WorldWideScience

Sample records for reliable message propagation

  1. Interarrival times of message propagation on directed networks

    Science.gov (United States)

    Mihaljev, Tamara; de Arcangelis, Lucilla; Herrmann, Hans J.

    2011-08-01

    One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the interarrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM reaching a single user. We study the behavior of the message interarrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying interarrival times at any node of the network.

  2. Creating buzz: the neural correlates of effective message propagation.

    Science.gov (United States)

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  3. Belief propagation decoding of quantum channels by passing quantum messages

    International Nuclear Information System (INIS)

    Renes, Joseph M

    2017-01-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical–quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels. (fast track communication)

  4. Belief propagation decoding of quantum channels by passing quantum messages

    Science.gov (United States)

    Renes, Joseph M.

    2017-07-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.

  5. Running a reliable messaging infrastructure for CERN's control system

    International Nuclear Information System (INIS)

    Ehm, F.

    2012-01-01

    The current middle-ware for CERN's Control System is based on 2 implementations: CORBA-based Controls Middle-Ware (CMW) and Java Messaging Service (JMS). The JMS service is realized using the open source messaging product ActiveMQ and had became an increasing vital part of beam operations as data need to be transported reliably for various areas such as the beam protection system, post mortem analysis, beam commissioning or the alarm system. The current JMS service is made of 18 brokers running either in clusters or as single nodes. The main service is deployed as a 2 node cluster providing fail-over and load balancing capabilities for high availability. Non-critical applications running on virtual machines or desktop machines read data via a third broker to decouple the load from the operational main cluster. This scenario has been introduced last year and the statistics showed an up-time of 99.998% and an average data serving rate of 1.6 G-Byte per minute represented by around 150 messages per second. Deploying, running, maintaining and protecting such messaging infrastructure is not trivial and includes setting up of careful monitoring and failure pre-recognition. Naturally, lessons have been learnt and their outcome is very important for the current and future operation of such service. (author)

  6. Micro-cultural customization of organ donation propagation messages.

    Science.gov (United States)

    Dunkel, Anke; Nakamoto, Kent; Schulz, Peter J

    2018-05-01

    Organ transplantation is plagued by limited availability of organs. This study investigated the effect of messages promoting organ donation which were customized according to the language-defined micro-cultures in Switzerland. Community-, informative-, and emotional-oriented messages were carried by conventional flyers. A 3 × 3 between-subjects experiment was conducted with short- and long-term willingness to donate, long-term signing of organ donation card and long-term interpersonal communication on organ donation as outcome variables. The culturally customized interventions appeared to have no immediate effect and consequently no differential effect on willingness to donate organs and on signing a donor card. Among the Swiss Germans, of the three messages, the community-oriented one instigated less interpersonal communication. Findings are consistent with a mechanism in which the message does not have an immediate effect on willingness to donate organs but motivates further thought and related behaviors that lead to higher commitment and later increased willingness to donate. Targeting not only the message but also the objective that drives the messages must be considered. Campaigns should include elements that build on the unfolding commitment process to promote the follow-up actions that lead to greater willingness. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Getting the word out: neural correlates of enthusiastic message propagation.

    Science.gov (United States)

    Falk, Emily B; O'Donnell, Matthew Brook; Lieberman, Matthew D

    2012-01-01

    What happens in the mind of a person who first hears a potentially exciting idea?We examined the neural precursors of spreading ideas with enthusiasm, and dissected enthusiasm into component processes that can be identified through automated linguistic analysis, gestalt human ratings of combined linguistic and non-verbal cues, and points of convergence/divergence between the two. We combined tools from natural language processing (NLP) with data gathered using fMRI to link the neurocognitive mechanisms that are set in motion during initial exposure to ideas and subsequent behaviors of these message communicators outside of the scanner. Participants' neural activity was recorded as they reviewed ideas for potential television show pilots. Participants' language from video-taped interviews collected post-scan was transcribed and given to an automated linguistic sentiment analysis (SA) classifier, which returned ratings for evaluative language (evaluative vs. descriptive) and valence (positive vs. negative). Separately, human coders rated the enthusiasm with which participants transmitted each idea. More positive sentiment ratings by the automated classifier were associated with activation in neural regions including medial prefrontal cortex; MPFC, precuneus/posterior cingulate cortex; PC/PCC, and medial temporal lobe; MTL. More evaluative, positive, descriptions were associated exclusively with neural activity in temporal-parietal junction (TPJ). Finally, human ratings indicative of more enthusiastic sentiment were associated with activation across these regions (MPFC, PC/PCC, DMPFC, TPJ, and MTL) as well as in ventral striatum (VS), inferior parietal lobule and premotor cortex. Taken together, these data demonstrate novel links between neural activity during initial idea encoding and the enthusiasm with which the ideas are subsequently delivered. This research lays the groundwork to use machine learning and neuroimaging data to study word of mouth communication and

  8. Getting the word out: Neural correlates of enthusiastic message propagation

    Directory of Open Access Journals (Sweden)

    Emily eFalk

    2012-11-01

    Full Text Available What happens in the mind of a person who first hears a potentially exciting idea? We examined the neural precursors of spreading ideas with enthusiasm, and dissect enthusiasm into component processes that can be identified through automated linguistic analysis, gestalt human ratings of combined linguistic and non-verbal cues, and points of convergence/divergence between the two. We combined tools from natural language processing with data gathered using fMRI, to link the neurocognitive mechanisms that are set in motion during initial exposure to ideas and subsequent behaviors of these message communicators outside of the scanner. Participants’ neural activity was recorded as they reviewed ideas for potential television show pilots. Participants’ language from video-taped interviews collected post-scan was transcribed and given to an automated linguistic sentiment analysis classifier, which returned ratings for evaluative language (evaluative vs. descriptive and valence (positive vs. negative. Separately, human coders rated the enthusiasm with which participants transmitted each idea. More positive sentiment ratings by the automated classifier were associated with activation in neural regions including medial prefrontal cortex; MPFC, precuneus/posterior cingulate cortex; PC/PCC, and medial temporal lobe; MTL. More evaluative, positive, descriptions were associated exclusively with neural activity in temporal parietal junction (TPJ. Finally, human ratings indicative of more enthusiastic sentiment were associated with activation across these regions (MPFC, PC/PCC, DMPFC, TPJ, MTL as well as in ventral striatum, inferior parietal lobule and premotor cortex. Taken together, these data demonstrate novel links between neural activity during initial idea encoding and the enthusiasm with which the ideas are subsequently delivered. These data also demonstrate the novel use of machine learning tools to link natural language data to neuroimaging data.

  9. Getting the word out: neural correlates of enthusiastic message propagation

    Science.gov (United States)

    Falk, Emily B.; O'Donnell, Matthew Brook; Lieberman, Matthew D.

