whose fruits germinate only after passing through the dodo's digestive system? Now no natural strands of tambalocoque younger than 300 years can be found. Or who would have predicted that clear-cutting tropical rainforests would so significantly alter local weather patterns that the tropical rainforest biome itself and its vast diversity of life might not survive? Such interactions are worth noting because of the possible ramifications of a phenomenon that ecologists have just begun to document. Mushrooms worldwide appear to be in a catastrophic state of decline. Throughout Europe, in countries with terrains as diverse as Holland, Germany, Austria, Czechoslovakia, Poland and England, wild mushrooms are becoming increasingly difficult to find. Those fungi that are found are significantly smaller than those found years ago. Preliminary data suggest that the same troubling situation is occurring throughout North American as well. The decline has been so precipitous that biologists have begun to refer to it as a mass extinction. The 2 obvious explanations for the demise of the mushrooms--habitat destruction and overpicking of edible types by an ever growing human population--have been ruled out. Sophisticated sampling schemes designed by ecologists control for the fact that there is less land available for wild mushrooms; they have been declining at a rate that far exceeds the rate at which land is being developed. The fact that the decline has affected both edible and inedible mushrooms equally indicates that humans hunting for tasty treats are not the main cause of the problem. The loss of wild mushrooms worldwide might not seem like that big a deal, but the consequences may well be grave

  13. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  14. Translating Message Sequence Charts to other Process Languages using Process

    DEFF Research Database (Denmark)

    Lassen, Kristian Bisgaard; van Dongen, Boudewijn F.

    2008-01-01

    Message Sequence Charts (MSCs) are a well known language for speci- fying scenarios that describe how different actors (e.g., system components, people, or organizations) interact. MSCs are often used as a starting point for software analysts to discuss the behavior of a system with different...

  15. A Broadcasting Scheme for Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Ravindra J. Makwana

    2015-02-01

    Full Text Available Vehicular Ad hoc Networks [VANET] is one of the fastest emerging technologies for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular communication systems developed largely by the growing interest in intelligent transportation systems [ITS]. Cooperative driving can improve safety and efficiency by enabling vehicles to exchange emergency messages to each other in the neighborhood and to assist driver in making proper decision to avoid vehicle collisions and congestion. Broadcast transmission is usually used for disseminating safety related information among vehicles. Message Broadcast over wireless networks poses many challenges due to link unreliability, hidden terminal, message redundancy, and broadcast storm, etc., which greatly degrade the network performance. In most of the emergency situations, there is less time to make a handshake with other nodes in the networks, as the emergency message is to be delivered fast and efficient. Broadcasting information is usually very costly and without limiting techniques this will result in serious data redundancy, contention and collisions. This work focuses on Broadcasting Scheme for Message Dissemination.

  16. Patient–Clinician Mobile Communication: Analyzing Text Messaging Between Adolescents with Asthma and Nurse Case Managers

    Science.gov (United States)

    Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V.; Gustafson, David H.

    2015-01-01

    Abstract Background: With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient–clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. Materials and Methods: We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Results: Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Conclusions: Mobile texting messaging has the potential to play an important role in patient–clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication. PMID:25401324

  17. Two-way text messaging: an interactive mobile learning environment in higher education

    Directory of Open Access Journals (Sweden)

    H.K. Salinda Premadasa

    2016-11-01

    Full Text Available Short messaging service (SMS is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can be integrated into a learning management system (LMS to provide an interactive learning experience to the user community. Initially, a database is integrated into the LMS that holds message information such as recipient's phone number, message body and user data header. A specific port associated with the SMS is used to conceal and exchange data of a particular course unit. Subsequently, software in the student's mobile device captures this message and sends back the reply message to the appropriate course unit allowing both teachers and students to view messages sent and replies received pertaining to a particular course. Results indicate the educational impact of the proposed system in improving the learning environment and benefits it offers to the community in a campus-wide implementation.

  18. A Method for Detecting and Blocking Instant Messaging Software

    Directory of Open Access Journals (Sweden)

    Hao Zhang

    2013-10-01

    Full Text Available Instant messaging software, as a convenient network communication tool, is becoming more and more popular. At the same time, it also brings risks in security of local area network (LAN. Through studying in typical instant messaging software and detected by the combination of misuse detection and protocol analysis, an architecture of detecting and blocking mechanism of instant messaging software is proposed in this paper and its prototype system is achieved on Windows platform. This new system effectively solves the problems that the efficiency of traditional firewall application layer data filtering is low and the firewall cannot dynamically adjust the filtering rules, providing a good application value for the protection of the security of local area network.  

  19. Short message service or disService: issues with text messaging in a complex medical environment.

    Science.gov (United States)

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  20. Detecting the Incorrect Safety Message in VANETS

    Directory of Open Access Journals (Sweden)

    Huibin Xu

    2013-05-01

    Full Text Available There always are some vehicles (nodes to demonstrate various misdemeanours, such as, modifying data, transmitting fraudulent data about road congestion or vehicle, due to the distinct characteristics of Vehicular Ad-Hoc Networks (VANETs. Those malicious data from safety message have the potential to damage in VANETs. Therefore, the received safety message should be verified before the message is accepted and relayed. In this study, we address the challenge by detecting incorrect safety message. We propose a novel approach to deal with evaluating the trustworthiness of safety message reported by neighbor vehicles by detecting the consistency between the actions and the words (safety message. If it is inconsistent, the safety message is recognized as incorrect message; otherwise, the message is accepted and relayed. Moreover, the safety precaution is considered to protect itself and minimize the losses. Simulation results show that our proposed method can detect effectively the incorrect safety message. The detection ration is about 90% when the number of malicious vehicles is small.

  1. Regulatory fit messages and physical activity motivation.

    Science.gov (United States)

    Pfeffer, Ines

    2013-04-01

    Targeted communication about health behaviors seems to be more effective than mass communication in which undifferentiated audiences receive identical messages. Regulatory focus is psychological variable that can be used to build two target groups: promotion-focused or prevention-focused people. It is hypothesized that targeting messages to an individual's regulatory focus creates regulatory fit and is more successful to promote a physically active lifestyle than nonfit messages. Two different print messages promoting a physically active lifestyle derived from regulatory focus theory (promotion message vs. prevention message) were randomly assigned to N = 98 participants after measuring their regulatory focus. It was examined whether regulatory fit between the regulatory focus and the assigned print message would lead to more positive evaluations in the dependent variables inclination toward the message (preference for the message), intention to perform the behavior, prospective and retrospective feelings associated with the behavior (positive and negative), and perceived value of the behavior directly after reading the message. Hierarchical linear regression analyses revealed that regulatory fit led to stronger intentions in the prevention-message condition and more prospective positive and retrospective positive feelings associated with the behavior in the promotion-message condition in contrast to the nonfit conditions. Prospective positive feelings associated with the behavior mediated the effect of regulatory fit on intention. The results partly provided support for the regulatory fit concept. Matching print messages to the regulatory focus of individuals seems to be a useful approach to enhance physical activity motivation. Future studies should include an objective measure of physical activity behavior.

  2. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  3. Spam Short Messages Detection via Mining Social Networks

    Institute of Scientific and Technical Information of China (English)

    Jian-Yun Liu; Yu-Hang Zhao; Zhao-Xiang Zhang; Yun-Hong Wang; Xue-Mei Yuan; Lei Hu; Zhen-Jiang Dong

    2012-01-01

    Short message service (SMS) is now becoming an indispensable way of social communication,and the problem of mobile spam is getting increasingly serious. We propose a novel approach for spam messages detection. Instead of conventional methods that focus on keywords or flow rate filtering,our system is based on mining under a more robust structure:the social network constructed with SMS.Several features,including static features,dynamic features and graph features,are proposed for describing activities of nodes in the network in various ways.Experimental results operated on real dataset prove the validity of our approach.

  4. Cognitive Interference Channels with Confidential Messages under Randomness Constraint

    CERN Document Server

    Watanabe, Shun

    2012-01-01

    The cognitive interference channel with confidential messages (CICC) proposed by Liang et. al. is investigated. When the security is considered in coding systems, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. For the CICC, the trade-off between the rate of the random number to realize the stochastic encoding and the communication rates is investigated, and the optimal trade-off is completely characterized.

  5. Probabilistic Priority Message Checking Modeling Based on Controller Area Networks

    Science.gov (United States)

    Lin, Cheng-Min

    Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.

  6. Efficiently passing messages in distributed spiking neural network simulation.

    Science.gov (United States)

    Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan

    2013-01-01

    Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.

  7. Clinical data exchange standards and vocabularies for messages.

    Science.gov (United States)

    Huff, S M

    1998-01-01

    Motivation for the creation of electronic data interchange (message) standards is discussed. The ISO Open Systems Interface model is described. Clinical information models, message syntax and structure, and the need for a standardized coded vocabulary are explained. The HIPAA legislation and subsequent HHS transaction recommendations are reviewed. The history and mission statements of six of the most popular message development organizations (MDOs) are summarized, and the data exchange standards developed by these organizations are listed. The organizations described include Health Level Seven (HL7), American Standards for Testing and Materials (ASTM) E31, Digital Image Communication in Medicine (DICOM), European Committee for Standardization (Comité Européen de Normalisation), Technical Committee for Health Informatics (CEN/TC 251), the National Council for Prescription Drug Programs (NCPDP), and Accredited Standards Committee X12 Insurance Subcommittee (X12N). The locations of Internet web sites for the six organizations are provided as resources for further information.

  8. Efficiently passing messages in distributed spiking neural network simulation

    Directory of Open Access Journals (Sweden)

    Corey Michael Thibeault

    2013-06-01

    Full Text Available Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI. A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid-method for spike exchange was implemented and benchmarked.

  9. Control mechanism to prevent correlated message arrivals from degrading signaling no. 7 network performance

    Science.gov (United States)

    Kosal, Haluk; Skoog, Ronald A.

    1994-04-01

    Signaling System No. 7 (SS7) is designed to provide a connection-less transfer of signaling messages of reasonable length. Customers having access to user signaling bearer capabilities as specified in the ANSI T1.623 and CCITT Q.931 standards can send bursts of correlated messages (e.g., by doing a file transfer that results in the segmentation of a block of data into a number of consecutive signaling messages) through SS7 networks. These message bursts with short interarrival times could have an adverse impact on the delay performance of the SS7 networks. A control mechanism, Credit Manager, is investigated in this paper to regulate incoming traffic to the SS7 network by imposing appropriate time separation between messages when the incoming stream is too bursty. The credit manager has a credit bank where credits accrue at a fixed rate up to a prespecified credit bank capacity. When a message arrives, the number of octets in that message is compared to the number of credits in the bank. If the number of credits is greater than or equal to the number of octets, then the message is accepted for transmission and the number of credits in the bank is decremented by the number of octets. If the number of credits is less than the number of octets, then the message is delayed until enough credits are accumulated. This paper presents simulation results showing delay performance of the SS7 ISUP and TCAP message traffic with a range of correlated message traffic, and control parameters of the credit manager (i.e., credit generation rate and bank capacity) are determined that ensure the traffic entering the SS7 network is acceptable. The results show that control parameters can be set so that for any incoming traffic stream there is no detrimental impact on the SS7 ISUP and TCAP message delay, and the credit manager accepts a wide range of traffic patterns without causing significant delay.

  10. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Satyam Mukherjee; Neelima Gupte

    2008-06-01

    We study message transfer in a 2-d communication network of regular nodes and randomly distributed hubs. We study both single message transfer and multiple message transfer on the lattice. The average travel time for single messages travelling between source and target pairs of fixed separations shows -exponential behaviour as a function of hub density with a characteristic power-law tail, indicating a rapid drop in the average travel time as a function of hub density. This power-law tail arises as a consequence of the log-normal distribution of travel times seen at high hub densities. When many messages travel on the lattice, a congestion-decongestion transition can be seen. The waiting times of messages in the congested phase show a Gaussian distribution, whereas the decongested phase shows a log-normal distribution. Thus the waiting time distributions carry the signature of congested or decongested behaviour.

  11. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  12. Extending Rebeca with synchronous messages and reusable components

    NARCIS (Netherlands)

    Sirjani, M.; Boer, F.S. de; Movaghar, A.; Shali, A.

    2005-01-01

    In this paper, we propose extended Rebeca as a tool-supported actor-based language for modeling and verifying of concurrent and distributed systems. We enrich Rebeca with a formal concept of components which integrates the message-driven computational model of actor-based languages with synchronous

  13. Message Passing on a Time-predictable Multicore Processor

    DEFF Research Database (Denmark)

    Sørensen, Rasmus Bo; Puffitsch, Wolfgang; Schoeberl, Martin

    2015-01-01

    Real-time systems need time-predictable computing platforms. For a multicore processor to be time-predictable, communication between processor cores needs to be time-predictable as well. This paper presents a time-predictable message-passing library for such a platform. We show how to build up...

  14. Learning from marketing: Rapid development of medication messages that engage patients.

    Science.gov (United States)

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-08-01

    To adapt marketing approaches in a health services environment. Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. Copyright © 2015. Published by Elsevier Ireland Ltd.

  15. gender differences in short message language use

    Institute of Scientific and Technical Information of China (English)

    张丽君

    2011-01-01

    “language and gender” is one of the main research fields in sociolinguistics.with the introduction of short message service,another communication method appears.due to the problem of privacy aggression,few people have done researches on short message.so gender differences in short message language use are discussed here and at last reasons for the differences will also be generalized.

  16. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  17. Mobile phone messaging reminders for attendance at healthcare appointments.

    Science.gov (United States)

    Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Atun, Rifat; Car, Josip

    2013-12-05

    This review is an update of the original Cochrane review published in July 2012. Missed appointments are a major cause of inefficiency in healthcare delivery with substantial monetary costs for the health system, leading to delays in diagnosis and appropriate treatment. Patients' forgetfulness is one of the main reasons for missed appointments. Patient reminders may help reduce missed appointments. Modes of communicating reminders for appointments to patients include face-to-face communication, postal messages, calls to landlines or mobile phones, and mobile phone messaging. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could provide an important, inexpensive delivery medium for reminders for healthcare appointments. To update our review assessing the effects of mobile phone messaging reminders for attendance at healthcare appointments. Secondary objectives include assessment of costs; health outcomes; patients' and healthcare providers' evaluation of the intervention and perceptions of safety; and possible harms and adverse effects associated with the intervention. Original searches were run in June 2009. For this update, we searched the Cochrane Central Register of Controlled Trials (CENTRAL,The Cochrane Library 2012, Issue 8), MEDLINE (OvidSP) (January 1993 to August 2012), EMBASE (OvidSP) (January 1993 to August 2012), PsycINFO (OvidSP) (January 1993 to August 2012) and CINAHL (EbscoHOST) (January 1993 to August 2012). We also reviewed grey literature (including trial registers) and reference lists of articles. Randomised controlled trials (RCTs) assessing mobile phone messaging as reminders for healthcare appointments. We only included studies in which it was possible to assess effects of mobile phone messaging independent of other technologies or interventions.   Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third

  18. Presentation of dynamically overlapping auditory messages in user interfaces

    Energy Technology Data Exchange (ETDEWEB)

    Papp, III, Albert Louis [Univ. of California, Davis, CA (United States)

    1997-09-01

    This dissertation describes a methodology and example implementation for the dynamic regulation of temporally overlapping auditory messages in computer-user interfaces. The regulation mechanism exists to schedule numerous overlapping auditory messages in such a way that each individual message remains perceptually distinct from all others. The method is based on the research conducted in the area of auditory scene analysis. While numerous applications have been engineered to present the user with temporally overlapped auditory output, they have generally been designed without any structured method of controlling the perceptual aspects of the sound. The method of scheduling temporally overlapping sounds has been extended to function in an environment where numerous applications can present sound independently of each other. The Centralized Audio Presentation System is a global regulation mechanism that controls all audio output requests made from all currently running applications. The notion of multimodal objects is explored in this system as well. Each audio request that represents a particular message can include numerous auditory representations, such as musical motives and voice. The Presentation System scheduling algorithm selects the best representation according to the current global auditory system state, and presents it to the user within the request constraints of priority and maximum acceptable latency. The perceptual conflicts between temporally overlapping audio messages are examined in depth through the Computational Auditory Scene Synthesizer. At the heart of this system is a heuristic-based auditory scene synthesis scheduling method. Different schedules of overlapped sounds are evaluated and assigned penalty scores. High scores represent presentations that include perceptual conflicts between over-lapping sounds. Low scores indicate fewer and less serious conflicts. A user study was conducted to validate that the perceptual difficulties predicted by

  19. Use of text messaging in general practice: a mixed methods investigation on GPs' and patients' views.

    Science.gov (United States)

    Leahy, Dorothy; Lyons, Aoife; Dahm, Matthias; Quinlan, Diarmuid; Bradley, Colin

    2017-09-25

    Text messaging has become more prevalent in general practice as a tool with which to communicate with patients. The main objectives were to assess the extent, growth, and perceived risks and benefits of text messaging by GPs to communicate with patients, and assess patients' attitudes towards receiving text messages from their GP. A mixed methods study, using surveys, a review, and a focus group, was conducted in both urban and rural practices in the south-west of Ireland. A telephone survey of 389 GPs was conducted to ascertain the prevalence of text messaging. Subsequently, the following were also carried out: additional telephone surveys with 25 GPs who use text messaging and 26 GPs who do not, a written satisfaction survey given to 78 patients, a review of the electronic information systems of five practices, and a focus group with six GPs to ascertain attitudes towards text messaging. In total, 38% (n = 148) of the surveyed GPs used text messaging to communicate with patients and 62% (n = 241) did not. Time management was identified as the key advantage of text messaging among GPs who used it (80%; n = 20) and those who did not (50%; n = 13). Confidentiality was reported as the principal concern among both groups, at 32% (n = 8) and 69% (n = 18) respectively. Most patients (99%; n = 77) were happy to receive text messages from their GP. The GP focus group identified similar issues and benefits in terms of confidentiality and time management. Data were extracted from the IT systems of five consenting practices and the number of text messages sent during the period from January 2013 to March 2016 was generated. This increased by 40% per annum. Collaborative efforts are required from relevant policymakers to address data protection and text messaging issues so that GPs can be provided with clear guidelines to protect patient confidentiality. © British Journal of General Practice 2017.

  20. 基于Android的简易即时通信系统设计与实现%Design and Implementation of Simple Instant Message Communication System Based on Android

    Institute of Scientific and Technical Information of China (English)

    黄福贵; 李文辉; 陈功

    2014-01-01

    This paper present a method of instant message conmmunication including text and voice be-tween Android equipment based on cloud technology.This system use free public personal cloud storage platform and push platform to substitute of servers set up by our own,and its'easy stable and extendiable. This system provide a cheap,real time way of communicate between smal group of people by avoid voice and text platform of telecom operators.%该文介绍了一种基于云技术实现Android设备之间文字、语音即时通信的解决方案。该系统无需搭建服务器,利用免费的公共云存储平台以及推送平台实现主要功能,具有简单易行、稳定可靠、可扩展性强等特点。该系统避开了移动运营商的短信和语音电话平台,为小范围人群通信提供了一种实时、廉价的通信方式。

  1. Sistema de ayuda para la redacción de mensajes en un servicio de referencia por correo electrónico Help system for messages writing in a reference service via e-mail

    Directory of Open Access Journals (Sweden)

    Pedro Falcato

    2005-12-01

    Full Text Available El presente artículo trata el origen, el desarrollo y las propiedades del sistema de ayuda que utiliza un servicio de referencia digital como apoyo para elaborar respuestas. Está basado en la compilación y clasificación de locuciones de uso frecuente cuya eficacia comunicativa ha sido puesta a prueba en la práctica, adaptadas de modo tal que el referencista puede emplearlas como módulos para construir los mensajes. Se exponen las principales características de la interfaz diseñada. Se tratan también los alcances y limitaciones que tiene un sistema de este tipo, así como la aplicabilidad de la idea que le dio origen para construir ayudas equivalentes en otros entornos de referencia.The article deals with the origin, development, and properties of the help system used by a digital reference service as a support to develop answers. It is based on the compilation and classification of frequently used idioms whose communication effectiveness was practically put to the test, adapted in such a way that the reference librarian can use them as modules to construct the messages. Main characteristics of the interface design are stated. Scopes and limitations of that kind of system are discussed as well as the compatibility of the original idea to build equivalent helps in some other reference environment.

  2. 基于GSM的短信息的电源监控系统的设计%Design of monitor system of power supply for short message based on GSM

    Institute of Scientific and Technical Information of China (English)

    王文亮; 冀文超

    2011-01-01

    With the development of GSM, short message is developing very quickly and widely as a simple and convenient ways of data communicalion. The structure and the design proposal of the power source monitor system based on GSM were introduced. and a real time and accurate monitoring by existing GMS network resources was carried out The system is suitable to the field which requires less data transmission and dispersed detected point%随着GSM网络的发展,短信息作为GSM系统中最为简单和方便的数据通信方式,得到了迅猛的发展.介绍了基于短消息业务的电源监控系统的组成结构和设计方案,利用了GSM移动通讯网络短信息服务快捷的性能对电源进行实时、准确的监控.该系统对于监测点分散,数据传送量较少,需要监控的领域具有较大的实用价值.

  3. Research on the Technologies of Instant Messaging Software Detection

    Directory of Open Access Journals (Sweden)

    Hao Zhang

    2013-04-01

    Full Text Available In order to solve the security problems of instant messaging, a new Instant Messaging Software (IMS intrusion detection method has been proposed in this paper. Intrusion Detection is an important component of the security of the Network,through the critical information of the network and host system, it can determine the user’s invasion of illegal and legal acts of the user misuse of resources and make an adequate response.Instant messaging software provides a platform for the communication of information. It’s convenient for people to communicate, at the same time enterprises and institutions, companies, families; local area network has security implications. Such as access to user's personal information and the company's trade secrets; dissemination of pornography, reactionary remarks; provide attack corridors for Trojans and worms. Therefore, study the detection and blocking techniques of instant messaging software to protect the security of local area network has great application value. According to the detection method of IMS, detection and blocking architecture of IMS is presented and developed at the Windows platform. The rule base store in the configuration file, users can add their own IMS, detection and blocking the rules, users can also add other applications, features, so that the system has better scalability and practicality.

  4. Arbitrated quantum signature scheme with message recovery

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-02-16

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission.

  5. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures Trading Commission. ACTION: Notice... qualitative message testing research (for which CFTC received fast-track OMB approval) and is necessary to... research (for which CFTC received fast-track OMB approval) and is necessary to identify, with...

  6. Undergraduates' Text Messaging Language and Literacy Skills

    Science.gov (United States)

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  7. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  8. Application of Mobile Phone Short Message in Experimental Course Selection System%手机短信在实验选课系统的应用

    Institute of Scientific and Technical Information of China (English)

    徐富新; 王洲; 陈芳; 黄玉秀; 王晶

    2013-01-01

    基于WEB的实验选课系统在上机条件和时间上对用户造成了限制,为解决这一弊端,开发了一种基于GSM手机短信息的实验选课系统。采用VS2008为开发平台,C++语言为开发工具,结合多线程技术和数据库技术,实现了短信预约实验、短信查询实验和短信取消实验等功能。经过测试,系统在功能实现、整体性能、响应速度等方面均达到了使用要求,可投入到实验教学应用中。该系统具有方便灵活、廉价可靠的特点,避免了传统的实验选课系统对计算机的依赖性,是对原有系统的重要补充。%Experimental election system based on the WEB imposes restrictions on the condition of the machine and time. In order to re-solve this drawback,another experimental election system based on GSM is proposed. Take use of VS2008 as development platform and C language as development tools,combined with multi-threading technology and database technology,make these functions realized,such as booking a lab,querying a lab and cancelling a lab. Through test result of the system,can get that it has reached the demands,including function realization,overall performance and response speed requirements. The system is convenient,flexible and reliable to use,and has a low-cost. When compared with traditional experimental election system,the new one can avoid the dependence on computer and it is also a great supplement to the original system.

  9. Web Instant Messaging System Based on Server Push Technology and php%基于php和服务器推技术的Web即时聊天系统

    Institute of Scientific and Technical Information of China (English)

    王振兴; 黄静

    2012-01-01

    基于http协议应用于Web端,实现一个浏览器无关的、便于移植的、高性能的Web即时聊天系统.系统使用服务器推技术中的ajax长轮询模型构建http通讯模型,利用开源LAMP架构搭建服务器端程序,并使用XML文件系统存储即时聊天内容,前端使用javascript的jquery框架实现与浏览器无关的ajax前端程序.提供包括文本表情模式的聊天,便于整合到社交类型的网站中.项目实践表明,基于php和服务器推技术的Web即时聊天系统稳定性高,具有一定的使用价值.%Based on the http protocol used in the Web side, it realizes a not browser based, easy to transplant, high-performance real-time web chat system. System uses the ajax long polling model of the server push technique to build the http communication, using the open source LAMP architecture to build server-side programs, and use the xml file system to store real-time chat content, the front using the javascript jquery framework to achieve and browse device-independent ajax front-end program. Text chat and expressions, and ease of integration into the sns type of site. Project practice shows that the web php-based server push model real time chat system stability, it has a certain value.

  10. 基于GPS-GSM的汽车短信防盗系统设计%GPS-GSM-BASED VEHICLE ANTI-THEFT MESSAGE SYSTEM DESIGN

    Institute of Scientific and Technical Information of China (English)

    刘柏楠; 张修红; 娄海波; 陈学旭

    2011-01-01

    Aiming at current problems in vehicle anti-theft devices and the market prospect, the authors put forward a new vehicle anti-theft system design proposal. The system consists of STC89C52 SCM, TC35i wireless communication module, XN934 + integrated GPS module, relay and other components. After testing, the system can be real-time monitoring of vehicles with the positioning accuracy 5 meters which realizes the anti-theft function.%针对目前汽车防盗设备存在的问题及市场应用前景,作者提出了一种新的汽车防盗系统的设计方案.本系统由STC89C52单片机、TC35i无线通信模块、XN934+一体化GPS模块、继电器等元件构成.经测试,本系统可以对汽车进行实时监控,且其定位精度为5 m,实现了汽车防盗功能.

  11. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  12. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  13. Semantic message oriented middleware for publish/subscribe networks

    Science.gov (United States)

    Li, Han; Jiang, Guofei

    2004-09-01

    The publish/subscribe paradigm of Message Oriented Middleware provides a loosely coupled communication model between distributed applications. Traditional publish/subscribe middleware uses keywords to match advertisements and subscriptions and does not support deep semantic matching. To this end, we designed and implemented a Semantic Message Oriented Middleware system to provide such capabilities for semantic description and matching. We adopted the DARPA Agent Markup Language and Ontology Inference Layer, a formal knowledge representation language for expressing sophisticated classifications and enabling automated inference, as the topic description language in our middleware system. A simple description logic inference system was implemented to handle the matching process between the subscriptions of subscribers and the advertisements of publishers. Moreover our middleware system also has a security architecture to support secure communication and user privilege control.

  14. Integration of Advanced Concepts and Vehicles Into the Next Generation Air Transportation System. Volume 1; Introduction, Key Messages, and Vehicle Attributes

    Science.gov (United States)

    Zellweger, Andres; Resnick, Herbert; Stevens, Edward; Arkind, Kenneth; Cotton William B.

    2010-01-01

    Raytheon, in partnership with NASA, is leading the way in ensuring that the future air transportation continues to be a key driver of economic growth and stability and that this system provides an environmentally friendly, safe, and effective means of moving people and goods. A Raytheon-led team of industry and academic experts, under NASA contract NNA08BA47C, looked at the potential issues and impact of introducing four new classes of advanced aircraft into the next generation air transportation system -- known as NextGen. The study will help determine where NASA should further invest in research to support the safe introduction of these new air vehicles. Small uncrewed or unmanned aerial systems (SUAS), super heavy transports (SHT) including hybrid wing body versions (HWB), very light jets (VLJ), and supersonic business jets (SSBJ) are the four classes of aircraft that we studied. Understanding each vehicle's business purpose and strategy is critical to assessing the feasibility of new aircraft operations and their impact on NextGen's architecture. The Raytheon team used scenarios created by aviation experts that depict vehicles in year 2025 operations along with scripts or use cases to understand the issues presented by these new types of vehicles. The information was then mapped into the Joint Planning and Development Office's (JPDO s) Enterprise Architecture to show how the vehicles will fit into NextGen's Concept of Operations. The team also identified significant changes to the JPDO's Integrated Work Plan (IWP) to optimize the NextGen vision for these vehicles. Using a proven enterprise architecture approach and the JPDO s Joint Planning Environment (JPE) web site helped make the leap from architecture to planning efficient, manageable and achievable. Very Light Jets flying into busy hub airports -- Supersonic Business Jets needing to climb and descend rapidly to achieve the necessary altitude Super-heavy cargo planes requiring the shortest common flight

  15. Message communications of particular message types between compute nodes using DMA shadow buffers

    Science.gov (United States)

    Blocksome, Michael A.; Parker, Jeffrey J.

    2010-11-16

    Message communications of particular message types between compute nodes using DMA shadow buffers includes: receiving a buffer identifier specifying an application buffer having a message of a particular type for transmission to a target compute node through a network; selecting one of a plurality of shadow buffers for a DMA engine on the compute node for storing the message, each shadow buffer corresponding to a slot of an injection FIFO buffer maintained by the DMA engine; storing the message in the selected shadow buffer; creating a data descriptor for the message stored in the selected shadow buffer; injecting the data descriptor into the slot of the injection FIFO buffer corresponding to the selected shadow buffer; selecting the data descriptor from the injection FIFO buffer; and transmitting the message specified by the selected data descriptor through the data communications network to the target compute node.

  16. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  17. Messaging and Voice Conferencing through Wi-Fi Network

    OpenAIRE

    Miss. Nayana H S,; Dr. M C Padma

    2014-01-01

    The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android operating system, can be used to communicate with each other through the Wi-Fi communication channel. Proposed system incorporates messaging (Text and voice), conferencing (group conver...

  18. Learning experiences in population education: proposed guidelines and core messages.

    Science.gov (United States)

    1984-01-01

    As a result of the 1984 Regional Workshop for the Development of Packages of Adequate Learning Requirements in Population Education, the participants tackled the problem of non-institutionalization of population education into the formal and non-formal educational curricula in their countries. Based on their deliberations, several sets of guidelines and core messages were formulated to provide countries with a more definite direction that will hopefully ensure the functional and effective integration of population education in their respective national school and out-of-school curriculum system. Useful packages of learning materials in population education should help realize the country's population policy and goals within the broader framework of socioeconomic development, and the content of the package should comprehensively cover the core messages of the country's Population Information, Education and Communication (IEC) Program. The population knowledge base of the package should be accurate and relevant; the package should provide for graphic and visual presentation and for assessment of effects on the target groups. Proposed core messages in population education discuss the advantages of small family size and delayed marriage, and aspects of responsible parenthood. Other messages discuss population resource development and population-related beliefs and values.

  19. Cryptography on Android Message Applications – A Review

    Directory of Open Access Journals (Sweden)

    Nishika

    2013-05-01

    Full Text Available Short Message Service (SMS is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. Security of SMS’s is still an open challenging task. Various Cryptographic algorithms have been applied to secure the mobile SMS. The success of any cryptography technique depends on various factors like complexity, time, memory requirement, cost etc. In this paper we survey the most common and widely used SMS Encryption techniques. Each has its own advantages and disadvantages. Recent trends on Cryptography on android message applications have also been discussed. The latest cryptographic algorithm is based on lookup table and dynamic key which is easy to implement and to use and improve the efficiency. In this paper, an improvement in lookup tableand dynamic algorithm is proposed. Rather than using the Static Lookup Table, Dynamic Lookup Table may be used which will improve the overall efficiency.

  20. Congestion Control Strategy for Opportunistic Network Based on Message Values

    Directory of Open Access Journals (Sweden)

    Deng-yin Zhang

    2014-05-01

    Full Text Available To solve the congestion problem in opportunistic networks, a congestion control strategy based on message deleting and transferring(DATM is proposed. The congested node calculates the storage value of each message according to the forwarding probability and TTL of message, then deletes the message with the minimum storage value and transfers the message with the minimum forwarding probability to neighboring nodes. The neighboring nodes calculate the receiving value of the message according to the forwarding probability and free buffer capacity of this message. The congested node transfers the message to the neighboring node with the maximum receiving value. The message will be deleted when there is no neighboring node to receive it. The algorithm is more targeted at deleting messages. Besides, it combines the strategy of transferring message. Therefore, it can deal with the congestion more efficiently. The message arrival rate is improved significantly and the end-to-end delay is also reduced to some extent.

  1. Message from%致辞

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    标准典范的发展,此典范可在示范工程完全实施前被进行尝试。 最后,我衷心祝愿研讨会圆满成功,我希望能在今后的项目进程中不断获得对该项目的报道。 2001年3月6日 Message from Carma Elliot Consul General, British Consulate General Chongqing Distinguished guests, ladies and gentlemen: I would like to commence by thanking the organizers for inviting me to attend this important seminar for the future of the quality and affordability of housing in Chongqing. I would also like to thank the Municipal Government and the Mayor, the Chongqing Construction Commission, together with the Ministry of Construction, local companies and developers and Chongqing University for supporting this event. The British Consulate General was delighted to assist in the initial stages of this project and we would like to continue our support by encouraging the involvement of British expertise and companies in the development of industrialized housing in Chongqing. There have been advances in the provision of industrialized housing in the United Kingdom, especially in lightweight steel frame construction and innovative cladding using re-cylced materials and we see these as particularly relevant to Chongqing. The co-operation between Chongqing University, Hong Kong Polytechnic University and South Bank University in London has been quite exceptional and strong relationships have been built. These are beginning to bear fruit and have led to notable achievements already involving research and a masters degree programme in construction project management. It is also pleasing that industrial and commercial partners have joined the universities in what has become known as the Chongqing Project. I very much approve of, and appreciate, the involvement of local companies and developers, and the support of Battle McCarthy, Gammon Construction, Building Research Establishment and J. Prewer Associates, all of whom are participating in the

  2. Study on Message Queuing Technology :Overview and a Case Study%消息队列技术研究:综述与一个实例

    Institute of Scientific and Technical Information of China (English)

    周世杰; 刘锦德; 秦志光

    2002-01-01

    The features and applications of message queuing technology are analyzed.After discussing the communication mode of message queuing,the differences among message queuing,remote procedure call and distributed transaction processing are clarified.Then,several kinds of application design patterns used in common application scenarios are carefully considered.Finally,how to design a real middileware system adopting message queuing technology is explained in detail.

  3. Synchronicity, Instant Messaging and Performance among Financial Traders

    CERN Document Server

    Saavedra, Serguei; Uzzi, Brian; 10.1073/pnas.1018462108

    2011-01-01

    Successful animal systems often manage risk through synchronous behavior that spontaneously arises without leadership. In critical human systems facing risk, such as financial markets or military operations, our understanding of the benefits associated to synchronicity is nascent but promising. Building on previous work illuminating commonalities between ecological and human systems, we compare the activity patterns of individual financial traders with the simultaneous activity of other traders---an individual and spontaneous characteristic we call synchronous trading. Additionally, we examine the association of synchronous trading with individual performance and communication patterns. Analyzing empirical data on day traders' second-to-second trading and instant messaging, we find that the higher the traders' synchronous trading, the less likely they lose money at the end of the day. We also find that the daily instant messaging patterns of traders are closely associated with their level of synchronous tradi...

  4. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  5. Message Passing Framework for Globally Interconnected Clusters

    Science.gov (United States)

    Hafeez, M.; Asghar, S.; Malik, U. A.; Rehman, A.; Riaz, N.

    2011-12-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  6. Communicating Concepts about Altruism in Interstellar Messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2002-01-01

    This project identifies key principles of altruism that can be translated into interstellar messages for communication with extraterrestrial intelligence. The message contents will focus specifically on the evolution of altruism, drawing on recent insights in evolutionary biology, with particular emphasis on sociobiological accounts of kin selection and reciprocal altruism. This focus on altruism for message contents has several advantages. First, the subject can be translated into interstellar messages both via an existing formal interstellar language and via pictorial messages. For example, aspects of reciprocal altruism can be described through mathematical modeling, such as game theoretic approaches, which in turn can be described readily in the interstellar language Lincos. Second, concentrating on altruism as a message content may facilitate communications with extraterrestrial intelligence. Some scientists have argued that humans may be expected to communicate something about their moral status and development in an exchange with extraterrestrials. One of the most salient ways that terrestrial and extraterrestrial civilizations might be expected to evaluate one another is in terms of ethical motivations. Indeed, current search strategies assume some measure of altruism on the part of transmitting civilizations; with no guarantee of a response, the other civilization would be providing information to us with no direct payoff. Thus, concepts about altruism provide an appropriate content for interstellar messages, because the concepts themselves might be understood by extraterrestrial civilizations.

  7. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  8. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  9. The Zen Scavenger Hunt: Constructing and Presenting Persuasive Messages

    Science.gov (United States)

    Hamilton, Heidi

    2017-01-01

    Courses: Persuasion; Persuasive Speaking. Objectives: Students will demonstrate the ability to apply persuasive concepts in constructing persuasive messages creatively, and students will present and analyze their persuasive messages.

  10. Crafting Appealing Text Messages to Encourage Colorectal Cancer Screening Test Completion: A Qualitative Study

    Science.gov (United States)

    Ellis, Shellie D; Denizard-Thompson, Nancy; Kronner, Donna; Miller, David P

    2015-01-01

    Background mHealth interventions that incorporate text messages have great potential to increase receipt of preventive health services such as colorectal cancer screening. However, little is known about older adult perspectives regarding the receipt of text messages from their health care providers. Objective To assess whether older adults would value and access text messages from their physician’s practice regarding colorectal cancer screening. Methods We conducted four focus groups with 26 adults, aged 50 to 75 years, who had either recently completed or were overdue for colorectal cancer screening. A trained moderator followed a semistructured interview guide covering participant knowledge and attitudes regarding colorectal cancer screening, potential barriers to colorectal cancer screening, attitudes about receiving electronic communications from a doctor’s office, and reactions to sample text messages. Results Participant responses to three primary research questions were examined: (1) facilitators and barriers to colorectal cancer screening, (2) attitudes toward receiving text messages from providers, and (3) characteristics of appealing text messages. Two themes related to facilitators of colorectal cancer screening were perceived benefits/need and family experiences and encouragement. Themes related to barriers included unpleasantness, discomfort, knowledge gaps, fear of complications, and system factors. Four themes emerged regarding receipt of text messages from health care providers: (1) comfort and familiarity with technology, (2) privacy concerns/potential for errors, (3) impact on patient-provider relationship, and (4) perceived helpfulness. Many participants expressed initial reluctance to receiving text messages but responded favorably when shown sample messages. Participants preferred messages that contained content that was important to them and were positive and reassuring, personalized, and friendly to novice texters (eg, avoided the use of

  11. Managing Gradual Typing with Message-Safety in Dart

    DEFF Research Database (Denmark)

    Ernst, Erik; Møller, Anders; Schwarz, Mathias Romme

    This paper establishes a notion of message-safe programs as a natural intermediate point between dynamically typed and statically typed Dart programs. Unlike traditional static type checking, the type system in the Dart programming language is unsound by design. The rationale has been...... that this allows compile-time detection of likely errors and enables code completion in integrated development environments, without being restrictive on programmers. We show that, despite unsoundness, judicious use of type annotations can ensure useful properties of the runtime behavior of Dart programs....... This supports evolution from a dynamically typed programto a strictly statically typed form. We present a formal model of Dart that elucidates how a core of the language and its standard type system works. This allows us to characterize message-safe programs and present a theorem stating that such programs...

  12. Variable Message Signs for road tunnel emergency evacuations.

    Science.gov (United States)

    Ronchi, Enrico; Nilsson, Daniel; Modig, Henric; Walter, Anders Lindgren

    2016-01-01

    This paper investigates the design of Variable Message Signs (VMS) as a way-finding aid for road tunnel emergency evacuations. The use of the Theory of Affordances is suggested to provide recommendations on the design of VMS. A preliminary evaluation of 11 selected VMS systems was performed and 6 of them were further evaluated using an affordance-based within subject stated-preference questionnaire administered to a sample of 62 participants. Results are used to provide recommendations on the characteristics of the VMS systems, such as (1) size of the sign (large or small); (2) use of flashing lights; (3) colour scheme; (4) message coding (i.e., text, pictograms or a combination of them). The best performing VMS features for road tunnel emergency evacuation included the use of larger signs, flashing lights, the combination of emergency exit pictorial symbol in green in one panel and text in amber in the other panel.

  13. Denoising Message Passing for X-ray Computed Tomography Reconstruction

    CERN Document Server

    Perelli, Alessandro; Can, Ali; Davies, Mike E

    2016-01-01

    X-ray Computed Tomography (CT) reconstruction from sparse number of views is becoming a powerful way to reduce either the radiation dose or the acquisition time in CT systems but still requires a huge computational time. This paper introduces an approximate Bayesian inference framework for CT reconstruction based on a family of denoising approximate message passing (DCT-AMP) algorithms able to improve both the convergence speed and the reconstruction quality. Approximate Message Passing for Compressed Sensing has been extensively analysed for random linear measurements but there are still not clear solutions on how AMP should be modified and how it performs with real world problems. In particular to overcome the convergence issues of DCT-AMP with structured measurement matrices, we propose a disjoint preconditioned version of the algorithm tailored for both the geometric system model and the noise model. In addition the Bayesian DCT-AMP formulation allows to measure how the current estimate is close to the pr...

  14. TXT4Tots Message Library - Spanish

    Data.gov (United States)

    U.S. Department of Health & Human Services — TXT4Tots is a library of short, evidence-based messages focused on nutrition and physical activity. The library is targeted to parents and caregivers of children,...

  15. TXT4Tots Message Library - English

    Data.gov (United States)

    U.S. Department of Health & Human Services — TXT4Tots is a library of short, evidence-based messages focused on nutrition and physical activity. The library is targeted to parents and caregivers of children,...

  16. Text messaging is a useful reminder tool.

    Science.gov (United States)

    Balzer, Ben W R; Kelly, Patrick J; Hazell, Philip; Paxton, Karen; Hawke, Catherine; Steinbeck, Katharine S

    2014-07-01

    Longitudinal studies of adolescents must be 'adolescent-friendly', to collect data and to encourage maintenance in the study cohort. Text messaging may offer a feasible means to do both. Adolescents in the Adolescent Rural Cohort, Hormones and Health, Education, Environments and Relationships (ARCHER) study (n=342) are sent automated text messages every 3 months, prompting biological specimen collection. A total of 99.2% of participants (or their parents) owned a mobile phone, of which 89.1% of participants responded to text messages and 97.3% of intended urine samples were collected. The average time to provide a urine sample after prompting correlated with time to reply to Short Message Service (SMS). This study shows SMS can be used effectively in longitudinal research involving adolescents and is feasible and useful as a reminder tool for regular biological specimen collection.

  17. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  18. Influences of Product Involvement, Environmental Message and ...

    African Journals Online (AJOL)

    Influences of Product Involvement, Environmental Message and Green ... The study employs an empirical research by 2x2x2 between subject factorial design. ... Advertising Appeals, Green Marketing, Elaboration Likelihood Model (ELM) ...

  19. QuitNowTXT Text Messaging Library

    Data.gov (United States)

    U.S. Department of Health & Human Services — Overview: The QuitNowTXT text messaging program is designed as a resource that can be adapted to specific contexts including those outside the United States and in...

  20. Messaging to Extra-Terrestrial Intelligence

    CERN Document Server

    Zaitsev, A

    2006-01-01

    Throughout the entire history of terrestrial civilization, only four projects involving transmitting of interstellar radio messages (IRMs) have yet been fully developed and realized. Nevertheless, we should understand a simple thing -- if all civilizations in the Universe are only recipients, and not message-sending civilizations, than no SETI searches make any sense. We present the theory and methodology of composing and transmitting of future IRMs.

  1. Bolt elongation of variable message signs

    Science.gov (United States)

    Scancella, Robert J.; Skalla, Robert

    1998-03-01

    The purpose of this paper is to describe existing problem areas in the manufacturing and erecting of variable message signs (VMS) on cantilever truss units. VMS are electronic message boards that are rectangular in shape and weigh between 3,000 and 5,000 pounds. The structures that were inspected for this paper are part of the Route 80 Magic Project and the Traffic Signal Contract #25 (Route 37).

  2. Global Positioning System Disaster Notification Messaging Service

    Science.gov (United States)

    2013-09-01

    track each GPS satellite. Launch L1 L2 L5 IIA 1990–1997 C/A P(Y) P(Y) IIR 1997–2004 C/A P(Y) P(Y) IIR -M 2005–2009 C/A P(Y) P(Y...yet launched Table 1. Current and Future GPS Broadcast Types On the Block I, II, IIA and IIR GPS satellites launched through 2004, a legacy...Broadcast Signals Beginning in 2005 with the Block IIR -M satellites, each successive generation adds additional modernized signals, including L2C, M, and

  3. Message development for surface markers at the Hanford Radwaste Disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Kaplan, M.F.