    2012-01-01

    What happens in the mind of a person who first hears a potentially exciting idea?We examined the neural precursors of spreading ideas with enthusiasm, and dissected enthusiasm into component processes that can be identified through automated linguistic analysis, gestalt human ratings of combined linguistic and non-verbal cues, and points of convergence/divergence between the two. We combined tools from natural language processing (NLP) with data gathered using fMRI to link the neurocognitive mechanisms that are set in motion during initial exposure to ideas and subsequent behaviors of these message communicators outside of the scanner. Participants' neural activity was recorded as they reviewed ideas for potential television show pilots. Participants' language from video-taped interviews collected post-scan was transcribed and given to an automated linguistic sentiment analysis (SA) classifier, which returned ratings for evaluative language (evaluative vs. descriptive) and valence (positive vs. negative). Separately, human coders rated the enthusiasm with which participants transmitted each idea. More positive sentiment ratings by the automated classifier were associated with activation in neural regions including medial prefrontal cortex; MPFC, precuneus/posterior cingulate cortex; PC/PCC, and medial temporal lobe; MTL. More evaluative, positive, descriptions were associated exclusively with neural activity in temporal-parietal junction (TPJ). Finally, human ratings indicative of more enthusiastic sentiment were associated with activation across these regions (MPFC, PC/PCC, DMPFC, TPJ, and MTL) as well as in ventral striatum (VS), inferior parietal lobule and premotor cortex. Taken together, these data demonstrate novel links between neural activity during initial idea encoding and the enthusiasm with which the ideas are subsequently delivered. This research lays the groundwork to use machine learning and neuroimaging data to study word of mouth communication and

  10. A Scalable and Reliable Message Transport Service for the ATLAS Trigger and Data Acquisition System

    CERN Document Server

    Kazarov, A; The ATLAS collaboration; Kolos, S; Lehmann Miotto, G; Soloviev, I

    2014-01-01

    The ATLAS Trigger and Data Acquisition (TDAQ) is a large distributed computing system composed of several thousands of interconnected computers and tens of thousands applications. During a run, TDAQ applications produce a lot of control and information messages with variable rates, addressed to TDAQ operators or to other applications. Reliable, fast and accurate delivery of the messages is important for the functioning of the whole TDAQ system. The Message Transport Service (MTS) provides facilities for the reliable transport, the filtering and the routing of the messages, basing on publish-subscribe-notify communication pattern with content-based message filtering. During the ongoing LHC shutdown, the MTS was re-implemented, taking into account important requirements like reliability, scalability and performance, handling of slow subscribers case and also simplicity of the design and the implementation. MTS uses CORBA middleware, a common layer for TDAQ infrastructure, and provides sending/subscribing APIs i...

  11. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    OpenAIRE

    Zhenyu Mei; Ye Tian; Dongping Li

    2012-01-01

    Operators of parking guidance and information systems (PGIS) often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs). By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constru...

  12. Reliability Evaluation for Clustered WSNs under Malware Propagation

    Directory of Open Access Journals (Sweden)

    Shigen Shen

    2016-06-01

    Full Text Available We consider a clustered wireless sensor network (WSN under epidemic-malware propagation conditions and solve the problem of how to evaluate its reliability so as to ensure efficient, continuous, and dependable transmission of sensed data from sensor nodes to the sink. Facing the contradiction between malware intention and continuous-time Markov chain (CTMC randomness, we introduce a strategic game that can predict malware infection in order to model a successful infection as a CTMC state transition. Next, we devise a novel measure to compute the Mean Time to Failure (MTTF of a sensor node, which represents the reliability of a sensor node continuously performing tasks such as sensing, transmitting, and fusing data. Since clustered WSNs can be regarded as parallel-serial-parallel systems, the reliability of a clustered WSN can be evaluated via classical reliability theory. Numerical results show the influence of parameters such as the true positive rate and the false positive rate on a sensor node’s MTTF. Furthermore, we validate the method of reliability evaluation for a clustered WSN according to the number of sensor nodes in a cluster, the number of clusters in a route, and the number of routes in the WSN.

  13. Reliability Evaluation for Clustered WSNs under Malware Propagation.

    Science.gov (United States)

    Shen, Shigen; Huang, Longjun; Liu, Jianhua; Champion, Adam C; Yu, Shui; Cao, Qiying

    2016-06-10

    We consider a clustered wireless sensor network (WSN) under epidemic-malware propagation conditions and solve the problem of how to evaluate its reliability so as to ensure efficient, continuous, and dependable transmission of sensed data from sensor nodes to the sink. Facing the contradiction between malware intention and continuous-time Markov chain (CTMC) randomness, we introduce a strategic game that can predict malware infection in order to model a successful infection as a CTMC state transition. Next, we devise a novel measure to compute the Mean Time to Failure (MTTF) of a sensor node, which represents the reliability of a sensor node continuously performing tasks such as sensing, transmitting, and fusing data. Since clustered WSNs can be regarded as parallel-serial-parallel systems, the reliability of a clustered WSN can be evaluated via classical reliability theory. Numerical results show the influence of parameters such as the true positive rate and the false positive rate on a sensor node's MTTF. Furthermore, we validate the method of reliability evaluation for a clustered WSN according to the number of sensor nodes in a cluster, the number of clusters in a route, and the number of routes in the WSN.

  14. Reliability Evaluation for Clustered WSNs under Malware Propagation

    Science.gov (United States)

    Shen, Shigen; Huang, Longjun; Liu, Jianhua; Champion, Adam C.; Yu, Shui; Cao, Qiying

    2016-01-01

    We consider a clustered wireless sensor network (WSN) under epidemic-malware propagation conditions and solve the problem of how to evaluate its reliability so as to ensure efficient, continuous, and dependable transmission of sensed data from sensor nodes to the sink. Facing the contradiction between malware intention and continuous-time Markov chain (CTMC) randomness, we introduce a strategic game that can predict malware infection in order to model a successful infection as a CTMC state transition. Next, we devise a novel measure to compute the Mean Time to Failure (MTTF) of a sensor node, which represents the reliability of a sensor node continuously performing tasks such as sensing, transmitting, and fusing data. Since clustered WSNs can be regarded as parallel-serial-parallel systems, the reliability of a clustered WSN can be evaluated via classical reliability theory. Numerical results show the influence of parameters such as the true positive rate and the false positive rate on a sensor node’s MTTF. Furthermore, we validate the method of reliability evaluation for a clustered WSN according to the number of sensor nodes in a cluster, the number of clusters in a route, and the number of routes in the WSN. PMID:27294934

  15. Ultra Reliable Short Message Relaying with Wireless Power Transfer

    OpenAIRE

    López, Onel L. Alcaraz; Alves, Hirley; Souza, Richard Demo; Fernández, Evelio Martín García

    2017-01-01

    Abstract We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source’s information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited transmission mode. We consider ultra-reliable communication scenarios under discussio...

  16. Modeling Message Queueing Services with Reliability Guarantee in Cloud Computing Environment Using Colored Petri Nets

    Directory of Open Access Journals (Sweden)

    Jing Li

    2015-01-01

    Full Text Available Motivated by the need for loosely coupled and asynchronous dissemination of information, message queues are widely used in large-scale application areas. With the advent of virtualization technology, cloud-based message queueing services (CMQSs with distributed computing and storage are widely adopted to improve availability, scalability, and reliability; however, a critical issue is its performance and the quality of service (QoS. While numerous approaches evaluating system performance are available, there is no modeling approach for estimating and analyzing the performance of CMQSs. In this paper, we employ both the analytical and simulation modeling to address the performance of CMQSs with reliability guarantee. We present a visibility-based modeling approach (VMA for simulation model using colored Petri nets (CPN. Our model incorporates the important features of message queueing services in the cloud such as replication, message consistency, resource virtualization, and especially the mechanism named visibility timeout which is adopted in the services to guarantee system reliability. Finally, we evaluate our model through different experiments under varied scenarios to obtain important performance metrics such as total message delivery time, waiting number, and components utilization. Our results reveal considerable insights into resource scheduling and system configuration for service providers to estimate and gain performance optimization.

  17. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  18. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  19. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    Directory of Open Access Journals (Sweden)

    Zhenyu Mei

    2012-01-01

    Full Text Available Operators of parking guidance and information systems (PGIS often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs. By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constructed. A mathematical program was formulated to determine the guiding parking reliability of VMS. The procedures were applied to a numerical example, and the factors that affect guiding reliability were analyzed. The quantitative changes of the parking berths and the display conditions of VMS were found to be the most important factors influencing guiding reliability. The parking guiding VMS achieved the best benefit when the parking supply was close to or was less than the demand. The combination of a guiding parking reliability model and parking choice behavior offers potential for PGIS operators to reduce traffic congestion in central city areas.

  20. Feasibility and reliability of a mobile tool to evaluate exposure to tobacco product marketing and messages using ecological momentary assessment.

    Science.gov (United States)

    Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L

    2017-10-01

    Existing measures of tobacco marketing and messaging exposure are limited, relying on recall, recognition, or proxy measures. This study aimed to determine the feasibility and reliability of a mobile application for the measurement of tobacco and e-cigarette marketing and message exposure using ecological momentary assessment (EMA). Young adults from Austin, TX (n=181, ages 18-29) were instructed to use a mobile application to record all sightings of marketing or social media related to tobacco (including e-cigarettes) in real-time for 28days (Event EMAs). Tobacco product use and recall of message encounters were assessed daily using an app-initiated EMA (Daily EMAs). The mobile app was a feasible and acceptable method to measure exposure to tobacco messages. The majority of messages (45.0%) were seen on the Internet, and many were user-generated. Thirty-day recall of messages at baseline was poorly correlated with messages reported via Event EMA during the study period; however, the correlation between post-study 30-day recall and Event EMA was much stronger (r=0.603 for industry-sponsored messages, r=0.599 for user-generated messages). Correlations between Daily EMAs and 30-day recall of message exposure (baseline and post-study) were small (baseline: r=0.329-0.389) to large (post-study: r=0.656-0.766). These findings suggest that EMA is a feasible and reliable method for measuring tobacco message exposure, especially given the prevalence of messages encountered online and on social media. Recall measures are limited in their ability to accurately represent marketing exposure, but might be improved by a period of priming or clearer response categories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Propagation of uncertainties in problems of structural reliability

    International Nuclear Information System (INIS)

    Mazumdar, M.; Marshall, J.A.; Chay, S.C.

    1978-01-01

    The problem of controlling a variable Y such that the probability of its exceeding a specified design limit L is very small, is treated. This variable is related to a set of random variables Xsub(i) by means of a known function Y=f(Xsub(i)). The following approximate methods are considered for estimating the propagation of error in the Xsub(i)'s through the function f(-): linearization; method of moments; Monte Carlo methods; numerical integration. Response surface and associated design of experiments problems as well as statistical inference problems are discussed. (Auth.)

  2. Uncertainty propagation and sensitivity analysis in system reliability assessment via unscented transformation

    International Nuclear Information System (INIS)

    Rocco Sanseverino, Claudio M.; Ramirez-Marquez, José Emmanuel

    2014-01-01

    The reliability of a system, notwithstanding it intended function, can be significantly affected by the uncertainty in the reliability estimate of the components that define the system. This paper implements the Unscented Transformation to quantify the effects of the uncertainty of component reliability through two approaches. The first approach is based on the concept of uncertainty propagation, which is the assessment of the effect that the variability of the component reliabilities produces on the variance of the system reliability. This assessment based on UT has been previously considered in the literature but only for system represented through series/parallel configuration. In this paper the assessment is extended to systems whose reliability cannot be represented through analytical expressions and require, for example, Monte Carlo Simulation. The second approach consists on the evaluation of the importance of components, i.e., the evaluation of the components that most contribute to the variance of the system reliability. An extension of the UT is proposed to evaluate the so called “main effects” of each component, as well to assess high order component interaction. Several examples with excellent results illustrate the proposed approach. - Highlights: • Simulation based approach for computing reliability estimates. • Computation of reliability variance via 2n+1 points. • Immediate computation of component importance. • Application to network systems

  3. Reliability of Smartphone-Based Instant Messaging Application for Diagnosis, Classification, and Decision-making in Pediatric Orthopedic Trauma.

    Science.gov (United States)

    Stahl, Ido; Katsman, Alexander; Zaidman, Michael; Keshet, Doron; Sigal, Amit; Eidelman, Mark

    2017-07-11

    Smartphones have the ability to capture and send images, and their use has become common in the emergency setting for transmitting radiographic images with the intent to consult an off-site specialist. Our objective was to evaluate the reliability of smartphone-based instant messaging applications for the evaluation of various pediatric limb traumas, as compared with the standard method of viewing images of a workstation-based picture archiving and communication system (PACS). X-ray images of 73 representative cases of pediatric limb trauma were captured and transmitted to 5 pediatric orthopedic surgeons by the Whatsapp instant messaging application on an iPhone 6 smartphone. Evaluators were asked to diagnose, classify, and determine the course of treatment for each case over their personal smartphones. Following a 4-week interval, revaluation was conducted using the PACS. Intraobserver agreement was calculated for overall agreement and per fracture site. The overall results indicate "near perfect agreement" between interpretations of the radiographs on smartphones compared with computer-based PACS, with κ of 0.84, 0.82, and 0.89 for diagnosis, classification, and treatment planning, respectively. Looking at the results per fracture site, we also found substantial to near perfect agreement. Smartphone-based instant messaging applications are reliable for evaluation of a wide range of pediatric limb fractures. This method of obtaining an expert opinion from the off-site specialist is immediately accessible and inexpensive, making smartphones a powerful tool for doctors in the emergency department, primary care clinics, or remote medical centers, enabling timely and appropriate treatment for the injured child. This method is not a substitution for evaluation of the images in the standard method over computer-based PACS, which should be performed before final decision-making.