    1984-12-31

    At the Hanford Reservation in Washington, there are sites which received liquid and solid transuranic wastes from the late 1940`s until 1970. Rockwell Hanford Operations (Rockwell) is investigating the feasibility of several options for the permanent disposal of these wastes. One option is to stabilize the wastes in their present locations and to add barriers to minimize water infiltration and root penetration into the wastes. This report forms part of the project to develop a marking system for transuranic wastes on the Hanford Reservation. The focus of this report is the development of the message system to appear on the surface markers. A logical framework is developed to deduce what is required by the message system. Alternatives for each message component are evaluated and justification is provided for the choice of each component. The components are then laid out on the surface marker to provide a legible, comprehensible message system. The surface markers are tall, standing monoliths which ring the perimeter of each disposal area. Based on the logical framework, it is recommended that three domains of representation -- symbols, pictures, and language -- be used in the message system. The warning symbol chosen for the message system is the radiation trefoil. Two other options were considered, including the warning symbol developed by the Human Interference Task Force for a high-level waste repository. The trefoil was preferred because of the widespread usage and international acceptance which is already enjoys.

  4. Nutrition Education Research Brief: Message Framing, Use of Interactive Technology to Tailor Messages, and Intervention Intensity

    OpenAIRE

    Mary Kay Fox; Charlotte Hanson; Ronette Briefel

    2007-01-01

    This research brief is intended to assist nutrition educators in assessing whether specific characteristics of nutrition messages promote desired dietary behavior changes. Based on a computerized literature search targeting peer-reviewed journal articles, it highlights three topics pertinent to the design of nutrition education programs—message framing, use of interactive technology to tailor messages, and intervention intensity. While some promising results were found to be associated with...

  5. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  6. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  7. Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service

    Directory of Open Access Journals (Sweden)

    Hyeong gon Jo

    2016-07-01

    Full Text Available The Internet of Things (IoT opens up tremendous opportunities to provide location-based applications. However, despite the services around a user being physically adjacent, common IoT platforms use a centralized structure, like a cloud-computing architecture, which transfers large amounts of data to a central server. This raises problems, such as traffic concentration, long service latency, and high communication cost. In this paper, we propose a physical distance-based asynchronous messaging platform that specializes in processing personalized data and location-based messages. The proposed system disperses traffic using a location-based message-delivery protocol, and has high stability.

  8. An Analysis of Normative Messages in Signs at Recreation Settings.

    Science.gov (United States)

    Winter, Patricia L.; Cialdini, Robert B.; Bator, Renee J.; Rhoads, Kelton; Sagarin, Brad J.

    1998-01-01

    A systematic evaluation of signs and messages at 42 recreation areas in California and Arizona focused on type of site, managing agency, density of message locales, sign attributes, and message content. The vast majority of messages presented behavioral commands and were negatively worded. This striking imbalance points to concerns in visitor…

  9. Replacing the Message Service Component In an Integration Framework.

    Science.gov (United States)

    1994-10-01

    routine: add- eventO if (event->type == Message && event->tt~pattern 1= NULL) tt-pattern-register(event->tt~pattern); A..4 ToolTalk Message Pattern...Message Pattern Destruction A.5.1 routine: free- eventO if (event->type == Message && event->tt~pattern 1= NULL) tt-free (event->tt~pattern); A.6

  10. 消息中间件的排队论模型研究%Study on the Queuing Model of the Message-Oriented Middleware

    Institute of Scientific and Technical Information of China (English)

    周世杰; 秦志光; 刘锦德

    2002-01-01

    The general concepts in message queuing and message-oriented middleware(MOM) are discussed. The essential elements and model of the queuing theory are analyzed in detail. Then, after puting forward and analyzing the basic formulas of the queuing theory, the applicable model for message queue middleware is probed into. Some important formulas used in the designing of the message queue middleware are also elucidated. Finally, a case of designing the message queue middleware adopting queuing model we put forward, which is used in the freeway toll system of ITS, is studied.

  11. An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

    CERN Document Server

    Mukhopadhyay, Debajyoti; Ghosh, Surjya; Biswas, Sudipto; Chakraborty, Poulami

    2011-01-01

    A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.

  12. Bridging the Gap – Electronic Messaging between Home Health Care and General Practitioners

    OpenAIRE

    2015-01-01

    Communication between health care providers is essential for the safe delivery of care to patients. The health care service is fragmented and the tools designed to support communication between health care providers has been unsatisfactory, in particular between home health care nurses and general practitioners (GPs). Three sub-studies were conducted to; 1) describe the experiences of home health care nurses with an e-messaging system and to determine how e-messaging influenced their communic...

  13. "This Is a Message for …": Third Graders' Use of Written Text Functions to Facilitate Interpersonal Relationships

    Science.gov (United States)

    Jaeger, Elizabeth L.

    2016-01-01

    This article describes the ways in which a class of 7- and 8-year-old children used writing to communicate. Using Halliday's Systemic Functional Linguistics as a theoretical frame, I examine what functions these messages served, how functions varied from child to child and how the practice of message-sending evolved over time. Analysis of data…

  14. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  15. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  16. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  17. Randomized controlled trial of a messaging intervention to increase fruit and vegetable intake in adolescents: Affective versus instrumental messages.

    Science.gov (United States)

    Carfora, Valentina; Caso, Daniela; Conner, Mark

    2016-11-01

    The present research aimed to test the efficacy of affective and instrumental text messages compared with a no-message control as a strategy to increase fruit and vegetable intake (FVI) in adolescents. A randomized controlled trial was used test impact of different text messages compared with no message on FVI over a 2-week period. A total of 1,065 adolescents (14-19 years) from a high school of the South of Italy completed the baseline questionnaire and were randomly allocated to one of three conditions: instrumental messages (N = 238), affective messages (N = 300), and no messages (N = 521). Students in the message conditions received one message each day over a 2-week period. The messages targeted affective (affective benefits) or instrumental (instrumental benefits) information about FVI. Self-reported FVI at 2 weeks was the key dependent variable. Analyses were based on the N = 634 who completed all aspects of the study. Findings showed that messages significantly increased FVI, particularly in the affective condition and this effect was partially mediated by changes in affective attitude and intentions towards FVI. Text messages can be used to increase FVI in adolescents. Text messages based on affective benefits are more effective than text messages based on instrumental benefits. Statement of contribution What is already known on this subject? Text messages have been shown to promote positive change in health behaviours. However, the most appropriate target for such text messages is less clear although targeting attitudes may be effective. What does this study add? This randomized controlled study shows that text messages targeting instrumental or affective attitudes produce changes in fruit and vegetable intake (FVI) in adolescents. Text messages targeting affective attitudes are shown to be more effective than text messages targeting instrumental attitudes. The effect of affective text messages on FVI was partially mediated by changes in

  18. Messaging and Voice Conferencing through Wi-Fi Network

    Directory of Open Access Journals (Sweden)

    Miss. Nayana H S,

    2014-06-01

    Full Text Available The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android operating system, can be used to communicate with each other through the Wi-Fi communication channel. Proposed system incorporates messaging (Text and voice, conferencing (group conversation and file sharing services through the Wi-Fi network. When users enters the Wi-Fi network, proposed system displays the list of other users they are having this system on their mobile in that network. Using the system services, user can communicate with other user by exchanging packets to IP address of destination user, with the condition that both communicating person should be in same Wi-Fi network. The proposed system allows communication through Wi-Fi which requires neither any internet connectivity nor any service from the service providers. In this paper, the proposed system shall eliminate the usage of service providers for short-distance calls and decreases the cost that gets accrued in the consumer’s monthly bill. This system allows free conferencing, file sharing and messaging services within the Wi-Fi network that will greatly reduce the communication cost in large organizations.

  19. Design and Development of Network Message Board System based on ASP.NET%基于ASP.NET的网络留言板系统设计与开发

    Institute of Scientific and Technical Information of China (English)

    迟松

    2015-01-01

    The paper analyzes the function of message board and the key implementation techniques in accordance with the design process of network. ASP.NET technology is used, through the Datalist control, GridView AccessData-Source control and the use of nested, data binding, operation associated with hierarchical master-slave table display are realized, and then messaging and reply function are implemented.%以网络留言板设计过程为思路,分析留言板的功能和实现技术要点,采用ASP.NET技术,通过Datalist控件与GridView的嵌套,利用AccessDataSource控件数据绑定,实现主从表的关联操作与分级显示,进而完成留言、回复等功能。

  20. Home telemental health implementation and outcomes using electronic messaging.

    Science.gov (United States)

    Godleski, Linda; Cervone, Dana; Vogel, Donna; Rooney, Meghan

    2012-01-01

    In 2007, the VA Connecticut Healthcare System began a home electronic messaging programme for mental health patients. During the first two years, 76 patients with diagnoses of schizophrenia, post traumatic stress disorder, depression and substance-use disorders received a home messaging device, which was connected via an ordinary telephone line. There were daily questions, which were based on disease management protocols, and included alerts, data and educational components. Patient data were sent to a nurse practitioner each day for triage and follow-up. Patients used the device for at least six months. In the six months prior to enrolment, 42 patients were hospitalized for 46 admissions. In the following six months, six patients were hospitalized for nine admissions (P < 0.0001). In the six months prior to enrolment, 47 patients had a total of 80 ER visits. In the following six months, 16 patients had a total of 32 ER visits (P < 0.0001). Questionnaire responses indicated a high level of satisfaction with the home messaging programme.

  1. MAP Estimation, Message Passing, and Perfect Graphs

    CERN Document Server

    Jebara, Tony S

    2012-01-01

    Efficiently finding the maximum a posteriori (MAP) configuration of a graphical model is an important problem which is often implemented using message passing algorithms. The optimality of such algorithms is only well established for singly-connected graphs and other limited settings. This article extends the set of graphs where MAP estimation is in P and where message passing recovers the exact solution to so-called perfect graphs. This result leverages recent progress in defining perfect graphs (the strong perfect graph theorem), linear programming relaxations of MAP estimation and recent convergent message passing schemes. The article converts graphical models into nand Markov random fields which are straightforward to relax into linear programs. Therein, integrality can be established in general by testing for graph perfection. This perfection test is performed efficiently using a polynomial time algorithm. Alternatively, known decomposition tools from perfect graph theory may be used to prove perfection ...

  2. Message Passing for Dynamic Network Energy Management

    CERN Document Server

    Kraning, Matt; Lavaei, Javad; Boyd, Stephen

    2012-01-01

    We consider a network of devices, such as generators, fixed loads, deferrable loads, and storage devices, each with its own dynamic constraints and objective, connected by lossy capacitated lines. The problem is to minimize the total network objective subject to the device and line constraints, over a given time horizon. This is a large optimization problem, with variables for consumption or generation in each time period for each device. In this paper we develop a decentralized method for solving this problem. The method is iterative: At each step, each device exchanges simple messages with its neighbors in the network and then solves its own optimization problem, minimizing its own objective function, augmented by a term determined by the messages it has received. We show that this message passing method converges to a solution when the device objective and constraints are convex. The method is completely decentralized, and needs no global coordination other than synchronizing iterations; the problems to be...

  3. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  4. Impacting delayed pediatric influenza vaccination: a randomized controlled trial of text message reminders.

    Science.gov (United States)

    Hofstetter, Annika M; Vargas, Celibell Y; Camargo, Stewin; Holleran, Stephen; Vawdrey, David K; Kharbanda, Elyse Olshen; Stockwell, Melissa S

    2015-04-01

    Influenza vaccination coverage is low, especially among low-income populations. Most doses are generally administered early in the influenza season, yet sustained vaccination efforts are crucial for achieving optimal coverage. The impact of text message influenza vaccination reminders was recently demonstrated in a low-income population. Little is known about their effect on children with delayed influenza vaccination or the most effective message type. To determine the impact of educational plus interactive text message reminders on influenza vaccination of urban low-income children unvaccinated by late fall. Randomized controlled trial. Parents of 5,462 children aged 6 months-17 years from four academically affiliated pediatric clinics who were unvaccinated by mid-November 2011. Eligible parents were stratified by their child's age and pediatric clinic site and randomized using a 1:1:1 allocation to educational plus interactive text message reminders, educational-only text message reminders, or usual care. Using an immunization registry-linked text messaging system, parents of intervention children received up to seven weekly text message reminders. One of the messages sent to parents in the educational plus interactive text message arm allowed selection of more information about influenza and influenza vaccination. Influenza vaccination by March 31, 2012. Data were collected and analyzed between 2012 and 2014. Most children were publicly insured and Spanish speaking. Baseline demographics were similar between groups. More children of parents in the educational plus interactive text message arm were vaccinated (38.5%) versus those in the educational-only text message (35.3%; difference=3.3%, 95% CI=0.02%, 6.5%; relative risk ratio (RRR)=1.09, 95% CI=1.002, 1.19) and usual care (34.8%; difference=3.8%, 95% CI=0.6%, 7.0%; RRR=1.11, 95% CI=1.02-1.21) arms. Text message reminders with embedded educational information and options for interactivity have a small

  5. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.

    Science.gov (United States)

    Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton

    2016-01-01

    Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.

  6. Detecting influenza outbreaks by analyzing Twitter messages

    CERN Document Server

    Culotta, Aron

    2010-01-01

    We analyze over 500 million Twitter messages from an eight month period and find that tracking a small number of flu-related keywords allows us to forecast future influenza rates with high accuracy, obtaining a 95% correlation with national health statistics. We then analyze the robustness of this approach to spurious keyword matches, and we propose a document classification component to filter these misleading messages. We find that this document classifier can reduce error rates by over half in simulated false alarm experiments, though more research is needed to develop methods that are robust in cases of extremely high noise.

  7. 短信平台随访系统在糖尿病患者复诊率与血糖控制中的应用%Effects of short message service platform system on return visit rate, glycosylated hemoglobin level and glucose control rate for diabetics

    Institute of Scientific and Technical Information of China (English)

    郑玲玉; 张爱丽; 吕佳; 詹静; 谭擎缨

    2014-01-01

    A total of 296 patients were randomly divided into short message group (n =153) and non short message group (n =143).The former group received short message service (SMS) for follow-ups while the latter group had routine oral follow-ups.The return visit rate,recall rate of glycosylated hemoglobin (HbA1c),HbAlc level and glucose control rate for diabetics were assessed after one-year follow-up.The return visit rate (96%) and recall rate of HbAlc (78%) in the short message group were significantly higher than those in the non-short message group (59%,25%,P <0.01 for both).The HbAlc level after one-year follow-up (6.51 ± 0.74) % was lower than that one year before (6.85 ± 1.26) % in the short message group.The glucose control rate after one year (82%) were significantly higher than that one year before in the short message group (65%) and that after one year in the non-short message group(59%,P < 0.01).Use of SMS platform system for follow-ups and health education can effectively improve the return visit rate and glucose control rate,lower the HbA1c level.in diabetics.%将2012年3-12月296例门诊糖尿病患者,分为短信组(153例)和非短信组(143例).非短信组给予常规口头健康宣教及告知复诊,短信组利用短信息平台随访系统定期发送糖尿病相关知识及通知复诊.随访1年,短信组复诊次数达标(门诊复诊10以上)率96%(147/153),糖化血红蛋白(HbA1c)监测次数达标(测定3次以上)率78%(120/153),高于非短信组的59%(85/143)和25%(36/143)(均P<0.01);HbA1c水平下降[(6.85±1.26)%降至(6.51±0.74)%](P<0.01),血糖达标率提高[65% (100/153)与82%(126/153),P<0.01],和非短信组干预后[71% (100/143)与59%(84/143)]比较差异有统计学意义(均P<0.01).说明应用短信息平台进行周期性短信干预能有效改善糖尿病患者遵医行为,降低HbA1c水平,提高血糖达标率.

  8. Message from%致辞

    Institute of Scientific and Technical Information of China (English)

    吴中福

    2001-01-01

    经验和技术,充分利用地方资源提供了很好的机会。我相信,通过这次研讨会,通过相互学习、互相交流,国内外政府、企业、以及专家学者必能携手并进,为在此领域的进一步的合作,为建设重庆美好的未来做出贡献! 藉此,我谨祝国际研讨会圆满成功。 谢谢! 2001年3月6日 Message from WU Zhong-fu President of Chongqing University Distinguished guests, ladies and gentlemen: Good morning! It is my great pleasure to speak at "International Seminar on Industrialised Housing in Chongqing" at the beginning of the spring of this promising new century. I'd like to take this opportunity to extend my warmest welcome to all the foreign and Chinese leaders, experts, researchers and practitioners attending this seminar. Chongqing is the central city, traffic hinge and foreign trade port along Yangtze River and in the southwest part of China. Since the establishment of China, great changes have taken place and remarkable achievements have been acquired in economy, city construction, education and other aspects. Though development and progress have been made in housing development, the level of techniques, management and the quality of people engaged in construction need to be improved. In the 21st century, more and more specialists and scholars have realised that promoting housing industrialisation is an effective way to meet the need for houses from local people, since the traditional way of housing building can not reach the requirement of the quantity and quality of houses in Chongqing. As one of the biggest comprehensive universities in the west, Chongqing University possesses great strength in scientific research and technological innovation. Especially after the merge with former Chongqing Jianzhu University and Chongqing Civil Engineering &Technology College in 2000, 23 faculties have been set up with varieties of disciplines and subjects. Such a reform has greatly enhanced the

  9. A hazard-independent approach for the standardised multi-channel dissemination of warning messages

    Science.gov (United States)

    Esbri Palomares, M. A.; Hammitzsch, M.; Lendholt, M.

    2012-04-01

    The tsunami disaster affecting the Indian Ocean region on Christmas 2004 demonstrated very clearly the shortcomings in tsunami detection, public warning processes as well as intergovernmental warning message exchange in the Indian Ocean region. In that regard, early warning systems require that the dissemination of early warning messages has to be executed in way that ensures that the message delivery is timely; the message content is understandable, usable and accurate. To that end, diverse and multiple dissemination channels must be used to increase the chance of the messages reaching all affected persons in a hazard scenario. In addition to this, usage of internationally accepted standards for the warning dissemination such as the Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) Distribution Element specified by the Organization for the Advancement of Structured Information Standards (OASIS) increase the interoperability among different warning systems enabling thus the concept of system-of-systems proposed by GEOSS. The project Distant Early Warning System (DEWS), co-funded by the European Commission under the 6th Framework Programme, aims at strengthening the early warning capacities by building an innovative generation of interoperable tsunami early warning systems based on the above mentioned concepts following a Service-oriented Architecture (SOA) approach. The project focuses on the downstream part of the hazard information processing where customized, user-tailored warning messages and alerts flow from the warning centre to the responsible authorities and/or the public with their different needs and responsibilities. The information logistics services within DEWS generate tailored EDXL-DE/CAP warning messages for each user that must receive the message according to their preferences, e.g., settings for language, interested areas, dissemination channels, etc.. However, the significant difference in the implementation and

  10. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  11. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  12. Response time analysis of mixed messages in CAN

    Directory of Open Access Journals (Sweden)

    S. Arthy,

    2015-03-01

    Full Text Available Controller Area Network (CAN is a network protocol that allows multiple processors in a system to communicate efficiently with each other. Microprocessors became small enough and powerful enough to start appearing everywhere, not just inside personal computers. A CAN system sends messages using a serial bus network, with the individual nodes (processors in the network linked together in a daisy chain. Every node in the system is equal to every other node. Any processor can send a message to any other processor, and if any processor fails, the other systems in the machine will continue to work properly and communicate with each other.In modern vehicle technology CAN is used to reduce point to point wiring harness for vehicle automation and for data communication. To overcome the drawbacks of analog vehicle driving interface, this paper presents the development and implementation of a digital driving system for a semi-autonomous vehicle to improve the driver-vehicle interface. This offers increased flexibility and expandability. This system uses sensors to measure temperature, distance from the other car, presence of alcohol in car, position monitoring, theft monitoring and etc., and sends a warning signal to the driver if any of the parameter goes out of range to avoid accidents. In addition to this if accident occurs in any remote area then using vibration sensor, accident is detected and SMS is send immediately using GSM and preventing him from potentially getting into a serious problems.

  13. Alcohol Messages in Prime-Time Television Series.

    Science.gov (United States)

    Russell, Cristel Antonia; Russell, Dale W

    2009-01-01

    Alcohol messages contained in television programming serve as sources of information about drinking. To better understand the ways embedded messages about alcohol are communicated, it is crucial to objectively monitor and analyze television alcohol depictions. This article presents a content analysis of an eight-week sample of eighteen prime-time programs. Alcohol messages were coded based on modalities of presentation, level of plot connection, and valence. The analysis reveals that mixed messages about alcohol often coexist but the ways in which they are presented differ: whereas negative messages are tied to the plot and communicated verbally, positive messages are associated with subtle visual portrayals.

  14. The Application of the Cooperative Principle in Text Messages

    Institute of Scientific and Technical Information of China (English)

    李军霞

    2015-01-01

    The language of text messages speeds up the transmission of information,shows the richness of languages,and contains all kinds of implication. Many researches on text messages have been published but the analysis of the languages of text messages in the domain of Grice’s cooperative principle is open to investigate. This paper explores the language of text messages based on Grice’s Cooperative Principle(CP) and its maxims,which aims to understand how the theory influences the text message communication and create some humorous effect. It is of practical significance to research text messages as a kind of language phenomenon.

  15. The Application of the Cooperative Principle in Text Messages

    Institute of Scientific and Technical Information of China (English)

    李军霞

    2015-01-01

    The language of text messages speeds up the transmission of information,shows the richness of languages,and contains all kinds of implication. Many researches on text messages have been published but the analysis of the languages of text messages in the domain of Grice’s cooperative principle is open to investigate. This paper explores the language of text messages based on Grice’s Cooperative Principle (CP) and its maxims,which aims to understand how the theory influences the text message communication and create some humorous effect. It is of practical significance to research text messages as a kind of language phenomenon.