  4. Reliability assessment of complex mechatronic systems using a modified nonparametric belief propagation algorithm

    International Nuclear Information System (INIS)

    Zhong, X.; Ichchou, M.; Saidi, A.

    2010-01-01

    Various parametric skewed distributions are widely used to model the time-to-failure (TTF) in the reliability analysis of mechatronic systems, where many items are unobservable due to the high cost of testing. Estimating the parameters of those distributions becomes a challenge. Previous research has failed to consider this problem due to the difficulty of dependency modeling. Recently the methodology of Bayesian networks (BNs) has greatly contributed to the reliability analysis of complex systems. In this paper, the problem of system reliability assessment (SRA) is formulated as a BN considering the parameter uncertainty. As the quantitative specification of BN, a normal distribution representing the stochastic nature of TTF distribution is learned to capture the interactions between the basic items and their output items. The approximation inference of our continuous BN model is performed by a modified version of nonparametric belief propagation (NBP) which can avoid using a junction tree that is inefficient for the mechatronic case because of the large treewidth. After reasoning, we obtain the marginal posterior density of each TTF model parameter. Other information from diverse sources and expert priors can be easily incorporated in this SRA model to achieve more accurate results. Simulation in simple and complex cases of mechatronic systems demonstrates that the posterior of the parameter network fits the data well and the uncertainty passes effectively through our BN based SRA model by using the modified NBP.

  5. Questionnaire-based study showed that neonatal chest radiographs could be reliably interpreted using the WhatsApp messaging application.

    Science.gov (United States)

    Gross, Itai; Langer, Yshia; Pasternak, Yehonatan; Abu Ahmad, Wiessam; Eventov-Friedman, Smadar; Koplewitz, Benjamin Z

    2018-06-11

    We surveyed whether clinicians used the WhatsApp messaging application to view neonatal chest radiographs and asked a sub-sample to compare them with computer screen viewings. The study was conducted at three university-affiliated medical centres in Israel from June-December 2016. Questionnaires on using smartphones for professional purposes were completed by 68/71 paediatric residents and 20/28 neonatologists. In addition, 11 neonatologists viewed 20 chest radiographs on a computer screen followed by a smartphone and 10 viewed the same radiographs in the opposite order, separated by a washout period of two months. After another two months, five from each group viewed the same radiographs on a computer screen. Different interpretations between viewing modes were assessed. Most respondents used WhatsApp to send chest radiographs for consultation: 82% of the paediatric residents and 80% of the neonatologists. The mean number of inconsistencies in diagnosis was 3.7/20 between two computer views and 2.9/20 between computer and smartphone views (p=0.88) and the disease severity means were 3.7/20 and 2.85/20, respectively (p=0.94). Neonatologists using WhatsApp only determined umbilical line placement in 80% of cases. WhatsApp was reliable for preliminary interpretation of neonatal chest radiographs, but caution was needed when assessing umbilical lines. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  6. Radio Propagation Analysis of Industrial Scenarios within the Context of Ultra-Reliable Communication

    DEFF Research Database (Denmark)

    Wassie, Dereje Assefa; Rodriguez Larrad, Ignacio; Berardinelli, Gilberto

    2018-01-01

    One of the 5G use cases, known as ultra-reliable communication (URC), is expected to support very low packet error rate on the order of 10^(−5) with a 1 ms latency. In an industrial scenario, this would make possible replacing wired connections with wireless for controlling critical processes...

  7. V2X application-reliability analysis of data-rate and message-rate congestion control algorithms

    NARCIS (Netherlands)

    Math, C. Belagal; Li, H.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    2017-01-01

    Intelligent Transportation Systems (ITS) require Vehicle-to-Everything (V2X) communication. In dense traffic, the communication channel may become congested, impairing the reliability of the ITS safety applications. Therefore, European Telecommunications Standard Institute (ETSI) demands

  8. Reliability

    OpenAIRE

    Condon, David; Revelle, William

    2017-01-01

    Separating the signal in a test from the irrelevant noise is a challenge for all measurement. Low test reliability limits test validity, attenuates important relationships, and can lead to regression artifacts. Multiple approaches to the assessment and improvement of reliability are discussed. The advantages and disadvantages of several different approaches to reliability are considered. Practical advice on how to assess reliability using open source software is provided.

  9. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  10. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  11. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  12. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  13. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  14. reliability reliability

    African Journals Online (AJOL)

    eobe

    Corresponding author, Tel: +234-703. RELIABILITY .... V , , given by the code of practice. However, checks must .... an optimization procedure over the failure domain F corresponding .... of Concrete Members based on Utility Theory,. Technical ...

  15. Mixed messages

    Science.gov (United States)

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  16. The WLCG Messaging Service and its Future

    International Nuclear Information System (INIS)

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  17. Temporal scaling in information propagation

    Science.gov (United States)

    Huang, Junming; Li, Chao; Wang, Wen-Qiang; Shen, Hua-Wei; Li, Guojie; Cheng, Xue-Qi

    2014-06-01

    For the study of information propagation, one fundamental problem is uncovering universal laws governing the dynamics of information propagation. This problem, from the microscopic perspective, is formulated as estimating the propagation probability that a piece of information propagates from one individual to another. Such a propagation probability generally depends on two major classes of factors: the intrinsic attractiveness of information and the interactions between individuals. Despite the fact that the temporal effect of attractiveness is widely studied, temporal laws underlying individual interactions remain unclear, causing inaccurate prediction of information propagation on evolving social networks. In this report, we empirically study the dynamics of information propagation, using the dataset from a population-scale social media website. We discover a temporal scaling in information propagation: the probability a message propagates between two individuals decays with the length of time latency since their latest interaction, obeying a power-law rule. Leveraging the scaling law, we further propose a temporal model to estimate future propagation probabilities between individuals, reducing the error rate of information propagation prediction from 6.7% to 2.6% and improving viral marketing with 9.7% incremental customers.

  18. The WLCG Messaging Service and its Future

    CERN Document Server

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  19. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  20. Advertising to Early Trend Propagators: Evidence from Twitter

    OpenAIRE

    Lambrecht, A.; Tucker, C. M.; Wiertz, C.

    2018-01-01

    In the digital economy, influencing and controlling the spread of information is a key concern for firms. One way firms try to achieve this is to target firm communications to consumers who embrace and propagate the spread of new information on emerging and `trending' topics on social media. However, little is known about whether early trend propagators are indeed responsive to firm-sponsored messages. To explore whether early propagators of trending topics respond to advertising messages, we...

  1. Advertising to early trend propagators: evidence from Twitter

    OpenAIRE

    Lambrecht, A; Tucker, C; Wiertz, C

    2018-01-01

    In the digital economy, influencing and controlling the spread of information is a key concern for firms. One way firms try to achieve this is to target firm communications to consumers who embrace and propagate the spread of new information on emerging and `trending' topics on social media. However, little is known about whether early trend propagators are indeed responsive to firm-sponsored messages. To explore whether early propagators of trending topics respond to advertising messages, we...

  2. MANGO PROPAGATION

    OpenAIRE

    ALBERTO CARLOS DE QUEIROZ PINTO; VICTOR GALÁN SAÚCO; SISIR KUMAR MITRA; FRANCISCO RICARDO FERREIRA

    2018-01-01

    ABSTRACT This Chapter has the objectives to search, through the review of the available literature, important informations on the evolution of mango propagation regarding theoretical and practical aspects from cellular base of sexual propagation, nursery structures and organizations, substrate compositions and uses, importance of rootstock and scion selections, also it will be described the preparation and transport of the grafts (stem and bud) as well as the main asexual propagation methods...

  3. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  4. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  5. MANGO PROPAGATION

    Directory of Open Access Journals (Sweden)

    ALBERTO CARLOS DE QUEIROZ PINTO

    2018-03-01

    Full Text Available ABSTRACT This Chapter has the objectives to search, through the review of the available literature, important informations on the evolution of mango propagation regarding theoretical and practical aspects from cellular base of sexual propagation, nursery structures and organizations, substrate compositions and uses, importance of rootstock and scion selections, also it will be described the preparation and transport of the grafts (stem and bud as well as the main asexual propagation methods their uses and practices. Finally, pattern and quality of graft mangos and their commercialization aspects will be discussed in this Chapter.

  6. Instant Messaging by SIP

    Science.gov (United States)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  7. Media's Moral Messages: Assessing Perceptions of Moral Content in Television Programming

    Science.gov (United States)

    Glover, Rebecca J.; Garmon, Lance C.; Hull, Darrell M.

    2011-01-01

    This study extends the examination of moral content in the media by exploring moral messages in television programming and viewer characteristics predictive of the ability to perceive such messages. Generalisability analyses confirmed the reliability of the Media's Moral Messages (MMM) rating form for analysing programme content and the existence…

  8. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  9. The message is the message-maker.

    Science.gov (United States)

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  10. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Science.gov (United States)

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  11. Popular Mobilization Messaging

    Directory of Open Access Journals (Sweden)

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  12. Track-stitching using graphical models and message passing

    CSIR Research Space (South Africa)

    Van der Merwe, LJ

    2013-07-01

    Full Text Available In order to stitch tracks together, two tasks are required, namely tracking and track stitching. In this study track stitching is performed using a graphical model and message passing (belief propagation) approach. Tracks are modelled as nodes in a...

  13. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  14. Reliability engineering

    International Nuclear Information System (INIS)

    Lee, Chi Woo; Kim, Sun Jin; Lee, Seung Woo; Jeong, Sang Yeong

    1993-08-01

    This book start what is reliability? such as origin of reliability problems, definition of reliability and reliability and use of reliability. It also deals with probability and calculation of reliability, reliability function and failure rate, probability distribution of reliability, assumption of MTBF, process of probability distribution, down time, maintainability and availability, break down maintenance and preventive maintenance design of reliability, design of reliability for prediction and statistics, reliability test, reliability data and design and management of reliability.

  15. Preventing Unofficial Information Propagation

    Science.gov (United States)

    Le, Zhengyi; Ouyang, Yi; Xu, Yurong; Ford, James; Makedon, Fillia

    Digital copies are susceptible to theft and vulnerable to leakage, copying, or manipulation. When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagation problem of digital credentials, which may contain sensitive information about a credential holder. Existing work such as access control policies and the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.

  16. Are Instant Messages Speech?

    Science.gov (United States)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  17. Microprocessorized message multiplexer

    International Nuclear Information System (INIS)

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  18. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  19. 3. Secure Messaging

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  20. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  1. Does the Screening Status of Message Characters Affect Message Effects?

    Science.gov (United States)

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  2. Beam propagation

    International Nuclear Information System (INIS)

    Hermansson, B.R.

    1989-01-01

    The main part of this thesis consists of 15 published papers, in which the numerical Beam Propagating Method (BPM) is investigated, verified and used in a number of applications. In the introduction a derivation of the nonlinear Schroedinger equation is presented to connect the beginning of the soliton papers with Maxwell's equations including a nonlinear polarization. This thesis focuses on the wide use of the BPM for numerical simulations of propagating light and particle beams through different types of structures such as waveguides, fibers, tapers, Y-junctions, laser arrays and crystalline solids. We verify the BPM in the above listed problems against other numerical methods for example the Finite-element Method, perturbation methods and Runge-Kutta integration. Further, the BPM is shown to be a simple and effective way to numerically set up the Green's function in matrix form for periodic structures. The Green's function matrix can then be diagonalized with matrix methods yielding the eigensolutions of the structure. The BPM inherent transverse periodicity can be untied, if desired, by for example including an absorptive refractive index at the computational window edges. The interaction of two first-order soliton pulses is strongly dependent on the phase relationship between the individual solitons. When optical phase shift keying is used in coherent one-carrier wavelength communication, the fiber attenuation will suppress or delay the nonlinear instability. (orig.)

  3. Degree sequence in message transfer

    Science.gov (United States)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  4. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  5. Radio wave propagation and parabolic equation modeling

    CERN Document Server

    Apaydin, Gokhan

    2018-01-01

    A thorough understanding of electromagnetic wave propagation is fundamental to the development of sophisticated communication and detection technologies. The powerful numerical methods described in this book represent a major step forward in our ability to accurately model electromagnetic wave propagation in order to establish and maintain reliable communication links, to detect targets in radar systems, and to maintain robust mobile phone and broadcasting networks. The first new book on guided wave propagation modeling and simulation to appear in nearly two decades, Radio Wave Propagation and Parabolic Equation Modeling addresses the fundamentals of electromagnetic wave propagation generally, with a specific focus on radio wave propagation through various media. The authors explore an array of new applications, and detail various v rtual electromagnetic tools for solving several frequent electromagnetic propagation problems. All of the methods described are presented within the context of real-world scenari...

  6. Reliability and safety engineering

    CERN Document Server

    Verma, Ajit Kumar; Karanki, Durga Rao

    2016-01-01

    Reliability and safety are core issues that must be addressed throughout the life cycle of engineering systems. Reliability and Safety Engineering presents an overview of the basic concepts, together with simple and practical illustrations. The authors present reliability terminology in various engineering fields, viz.,electronics engineering, software engineering, mechanical engineering, structural engineering and power systems engineering. The book describes the latest applications in the area of probabilistic safety assessment, such as technical specification optimization, risk monitoring and risk informed in-service inspection. Reliability and safety studies must, inevitably, deal with uncertainty, so the book includes uncertainty propagation methods: Monte Carlo simulation, fuzzy arithmetic, Dempster-Shafer theory and probability bounds. Reliability and Safety Engineering also highlights advances in system reliability and safety assessment including dynamic system modeling and uncertainty management. Cas...