  16. Educational Messages in Tevfik Fikret's Poems

    Science.gov (United States)

    Erdal, Kelime

    2011-01-01

    Being in the education community for long years, Tevfik Fikret aims to educate children and teenagers with the works he has written while he is carrying out his profession. Knowing child's world very well, the poet gives messages which can be counted valid in today's education perception. Emphasizing the basic humanistic and moral values such as…

  17. Maintaining High Assurance in Asynchronous Messaging

    Science.gov (United States)

    2015-10-24

    be inconvenient and not consistent with normal dialog communication. II. PRIOR WORK A proliferation of standards for asynchronous messaging has...Software Technology Conference, “A Persona -Based Framework for Flexible Delegation and Least Privilege,” Las Vegas, Nevada, May 2008. [25] William

  18. Perfectly secure message transmission in two rounds

    NARCIS (Netherlands)

    G. Spini (Gabriele); Zémor, G (Gilles); M. Hirt; A. Smith

    2016-01-01

    textabstractIn the model that has become known as "Perfectly Secure Message Transmission"(PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that

  19. Interactive source and message effects in persuasion.

    Science.gov (United States)

    Siu, Wanda

    2010-04-01

    In this study, the influence of source and message frame on judgments of a public service announcement was examined. The participants in the experiment were 408 undergraduate students (126 men, 280 women, 2 unknown; M age=20.0, SD=2.5, range=18-23) of a Midwestern U.S. university. Message frame and source were manipulated in a between-subjects design. Two levels of the message frame were benefits of physical activity and costs of not engaging in regular physical activity; the source was a healthy or unhealthy individual. In the Healthy-source condition, "Kim Jones" set realistic goals for exercise and had a healthy lifestyle. Conversely, she was described as a sedentary individual who led an unhealthy lifestyle in the Sick-source condition. Results indicated that respondents in the conditions of gain frame-healthy source and cost frame-unhealthy source had more positive message judgment as compared to respondents in the conditions of gain frame-unhealthy source and cost frame-healthy source.

  20. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  1. Princess Picture Books: Content and Messages

    Science.gov (United States)

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  2. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  3. Automated telephone reminder messages can assist electronic diabetes care.

    Science.gov (United States)

    Mollon, Brent; Holbrook, Anne M; Keshavjee, Karim; Troyan, Sue; Gaebel, Kathryn; Thabane, Lehana; Perera, Gihan

    2008-01-01

    Telephone reminder systems have been used to assist in the treatment of many chronic diseases. However, it is unclear if these systems can increase medication and appointment adherence in patients with diabetes without direct patient-provider telephone contact. We tested the feasibility of using an automated telephone reminder system (ATRS) to deliver reminder messages to 253 adults with diabetes enrolled in a randomized controlled trial. Eighty-four percent of the patients were able to register using voice recognition and at least one reminder was delivered to 95% of registered patients over a period of 7.5 months. None of the demographic features studied predicted a patient's ability to enroll or to receive reminder calls. At the end of the study, 63% of patients indicated that they wished to continue to receive ATRS calls. The level of system use as determined by the number of received reminder calls was not associated with a change in the number of physician visits or diabetes-related laboratory tests during follow-up. The clinical benefits and sustainability of ATRS remain unproven, but our results indicate that an automated reminder system can be effective for providing messages to a large group of older patients with diabetes.

  4. Short Message,Long Progress

    Institute of Scientific and Technical Information of China (English)

    ByYangWenhui

    2004-01-01

    Whenever remembering the past handle of de-warehousing forms, Chen Xuejun, general supervisor of the supply chain management, and general supervisor of the information system of Nippon Paint (China) Co., Ltd always gives a helpless impression: “such forms amount to several thousands each month, and it is impossible to keep a real time track of all of them.Usually, we keep track only of forms for important customers and customers ordering emergency services to ensure timely delivery of goods”.

  5. A Bespoke Technique for Secret Messaging

    Directory of Open Access Journals (Sweden)

    Mahimn Pandya

    2013-04-01

    Full Text Available The communication of digital assets on the internet infrastructure is increasing in its volume with threats on its security with regard to active and passive attacks of eavesdroppers. This concern has opened up the research channel to improve the techniques of secure and reliable communication protecting intellectual property rights and message security. Constant efforts of researchers in this area to achieve communication at faster rate maintaining security of digital assets, is giving improved techniques to achieve the goal. The efforts made here in this work are in the direction to enhance level of security in making faster reliable and secure communication. In spite of continued efforts, still as on today, it is challenging to hide the communication from eavesdropper. The disciplines of Cryptography, Steganography and Digital Watermarking are still popular areas of research. They are continuously digging to find robust and effective algorithms to protect digital communications and digital assets. It is very true that if the complexity in algorithm is increased, higher security level can be achieved. In the reviewed work, Researchers have developed algorithms for text encryption and embedment in digital watermarking using LSB at cost of time. The proposed work is targeted to maintain the tradeoff between the complexity level of algorithm and security level of message considering the time factor. The proposed work has evolved with two algorithms: AMEADT (ASCII Message Encryption and Decryption Technique to protect secret message and AMEAET (ASCII Message Embedment and Extraction Technique to embed encrypted text to digital image. The implementation of these algorithms has resulted in justifying higher level of security with comparatively lower level of complexity of algorithm.

  6. Communication opportunities via special messaging technology for two post-coma persons with multiple disabilities.

    Science.gov (United States)

    Lancioni, Giulio E; O'Reilly, Mark F; Singh, Nirbhay N; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Lanzilotti, Crocifissa; de Pace, Claudia; Megna, Marisa; Oliva, Doretta

    2011-01-01

    This study extended the assessment of a special messaging technology with two additional post-coma adults who had emerged from a minimally conscious state, but showed multiple disabilities including profound motor and communication impairments. For each participant, the study involved an ABAB design, in which the A represented baseline phases and the B represented intervention phases with the special messaging technology. The technology involved a net-book computer provided with specific software, a global system for mobile communication (GSM) modem, microswitches, and prerecorded verbal lists of persons' names and messages. Both participants learned to send out and receive (listen to) messages independently during the intervention, thus providing clear support for previous data in the area. They sent out means of about three and 17 messages and received means of about two and six messages per 20- and 30-min session, respectively. The positive impact of the technology was discussed in relation to previous data in this area and the possibility of helping post-coma persons with multiple disabilities engage in basic communication with distant partners.

  7. Enhancing the effects of a narrative message through experiential information processing: An experimental study.

    Science.gov (United States)

    Dillard, Amanda J; Hisler, Garrett

    2015-01-01

    First-person narratives are becoming a popular means to communicate health risk information. Although studies show they can increase risk perception and motivate health behaviours compared to statistical messages, more research on the conditions in which they are particularly likely to have effects is needed. In this study, we tested a moderator related to how information is processed. Specifically, we hypothesised that thinking in terms of emotions and personal experiences - known as experiential information processing - would increase people's responsiveness to a narrative. Female college students (N = 138) who reported indoor tanning were randomly assigned to read a first-person narrative message or a statistical message about the risks of skin cancer. Prior to reading the message, the women received instructions that would activate either experiential or rational information processing. Participants then reported their risk perceptions of skin cancer, worry about skin cancer and behaviour intentions related to skin cancer. Analyses showed that message type and information processing interacted to influence risk perceptions and worry. Consistent with hypotheses, participants reported the highest risk perception and worry when they used an experiential information system prior to reading the narrative message. There were no effects on behaviour intentions. Implications of these findings are discussed.

  8. The Effects of Obesity-Related Health Messages on Explicit and Implicit Weight Bias

    Science.gov (United States)

    Rudolph, Almut; Hilbert, Anja

    2017-01-01

    The pervasiveness of explicit and implicit weight bias (WB) defined as negative stereotypes and prejudice regarding one’s weight has been observed among individuals of all weight categories. As a source of WB, health messages have been discussed due to reinforcing stigmatizing notions. The present study sought to investigate whether health messages (i.e., eat healthy, become physically active) have the potential to increase explicit and implicit WB. Participants (N = 144) from the community were randomized to either an experimental group (EG) or a control group (CG). While the EG was presented with health messages, the CG was presented with neutral information. Before and after manipulation, participants completed measures of explicit and implicit WB. Paired samples t-test revealed no differences in explicit WB after manipulation, however, a small effect decrease of implicit WB in the EG but not in the CG was found. This study provided evidence that health messages might have differential impact to change WB. According to dual-model approaches, explicit and implicit WB tap into two different information processing systems, and thus were differentially affected by health messages. Brief exposure to health messages might have the potential to contribute to health behavior and to mitigate implicit WB. PMID:28123375

  9. ASSESSING AND MITIGATING THE IMPACTS OF DYNAMIC MESSAGE SIGNS ON HIGHWAY TRAFFIC

    Directory of Open Access Journals (Sweden)

    Miao Song

    2016-03-01

    Full Text Available As a critical component in Intelligent Transportation Systems (ITS of modern traffic management, dynamic message signs (DMS are widely used in many countries as an effective means to provide motorists with up-to-date information regarding accidents, congestion, road conditions and travel time, etc. However, it was observed in traffic data that motorists tended to slow down when approaching active DMSs and speed up after passing these signs. The speed variations could pose safety hazards to other motorists on highways. To gain insights into this issue and understand associated causes and risks, a human factors study was conducted to help ease the speed variation when approaching DMSs. The effect of DMS messages on traffic approaching and passing the signs were assessed by analyzing highway traffic data near DMSs. A questionnaire survey was conducted to identify associated causes and risks. Participants were further surveyed about their preferences on DMS characteristics such as message category, message type, number of frames, message details, and the use of graphics. Individual drivers' responses to various DMS designs were evaluated through a simulation test. This study has provided updated knowledge regarding the effects of DMSs on highway traffic and has identified measures to improve the design and display of DMS messages to help ease the speed variation of approaching traffic.

  10. Making Vaccine Messaging Stick: Perceived Causal Instability as a Barrier to Effective Vaccine Messaging.

    Science.gov (United States)

    Dixon, Graham N

    2017-08-01

    Health officials often face challenges in communicating the risks associated with not vaccinating, where persuasive messages can fail to elicit desired responses. However, the mechanisms behind these failures have not been fully ascertained. To address this gap, an experiment (N = 163) tested the differences between loss-framed messages-one emphasizing the consequence of not receiving a flu vaccine; the other emphasizing the consequence of receiving the flu vaccine. Despite an identical consequence (i.e., Guillain-Barre syndrome), the message highlighting the consequence of not receiving the flu vaccine produced lower negative affect scores as compared to the message highlighting the consequence of receiving the flu vaccine. Mediation analyses suggest that one reason for this difference is due to non-vaccination being perceived as temporary and reversible, whereas vaccination is perceived as being permanent. Implications on health communication and future research are discussed.

  11. Mobile Learning Environment with Short Messaging Service: Application to a Campus Environment in a Developing Country

    Science.gov (United States)

    Premadasa, H. K. Salinda; Meegama, R. Gayan N.

    2013-01-01

    Purpose: The purpose of this paper is to discuss how to integrate secure, open-source and mobile-based system with the Moodle learning management system (MLMS) then describe the implementation of a campus-wide mobile learning environment with short messaging system (SMS) and how this platform is incorporated with the student's learning…

  12. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  13. Yap: A High-Performance Cursor on Target Message Router

    Science.gov (United States)

    2014-09-01

    Yap: A High-Performance Cursor on Target Message Router by Jesse Kovach ARL-TR-7096 September 2014...High-Performance Cursor on Target Message Router Jesse Kovach Computational and Information Sciences Directorate, ARL...

  14. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, Lise; Ringgaard, L W; Dalum, Peter

    2014-01-01

    the entire study population, as well as those opting for text messages (n = 1619). In intention-to-treat analysis with multiple imputation of missing data, the odds ratio for 30-day point abstinence was 1.28 (95% CI 0.91-2.08) for the tailored compared with untailored messages. When restricting the analysis...... to those who had chosen to receive text messages, the corresponding odds ratio was 1.45 (95% CI 1.01-2.08). The higher long-term quit rates in the group receiving the tailored text messages compared with untailored text messages in the restricted analysis indicated that tailoring and higher frequency......The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...

  15. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  16. Robust message authentication code algorithm for digital audio recordings

    Science.gov (United States)

    Zmudzinski, Sascha; Steinebach, Martin

    2007-02-01

    Current systems and protocols for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code (RMAC) to verify the integrity of audio recodings by means of robust audio fingerprinting and robust perceptual hashing. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information.

  17. Short Message Service (SMS) Security Solution for Mobile Devices

    Science.gov (United States)

    2006-12-01

    tunnels, the SMS messages are stored unencrypted at the SMSC. This means that employees of SMSC operators, or others who can hack into the system... hacks against smart cards are available, extraction of 13 information directly from the card is generally difficult and it requires physical access to...GPRS Class B / Multi-slot Class10 Bluetooth v2.0 compliant, WiFi IEEE802.11b Camera Built-in 2.0 Mega Pixels, up to 1600 x 1200 resolution

  18. Vers la reconnaissance de mini-messages manuscrits

    CERN Document Server

    Prochasson, Emmanuel; Viard-Gaudin, Christian

    2009-01-01

    Handwriting is an alternative method for entering texts which composed Short Message Services. However, a whole new language features the texts which are produced. They include for instance abbreviations and other consonantal writing which sprung up for time saving and fashion. We have collected and processed a significant number of such handwritten SMS, and used various strategies to tackle this challenging area of handwriting recognition. We proposed to study more specifically three different phenomena: consonant skeleton, rebus, and phonetic writing. For each of them, we compare the rough results produced by a standard recognition system with those obtained when using a specific language model to take care of them.

  19. Split-C and active messages under SUNMOS on the Intel Paragon

    Energy Technology Data Exchange (ETDEWEB)

    Reisen, R. [Sandia National Labs., Albuquerque, NM (United States); Maccabe, A.B. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1994-04-01

    The compute power of the individual nodes of massively parallel systems increases steadily, while network latencies and bandwidth have not improved as quickly. Many researches believe that it is necessary to use explicit message passing in order to get the best possible performance out of these systems. High level parallel languages are shunned out of fear they might compromise performance. In this paper we have a look at one such language called Split-C. It fits into a middle ground between efforts such as High Performance Fortran (HPF) and explicit message passing. HPF tries to hide the underlying architecture from the programmer and let the compiler and the run time system make decision about parallelization, location of data, and the mechanisms used to transfer the data from one node to another. On the other hand, explicit message passing leaves all the decision to the programmer. Split-C allows access to a global address space, but leaves the programmer in control of the location of data, and offers a clear cost model for data access. Split-C is based on Active Messages. We have implemented both under the SUNMOS operating system on the Intel Paragon. We will discuss performance issues of Split-C and make direct comparisons to the Thinking Machines CM-5 implementation. We will also scrutinize Active Messages, discuss their properties and drawbacks, and show that other mechanisms can be used to support Split-C.

  20. EDITORIAL: Message from the Editor Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2010-02-01

    November 2009 and provided particularly detailed advice to the authors. The other three have been very helpful in 'minority fields'. We have excluded our Board members, Guest Editors of special editions and those referees who were already listed in the last four years. Guest Editors' work on papers submitted to their Special Issues is also excluded from consideration. The following people have been selected: Tomonori Takizuka, JAEA-Naka Fusion Institute, Japan Rudolf Neu, Max-Planck-Institut für Plasmaphysik, Germany Sibylle Guenter, Max-Planck-Institut für Plasmaphysik, Germany Taik-Soo Hahm, Princeton Plasma Physics Laboratory, United States David R. Mikkelsen, Princeton Plasma Physics Laboratory, United States Peter C. de Vries, EURATOM/UKAEA Fusion Association, United Kingdom Yasuhiro Suzuki, National Institute for Fusion Science, Japan Jerzy Wolowski, Institute of Plasma Physics and Laser Microfusion, Poland Tetsuo Tanabe, Kyushu University, Japan Yasuyuki Yagi, National Institute of Advanced Industrial Science and Technology, Japan Congratulations and many, many thanks! The Guest Editors of special editions deserve a special mention for the excellent help that they have given us. They are: Taik-Soo Hahm, Princeton Plasma Physics Laboratory, United States, Special Issue on H-Mode Physics and Transport Barriers Yaroslav Kolesnichenko, Institute for Nuclear Research, Ukraine, Special Issue on Energetic Particles in Magnetic Confinement Systems Kimitaka Itoh, National Institute for Fusion Science, Japan and Howard R. Wilson, University of York, UK, Special Issue on Plasma Instabilities Bernhard Unterberg, Forschungszentrum Juelich, Germany, Special Issue on Stochastic Fusion Plasma In addition, there is a group of several hundred referees who have helped us in the past year to maintain the high scientific standard of Nuclear Fusion. At the end of this issue we give the full list of all referees for 2009. Our thanks to them! Authors The winner of the 2009 Nuclear Fusion

  1. Potential Nutrition Messages in Magazines Read by College Students.

    Science.gov (United States)

    Hertzler, Ann A.; Grun, Ingolf

    1990-01-01

    Surveyed advertisements in magazines read by college students in nutrition class for hidden food and nutrition messages. Hidden messages for females could imply beauty through fashion products, beauty aids, and supplements but with nutrition slimming plan. Males may be receiving subtle message that food choices do not matter and that alcohol and…

  2. Lol: New Language and Spelling in Instant Messaging

    Science.gov (United States)

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  3. 19 CFR 4.7d - Container status messages.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements...

  4. Teaching Students the Persuasive Message through Small Group Activity

    Science.gov (United States)

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  5. Content analysis of antismoking videos on YouTube: message sensation value, message appeals, and their relationships with viewer responses.

    Science.gov (United States)

    Paek, Hye-Jin; Kim, Kyongseok; Hove, Thomas

    2010-12-01

    Focusing on several message features that are prominent in antismoking campaign literature, this content-analytic study examines 934 antismoking video clips on YouTube for the following characteristics: message sensation value (MSV) and three types of message appeal (threat, social and humor). These four characteristics are then linked to YouTube's interactive audience response mechanisms (number of viewers, viewer ratings and number of comments) to capture message reach, viewer preference and viewer engagement. The findings suggest the following: (i) antismoking messages are prevalent on YouTube, (ii) MSV levels of online antismoking videos are relatively low compared with MSV levels of televised antismoking messages, (iii) threat appeals are the videos' predominant message strategy and (iv) message characteristics are related to viewer reach and viewer preference.

  6. Ritual, meaningfulness, and interstellar message construction

    Science.gov (United States)

    Traphagan, John W.

    2010-10-01

    In this paper, I am interested in exploring the potential of ritual performance as a means of communication with ETI. I argue that the study of ritual and ritualized behavior, understood as a technique for representation of meaning and meaningfulness about the world, has potential to inform how scientists think about the construction and interpretation of interstellar messages. I do not suggest that ritual activities themselves provide more than limited potential for communication with ETI. However, the structural elements of ritual and the manner in which meaning is conveyed through the formality and repetition of ritual is at least to some extent decipherable cross-culturally and provides one way to think about how to express important aspects of humans and their cultures to ETI and to represent, if not specific meanings themselves, the fact that a message is meaningful.

  7. Ensuring message embedding in wet paper steganography

    CERN Document Server

    Augot, Daniel; Fontaine, Caroline

    2011-01-01

    Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded decoding. In 2005, Fridrich et al. introduced wet paper codes to improve the undetectability of the embedding by nabling the sender to lock some components of the cover-data, according to the nature of the cover-medium and the message. Unfortunately, almost all existing methods solving the bounded decoding syndrome problem with or without locked components have a non-zero probability to fail. In this paper, we introduce a randomized syndrome coding, which guarantees the embedding success with probability one. We analyze the parameters of this new scheme in the case of perfect codes.

  8. Sending and Addressing Messages in Web Services

    OpenAIRE

    Borkowski, Piotr

    2007-01-01

    This thesis provides an overview of Web Services technology. The concept of Web Services and Service Oriented Architecture are explained. The thesis focuses on the mechanisms for transporting and addressing messages in web services, especially SOAP. It presents the development history of SOAP, an overview of the SOAP 1.2 specification, and the differences between SOAP in version 1.1 and 1.2. Further, the thesis presents two web servers for development and deployment of web services using Java...

  9. The perfect message at the perfect moment.

    Science.gov (United States)

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  10. Message From The Chief Editor

    Directory of Open Access Journals (Sweden)

    Chief Editor

    2014-05-01

    validate an existing tool for assessing learning environment in TVET.  The discussion of the validation process can bring a better understanding on instrument development and validation in general which is an added benefit to the validated instrument.   Both students’ and teachers’ readiness is especially critical where new innovations are introduced. With increasing use of ICT innovations in teaching and learning practices, and in management of TVET, more efforts are being made to understand factors that may contribute to the success of such initiatives. In the fifth article, by Ruhizan et al., they discuss one potential factor that is, the readiness in using e-portfolios among vocational teacher and students in relation to its successful implementation in vocational education.  They provide findings and recommendations that can be useful to managers and practitioners who are at the early stage or planning to implement e-portfolios.    Outside the national TVET system, vocational trainings are often adopted as the solution in promoting successful career move in certain professions such as the military service. In career change, where the repercussion of failure is enormous, readiness becomes more crucial.  In the sixth paper, Zakaria et al. investigate the readiness of military retirees for career change as indicated by their competence in managing their vocational skills development.  Interesting findings related to retirees’ readiness and readiness of training providers are discussed for greater understandings. Going international, Maringa’s article discusses the initiatives that can be implemented to improve the industry readiness TVET graduates in Kenya.  The articles’ recommendations based on extensive situational analysis will be useful to TVET managers and practitioners worldwide. I hope that these articles are useful and have encouraged more thoughts on the relevance of readiness in ensuring learning in TVET.  My heartiest gratitude goes to

  11. Effects of motives on reactions to safe sun messages.

    Science.gov (United States)

    Aspden, Trefor; Ingledew, David K; Parkinson, John A

    2015-01-01

    We investigated whether appearance motive for sun exposure, which strongly predicts exposure behaviour, would predict reactions to safe sun messages. In a survey with an embedded experiment, 245 individuals completed measures of motives, read a safe sun message framed by incentive (appearance/health), tone (directive/nondirective) and valence (gain/loss), then completed measures of reactions. For participants high in appearance motive, an appearance-nondirective message was most persuasive. Regardless of individual's appearance motive, appearance messages produced lower reactance if phrased using nondirective language. To maximise persuasion and minimise reactance in individuals most motivated to sun expose, safe sun messages should focus on appearance using nondirective language.

  12. The study results steganography hiding messages in image files as vehicle security software

    Directory of Open Access Journals (Sweden)

    D. O. Navrotskyi

    2012-11-01

    Full Text Available Synergetics of steganographic and cryptographic encryption algorithms, which provide a solid security foundation, is presented in this paper. Hiding messages systems in spatial and frequency domain image are compared and studied by the author. The following questions: Compression scheme JPEG , JPEG – transformation structure, Practical recommendations for hiding data to image files, The method of least significant bits (spatial domain and the DCT coefficients values relative replacement method (frequency domain, Packing and unpacking the hidden message, Visual distortion image changing system parameters are considered.