  7. Layered virus protection for the operations and administrative messaging system

    Science.gov (United States)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  8. ACTS Propagation Measurements in Maryland and Virginia

    Science.gov (United States)

    Dissanayake, Asoka; Lin, Kuan-Ting

    1996-01-01

    Rapid growth in new satellite services incorporating very small aperture terminals (VSAT) and ultra small aperture terminals (USAT) is expected in the coming years. Small size terminals allow for widespread use of satellite services in small business and domestic applications. Due to congestion of lower frequency bands such as C and Ku, most of these services will use Ka-band (2/20 GHz) frequencies. Propagation impairments produced by the troposphere is a limiting factor for the effective use of the 20/30 GHz band and the use of smaller Earth terminals makes it difficult to provide sufficient link margins for propagation related outages. In this context, reliable prediction of propagation impairments for low margin systems becomes important. Due to the complexity of propagation phenomena propagation modeling is mainly attempted on an empirical basis. As such, the availability of reliable measured data that extend to probability levels well in excess of the traditional limit of 1 percent is of great importance in the development, validation, and refinement of propagation models. The beacon payload on the Advanced Communications Technology Satellite (ACTS) together with the propagation measurement terminals developed under the NASA ACTS propagation program provide an excellent opportunity to collect such data on a long-term basis. This paper presents the results of ACTS propagation measurements conducted in the Washington, DC metropolitan area by COMSAT Laboratories.

  9. Reliability Engineering

    International Nuclear Information System (INIS)

    Lee, Sang Yong

    1992-07-01

    This book is about reliability engineering, which describes definition and importance of reliability, development of reliability engineering, failure rate and failure probability density function about types of it, CFR and index distribution, IFR and normal distribution and Weibull distribution, maintainability and movability, reliability test and reliability assumption in index distribution type, normal distribution type and Weibull distribution type, reliability sampling test, reliability of system, design of reliability and functionality failure analysis by FTA.

  10. Survey of Instant Messaging Applications Encryption Methods

    OpenAIRE

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  11. Signal propagation along the axon.

    Science.gov (United States)

    Rama, Sylvain; Zbili, Mickaël; Debanne, Dominique

    2018-03-08

    Axons link distant brain regions and are usually considered as simple transmission cables in which reliable propagation occurs once an action potential has been generated. Safe propagation of action potentials relies on specific ion channel expression at strategic points of the axon such as nodes of Ranvier or axonal branch points. However, while action potentials are generally considered as the quantum of neuronal information, their signaling is not entirely digital. In fact, both their shape and their conduction speed have been shown to be modulated by activity, leading to regulations of synaptic latency and synaptic strength. We report here newly identified mechanisms of (1) safe spike propagation along the axon, (2) compartmentalization of action potential shape in the axon, (3) analog modulation of spike-evoked synaptic transmission and (4) alteration in conduction time after persistent regulation of axon morphology in central neurons. We discuss the contribution of these regulations in information processing. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  13. A Visualized Message Interface (VMI) for intelligent messaging services

    International Nuclear Information System (INIS)

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  14. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  15. Message Collision Avoidance Protocols for Detecting Stray Nodes in a Scuba Diving Group Using Ultrasonic Multi-Hop Message Communication

    Directory of Open Access Journals (Sweden)

    Shinya Kaido

    2017-12-01

    Full Text Available Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the underwater environment is intrinsically not suitable for propagation of electric waves. Instead, ultrasonic waves are mainly used for underwater communication. Since ultrasonic waves cannot provide sufficient communication speed or capacity, they cannot use existing network technologies, which assume use of radio waves. In particular, communication in shallow water is still an uncharted territory. Few communication technologies are employed in environments where people enjoy scuba diving. This paper addresses problems faced by recreational scuba divers. It proposes constructing an ad hoc mesh-shaped network between divers within a group and use ultrasonic waves as transmission media in order to enable the detection of a stray diver. It also proposes a communication protocol in which messages are relayed in multiple hops, and a message collision avoidance method, which is intended to reduce the rate of packet loss caused by message propagation delay. We have implemented the proposed methods in a network simulator, and compared them with an existing communication method that has no message collision avoidance function, in terms of the packet loss rate, the stray driver detection rate, and the rate of the ability to communicate in multiple hops.

  16. Clear message for causality

    Energy Technology Data Exchange (ETDEWEB)

    Steinberg, Aephraim M. [Institute for Experimental Physics, University of Vienna, Vienna (Austria)

    2003-12-01

    Experiment confirms that information cannot be transmitted faster than the speed of light. Ever since Einstein stated that nothing can travel faster than light, physicists have delighted in finding exceptions. One after another, observations of such 'superluminal' propagation have been made. However, while some image or pattern- such as the motion of a spotlight projected on a distant wall - might have appeared to travel faster than light, it seemed that there was no way to use the superluminal effect to transmit energy or information. In recent years, the superluminal propagation of light pulses through certain media has led to renewed controversy. In 1995, for example, Guenther Nimtz of the University of Cologne encoded Mozart's 40th Symphony on a microwave beam, which he claimed to have transmitted at a speed faster than light. Others maintain that such a violation of Einstein's speed limit would wreak havoc on our most fundamental ideas about causality, allowing an effect to precede its cause. Relativity teaches us that sending a signal faster than light would be equivalent to sending it backwards in time. (U.K.)

  17. Part two: Error propagation

    International Nuclear Information System (INIS)

    Picard, R.R.

    1989-01-01

    Topics covered in this chapter include a discussion of exact results as related to nuclear materials management and accounting in nuclear facilities; propagation of error for a single measured value; propagation of error for several measured values; error propagation for materials balances; and an application of error propagation to an example of uranium hexafluoride conversion process

  18. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    International Nuclear Information System (INIS)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; Fermilab

    2007-01-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results

  19. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Energy Technology Data Exchange (ETDEWEB)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; /Fermilab

    2007-04-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results.

  20. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  1. Merging Belief Propagation and the Mean Field Approximation

    DEFF Research Database (Denmark)

    Riegler, Erwin; Kirkelund, Gunvor Elisabeth; Manchón, Carles Navarro

    2010-01-01

    We present a joint message passing approach that combines belief propagation and the mean field approximation. Our analysis is based on the region-based free energy approximation method proposed by Yedidia et al., which allows to use the same objective function (Kullback-Leibler divergence......) as a starting point. In this method message passing fixed point equations (which correspond to the update rules in a message passing algorithm) are then obtained by imposing different region-based approximations and constraints on the mean field and belief propagation parts of the corresponding factor graph....... Our results can be applied, for example, to algorithms that perform joint channel estimation and decoding in iterative receivers. This is demonstrated in a simple example....

  2. Military Message Experiment. Volume II.

    Science.gov (United States)

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  3. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  4. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  5. Effects of argument quality, source credibility and self-reported diabetes knowledge on message attitudes: an experiment using diabetes related messages.

    Science.gov (United States)

    Lin, Tung-Cheng; Hwang, Lih-Lian; Lai, Yung-Jye

    2017-05-17

    Previous studies have reported that credibility and content (argument quality) are the most critical factors affecting the quality of health information and its acceptance and use; however, this causal relationship merits further investigation in the context of health education. Moreover, message recipients' prior knowledge may moderate these relationships. This study used the elaboration likelihood model to determine the main effects of argument quality, source credibility and the moderating effect of self-reported diabetes knowledge on message attitudes. A between-subjects experimental design using an educational message concerning diabetes for manipulation was applied to validate the effects empirically. A total of 181 participants without diabetes were recruited from the Department of Health, Taipei City Government. Four group messages were manipulated in terms of argument quality (high and low) × source credibility (high and low). Argument quality and source credibility of health information significantly influenced the attitude of message recipients. The participants with high self-reported knowledge participants exhibited significant disapproval for messages with low argument quality. Effective health information should provide objective descriptions and cite reliable sources; in addition, it should provide accurate, customised messages for recipients who have high background knowledge level and ability to discern message quality. © 2017 Health Libraries Group Health Information & Libraries Journal.

  6. Software reliability

    CERN Document Server

    Bendell, A

    1986-01-01

    Software Reliability reviews some fundamental issues of software reliability as well as the techniques, models, and metrics used to predict the reliability of software. Topics covered include fault avoidance, fault removal, and fault tolerance, along with statistical methods for the objective assessment of predictive accuracy. Development cost models and life-cycle cost models are also discussed. This book is divided into eight sections and begins with a chapter on adaptive modeling used to predict software reliability, followed by a discussion on failure rate in software reliability growth mo

  7. Extracting messages masked by chaos

    International Nuclear Information System (INIS)

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  8. Message framing strategies to increase influenza immunization uptake among pregnant African American women.

    Science.gov (United States)

    Marsh, Heather A; Malik, Fauzia; Shapiro, Eve; Omer, Saad B; Frew, Paula M

    2014-09-01

    We explored the attitudes, opinions, and concerns of African American women regarding influenza vaccination during pregnancy. As influenza immunization coverage rates remain suboptimal in the United States among this population, we elicited message framing strategies for multicomponent interventions aimed at decreasing future incident cases of maternal and neonatal influenza. Semi-structured in-depth interviews (N = 21) were conducted with pregnant African American women at urban OB/GYN clinics who had not received an influenza vaccine. Interviews were transcribed, subjected to intercoder reliability assessment, and content analyzed to identify common thematic factors related to acceptance of the influenza vaccine and health communication message preferences. Four major themes were identified. These were communication approaches, normal vaccine behavior, pregnancy vaccination, and positive versus negative framing. Two strong themes emerged: positively-framed messages were preferred over negatively-framed messages and those emphasizing the health of the infant. Additionally, previous immunization, message source, and vaccine misperceptions also played important roles in decision-making. The majority of women indicated that positively framed messages focusing on the infant's health would encourage them to receive an influenza vaccine. Messages emphasizing immunization benefits such as protection against preterm birth and low birth weight outcomes have potential to overcome widespread negative community perceptions and cultural beliefs. Additionally, messages transmitted via interpersonal networks and social media strongly influence motivation to obtain vaccination during pregnancy. The findings of this study will assist in developing tailored messages that change pregnant African American women's influenza vaccination decision-making to achieve improved coverage.

  9. Source reliability in auditory health persuasion : Its antecedents and consequences

    NARCIS (Netherlands)

    Elbert, Sarah P.; Dijkstra, Arie

    2015-01-01

    Persuasive health messages can be presented through an auditory channel, thereby enhancing the salience of the source, making it fundamentally different from written or pictorial information. We focused on the determinants of perceived source reliability in auditory health persuasion by

  10. SDEM modelling of fault-propagation folding

    DEFF Research Database (Denmark)

    Clausen, O.R.; Egholm, D.L.; Poulsen, Jane Bang

    2009-01-01

    and variations in Mohr-Coulomb parameters including internal friction. Using SDEM modelling, we have mapped the propagation of the tip-line of the fault, as well as the evolution of the fold geometry across sedimentary layers of contrasting rheological parameters, as a function of the increased offset......Understanding the dynamics and kinematics of fault-propagation-folding is important for evaluating the associated hydrocarbon play, for accomplishing reliable section balancing (structural reconstruction), and for assessing seismic hazards. Accordingly, the deformation style of fault-propagation...... a precise indication of when faults develop and hence also the sequential evolution of secondary faults. Here we focus on the generation of a fault -propagated fold with a reverse sense of motion at the master fault, and varying only the dip of the master fault and the mechanical behaviour of the deformed...

  11. Fatigue Reliability under Random Loads

    DEFF Research Database (Denmark)

    Talreja, R.

    1979-01-01

    We consider the problem of estimating the probability of survival (non-failure) and the probability of safe operation (strength greater than a limiting value) of structures subjected to random loads. These probabilities are formulated in terms of the probability distributions of the loads...... propagation stage. The consequences of this behaviour on the fatigue reliability are discussed....

  12. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  13. Human reliability

    International Nuclear Information System (INIS)

    Embrey, D.E.

    1987-01-01

    Concepts and techniques of human reliability have been developed and are used mostly in probabilistic risk assessment. For this, the major application of human reliability assessment has been to identify the human errors which have a significant effect on the overall safety of the system and to quantify the probability of their occurrence. Some of the major issues within human reliability studies are reviewed and it is shown how these are applied to the assessment of human failures in systems. This is done under the following headings; models of human performance used in human reliability assessment, the nature of human error, classification of errors in man-machine systems, practical aspects, human reliability modelling in complex situations, quantification and examination of human reliability, judgement based approaches, holistic techniques and decision analytic approaches. (UK)

  14. Reliability Calculations

    DEFF Research Database (Denmark)

    Petersen, Kurt Erling

    1986-01-01

    Risk and reliability analysis is increasingly being used in evaluations of plant safety and plant reliability. The analysis can be performed either during the design process or during the operation time, with the purpose to improve the safety or the reliability. Due to plant complexity and safety...... and availability requirements, sophisticated tools, which are flexible and efficient, are needed. Such tools have been developed in the last 20 years and they have to be continuously refined to meet the growing requirements. Two different areas of application were analysed. In structural reliability probabilistic...... approaches have been introduced in some cases for the calculation of the reliability of structures or components. A new computer program has been developed based upon numerical integration in several variables. In systems reliability Monte Carlo simulation programs are used especially in analysis of very...

  15. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  16. Re: Design Changing the Message

    Science.gov (United States)

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  17. Instant Apache Camel message routing

    CERN Document Server

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  18. The Media and the Message.