  13. NMACA Approach Used to Build a Secure Message Authentication Code

    Science.gov (United States)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  14. A Service-Oriented Healthcare Message Alerting Architecture in an Asia Medical Center: A Case Study

    Directory of Open Access Journals (Sweden)

    Jin-Shin Lai

    2009-06-01

    Full Text Available This paper illustrates how our development team has used some information technologies to let physicians obtain an instant abnormal laboratory result report for critical patient care services. We have implementeda healthcare message alerting system (HMAS on a healthcare short message service (HSMS engine and the distributed healthcare-oriented service environment (DiHOSE in the National Taiwan University Hospital (NTUH. The HSMS engine has a general interface for all applications which could easily send any kind of alerting messages. Fundamentally, the DiHOSE uses HL7 standard formats to process the information exchange behaviors and can be flexibly extended for reasonable user requirements. The disease surveillance subsystem is an integral part of NTUH new hospital information system which is based on DiHOSE and the disease surveillance subsystem would send alerting messages through the HSMS engine. The latest cell phone message alerting subsystem, a case study, in NTUH proved that the DiHOSE could integrate the user required functions without much work. We concluded that both HSMS and DiHOSE can generalize and extend application demands efficiently.

  15. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  16. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  17. Emerging adults' perceptions of messages about physical appearance.

    Science.gov (United States)

    Gillen, Meghan M; Lefkowitz, Eva S

    2009-06-01

    Emerging adults receive messages about physical appearance from a range of sources, but few studies have examined the content of these messages. Undergraduates (N=154) who identified as African American, Latino American, and European American answered 4 open-ended questions about messages they perceived about physical appearance from family, peers, school, and media. Raters coded responses for content and affect. The most common messages perceived were the importance/non-importance of appearance, positive comments about appearance, and the link between attractiveness and success. The perception of these messages frequently differed by gender and source, but rarely by ethnicity. Women perceived more frequent and more negative messages than did men. Individuals perceived the media as transmitting more negative messages and the family more healthful and positive ones.

  18. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  19. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  20. The impact of text message reminders on adherence to antimalarial treatment in northern Ghana: a randomized trial.

    Science.gov (United States)

    Raifman, Julia R G; Lanthorn, Heather E; Rokicki, Slawa; Fink, Günther

    2014-01-01

    Low rates of adherence to artemisinin-based combination therapy (ACT) regimens increase the risk of treatment failure and may lead to drug resistance, threatening the sustainability of current anti-malarial efforts. We assessed the impact of text message reminders on adherence to ACT regimens. Health workers at hospitals, clinics, pharmacies, and other stationary ACT distributors in Tamale, Ghana provided flyers advertising free mobile health information to individuals receiving malaria treatment. The messaging system automatically randomized self-enrolled individuals to the control group or the treatment group with equal probability; those in the treatment group were further randomly assigned to receive a simple text message reminder or the simple reminder plus an additional statement about adherence in 12-hour intervals. The main outcome was self-reported adherence based on follow-up interviews occurring three days after treatment initiation. We estimated the impact of the messages on treatment completion using logistic regression. 1140 individuals enrolled in both the study and the text reminder system. Among individuals in the control group, 61.5% took the full course of treatment. The simple text message reminders increased the odds of adherence (adjusted OR 1.45, 95% CI [1.03 to 2.04], p-value 0.028). Receiving an additional message did not result in a significant change in adherence (adjusted OR 0.77, 95% CI [0.50 to 1.20], p-value 0.252). The results of this study suggest that a simple text message reminder can increase adherence to antimalarial treatment and that additional information included in messages does not have a significant impact on completion of ACT treatment. Further research is needed to develop the most effective text message content and frequency. ClinicalTrials.gov NCT01722734.

  1. The impact of text message reminders on adherence to antimalarial treatment in northern Ghana: a randomized trial.

    Directory of Open Access Journals (Sweden)

    Julia R G Raifman

    Full Text Available BACKGROUND: Low rates of adherence to artemisinin-based combination therapy (ACT regimens increase the risk of treatment failure and may lead to drug resistance, threatening the sustainability of current anti-malarial efforts. We assessed the impact of text message reminders on adherence to ACT regimens. METHODS: Health workers at hospitals, clinics, pharmacies, and other stationary ACT distributors in Tamale, Ghana provided flyers advertising free mobile health information to individuals receiving malaria treatment. The messaging system automatically randomized self-enrolled individuals to the control group or the treatment group with equal probability; those in the treatment group were further randomly assigned to receive a simple text message reminder or the simple reminder plus an additional statement about adherence in 12-hour intervals. The main outcome was self-reported adherence based on follow-up interviews occurring three days after treatment initiation. We estimated the impact of the messages on treatment completion using logistic regression. RESULTS: 1140 individuals enrolled in both the study and the text reminder system. Among individuals in the control group, 61.5% took the full course of treatment. The simple text message reminders increased the odds of adherence (adjusted OR 1.45, 95% CI [1.03 to 2.04], p-value 0.028. Receiving an additional message did not result in a significant change in adherence (adjusted OR 0.77, 95% CI [0.50 to 1.20], p-value 0.252. CONCLUSION: The results of this study suggest that a simple text message reminder can increase adherence to antimalarial treatment and that additional information included in messages does not have a significant impact on completion of ACT treatment. Further research is needed to develop the most effective text message content and frequency. TRIAL REGISTRATION: ClinicalTrials.gov NCT01722734.

  2. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  3. Personal messages reduce vandalism and theft of unattended scientific equipment

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-01-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40–60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure. PMID:25866614

  4. Design and Implementation of Web Services Security Based on Message Layer

    Institute of Scientific and Technical Information of China (English)

    WANG Cui-ru; XU Zheng-wei; YUAN He-jin; MA Hui-min

    2004-01-01

    Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science.However, it has not made great progress in research on Web Services security.Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security.Web Services technology needs a solution integrated in Web Services framework to realize end-to-end security.Based on cryptography and Web Services technology and according to W3C, XML encryption specification, XML digital Signature specification and WS-Security, which proposed by IBM and Microsoft, a new Web services security model based on message layer is put forward in this paper.The message layer is composed of message handlers.It is inserted into the message processing sequence and provides transparent security services for Web Services.To verify the model, a Web Services security system is realized on .net platform.The implementation version of the model can provide various security services, and has advantages such as security, scalability, security controllability and end-to-end security in message level.

  5. Getting your message out with social marketing.

    Science.gov (United States)

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  6. Electronic folklore among teenagers: SMS messages

    Directory of Open Access Journals (Sweden)

    Cvjetićanin Tijana

    2006-01-01

    Full Text Available The development of ICT media made way for a new form of folklore communication. Newly developed media, such as mobile phones, make it possible for their users to participate in electronically mediated communication, thus approaching the form of oral communication. The exchange of special type of SMS text messages represents a new way of transmitting contemporary folklore short forms. These messages use poetic language, they have standard style themes, patterns and formulas, and they form different genres and categories corresponding with already existing familiar folklore forms. The communication process that happens during the exchange of these messages also has folklore’s characteristics: it takes place within small groups, the communication is informal, the texts circulate in chain style, and undergo different transformation which generates the making of variants, etc. This form of electronic folklore is especially popular among teenagers, where it’s social functions and meanings are also most emphasized. Within this population, it adds to an older tradition of children’s written folklore poetry albums. Like poetry albums, SMS exchange influences the development of girls’ gender identity, providing also a socially defined channel for contacts between the sexes. It also functions as a mechanism of socialization and stratification within the group. At the same time, it creates a new field of meaning, which derives from the very media’s novelty and significance. In this sense, the exchange of SMS represents a symbolic act of acknowledging one’s belonging to the group of mobile telephone users. In this way, a new phenomenon is being symbolically processed through a new form of folklore.

  7. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  8. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    This article presents the results of a study of two SMS services aimed at providing young people with information on cannabis and helping them to reduce their consumption of the drug. The attitude of the 12 participants in the study towards the SMS services is generally positive, but they prefer...... factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...

  9. Neuroscience and education: myths and messages.

    Science.gov (United States)

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.

  10. Compressive Imaging via Approximate Message Passing

    Science.gov (United States)

    2015-09-04

    20] uses an adaptive Wiener filter [21] for 2D denoising. Another option is to use a more sophisticated image 2D denoiser such as BM3D [22] within AMP... filtering ,” IEEE Trans. Image Process ., vol. 16, no. 8, pp. 2080–2095, Aug. 2007. [23] J. Tan, Y. Ma, H. Rueda, D. Baron, and G. Arce, “Application of...JOURNAL OF SELECTED TOPICS IN in Signal Processing , (06 2015): 1. doi: Jin Tan, Yanting Ma, Dror Baron. Compressive Imaging via Approximate MessagePassing

  11. IMP: A Message-Passing Algorithmfor Matrix Completion

    CERN Document Server

    Kim, Byung-Hak; Pfister, Henry D

    2010-01-01

    A new message-passing (MP) method is considered for the matrix completion problem associated with recommender systems. We attack the problem using a (generative) factor graph model that is related to a probabilistic low-rank matrix factorization. Based on the model, we propose a new algorithm, termed IMP, for the recovery of a data matrix from incomplete observations. The algorithm is based on a clustering followed by inference via MP (IMP). The algorithm is compared with a number of other matrix completion algorithms on real collaborative filtering (e.g., Netflix) data matrices. Our results show that, while many methods perform similarly with a large number of revealed entries, the IMP algorithm outperforms all others when the fraction of observed entries is small. This is helpful because it reduces the well-known cold-start problem associated with collaborative filtering (CF) systems in practice.

  12. Transference & Retrieval of Pulse-code modulation Audio over Short Messaging Service

    CERN Document Server

    Khan, Muhammad Fahad

    2012-01-01

    The paper presents the method of transferring PCM (Pulse-Code Modulation) based audio messages through SMS (Short Message Service) over GSM (Global System for Mobile Communications) network. As SMS is text based service, and could not send voice. Our method enables voice transferring through SMS, by converting PCM audio into characters. Than Huffman coding compression technique is applied in order to reduce numbers of characters which will latterly set as payload text of SMS. Testing the said method we develop an application using J2me platform

  13. Provably Secure Self-certified Multi-proxy Signature with Message Recovery

    Directory of Open Access Journals (Sweden)

    Qi Xie

    2012-10-01

    Full Text Available Signature schemes with message recovery based on self-certified public keys can reduce the amount of communications and computations, since the signature verification, the public key authentication and the message recovery are simultaneously carried out in a single logical step. Integrating self-certified public-key systems and the message recovery signature schemes, in 2009, Wu et al. proposed two multi-proxy signatures based on the discrete logarithms over a finite field and the elliptic curve discrete logarithms. The proxy warrant revision attacks are proposed, and it will show that Wu et al.’s schemes can not resist the proxy warrant revision attacks by either the proxy group or the original signer. Further, a formal model of self-certified multi-proxy signature and a new scheme are proposed. The proposed scheme is provably secure in the random oracle model.

  14. End-to-end Encryption for SMS Messages in the Health Care Domain.

    Science.gov (United States)

    Hassinen, Marko; Laitinen, Pertti

    2005-01-01

    The health care domain has a high level of expectation on security and privacy of patient information. The security, privacy, and confidentiality issues are consistent all over the domain. Technical development and increasing use of mobile phones has led us to a situation in which SMS messages are used in the electronic interactions between health care professionals and patients. We will show that it is possible to send, receive and store text messages securely with a mobile phone with no additional hardware required. More importantly we will show that it is possible to obtain a reliable user authentication in systems using text message communication. Programming language Java is used for realization of our goals. This paper describes the general application structure, while details for the technical implementation and encryption methods are described in the referenced articles. We also propose some crucial areas where the implementation of encrypted SMS can solve previous lack of security.

  15. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  16. Estelle Specification of MIL-STD 188-220 Datalink Layer Interoperability Standard for Digital Message Transfer Device Subsystems

    Science.gov (United States)

    1995-11-01

    ESTELLE SPECIFICATION OF MIL- STD 188-220 DATALINK LAYER* INTEROPERABILITY STANDARD FOR DIGITAL MESSAGE TRANSFER DEVICE SUBSYSTEMS Hao Li Paul...Estelle specification. 1. Introduction The military standard "Interoperability Standard for Digital Message Transfer Device Subsystems" (MIL- STD -188- 220...5,6] represents the army’s focused efforts to digitize the battlefield. The army is hoping that by 2001, all systems will either use MIL- STD -188

  17. Soft real-time alarm messages for ATLAS TDAQ

    Science.gov (United States)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-05-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG—Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring "interesting" parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  18. Soft real-time alarm messages for ATLAS TDAQ

    Energy Technology Data Exchange (ETDEWEB)

    Darlea, G., E-mail: georgiana.lavinia.darlea@cern.c [CERN, Geneva (Switzerland); Al Shabibi, A.; Martin, B.; Lehmann Miotto, G. [CERN, Geneva (Switzerland)

    2010-05-21

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  19. Source entitativity and the elaboration of persuasive messages: the roles of perceived efficacy and message discrepancy.

    Science.gov (United States)

    Clark, Jason K; Wegener, Duane T

    2009-07-01

    Compared with nonentitative groups, entitative targets are considered to elicit more elaborative processing because of the singularity or unity they represent. However, when groups serve as sources of persuasive messages, other dynamics may operate. The current research suggests that entitativity is intrinsically linked to perceptions of a group's efficacy related to the advocacy, and this efficacy combines with the position of the appeal to determine message elaboration. When messages are counterattitudinal, entitative (efficacious) sources should elicit greater processing than nonentitative groups because of concern that the entitative sources may be more likely to bring about the negative outcomes proposed. However, when appeals are proattitudinal, sources low in entitativity (nonefficacious) should initiate more elaboration due to concern that they may be unlikely to facilitate the positive outcomes proposed. These hypotheses were supported in a series of studies. Preliminary studies established the entitativity-efficacy relation (Studies 1A and 1B). Primary persuasion studies showed that manipulations of source entitativity (Studies 2 and 3) and source efficacy (Studies 4A and 4B) have opposite effects on processing as a function of message discrepancy.

  20. Stages in the Analysis of Persuasive Messages: The Role of Causal Attributions and Message Comprehension.

    Science.gov (United States)

    Wood, Wendy; Eagly, Alice H.

    According to an attribution analysis, changing one's opinion toward the position advocated in a persuasive message is an outcome of one's inferences concerning why the communicator has taken the position. A study was undertaken to clarify the cognitive steps by which recipients went from information about communicator characteristics or…

  1. Comics: a medium for today's development messages.

    Science.gov (United States)

    Opilas, E A

    1978-03-01

    Filipino illustrated magazines, or the comics, may yet prove to be the most effective media, if not the most effective, for spreading the country's development messages. Long criticized by intellectuals and the social elite, the comics have been grossly underrated in their potential to inform, persuade, and even influence the life-style of the people. The government's Commission on Population (Popcom) has developed an information-education-communication program using the comics, among other media, to disseminate stories on family planning, responsible parenthood, and related topics. Its best quality is popular appeal, and for publishers and distribution outlets, the comics provide good business. A review of these materials shows that their themes reflect the following topics or issues: 1) population trends and consequences; 2) socioeconomic benefits of family planning; 3) customs which influence family planning; 4) family planning concepts; 5) family planning methods; 6) human sexuality and reproduction; 7) the husband-wife relationship; 8) guides for family planning motivation or communication; and 9) guides for teaching family planning. The materials were developed with 4 qualities in mind so as to attract audience or reader interest: simplicity, familiarity, realism, and attractiveness of materials. The consensus is that in the comics, population and development agencies may have found a "secret weapon" in getting these messages across, and that this new-found use for the illustrated magazines may be giving them a new respectability without in any way diminishing their popular appeal.

  2. On the Conceptual Ambiguity Surrounding Perceived Message Effectiveness

    Science.gov (United States)

    Yzer, Marco; LoRusso, Susan; Nagler, Rebekah H.

    2015-01-01

    Health message quality is best understood in terms of a message’s ability to effectively produce change in the variables that it was designed to change. The importance of determining a message’s effectiveness in producing change prior to implementation is clear: The better a message’s potential effectiveness is understood, the better able interventionists are to distinguish effective from ineffective messages before allocating scarce resources to message implementation. For this purpose, research has relied on perceived message effectiveness measures as a proxy of a message’s potential effectiveness. Remarkably, however, very little conceptual work has been done on perceived message effectiveness, which renders its measures under-informed and inconsistent across studies. To encourage greater conceptual work on this important construct, we review several threats to the validity of existing measures and consider strategies for improving our understanding of perceived message effectiveness. PMID:25470437

  3. MAXIMUM PRODUCTION OF TRANSMISSION MESSAGES RATE FOR SERVICE DISCOVERY PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Intisar Al-Mejibli

    2011-12-01

    Full Text Available Minimizing the number of dropped User Datagram Protocol (UDP messages in a network is regarded asa challenge by researchers. This issue represents serious problems for many protocols particularly thosethat depend on sending messages as part of their strategy, such us service discovery protocols.This paper proposes and evaluates an algorithm to predict the minimum period of time required betweentwo or more consecutive messages and suggests the minimum queue sizes for the routers, to manage thetraffic and minimise the number of dropped messages that has been caused by either congestion or queueoverflow or both together. The algorithm has been applied to the Universal Plug and Play (UPnPprotocol using ns2 simulator. It was tested when the routers were connected in two configurations; as acentralized and de centralized. The message length and bandwidth of the links among the routers weretaken in the consideration. The result shows Better improvement in number of dropped messages `amongthe routers.

  4. 客户停复电短信综合信息发布系统的开发与应用%The development and application of customers stop reply message SMS information release system

    Institute of Scientific and Technical Information of China (English)

    殷俊

    2013-01-01

      通过对客户用电缴费存在的问题的分析、研究,提出了利用客户停复电短信综合信息发布系统的有效支撑,为用电客户及抄表工作人员提供短信提醒服务,做实居民、低压客户电费催收工作,提高用电缴费工作的客户满意度,为电力营销优质服务提供有力保障。%  Through analysis and research of problems of the electricity payment, the article puts forward that using effective support of client stop reply message SMS information release sys⁃tem, can provide customers and electricity meter reading staff for SMS alerts service, do well tariff collection work for residents, the low voltage electricity customers, improve customer satisfaction, l guarantee electric power marketing service.

  5. 机场信息系统消息中间件通信控制策略%Communication control strategy of message oriented middleware in airport information system

    Institute of Scientific and Technical Information of China (English)

    杜建树; 熊桂喜

    2005-01-01

    在机场管理信息系统这一类大型系统中,常利用消息中间件进行系统集成.由于机场业务的复杂性,消息种类与数量都非常巨大,且与业务密切相关,而通用消息中间件由于无法与业务紧密结合,在实际运行中会产生效率问题,也给应用消息中间件的应用程序开发带来困难.专用机场消息中间件通信控制策略较好地解决了冗余消息、消息逻辑顺序混乱等问题,提高了运行效率,简化了应用开发难度,对其它利用MOM(Message Oriented Middleware)集成的大型应用系统同样具有借鉴意义.

  6. The relationships between message passing, pairwise, Kermack-McKendrick and stochastic SIR epidemic models

    CERN Document Server

    Wilkinson, Robert R; Sharkey, Kieran J

    2016-01-01

    We consider a generalised form of Karrer and Newman's (Phys. Rev. E 82, 016101, 2010) message passing representation of S(E)IR dynamics and show that this, and hence the original system of Karrer and Newman, has a unique feasible solution. The rigorous bounds on the stochastic dynamics, and exact results for trees, first obtained by Karrer and Newman, still hold in this more general setting. We also derive an expression which provides a rigorous lower bound on the variance of the number of susceptibles at any time for trees. By applying the message passing approach to stochastic SIR dynamics on symmetric graphs, we then obtain several key results. Firstly we obtain a low-dimensional message passing system comprising of only four equations. From this system, by assuming that transmission processes are Poisson and independent of the recovery processes, we derive a non-Markovian pairwise model which gives exactly the same infectious time series as the message passing system. Thus, this pairwise model provides th...

  7. Community Alert: Using Text Messaging and Social Media to Improve Campus Emergency Planning

    Science.gov (United States)

    Connolly, Maureen

    2014-01-01

    This article describes emergency management and the part that social media technologies and mobile messaging have made when they are included as part of the campus emergency plan. Administrators have found that ample notification and preparedness must be built into campus communication systems. Social media platforms such as Twitter and Facebook…

  8. Fault Analysis of Wind Turbines Based on Error Messages and Work Orders

    DEFF Research Database (Denmark)

    Borchersen, Anders Bech; Larsen, Jesper Abildgaard; Stoustrup, Jakob

    2012-01-01

    In this paper data describing the operation and maintenance of an offshore wind farm is presented and analysed. Two different sets of data is presented; the first is auto generated error messages from the Supervisory Control and Data Acquisition (SCADA) system, the other is the work orders...

  9. Community Alert: Using Text Messaging and Social Media to Improve Campus Emergency Planning

    Science.gov (United States)

    Connolly, Maureen

    2014-01-01

    This article describes emergency management and the part that social media technologies and mobile messaging have made when they are included as part of the campus emergency plan. Administrators have found that ample notification and preparedness must be built into campus communication systems. Social media platforms such as Twitter and Facebook…

  10. Effects of speech versus tactile driver support messages on driving behaviour and workload

    NARCIS (Netherlands)

    Martens, M.H.; Winsum, W. van

    2001-01-01

    In a driving simulator experiment, effects were tested of an integrated support system on driving behaviour, user acceptance and workload. An alternative workload measure was used based upon peripheral vision. Two modes of support (tactile and speech messages) were compared to a control condition wi

  11. Music carries a message to youths.

    Science.gov (United States)

    Coleman, P L

    1986-01-01

    The most widely played song in Mexico in March 1986 is a special record designed to encourage young people to be sexually responsible and not to bring into the world children they cannot care for. "It's OK to say 'no,'" is the message of a unique new family planning and health communication project designed to reach young people in 11 Spanish speaking countries of Latin America and the Caribbean. What makes this ambitious regional project so unique is not just the message or the remarkable success of the 1st song but the combination of materials that were produced, the way they were produced, and how they are now being used throughout the region. The Population Communication Services project in the Johns Hopkins School of Hygiene and Public Health (JHU/PCS) has been working in Latin America and elsewhere for 4 years to support innovative family planning communication projects. It became evident that 1 key group was not being reached, i.e., young people aged 13-18 who comprise approximately 30% of the total population in Latin America. The fertility and sexual behavior of young people have a significant impact on their own lives, their community, their country, and the region. Early pregnancy is a major health and social problem throughout the region and the world. To address this problem, the JHU/PCS decided to develop a regional Latin American project to make young people more sharply aware of the personal advantages to them of responsible parenthood. JHU/PCS put together a financial, marketing, and institutional package. The US Agency for International Development (USAID) provided the finances. Analysis showed that the common denominator for young people throughout the region is music. The decision was made to produce 2 songs, each with a music video, pressed on each side of 45 rpm single records and enclosed in a full-size, full-color, 2-sided record jacket which folds out into a poster. The next step was to refine the general message of sexual responsibility to

  12. 3-Receiver Broadcast Channels with Common and Confidential Messages

    CERN Document Server

    Chia, Yeow-Khiang

    2009-01-01

    Achievable secrecy rate regions for the general 3-receiver broadcast channel with one common and one confidential message sets are established. We consider two setups: (i) when the confidential message is to be sent to two of the receivers and the third receiver is an eavesdropper; and (ii) when the confidential message is to be sent to one of the receivers and the other two receivers are eavesdroppers. We show that our secrecy rate regions are optimum for some special cases.

  13. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    OpenAIRE

    Cho Choong-Ho; Leung VictorCM; Won Jeong-Jae; Vadapalli Murahari

    2009-01-01

    The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that ha...

  14. The Use of WhatsApp Smartphone Messaging Improves Communication Efficiency within an Orthopaedic Surgery Team.

    Science.gov (United States)

    Ellanti, Prasad; Moriarty, Andrew; Coughlan, Fionn; McCarthy, Thomas

    2017-02-18

    Effective and timely communication is important for any surgical specialty to function. The use of smartphones is prevalent amongst doctors. Numerous smartphone applications offer the potential for fast and cost-effective communication. WhatsApp is a commonly used application that is free, easy to use, and capable of text and multimedia messaging. We report on the use of WhatsApp over a six month period in our unit. WhatsApp communication between non-consultant members of an orthopaedic team over a six-month period was analysed. Both the phones and the WhatsApp application were password-protected, and patient details were anonymised. A series of 20 communications using the hospital pager system and the telephone system were also analysed. A total of 5,492 messages were sent during the six-month period and were part of 1,916 separate communication events. The vast majority of messages, 5,090, were related to patient care. A total of 195 multimedia messages were sent and these included images of radiographs and wounds. When using the hospital telephones, the length of time spent on a communication averaged 5.78 minutes and using the hospital pager system averaged 7.45 minutes. Using the WhatsApp messaging system has potentially saved up to 7,664 minutes over the study period. All participants found WhatsApp easy to use and found it to be more efficient than the traditional pager system Conclusion: Compared to the traditional pager systems, the use of WhatsApp is easy, inexpensive, and reliable and can help improve the efficiency of communication within a surgical team.

  15. A Secure Hash Function MD-192 With Modified Message Expansion

    CERN Document Server

    Tiwari, Harshvardhan

    2010-01-01

    Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is presented that produces 192 bit message digest and uses a modified message expansion mechanism which generates more bit difference in each working variable to make the algorithm more secure. This hash function is collision resistant and assures a good compression and preimage resistance.

  16. A readability comparison of anti- versus pro-influenza vaccination online messages in Japan.

    Science.gov (United States)

    Okuhara, Tsuyoshi; Ishikawa, Hirono; Okada, Masahumi; Kato, Mio; Kiuchi, Takahiro

    2017-06-01

    Historically, anti-vaccination sentiment has existed in many populations. Mass media plays a large role in disseminating and sensationalizing vaccine objections, especially via the medium of the Internet. Based on studies of processing fluency, we assumed that anti-influenza vaccination online messages to be more readable and more fluently processed than pro-influenza vaccination online messages, which may consequently sway the opinions of some audiences. The aim of this study was to compare readability of anti- and pro-influenza vaccination online messages in Japan using a measure of readability. Web searches were conducted at the end of August 2016 using two major Japanese search engines (Google.jp and Yahoo!.jp). The included websites were classified as "anti", "pro", or "both" depending on the claims, and "health professional" or "non-health professional" depending on the writers' expertise. Readability was determined using a validated measure of Japanese readability (the Japanese sentence difficulty discrimination system). Readability of "health professional" websites was compared with that of "non-health professional" websites, and readability of "anti" websites was compared with that of "pro" websites, using the t-test. From a total of 145 websites, the online messages written by non-health professionals were significantly easier to read than those written by health professionals (p = 0.002, Cohen's d = 0.54). Anti-influenza vaccination messages were significantly easier to read than pro-influenza vaccination messages (p vaccination materials for publication online, we recommend they check for readability using readability assessment tools and improve the text for easy reading if necessary.

  17. Power System Fault Diagnosis Considering Absence of Alarm Messages of Circuit Breakers on the Border of Outage Area%停电区域边界断路器信息缺失时的电网故障诊断

    Institute of Scientific and Technical Information of China (English)

    王磊; 陈青; 李天友; 高湛军; 李兆飞

    2013-01-01

      当电网中的元件发生故障,相关保护会跳开断路器以切断故障电流,最终形成一个或多个停电区域。如果将可疑故障元件限定在停电区域内,故障诊断程序的效率会得到很大的提升。然而在调度中心收到的跳闸断路器信息有缺失的情况下,由于无法形成停电区域,故障诊断程序只能对电网中所有元件逐一进行诊断,并且还容易造成对故障元件的漏判。针对断路器报警信息丢失的情况,从图论角度出发,以点割集算法为基础划分出多个可能包含故障元件的无源区域,然后通过skyline多目标优化查询方法,对这些无源区域按可疑元件查准率由高到低的顺序进行排列,并提供给故障诊断程序,保证了诊断速度的同时,能够防止故障元件的漏判。最后使用Petri网为诊断工具,以故障诊断算例验证了该方法的有效性。%When a fault takes place on a section in a power grid, the corresponding protective relays will trip the related circuit breakers to cut off the fault current. As a result, one or more outage areas would be formed. If the faulty section is restricted in the outage area, the efficiency of fault diagnosis program will be greatly promoted. On the other side, if the control center can not receive the whole alarm message of circuit beakers, all of the sections must be diagnosed because the outrage area can not be gotten. Furthermore, wrong diagnosis results may be gotten because of the missing of alarm messages. Given this back ground, based on graph theory, one or more outrage area can be partitioned by cut-set of nodes. Multi-objective optimization method skyline query was applied to sort the outrage area decreasingly based on the precision rate of fault section. The developed diagnosis method could make the diagnosis program much faster, and can insure the fault section will not be omitted. Petri net was applied as the diagnosis tool

  18. Ecological Evaluation of Persuasive Messages Using Google AdWords

    CERN Document Server

    Guerini, Marco; Stock, Oliviero

    2012-01-01

    In recent years there has been a growing interest in crowdsourcing methodologies to be used in experimental research for NLP tasks. In particular, evaluation of systems and theories about persuasion is difficult to accommodate within existing frameworks. In this paper we present a new cheap and fast methodology that allows fast experiment building and evaluation with fully-automated analysis at a low cost. The central idea is exploiting existing commercial tools for advertising on the web, such as Google AdWords, to measure message impact in an ecological setting. The paper includes a description of the approach, tips for how to use AdWords for scientific research, and results of pilot experiments on the impact of affective text variations which confirm the effectiveness of the approach.

  19. Congestion Reduction Using Ad hoc Message Dissemination in Vehicular Networks

    CERN Document Server

    Hewer, Thomas D

    2008-01-01

    Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and location-aware services. The ability to disseminate information in an ad-hoc fashion allows pertinent information to propagate faster through the network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to the receivers of this information. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols for influencing traffic flow, reducing congestion in road networks. The computational experiments presented in this paper show how an intelligent driver model (IDM) and car-following model can be adapted to 'react' to the reception of information. This model also presents the advantages of coupling together traffic modelling tools and network simulation tools.

  20. Impacts of variable message signs on traffic congestion

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The variable message signs (VMS) have been widely used in guiding and managing the dynamic traffic with development of intelligent transportation technologies. It is known that cell transmission model (CTM) can well reproduce such traffic dynamics as shock waves and jams. This paper presents a new method to estimate the route travel times by using the CTM in conjunction with a logit-based route choice rule. The impacts of VMS on a two-route scenario with recurrent and non-recurrent traffic congestion are numerically investigated by analyzing the changes of route flow and travel time. Simulation results show that in networks with suitable long links, the VMS can positively influence travelers’ decision making so as to improve the system performance. For non-recurrent congestion, the value space of the route choice parameter that affects the flow distribution between two routes is narrower in the case of high traffic demand than that in the low demand case.

  1. Framing political messages to fit the audience's regulatory orientation: how to improve the efficacy of the same message content.

    Directory of Open Access Journals (Sweden)

    Lucia Mannetti

    Full Text Available This research investigates how the impact of persuasive messages in the political domain can be improved when fit is created by subliminally priming recipients' regulatory focus (either promotion or prevention and by linguistic framing of the message (either strategic approach framing or strategic avoidance framing. Results of two studies show that regulatory fit: a increases the impact of a political message favoring nuclear energy on implicit attitudes of the target audience (Study 1; and b induces a more positive evaluation of, and intentions to vote for, the political candidate who is delivering a message concerning immigration policies (Study 2.

  2. Framing political messages to fit the audience's regulatory orientation: how to improve the efficacy of the same message content.

    Science.gov (United States)

    Mannetti, Lucia; Brizi, Ambra; Giacomantonio, Mauro; Higgins, E Tory

    2013-01-01

    This research investigates how the impact of persuasive messages in the political domain can be improved when fit is created by subliminally priming recipients' regulatory focus (either promotion or prevention) and by linguistic framing of the message (either strategic approach framing or strategic avoidance framing). Results of two studies show that regulatory fit: a) increases the impact of a political message favoring nuclear energy on implicit attitudes of the target audience (Study 1); and b) induces a more positive evaluation of, and intentions to vote for, the political candidate who is delivering a message concerning immigration policies (Study 2).

  3. Direct messaging to parents/guardians to improve adolescent immunizations.

    Science.gov (United States)

    Bar-Shain, David S; Stager, Margaret M; Runkle, Anne P; Leon, Janeen B; Kaelber, David C

    2015-05-01

    To study the impact on adolescent immunization rates of direct messages to parents/guardians. Electronic health record rules identified adolescents needing an immunization. Parents/guardians of adolescents were messaged via a single vendor using automated text, prerecorded voice, and/or postcard. Parents/guardians of 3,393 patients, ages 11-18 years, with one or more primary care visits in the prior 2 years, identified as needing (average of 2.04 years) a vaccination (meningococcal conjugate, human papillomavirus, or tetanus, diphtheria, and pertussis vaccines) were messaged (mean age, 14 years; 50% male; 38% African-American; 23% white; 19% Hispanic; and 79% public health insurance). A total of 7,094 messages were sent: 3,334 automated voice (47%), 2,631 texts (37%), and 1,129 postcards (16%). After the first message, 865 adolescents (25.5%) received at least one vaccine. Within 24 weeks of messaging 1,324 vaccines (745 human papillomavirus; 403 meningococcal conjugate; and 176 tetanus, diphtheria, and pertussis vaccines) occurred in 959 visits (83.8% physician visits and 16.2% nurse visits). Average visits generated $204 gross reimbursement for $1.77 in messaging expenses per vaccine given. No differences in immunization completion rates occurred by age, gender, race/ethnicity, or insurance type. At 24 weeks, one message was more effective than two or three messages (35.6%, 19.4%, and 24.1% effectiveness, respectively; p Texts and postcards correlated with more vaccination visits (38.8% and 40.1%, respectively) than phone calls (31.5%; p = .04). More vaccines due led to increasing message effectiveness. Automated texts, voice messages, and postcards had a significant positive effect on vaccination rates in adolescents needing vaccination and required minimal financial expenditure. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  4. Enhanced Secure Algorithm for Message Communion

    CERN Document Server

    Rasool, Shaik; Kumar, K Hemanth; Kumar, P Ravi

    2011-01-01

    This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the al...

  5. Message-Passing Estimation from Quantized Samples

    CERN Document Server

    Kamilov, Ulugbek; Rangan, Sundeep

    2011-01-01

    Estimation of a vector from quantized linear measurements is a common problem for which simple linear techniques are suboptimal -- sometimes greatly so. This paper develops generalized approximate message passing (GAMP) algorithms for minimum mean-squared error estimation of a random vector from quantized linear measurements, notably allowing the linear expansion to be overcomplete or undercomplete and the scalar quantization to be regular or non-regular. GAMP is a recently-developed class of algorithms that uses Gaussian approximations in belief propagation and allows arbitrary separable input and output channels. Scalar quantization of measurements is incorporated into the output channel formalism, leading to the first tractable and effective method for high-dimensional estimation problems involving non-regular scalar quantization. Non-regular quantization is empirically demonstrated to greatly improve rate--distortion performance in some problems with oversampling or with undersampling combined with a spar...

  6. Decoding the `Nature Encoded' Messages for Distributed Energy Generation Control in Microgrid

    CERN Document Server

    Gong, Shuping; Lai, Lifeng; Qiu, Robert C

    2010-01-01

    The communication for the control of distributed energy generation (DEG) in microgrid is discussed. Due to the requirement of realtime transmission, weak or no explicit channel coding is used for the message of system state. To protect the reliability of the uncoded or weakly encoded messages, the system dynamics are considered as a `nature encoding' similar to convolution code, due to its redundancy in time. For systems with or without explicit channel coding, two decoding procedures based on Kalman filtering and Pearl's Belief Propagation, in a similar manner to Turbo processing in traditional data communication systems, are proposed. Numerical simulations have demonstrated the validity of the schemes, using a linear model of electric generator dynamic system.

  7. Distributed Algorithm for Constructing Efficient Tree Topology for Message Dissemination in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    S. Kamakshi

    2014-01-01

    Full Text Available Vehicular ad hoc network is an ad hoc network constituted among moving vehicles that have wireless dedicated short range communication (DSRC devices in order to provide ubiquitous connectivity even if the road-side infrastructure is unavailable. Message dissemination in vehicular ad hoc networks is necessary for exchanging information about prevailing traffic information, so that the vehicles can take alternate routes to avoid traffic jam. A major challenge in broadcast protocols is that they result in flooding of messages that reduce the speed of dissemination due to collision. Dissemination of messages using tree topology reduces the number of rebroadcasts. Dynamicity Aware Graph Relabeling System model provides a framework to construct spanning tree in mobile wireless network. In this paper, we propose a new distributed algorithm for constructing an arbitrary spanning tree based on Dynamicity Aware Graph Relabeling System model, which develops a maximum leaf spanning tree in order to reduce the number of rebroadcasts and dissemination time. Our simulation results prove that the number of vehicles rebroadcasting the message is curtailed to 15% and the dissemination time required to achieve 100% reachability is curtailed by 10% under average vehicle density.

  8. Effects of Targeted Sales Messages on Subscription Sales and Retention.

    Science.gov (United States)

    Gamst, Glenn; And Others

    1987-01-01

    Investigates the effects of targeted sales messages on newspaper subscription sales and retention by combining two large research projects--a demographic market segmentation scheme, and a readership-lifestyle survey. Proposes that the content of sales messages influences new subscriptions but does not affect retention. (MM)

  9. Effective Compiler Error Message Enhancement for Novice Programming Students

    Science.gov (United States)

    Becker, Brett A.; Glanville, Graham; Iwashima, Ricardo; McDonnell, Claire; Goslin, Kyle; Mooney, Catherine

    2016-01-01

    Programming is an essential skill that many computing students are expected to master. However, programming can be difficult to learn. Successfully interpreting compiler error messages (CEMs) is crucial for correcting errors and progressing toward success in programming. Yet these messages are often difficult to understand and pose a barrier to…

  10. Emotional Responses to Environmental Messages and Future Behavioral Intentions

    Science.gov (United States)

    Perrin, Jeffrey L.

    2011-01-01

    The present research investigated effects of message framing (losses-framed or gains-framed), message modality (video with text or text-only) and emotional arousal on environmentally responsible behavioral intentions. The sample consisted of 161 college students. The present research did not find a significant difference in behavioral intentions…

  11. Message framing and credibility: application in dental services.

    Science.gov (United States)

    Arora, R

    2000-01-01

    This study uses an experimental approach to test the influence of message framing and credibility on the attitude toward a dental exam and consumers' intention to use the dental office. The findings indicate a strong effect of credibility on attitude as well as intention. The influence of framing is also statistically significant. Implications for marketers in terms of message strategy are discussed.

  12. Messages Discriminated from the Media about Illicit Drugs.

    Science.gov (United States)

    Patterson, Scott J.

    1994-01-01

    Investigates how much and what type of information college students receive from the media about drugs. Interviews were conducted with 228 students using the message discrimination protocol. Results are discussed in terms of the audience receiving fear and fight messages rather than clear, accurate information necessary to make informed decisions…

  13. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  14. Persuasion with Unintelligible Messages: A Cognitive Response Analysis.

    Science.gov (United States)

    Padgett, Vernon R.; Brock, Timothy C.

    Theories of persuasion have long assumed a process which includes comprehension of the message by the recipient. Several hundred undergraduates at Ohio State University and Marshall University (Ohio) participated in six experiments examining persuasion and the use of unintelligible messages. Subjects in individual cubicles of a university language…

  15. Using BDH for the Message Authentication in VANET

    Directory of Open Access Journals (Sweden)

    Mei-Wen Huang

    2014-01-01

    Full Text Available The transport message security provided by vehicles in VANETs is quite important; vehicle message should be real-time and it will be not complicated to validate message calculation. The method proposed in the essay is mainly to validate the identity by means of Bilinear Diffie-Hellman method, and make vehicles validate the authenticity of RSU and TA’s identity and the effectiveness of key. RSU and TA only need to validate vehicle identity, without helping vehicles produce any key. When vehicle identity validation is completed, vehicles will produce public value and transmit it to other RSU and vehicles, while other vehicles could validate the identity through the message from the sender and public value from RSU. The advantages of the method proposed in this essay are listed as follows. (1 Vehicles, RSU, and TA can validate mutual identities and the effectiveness of keys. (2 Vehicles can produce public value functions automatically, thus reducing key control risks. (3 Vehicles do not need to show certificates to validate their identities, preventing the certificates from attacking because of long-term exposure. (4 Vehicles adopt a pseudonym ID challenge to validate their own identities during the process of handoff. (5 Vehicle messages can be validated using the Bilinear Diffie-Hellman (BDH method without waiting for the RSU to validate messages, thus improving the instantaneity of messaging. The method proposed in the essay can satisfy source authentication, message integrity, nonrepudiation, privacy, and conditional untraceability requirements.

  16. 47 CFR 80.327 - Urgency signals and messages.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Urgency signals and messages. 80.327 Section 80... Safety Procedures § 80.327 Urgency signals and messages. (a) The urgency signal indicates that the... vehicle, or the safety of a person. The urgency signal must be sent only on the authority of the master or...

  17. 47 CFR 80.329 - Safety signals and messages.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Safety signals and messages. 80.329 Section 80... Safety Procedures § 80.329 Safety signals and messages. (a) The safety signal indicates that the station... warnings. (b) In radiotelegraphy, the safety signal consists of three repetitions of the group TTT, sent...

  18. An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption

    OpenAIRE

    Awasthi, Amit K; Lal, Sunder

    2005-01-01

    Blind signature schemes enable a useful protocol that guarantee the anonymity of the participants while Signcryption offers authentication of message and confidentiality of messages at the same time and more efficiently. In this paper, we present a blind signcryption scheme that combines the functionality of blind signature and signcryption. This blind Signcryption is useful for applications that are based on anonymity untracebility and unlinkability.

  19. Transmission of Correlated Messages over Interference Channels with Strong Interference

    Science.gov (United States)

    Choi, Suhan; Yoon, Eunchul; Moon, Hichan

    Transmission of correlated messages over interference channels with strong interference is considered. As a result, an achievable rate region is presented. It is shown that if the messages are correlated, the achievable rate region can be larger than the capacity region given by Costa and El Gamal. As an example, the Gaussian interference channel is considered.

  20. Resonant Messages to Prevent Prescription Drug Misuse by Teens

    Science.gov (United States)

    Twombly, Eric C.; Holtz, Kristen D.; Agnew, Christine B.

    2011-01-01

    Prescription drug misuse is a major health problem, particularly among teens. A key step in curbing misuse is the development of effective prescription drug prevention messages. This paper explores the elements of prescription drug misuse prevention messages that resonate with teens using data from focus groups with seventh and eighth grade…

  1. Exchanging Second Language Messages Online: Developing an Intercultural Communicative Competence?

    Science.gov (United States)

    Schuetze, Ulf

    2008-01-01

    This article reports on a study carried out twice on an online second language course that was set up between a Canadian University and a German University. In that course, students of German in Canada and students of English in Germany exchanged 2,412 messages in 2004 and 1,831 messages in 2005. A list of processing criteria for assessment was…

  2. How peer conversations about HIV/AIDS media messages affect ...

    African Journals Online (AJOL)

    2016-06-16

    Jun 16, 2016 ... Keywords: beliefs, comprehension, health messages, interpersonal discussions, female adolescents, prevention. Résumé ... prehension of the participants (do they understand the message?), on their perceived comprehension (do they think ... relationships on decision making among individuals. The Diffu-.

  3. Effects of Targeted Sales Messages on Subscription Sales and Retention.

    Science.gov (United States)

    Gamst, Glenn; And Others

    1987-01-01

    Investigates the effects of targeted sales messages on newspaper subscription sales and retention by combining two large research projects--a demographic market segmentation scheme, and a readership-lifestyle survey. Proposes that the content of sales messages influences new subscriptions but does not affect retention. (MM)

  4. Multiculturalism and AIDS: different communities mean different educational messages required.

    Science.gov (United States)

    Lechky, O

    1997-05-15

    Having a multitude of different ethnic communities forces Canada's AIDS educators to use many different methods to deliver their messages. These range from an AIDS bingo game that has been used to educate natives in northern Manitoba to attempts to take AIDS education to the streets of Toronto. With AIDS education, reports Olga Lechky, one message definitely does not fit all.

  5. Children's Text Messaging: Abbreviations, Input Methods and Links with Literacy

    Science.gov (United States)

    Kemp, N.; Bushnell, C.

    2011-01-01

    This study investigated the effects of mobile phone text-messaging method (predictive and multi-press) and experience (in texters and non-texters) on children's textism use and understanding. It also examined popular claims that the use of text-message abbreviations, or "textese" spelling, is associated with poor literacy skills. A sample of 86…

  6. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication.

  7. Framing Effects in Narrative and Non-Narrative Risk Messages.

    Science.gov (United States)

    Steinhardt, Joseph; Shapiro, Michael A

    2015-08-01

    Narrative messages are increasingly popular in health and risk campaigns, yet gain/loss framing effects have never been tested with such messages. Three experiments examined framing in narrative messages. Experiment 1 found that only the character's decision, not framing, influenced judgments about characters in a narrative derived from a prospect theory context. Experiment 2 found that a framing effect that occurred when presented in a decision format did not occur when the same situation was presented as a narrative. Using a different story/decision context, Experiment 3 found no significant difference in preference for surgery over radiation therapy in a narrative presentation compared to a non-narrative presentation. The results suggest that health and risk campaigns cannot assume that framing effects will be the same in narrative messages and non-narrative messages. Potential reasons for these differences and suggestions for future research are discussed.

  8. Impact of nutrition messages on children's food choice: pilot study.

    Science.gov (United States)

    Bannon, Katie; Schwartz, Marlene B

    2006-03-01

    This pilot study tested the influence of nutrition message framing on snack choice among kindergarteners. Three classrooms were randomly assigned to watch one of the following 60s videos: (a) a gain-framed nutrition message (i.e. the positive benefits of eating apples) (n=14); (b) a loss-framed message (i.e. the negative consequences of not eating apples) (n=18); or (c) a control scene (children playing a game) (n=18). Following this, the children were offered a choice between animal crackers and an apple for their snack. Among the children who saw one of the nutrition message videos, 56% chose apples rather than animal crackers; in the control condition only 33% chose apples. This difference was statistically significant (chi2=7.56, p<0.01). These results suggest that videos containing nutritional messages may have a positive influence on children's short-term food choices.

  9. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  10. The Message Logger for the LHCb on-line farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2005-01-01

    The Message Logger is a utility which provide a logger facility for the processes running on the nodes of the on-line farm. It can also be used to collect the processes stdout/stderr. The Message Logger can be exploited using two different policies: either as a no-drop logger facility (messages cannot be lost, but a write to the logger facility blocks in case of full-buffer condition, due e.g. to a network congestion) or as a congestion-proof logger facility (a write to the logger facility never locks even in case of network congestion, but, in this case, messages are dropped). The Message Logger package includes a Linux DIM server (logSrv), a Linux terminal/command-line DIM client (logViewer) and a PVSS DIM client.

  11. Message Encryption Using Deceptive Text and Randomized Hashing

    Directory of Open Access Journals (Sweden)

    VAMSIKRISHNA YENIKAPATI,

    2011-02-01

    Full Text Available In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and an encrypted special index file to message receiver.The original message is embedded in the meaningful deceptive text.The positions of the characters of the plain text in thedeceptive text are stored in the index file.The receiver decrypts the index file and gets back the original message from the received deceptive text. Authentication is achieved by verifying the hash value of the plaintext created by the Message Digest Algorithm at the receiver side.In order to prevent collision attcks on hashing algorithms that are intended for use with standard digital signature algorithms we provide an extra layer of security using randomized hashing method.

  12. The effects of iPod and text-messaging use on driver distraction: a bio-behavioral analysis.

    Science.gov (United States)

    Mouloua, M; Ahern, A; Quevedo, A; Jaramillo, D; Rinalducci, E; Smither, J; Alberti, P; Brill, C

    2012-01-01

    This study was designed to empirically examine the effects of iPod device and text-messaging activities on driver distraction. Sixty participants were asked to perform a driving simulation task while searching for songs using an iPod device or text messaging. Driving errors as measured by lane deviations were recorded and analyzed as a function of the distracters. Physiological measures (EEG) were also recorded during the driving phases in order to measure participant levels of cortical arousal. It was hypothesized that iPod use and text messaging would result in a profound effect on driving ability. The results showed a significant effect of iPod use and text-messaging on driving performance. Increased numbers of driving errors were recorded during the iPod and text-messaging phases than the pre- and post-allocation phases. Higher levels of Theta activity were also observed during the iPod and Text-messaging phase than the pre- and post-allocation phases. Implications for in-vehicle systems design, training, and safety are also discussed.

  13. Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS

    Directory of Open Access Journals (Sweden)

    M. A. Berlin,

    2011-01-01

    Full Text Available Vehicular ad hoc networks are a special case of mobile ad hoc networks (MANETs. Unlike MANETs, VANET nodes are moving very fast. It becomes quite challenging to maintain a stable path for broadcasting Emergency and Warning (E/ W messages from a risk zone. So routing takes an important role in VANETs. Reducing network overhead, avoiding network congestion, traffic congestion andincreasing packet delivery ratio are the major issues of routing in VANETs. So it is essential to broadcast the risk notification (RN messages such as accident and injury prevention messages, congestion control messages, road condition and other emergency/ warning messages in time to the rear vehicles. In this paper we propose a novel approach to categorize the messages and to give priority for the E/ W messages using a scheduling algorithm. The neighboring vehicles broadcast the RN messages from the risk zone using inter- zone clusters and intra- zone clusters communication to the rear vehicle by applying the proposed scheduling algorithm. Our simulation results show that this approach performs well and produce less network overhead, congestion control and high packet delivery ratio. We compared our approach with the existing protocol.

  14. Short Message Service (SMS) Texting Symbols: A Functional Analysis of 10,000 Cellular Phone Text Messages

    Science.gov (United States)

    Beasley, Robert E.

    2009-01-01

    The purpose of this study was to investigate the use of symbolic expressions (e.g., "BTW," "LOL," "UR") in an SMS text messaging corpus consisting of over 10,000 text messages. More specifically, the purpose was to determine, not only how frequently these symbolic expressions are used, but how they are utilized in terms of the language functions…

  15. Effect of Reinforcement of Oral Health Education Message through Short Messaging Service in Mobile Phones: A Quasi-Experimental Trial

    Directory of Open Access Journals (Sweden)

    Harish C. Jadhav

    2016-01-01

    Full Text Available Objective. This paper aims to assess the effectiveness of reinforcement of oral health education message through short messaging service (SMS in mobile phones. Material and Methods. 400 subjects from two colleges (200 from each college belonging to 18–20 years age group possessing mobile phones were randomly selected and baseline examination of oral hygiene and gingival status was carried out using Oral Hygiene Index (OHI and Gingival Index (GI. Oral health education was provided to all the subjects. Oral health education message was reinforced through short messaging service (SMS in mobile phones for the subjects belonging to the intervention group. There was no such reinforcement for the control group. Follow-up examinations were done at the end of 1st, 2nd, 3rd, and 6th month. After the 3rd month, subjects of the intervention group did not receive oral health education message through short messaging service (SMS and were followed up after next three months. Compiled data was analyzed using SPSS version 16 statistical software. Result. Mean OHI and GI scores in intervention group were significantly (p<0.01 less than those of control group after the 2nd, 3rd, and 6th month. Conclusion. Reinforcement of oral health education message through short messaging service (SMS is effective media to improve oral health.

  16. Short Message Service (SMS) Texting Symbols: A Functional Analysis of 10,000 Cellular Phone Text Messages

    Science.gov (United States)

    Beasley, Robert E.

    2009-01-01

    The purpose of this study was to investigate the use of symbolic expressions (e.g., "BTW," "LOL," "UR") in an SMS text messaging corpus consisting of over 10,000 text messages. More specifically, the purpose was to determine, not only how frequently these symbolic expressions are used, but how they are utilized in terms of the language functions…

  17. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.

    Directory of Open Access Journals (Sweden)

    Teing Yee Yang

    Full Text Available Instant messaging (IM has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.

  18. Using a Random Secret Pre-Distribution Scheme to Implement Message Authentication in VANETs

    Directory of Open Access Journals (Sweden)

    Alan Dahgwo Yein

    2015-10-01

    Full Text Available In recent years, the development of the Intelligent Transportation System (ITS has increased the popularity of vehicular ad hoc networks (VANET. A VANET is designed to enable vehicles to exchange information about traffic or vehicle conditions to help other vehicles avoid traffic accidents or traffic jams. To resist malicious attacks, all vehicles must be anonymous and their routings must be untraceable, but still verifiable. The vehicles must trust each other and communicate confidentially. In a VANET, Road Side Units (RSU are installed on traffic signs or streetlights to help vehicles maintain anonymity, to authenticate messages, or to support confidentiality. However, the coverage of an RSU is limited and the cost of widespread installation is high. RSU installations are incremental, so messages must be authenticated using dense RSUs or sparse RSUs. In this paper, the concept of random key pre-distribution that is used in Wireless Sensor Networks (WSN is modified to random secret pre-distribution (RSP, which integrates identity-based cryptography (IBC to produce a message authentication scheme for VANETs in a sparse RSU environment. In the proposed scheme, vehicles follow a process to determine a common secret, allowing them to authenticate each other and obtain the pairing value as a key for use in message authentication and private communication. Evaluation results show that the proposed scheme outperforms related schemes.

  19. Don't Say That to ME: Opposition to Targeting in Weight-Centric Intervention Messages.

    Science.gov (United States)

    Robinson, Becky; Coveleski, Samantha

    2016-12-02

    Obesity is a global health issue. Despite well-intentioned efforts by public institutions, traditional health promotion techniques often lead to offending those most in need of weight loss. For example, when Bryn Mawr College targeted overweight students to offer a free fitness and nutrition program, it was met with accusations of fat-shaming, indicating that weight-centric messages operate in a more complex sociocultural system than many public health concerns. To better understand reactions to weight-centric health messages, college-aged women evaluated the Bryn Mawr College e-mail. Using an embedded mixed-methods design, analysis revealed that reactions followed four positive themes, six negative themes, and one neutral theme. Statistical tests indicated that health literacy, feminist identification, body dissatisfaction, and body size discrepancy influenced evaluations of message offensiveness and effectiveness. Contrary to the recommendations of traditional behavior change research, these results indicate that audience segmentation and message tailoring may not be effective for promoting weight loss.

  20. Systematic and heuristic processing of majority and minority-endorsed messages: the effects of varying outcome relevance and levels of orientation on attitude and message processing.

    Science.gov (United States)

    Martin, Robin; Hewstone, Miles; Martin, Pearl Y

    2007-01-01

    Two experiments investigated the conditions under which majority and minority sources instigate systematic processing of their messages. Both experiments crossed source status (majority vs. minority) with message quality (strong vs. weak arguments). In each experiment, message elaboration was manipulated by varying either motivational (outcome relevance, Experiment 1) or cognitive (orientating tasks, Experiment 2) factors. The results showed that when either motivational or cognitive factors encouraged low message elaboration, there was heuristic acceptance of the majority position without detailed message processing. When the level of message elaboration was intermediate, there was message processing only for the minority source. Finally, when message elaboration was high, there was message processing for both source conditions. These results show that majority and minority influence is sensitive to motivational and cognitive factors that constrain or enhance message elaboration and that both sources can lead to systematic processing under specific circumstances.

  1. Public responses to flood warning messages: the Floodline service in Scotland

    Science.gov (United States)

    Cranston, Michael; Geddes, Alistair; Black, Andrew; Ambler, Alice; Menmuir, Cordelia

    2017-04-01

    Over the past decade, efforts have been made to improve the national flood warning system in Scotland, with new capabilities in the underlying flood forecasting tools, as well as development of an active flood warning dissemination service. This paper focusses on the latter service, for which there are around 26,000 customers registered at present, and which saw over 300,000 individual messages being issued during recent floods in winter 2015/16. However, notwithstanding such promising signs of change, evidence of how (if at all) the flood warning messages disseminated by the service actually impacts on recipient behaviour remains more limited. For example, this includes knowledge of the extent to which the messages influence actions on flood preparedness and mitigation. In consequence, there are also ongoing questions over the cost-effectiveness of the service in its current format, and of its scalability to even larger numbers of recipients. This paper will present initial findings from the first detailed study of customer perceptions of the messages distributed via the Scottish flood warning system, officially known as Floodline. In particular, the primary focus will be on results generated from a web-based questionnaire survey of registered Floodline customers. The survey was designed to assess associations between multiple customer characteristics, including location and risk level, type of warning message received, prior experience of flooding, risk awareness, and demographics. The study was conducted for the Scottish Environment Protection Agency, which is responsible for running the Floodline service. More broadly it resonates with current emphases on exploring effective means of hazard communication and encouraging public engagement in flood risk management.

  2. Costs and Difficulties of Interstellar 'Messaging' and the Need for International Debate on Potential Risks

    Science.gov (United States)

    Billingham, J.; Benford, James

    We advocate international consultations on societal and technical issues to address the risk of Messaging to Extraterrestrial Intelligence (METI) transmissions, and a moratorium on future transmissions until such issues are resolved. Instead, we recommend continuing to conduct SETI by listening, with no innate risk, while using powerful new search systems to give a better total probability of detection of beacons and messages than METI for the same cost, and with no need for a long obligatory wait for a response. Realistically, beacons are costly. In light of recent work on the economics of contact by radio, we offer alternatives to the current standard methods of SETI searches. METI transmissions to date are faint and very unlikely to be detected, even by nearby stars. We show that historical leakage from Earth has been undetectable for Earth-scale receiver systems. Future space microwave and laser power systems will likely be more detectable.

  3. Tracking particles by passing messages between images

    Energy Technology Data Exchange (ETDEWEB)

    Chertkov, Michael [Los Alamos National Laboratory; Kroc, Lukas [Los Alamos National Laboratory; Zdeborova, Lenka [Los Alamos National Laboratory; Krakala, Florent [ESPCI; Vergassola, M [CNRS

    2009-01-01

    Methods to extract information from the tracking of mobile objects/particles have broad interest in biological and physical sciences. Techniques based on the simple criterion of proximity in time-consecutive snapshots are useful to identify the trajectories of the particles. However, they become problematic as the motility and/or the density of the particles increases because of the uncertainties on the trajectories that particles have followed during the acquisition time of the images. Here, we report efficient methods for learning parameters of the dynamics of the particles from their positions in time-consecutive images. Our algorithm belongs to the class of message-passing algorithms, also known in computer science, information theory and statistical physics under the name of Belief Propagation (BP). The algorithm is distributed, thus allowing parallel implementation suitable for computations on multiple machines without significant inter-machine overhead. We test our method on the model example of particle tracking in turbulent flows, which is particularly challenging due to the strong transport that those flows produce. Our numerical experiments show that the BP algorithm compares in quality with exact Markov Chain Monte-Carlo algorithms, yet BP is far superior in speed. We also suggest and analyze a random-distance model that provides theoretical justification for BP accuracy. Methods developed here systematically formulate the problem of particle tracking and provide fast and reliable tools for its extensive range of applications.

  4. Who killed Laius?: On Sophocles' enigmatic message.

    Science.gov (United States)

    Priel, Beatriz

    2002-04-01

    Using Laplanche's basic conceptualisation of the role of the other in unconscious processes, the author proposes a reading of Sophocles' tragedy, Oedipus the King, according to basic principles of dream interpretation. This reading corroborates contemporary literary perspectives suggesting that Sophocles' tragedy may not only convey the myth but also provide a critical analysis of how myths work. Important textual inconsistencies and incoherence, which have been noted through the centuries, suggest the existence of another, repressed story. Moreover, the action of the play points to enigmatic parental messages of infanticide and the silencing of Oedipus's story, as well as their translation into primordial guilt, as the origins of the tragic denouement. Oedipus's self-condemnation of parricide follows these enigmatic codes and is unrelated to, and may even contradict, the evidence offered in the tragedy as to the identity of Laius's murderers. Moreover, Sophocles' text provides a complex intertwining of hermeneutic and deterministic perspectives. Through the use of the mythical deterministic content, the formal characteristics of Sophocles' text, mainly its complex time perspective and extensive use of double meaning, dramatise in the act of reading an acute awareness of interpretation. This reading underscores the fundamental role of the other in the constitution of unconscious processes.

  5. Tracking particles by passing messages between images

    Energy Technology Data Exchange (ETDEWEB)

    Chertkov, Michael [Los Alamos National Laboratory; Kroc, Lukas [Los Alamos National Laboratory; Zdeborova, Lenka [Los Alamos National Laboratory; Krakala, Florent [ESPCI; Vergassola, M [CNRS

    2009-01-01

    Methods to extract information from the tracking of mobile objects/particles have broad interest in biological and physical sciences. Techniques based on the simple criterion of proximity in time-consecutive snapshots are useful to identify the trajectories of the particles. However, they become problematic as the motility and/or the density of the particles increases because of the uncertainties on the trajectories that particles have followed during the acquisition time of the images. Here, we report efficient methods for learning parameters of the dynamics of the particles from their positions in time-consecutive images. Our algorithm belongs to the class of message-passing algorithms, also known in computer science, information theory and statistical physics under the name of Belief Propagation (BP). The algorithm is distributed, thus allowing parallel implementation suitable for computations on multiple machines without significant inter-machine overhead. We test our method on the model example of particle tracking in turbulent flows, which is particularly challenging due to the strong transport that those flows produce. Our numerical experiments show that the BP algorithm compares in quality with exact Markov Chain Monte-Carlo algorithms, yet BP is far superior in speed. We also suggest and analyze a random-distance model that provides theoretical justification for BP accuracy. Methods developed here systematically formulate the problem of particle tracking and provide fast and reliable tools for its extensive range of applications.

  6. Targeting anti-smoking messages: does audience race matter?

    Science.gov (United States)

    Tharp-Taylor, Shannah; Fryer, Craig S; Shadel, William G

    2012-07-01

    This study examined whether an adolescent's self-identified race moderates the perceived effectiveness of anti-smoking messages. A sample of 94 never smoking adolescents (59% African-American; 41% European-American) participated in this two-part study. First, they rated the persuasive strength of a series of five decontextualized anti-smoking messages (i.e., messages delivered in text format). Second, they were exposed to five sets of anti-smoking public service announcements (PSAs; viewed as TV advertisements) that had embedded in them the five anti-smoking messages used in the first part of the study and rated their smoking refusal self-efficacy after each one. Although race moderated participants' ratings of the decontextualized messages, there were no significant moderating effects of race when those messages were embedded in PSAs. The results of this study support the notion that anti-smoking PSAs should not be targeted to adolescent racial background, but suggests that decontextualized anti-smoking messages may be more effective if targeted to adolescent race.

  7. Promoting healthy behaviors: how do we get the message across?

    Science.gov (United States)

    Myers, Rachel E

    2010-04-01

    The world is experiencing a rapid rise in chronic health problems, which places an enormous burden on health care services. Modifiable health behaviors are largely responsible for this high prevalence and incidence of chronic diseases. This realization has made initiatives that promote healthy behaviors an international and interdisciplinary priority. How can nurses and other health care providers get the message across to their patients in order to maximize likelihood of leading to desired outcomes? Message tailoring is a well-established health communication approach shown to increase the persuasiveness of message effects in the promotion of healthy behaviors. Message framing is an effective message tailoring strategy that has been well-studied in the psychology literature over the past 20-plus years across a breadth of health behaviors while being severely understudied in the nursing literature. Numerous variables, especially those related to individual differences, have been shown to moderate message framing effects, a finding of great utility for nursing. This article presents a detailed review of the current state of the message framing literature, offers specific suggestions for advancing this literature, and highlights implications for research, education, and practice, with particular attention to nurses.

  8. Costs and Difficulties of Large-Scale 'Messaging', and the Need for International Debate on Potential Risks

    CERN Document Server

    Billingham, John

    2011-01-01

    We advocate international consultations on societal and technical issues to address the risk problem, and a moratorium on future METI transmissions until such issues are resolved. Instead, we recommend continuing to conduct SETI by listening, with no innate risk, while using powerful new search systems to give a better total probability of detection of beacons and messages than METI for the same cost, and with no need for a long obligatory wait for a response. Realistically, beacons are costly. In light of recent work on the economics of contact by radio, we offer alternatives to the current standard of SETI searches. Historical leakage from Earth has been undetectable as messages for credible receiver systems. Transmissions ('messages') to date are faint and very unlikely to be detected, even by very nearby stars. Future space microwave and laser power systems will likely be more visible.

  9. Research on message resource optimization in computer supported collaborative design

    Institute of Scientific and Technical Information of China (English)

    张敬谊; 张申生; 陈纯; 王波

    2004-01-01

    An adaptive mechanism is presented to reduce bandwidth usage and to optimize the use of computing resources of heterogeneous computer mixes utilized in CSCD to reach the goal of collaborative design in distributed-synchronous mode.The mechanism is realized on a C/S architecture based on operation information sharing. Firstly, messages are aggregated into packets on the client. Secondly, an outgoing-message weight priority queue with traffic adjusting technique is cached on the server. Thirdly, an incoming-message queue is cached on the client. At last, the results of implementing the proposed scheme in a simple collaborative design environment are presented.

  10. Impact of locus of control on health message effectiveness.

    Science.gov (United States)

    Kong, Ying; Shen, Fuyuan

    2011-10-01

    This article examined how individuals' locus of control might moderate the effect of health message frames. An experiment was conducted whereby participants read either individual- or social-responsibility message frames after their locus of control was primed. Results indicated that messages presented in individual-responsibility frames were more persuasive when people were primed with internal locus of control, whereas social-responsibility framed appeals were more persuasive when people were primed with external locus of control. These results were found for individuals in both high and low cognitive load conditions. Theoretical and practical implications of the findings are discussed.

  11. Model-based development and testing of advertising messages

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino

    2000-01-01

    The implementation of valid and comprehensible guidelines for message development potentially enhances the effects of advertising messages and improves the possibility of measuring such effects. Moreover, such guidelines also have potential implications for the managerial communication processes...... (client-agency and intra-agency) involved in the development of advertising messages. The purpose of the study described in this paper is to compare the development and effects of two campaign proposals, with the common aim of increasing the consumption of apples among young Danes (18 to 35 years of age......-test with the target group (n=500), as well as interviews with the involved advertising agency and client2 staff....

  12. Model-based development and testing of advertising messages

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino

    2000-01-01

    The implementation of valid and comprehensible guidelines for message development potentially enhances the effects of advertising messages and improves the possibility of measuring such effects. Moreover, such guidelines also have potential implications for the managerial communication processes...... (client-agency and intra-agency) involved in the development of advertising messages. The purpose of the study described in this paper is to compare the development and effects of two campaign proposals, with the common aim of increasing the consumption of apples among young Danes (18 to 35 years of age......-test with the target group (n=500), as well as interviews with the involved advertising agency and client2 staff....

  13. Heavy-Tailed Statistics in Short-Message Communication

    Institute of Scientific and Technical Information of China (English)

    HONG Wei; HAN Xiao-Pu; ZHOU Tao; WANG Bing-Hong

    2009-01-01

    Short-message (SM) is one of the most frequently used communication channels in modern society. Bazed on the SM communication records provided by some volunteers, we investigate the statistics of SM communication pattern, including the inter-event time distributions between two consecutive short messages and two conversa-tions, and the distribution of message number contained in a complete conversation. In the individual level, the empirical result raises strong evidence that the human activity pattern, exhibiting a heavy-tailed inter-event time distribution, is driven by a non-Poisson process.

  14. Understanding Adolescent Nonresponsiveness to Text Messages: Lessons from the DepoText Trial.

    Science.gov (United States)

    Irons, Mallory; Tomaszewski, Kathy; Muñoz Buchanan, Cara R; Trent, Maria

    2015-06-01

    be used in an urban clinical setting to communicate with adolescent girls about family planning services. While economic barriers to continuous cell phone coverage do exist, adolescents indicate that the text message reminder system can be a valuable tool for enhancing clinic connectedness and promoting autonomy in care-seeking behavior.

  15. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing.

    Science.gov (United States)

    Van 't Riet, Jonathan; Cox, Anthony D; Cox, Dena; Zimet, Gregory D; De Bruijn, Gert-Jan; Van den Putte, Bas; De Vries, Hein; Werrij, Marieke Q; Ruiter, Robert A C

    2016-12-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour determines the relative persuasiveness of gain- and loss-framed messages. This 'risk-framing hypothesis', which was derived from prospect theory, has been central to health message-framing research for the better part of two decades and has enduring appeal to researchers and practitioners. It has found its way into several health communication handbooks and is communicated to the general public. The present article examines the validity of the risk-framing hypothesis anew by providing a review of the health message-framing literature. In spite of its ongoing appeal, we conclude that the hypothesis has severe theoretical flaws. In addition, we find that the empirical evidence in favour of the hypothesis is weak and inconsistent. It seems that, in applying prospect theory's tenets to a health-promotion context, some of the theory's key aspects have been lost in translation. At the close of the article, we offer a research agenda for the future, arguing that, above all, new methodology is needed to bring the message-framing literature further.

  16. Tobacco industry manipulation messages in anti-smoking public service announcements: the effect of explicitly versus implicitly delivering messages.

    Science.gov (United States)

    Shadel, William G; Fryer, Craig S; Tharp-Taylor, Shannah

    2010-05-01

    Message content in anti-smoking public service announcements (PSAs) can be delivered explicitly (directly with concrete statements) or implicitly (indirectly via metaphor), and the method of delivery may affect the efficacy of those PSAs. The purpose of this study was to conduct an initial test of this idea using tobacco industry manipulation PSAs in adolescents. A 2 (age: 11-14 years old; 15-17 years old)x2 (message delivery: implicit, explicit) mixed model design was used. There was a significant main effect of message delivery: Tobacco industry manipulation PSAs that delivered their messages explicitly were associated with stronger levels of smoking resistance self-efficacy compared to tobacco industry manipulation PSAs that delivered their messages implicitly. No significant main effects of age were found nor were any interactions between age and message delivery. These results suggest that message delivery factors should be taken into account when designing anti-smoking PSAs. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  17. Mobile phone messaging for facilitating self-management of long-term illnesses.

    Science.gov (United States)

    de Jongh, Thyra; Gurol-Urganci, Ipek; Vodopivec-Jamsek, Vlasta; Car, Josip; Atun, Rifat

    2012-12-12

    capacity to self-manage the condition, there is moderate quality evidence from one study that diabetes patients receiving the text messaging intervention demonstrated improved scores on measures of self-management capacity (Self-Efficacy for Diabetes score (MD 6.10, 95% CI 0.45 to 11.75), Diabetes Social Support Interview pooled score (MD 4.39, 95% CI 2.85 to 5.92)), but did not show improved knowledge of diabetes. There is moderate quality evidence from three studies of the effects on treatment compliance. One study showed an increase in hypertensive patients' rates of medication compliance in the intervention group (MD 8.90, 95% CI 0.18 to 17.62) compared with the control group, but in another study there was no statistically significant effect on rates of compliance with peak expiratory flow measurement in asthma patients. Text message prompts for diabetic patients initially also resulted in a higher number of blood glucose results sent back (46.0) than email prompts did (23.5).For the secondary outcome of participants' evaluation of the intervention, there is very low quality evidence from two studies that patients receiving mobile phone messaging support reported perceived improvement in diabetes self-management, wanted to continue receiving messages, and preferred mobile phone messaging to email as a method to access a computerised reminder system.For the secondary outcome of health service utilisation, there is very low quality evidence from two studies. Diabetes patients receiving text messaging support made a comparable number of clinic visits and calls to an emergency hotline as patients without the support. For asthma patients the total number of office visits was higher in the text messaging group, whereas the number of hospital admissions was higher for the control group.Because of the small number of trials included, and the low overall number of participants, for any of the reviewed outcomes the quality of the evidence can at best be considered moderate. We

  18. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  19. Message strategies in direct-to-consumer pharmaceutical advertising: a content analysis using Taylor's six-segment message strategy wheel.

    Science.gov (United States)

    Tsai, Wan-Hsiu Sunny; Lancaster, Alyse R

    2012-01-01

    This exploratory study applies Taylor's (1999) six-segment message strategy wheel to direct-to-consumer (DTC) pharmaceutical television commercials to understand message strategies adopted by pharmaceutical advertisers to persuade consumers. A convenience sample of 96 DTC commercial campaigns was analyzed. The results suggest that most DTC drug ads used a combination approach, providing consumers with medical and drug information while simultaneously appealing to the viewer's ego-related needs and desires. In contrast to ration and ego strategies, other approaches including routine, acute need, and social are relatively uncommon while sensory was the least common message strategy. Findings thus recognized the educational value of DTC commercials.

  20. Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS

    Science.gov (United States)

    Onyisi, Peter

    2015-12-01

    During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.

  1. Message passing theory for percolation models on multiplex networks with link overlap

    CERN Document Server

    Cellai, Davide; Bianconi, Ginestra

    2016-01-01

    Multiplex networks describe a large variety of complex systems including infrastructures, transportation networks and biological systems. Most of these networks feature a significant link overlap. It is therefore of particular importance to characterize the mutually connected giant component in these networks. Here we provide a message passing theory for characterizing the percolation transition in multiplex networks with link overlap and an arbitrary number of layers $M$. Specifically we propose and compare two message passing algorithms, that generalize the algorithm widely used to study the percolation transition in multiplex networks without link overlap. The first algorithm describes a directed percolation transition and admits an epidemic spreading interpretation. The second algorithm describes the emergence of the mutually connected giant component, that is the percolation transition, but does not preserve the epidemic spreading interpretation. We obtain the phase diagrams for the percolation and direc...

  2. Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS

    CERN Document Server

    Onyisi, Peter; The ATLAS collaboration

    2015-01-01

    During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.

  3. Updated spam filters reduce amount of messages in spam folder

    CERN Multimedia

    IT Department

    2010-01-01

    The flow of spam (unsolicited e-mail) targetting CERN mailboxes is constantly increasing: 96% of the 2 million mails received daily at CERN consist in successfully filtered spam, but spammers get smarter and detecting spam is becoming ever more difficult. In order to address this evolution, a new spam-detection software engine will progressively be deployed in next weeks. The aim is to decrease number of SPAM messages which are delivered to users’ Inboxes and to spam folders. Users can notify mail service about SPAM messages. To submit a spam message one can send it as an attachment. For more details please refer to the help pages (see links below). Useful links: To report spam messages please refer to information on http://cern.ch/mail/Help/?fdid=31 To configure spam filtering for your CERN mailbox, go to http://cern.ch/mail and click ‘spam fight’. Thank you for your collaboration. CERN Mail Services

  4. A Cryptosystem for Encryption and Decryption of Long Confidential Messages

    Science.gov (United States)

    Giri, Debasis; Barua, Prithayan; Srivastava, P. D.; Jana, Biswapati

    In this paper, we propose a cryptosystem which can encrypt and decrypt long (text) messages in efficient manner. The proposed cryptosystem is a combination of symmetric-key and asymmetric-key cryptography, where asymmetric-key cryptography is used to transmit the secret key to an intended receiver and the sender/receiver encrypts/decrypts messages using that secret key. In 2002, Hwang et al. proposed a scheme for encrypting long messages. The main drawback of their scheme is that it requires more computational overhead. Our proposed scheme is more efficient from the computational point of view compared to that of their scheme. Our scheme is a block cipher, long messages are broken into fixed length plaintext blocks for encryption. It supports parallel computation, since encryption/decryption of all the blocks of plaintext/plaintext are independent and thus can be carried out simultaneously. In addition, our scheme retains the same security level as their scheme.

  5. Improved Collision Search for Hash Functions: New Advanced Message Modification

    Science.gov (United States)

    Naito, Yusuke; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we discuss the collision search for hash functions, mainly in terms of their advanced message modification. The advanced message modification is a collision search tool based on Wang et al.'s attacks. Two advanced message modifications have previously been proposed: cancel modification for MD4 and MD5, and propagation modification for SHA-0. In this paper, we propose a new concept of advanced message modification, submarine modification. As a concrete example combining the ideas underlying these modifications, we apply submarine modification to the collision search for SHA-0. As a result, we show that this can reduce the collision search attack complexity from 239 to 236 SHA-0 compression operations.

  6. On the Compound MIMO Broadcast Channels with Confidential Messages

    CERN Document Server

    Kobayashi, Mari; Shamai, Shlomo; Debbah, Merouane

    2009-01-01

    We study the compound multi-input multi-output (MIMO) broadcast channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state set but does not know the realization of the state. We study achievable rates with perfect secrecy in the high SNR regime by characterizing an achievable secrecy degree of freedom (s.d.o.f.) region for two models, the Gaussian MIMO-BCC and the ergodic fading multi-input single-output (MISO)-BCC without a common message. We show that by exploiting an additional temporal dimension due to state variation in the ergodic fading model, the achievable s.d.o.f. region can be significantly improved compared to the Gaussian model with a constant state, although at the price of a larger delay.

  7. 3 Editorial message Dear readers, The Rwandan Journal of ...

    African Journals Online (AJOL)

    Amy Stambach

    Rwandan Journal of Education - Volume 4 No 1 (2017). 3. Editorial message. Dear readers,. The Rwandan Journal of Education strives to maintain its standard as a scholarly, peer-reviewed ... governance, management and others.

  8. Modeling and Analysis of Online Delay of Nonperiodic CAN Message

    Directory of Open Access Journals (Sweden)

    Dafang Wang

    2013-01-01

    Full Text Available In order to analyze the online communication delay of nonperiodic CAN message, the mathematical model of average on-line delay is established based on M/G/1 queuing theory and an experimental platform is designed to analyze the delay of CAN communication, with which the on-line delays of messages with a different ID are tested at different load ratios. The results show that the model is very close to the actual situation indicating the high accuracy of the model. In the results, for the same message, the average and maximum online delays both increase with the raise of load ratio. At the same load ratio, the maximum on-line delay increases with the decrease of the message priority, and the average on-line delay remains almost unchanged.

  9. Data Handover: Reconciling Message Passing and Shared Memory

    OpenAIRE

    Gustedt, Jens

    2004-01-01

    Data Handover (DHO) is a programming paradigm and interface that aims to handle data between parallel or distributed processes that mixes aspects of message passing and shared memory. It is designed to overcome the potential problems in terms of efficiency of both: (1) memory blowup and forced copies for message passing and (2) data consistency and latency problems for shared memory. Our approach attempts to be simple and easy to understand. It content...

  10. Text Messaging Interventions on Cancer Screening Rates: A Systematic Review.

    Science.gov (United States)

    Uy, Catherine; Lopez, Jennifer; Trinh-Shevrin, Chau; Kwon, Simona C; Sherman, Scott E; Liang, Peter S

    2017-08-24

    Despite high-quality evidence demonstrating that screening reduces mortality from breast, cervical, colorectal, and lung cancers, a substantial portion of the population remains inadequately screened. There is a critical need to identify interventions that increase the uptake and adoption of evidence-based screening guidelines for preventable cancers at the community practice level. Text messaging (short message service, SMS) has been effective in promoting behavioral change in various clinical settings, but the overall impact and reach of text messaging interventions on cancer screening are unknown. The objective of this systematic review was to assess the effect of text messaging interventions on screening for breast, cervical, colorectal, and lung cancers. We searched multiple databases for studies published between the years 2000 and 2017, including PubMed, EMBASE, and the Cochrane Library, to identify controlled trials that measured the effect of text messaging on screening for breast, cervical, colorectal, or lung cancers. Study quality was evaluated using the Cochrane risk of bias tool. Our search yielded 2238 citations, of which 31 underwent full review and 9 met inclusion criteria. Five studies examined screening for breast cancer, one for cervical cancer, and three for colorectal cancer. No studies were found for lung cancer screening. Absolute screening rates for individuals who received text message interventions were 0.6% to 15.0% higher than for controls. Unadjusted relative screening rates for text message recipients were 4% to 63% higher compared with controls. Text messaging interventions appear to moderately increase screening rates for breast and cervical cancer and may have a small effect on colorectal cancer screening. Benefit was observed in various countries, including resource-poor and non-English-speaking populations. Given the paucity of data, additional research is needed to better quantify the effectiveness of this promising intervention.

  11. Tailored Health Communication: Crafting the Patient Message for HIV TIPS

    Science.gov (United States)

    Merrill, Jacqueline; Kukafka, Rita; Bakken, Suzanne; Ferat, Rachel; Agopian, Eliz; Messeri, Peter

    2003-01-01

    The HIV TIPS project will pilot and evaluate the use of web-based information technology on prescription errors and quality of care by providing tailored practice guidelines and patient education in ambulatory practice settings of the National AIDS Education and Training Centers (NAETC) network. In the first phase of the project, we tailored messages to guide patient adherence and self-care, using DHHS guidelines. We developed a method based on communication theory to ensure complete and effective messages. PMID:14728437

  12. Language Features and Culture Features on Short Message

    Institute of Scientific and Technical Information of China (English)

    王佳

    2013-01-01

    Mobile phone is regarded as“the fifth media”after newspaper,radio,TV and the Internet.The mobile phone short message further highlights the importance of written signs in communication.“The thumb revolution”is eagerly anticipating one kind of trend by the hand replace of mouth,sound substitute for the quiet around us. My paper will analyze the language features and the culture features of mobile phone short messages which are written in Chinese and English.

  13. Effects of media messages on parent-child sexual communication.

    Science.gov (United States)

    Evans, W Douglas; Davis, Kevin C; Silber Ashley, Olivia; Khan, Munziba

    2012-01-01

    Parent-child communication about sex is an important reproductive health outcome. Consistent, positive perceptions of communication by parents and children can promote behavioral outcomes such as delaying sexual debut and increasing contraceptive use. The authors investigated whether exposure to messages from the Parents Speak Up National Campaign (PSUNC), a social marketing campaign to promote increased parent-child sexual communication, led to increased children's self-reports of communication. Also, the authors examined whether PSUNC message exposure increased agreement about communication between parents and their children. In a randomized experimental design, the authors surveyed children of parents exposed and not exposed to PSUNC messages. Parents and children completed online instruments asking matched questions about sexual attitudes, beliefs, and communication. The authors matched 394 parents and children for analysis. They used ordinal logistic regression modeling and kappa statistics. Children of parents exposed to PSUNC messages were more likely to (a) report sexual communication than were those not exposed and (b) agree with their parents about extent and content. Parent-child pairs of the same gender, younger pairs, and non-White pairs were more likely to agree. Overall, PSUNC message exposure appears to have promoted more extensive sexual communication. Future research should examine behavioral mechanisms and message receptivity among subgroups of parents and children.

  14. Covert Channel Pada Aliran Data Websocket untuk Komunikasi Messaging XMPP

    Directory of Open Access Journals (Sweden)

    Yoga Dwitya Pramudita

    2015-07-01

    Abstract Instant Messaging communication services provide a variety of communication features that can be used by the user, such as text messaging (text messages both online and offline. One of the standard protocol that supports this service is XMPP (Extensible Messaging and Presence Protocol. XMPP communication using XML documents, making it vulnerable to passive attacks monitoring content of  communications. To overcome this drawback the solution is encrypted communications. The other solutions that try to offer in this research is the use of a covert channel to send hidden messages. In this research will create a browser based XMPP client application that is capable to deliver XMPP communication and also provide covert channel communication. XMPP communication can be built on a web-based application using WebSocket protocol. This protocol will exploit field masking-key to load the covert channel messages that is sent during the session XMPP communication takes place. From the test results, the client application is able to produce a covert channel communication with a data width of 3 bytes in each packet. The client application is also able to perform covert communication channel in a communication link with the condition of the probability of packet loss rate below 10%.   Keywords— WebSocket, XMPP, masking-key, Covert Channel, browser based application.

  15. An Improved Three-Weight Message-Passing Algorithm

    CERN Document Server

    Derbinsky, Nate; Elser, Veit; Yedidia, Jonathan S

    2013-01-01

    We describe how the powerful "Divide and Concur" algorithm for constraint satisfaction can be derived as a special case of a message-passing version of the Alternating Direction Method of Multipliers (ADMM) algorithm for convex optimization, and introduce an improved message-passing algorithm based on ADMM/DC by introducing three distinct weights for messages, with "certain" and "no opinion" weights, as well as the standard weight used in ADMM/DC. The "certain" messages allow our improved algorithm to implement constraint propagation as a special case, while the "no opinion" messages speed convergence for some problems by making the algorithm focus only on active constraints. We describe how our three-weight version of ADMM/DC can give greatly improved performance for non-convex problems such as circle packing and solving large Sudoku puzzles, while retaining the exact performance of ADMM for convex problems. We also describe the advantages of our algorithm compared to other message-passing algorithms based u...

  16. Comparing Alcohol Marketing and Alcohol Warning Message Policies Across Canada.

    Science.gov (United States)

    Wettlaufer, Ashley; Cukier, Samantha N; Giesbrecht, Norman

    2017-08-24

    In order to reduce harms from alcohol, evidence-based policies are to be introduced and sustained. To facilitate the dissemination of policies that reduce alcohol-related harms by documenting, comparing, and sharing information on effective alcohol polices related to restrictions on alcohol marketing and alcohol warning messaging in 10 Canadian provinces. Team members developed measurable indicators to assess policies on (a) restrictions on alcohol marketing, and (b) alcohol warning messaging. Indicators were peer-reviewed by three alcohol policy experts, refined, and data were collected, submitted for validation by provincial experts, and scored independently by two team members. The national average score was 52% for restrictions on marketing policies and 18% for alcohol warning message policies. Most provinces had marketing regulations that went beyond the federal guidelines with penalties for violating marketing regulations. The provincial liquor boards' web pages focused on product promotion, and there were few restrictions on sponsorship activities. No province has implemented alcohol warning labels, and Ontario was the sole province to have legislated warning signs at all points-of-sale. Most provinces provided a variety of warning signs to be displayed voluntarily at points-of-sale; however, the quality of messages varied. Conclusions/Importance: There is extensive alcohol marketing with comparatively few messages focused on the potential harms associated with alcohol. It is recommended that governments collaborate with multiple stakeholders to maximize the preventive impact of restrictions on alcohol marketing and advertising, and a broader implementation of alcohol warning messages.

  17. Message Efficient Checkpointing and Rollback Recovery in Heterogeneous Mobile Networks

    Science.gov (United States)

    Jaggi, Parmeet Kaur; Singh, Awadhesh Kumar

    2016-06-01

    Heterogeneous networks provide an appealing way of expanding the computing capability of mobile networks by combining infrastructure-less mobile ad-hoc networks with the infrastructure-based cellular mobile networks. The nodes in such a network range from low-power nodes to macro base stations and thus, vary greatly in their capabilities such as computation power and battery power. The nodes are susceptible to different types of transient and permanent failures and therefore, the algorithms designed for such networks need to be fault-tolerant. The article presents a checkpointing algorithm for the rollback recovery of mobile hosts in a heterogeneous mobile network. Checkpointing is a well established approach to provide fault tolerance in static and cellular mobile distributed systems. However, the use of checkpointing for fault tolerance in a heterogeneous environment remains to be explored. The proposed protocol is based on the results of zigzag paths and zigzag cycles by Netzer-Xu. Considering the heterogeneity prevalent in the network, an uncoordinated checkpointing technique is employed. Yet, useless checkpoints are avoided without causing a high message overhead.

  18. A message passing approach for general epidemic models

    CERN Document Server

    Karrer, Brian

    2010-01-01

    In most models of the spread of disease over contact networks it is assumed that the probabilities of disease transmission and recovery from disease are constant in time. In real life, however, this is far from true. In many diseases, for instance, recovery occurs at about the same time after infection for all individuals, rather than at a constant rate. In this paper, we study a generalized version of the SIR (susceptible-infected-recovered) model of epidemic disease that allows for arbitrary nonuniform distributions of transmission and recovery times. Standard differential equation approaches cannot be used for this generalized model, but we show that the problem can be reformulated as a time-dependent message passing calculation on the appropriate contact network. The calculation is exact on trees (i.e., loopless networks) or locally tree-like networks (such as random graphs) in the large system size limit. On non-tree-like networks we show that the calculation gives a rigorous bound on the size of disease...

  19. Impacts of variable message signs on traffic congestion

    Institute of Scientific and Technical Information of China (English)

    SHANG HuaYan; HUANG HaiJun; GAO ZiYou

    2009-01-01

    The variable message signs (VMS) have been widely used in guiding and managing the dynamic traffic with development of intelligent transportation technologies. It is known that cell transmission model (CTM) can well reproduce such traffic dynamics as shock waves and jams. This paper presents a new method to estimate the route travel times by using the CTM in conjunction with a Iogit-based route choice rule. The impacts of VMS on a two-route scenario with recurrent and non-recurrent traffic con-gestion are numerically investigated by analyzing the changes of route flow and travel time. Simulation results show that in networks with suitable long links, the VMS can positively influence travelers' deci-sion making so as to improve the system performance. For non-recurrent congestion, the value space of the route choice parameter that affects the flow distribution between two routes is narrower in the case of high traffic demand than that in the low demand case.

  20. Performance Evaluation Tools for Message-Passing Parallel Problems

    Directory of Open Access Journals (Sweden)

    Wlodzimierz Funika

    1999-01-01

    Full Text Available The article presents a number of issues of designing and implementing performance evolution tools for message-passing parallel programs, eg. MPI and PVM. There is at number ofspecial techniques for investigating parallel programs, whose implementations are tools presented, A concept of performance observability is introduced. Although a number of interesting solutions of performance tools was developed in the course of last decade, there is a great demand for portable and integrated tools. Understanding the reason for this situation requires evaluating the state of art of existing tools, their advantages and drawbacks. Due to a complicated mechanism of interactions between a tool and operating system, computer architecture and application, evaluating the tool includes taking into account a large number of features. There is introduced a set of criteria, which enable a thorough evaluation of tools. based on the work of HPC standardizing organizations as well as the author's work. The second part of the article presents the review of features of the particular tools developed over last decade. The tools are being evaluated on the base of the criteria introduced. The features of the PARNAS performance tool project and its implementation are presented. The summary presents further avenues of inquiry in parallel performance evaluation tools.