    Science.gov (United States)

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  19. Spatial variation in messaging effects

    Science.gov (United States)

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  20. Theoretic derivation of directed acyclic subgraph algorithm and comparisons with message passing algorithm

    Science.gov (United States)

    Ha, Jeongmok; Jeong, Hong

    2016-07-01

    This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.

  1. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  2. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  3. Modifying the behaviour of minix system calls through the redirection of messages

    OpenAIRE

    Pessolani, Pablo Andrés

    2011-01-01

    Minix 3 is an open-source operating system designed to be highly reliable, flexible, and secure. The kernel is small and user processes, specialized servers and device drivers runs as user-mode isolated processes. Minix is a client/server operating system that uses message transfers as communication primitives between processes. Minix system calls send messages to request for services to the Process Manager Server (PM) or the File System Server (FS), and then waiting for the results. The requ...

  4. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  5. Improving Type Error Messages in OCaml

    OpenAIRE

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  6. Modelling the gluon propagator

    Energy Technology Data Exchange (ETDEWEB)

    Leinweber, D.B.; Parrinello, C.; Skullerud, J.I.; Williams, A.G

    1999-03-01

    Scaling of the Landau gauge gluon propagator calculated at {beta} = 6.0 and at {beta} = 6.2 is demonstrated. A variety of functional forms for the gluon propagator calculated on a large (32{sup 3} x 64) lattice at {beta} = 6.0 are investigated.

  7. Sound propagation in cities

    NARCIS (Netherlands)

    Salomons, E.; Polinder, H.; Lohman, W.; Zhou, H.; Borst, H.

    2009-01-01

    A new engineering model for sound propagation in cities is presented. The model is based on numerical and experimental studies of sound propagation between street canyons. Multiple reflections in the source canyon and the receiver canyon are taken into account in an efficient way, while weak

  8. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  9. Effects of Text Messaging on Academic Performance

    OpenAIRE

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  10. Message exchange in the building industry

    NARCIS (Netherlands)

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  11. A Wireless Text Messaging System Improves Communication for Neonatal Resuscitation.

    Science.gov (United States)

    Hughes Driscoll, Colleen A; Schub, Jamie A; Pollard, Kristi; El-Metwally, Dina

    Handoffs for neonatal resuscitation involve communicating critical delivery information (CDI). The authors sought to achieve ≥95% communication of CDI during resuscitation team requests. CDI included name of caller, urgency of request, location of delivery, gestation of fetus, status of amniotic fluid, and indication for presence of the resuscitation team. Three interventions were implemented: verbal scripted handoff, Spök text messaging, and Engage text messaging. Percentages of CDI communications were analyzed using statistical process control. Following implementation of Engage, the communication of all CDI, except for indication, was ≥95%; communication of indication occurred 93% of the time. Control limits for most CDI were narrower with Engage, indicating greater reliability of communication compared to the verbal handoff and Spök. Delayed resuscitation team arrival, a countermeasure, was not higher with text messaging compared to verbal handoff ( P = 1.00). Text messaging improved communication during high-risk deliveries, and it may represent an effective tool for other delivery centers.

  12. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  13. Reliability Engineering

    CERN Document Server

    Lazzaroni, Massimo

    2012-01-01

    This book gives a practical guide for designers and users in Information and Communication Technology context. In particular, in the first Section, the definition of the fundamental terms according to the international standards are given. Then, some theoretical concepts and reliability models are presented in Chapters 2 and 3: the aim is to evaluate performance for components and systems and reliability growth. Chapter 4, by introducing the laboratory tests, puts in evidence the reliability concept from the experimental point of view. In ICT context, the failure rate for a given system can be

  14. Reliability training

    Science.gov (United States)

    Lalli, Vincent R. (Editor); Malec, Henry A. (Editor); Dillard, Richard B.; Wong, Kam L.; Barber, Frank J.; Barina, Frank J.

    1992-01-01

    Discussed here is failure physics, the study of how products, hardware, software, and systems fail and what can be done about it. The intent is to impart useful information, to extend the limits of production capability, and to assist in achieving low cost reliable products. A review of reliability for the years 1940 to 2000 is given. Next, a review of mathematics is given as well as a description of what elements contribute to product failures. Basic reliability theory and the disciplines that allow us to control and eliminate failures are elucidated.

  15. Reactions to threatening health messages

    OpenAIRE

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  16. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  17. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  18. A Modular Instant Messaging System

    OpenAIRE

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  19. Nonlinear radial propagation of drift wave turbulence

    International Nuclear Information System (INIS)

    Prakash, M.

    1985-01-01

    We study the linear and the nonlinear radial propagation of drift wave energy in an inhomogeneous plasma. The drift mode excited in such a plasma is dispersive in nature. The drift wave energy spreads out symmetrically along the direction of inhomogeneity with a finite group velocity. To study the effect of the nonlinear coupling on the propagation of energy in a collision free plasma, we solve the Hasegawa-Mima equation as a mixed initial boundary-value problem. The solutions of the linearized equation are used to check the reliability of our numerical calculations. Additional checks are also performed on the invariants of the system. Our results reveal that a pulse gets distorted as it propagates through the medium. The peak of the pulse propagates with a finite velocity that depends on the amplitude of the initial pulse. The polarity of propagation depends on the initial parameters of the pulse. We have also studied drift wave propagation in a resistive plasma. The Hasegawa-Wakatani equations are used to investigate this problem

  20. 'Yeast mail': a novel Saccharomyces application (NSA) to encrypt messages.

    Science.gov (United States)

    Rosemeyer, Helmut; Paululat, Achim; Heinisch, Jürgen J

    2014-09-01

    The universal genetic code is used by all life forms to encode biological information. It can also be used to encrypt semantic messages and convey them within organisms without anyone but the sender and recipient knowing, i.e., as a means of steganography. Several theoretical, but comparatively few experimental, approaches have been dedicated to this subject, so far. Here, we describe an experimental system to stably integrate encrypted messages within the yeast genome using a polymerase chain reaction (PCR)-based, one-step homologous recombination system. Thus, DNA sequences encoding alphabetical and/or numerical information will be inherited by yeast propagation and can be sent in the form of dried yeast. Moreover, due to the availability of triple shuttle vectors, Saccharomyces cerevisiae can also be used as an intermediate construction device for transfer of information to either Drosophila or mammalian cells as steganographic containers. Besides its classical use in alcoholic fermentation and its modern use for heterologous gene expression, we here show that baker's yeast can thus be employed in a novel Saccharomyces application (NSA) as a simple steganographic container to hide and convey messages. Copyright © 2014 Verlag Helvetica Chimica Acta AG, Zürich.

  1. Neighbourhood-consensus message passing and its potentials in image processing applications

    Science.gov (United States)

    Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried

    2011-03-01

    In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.

  2. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Science.gov (United States)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  3. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  4. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  5. Entity-based Classification of Twitter Messages

    OpenAIRE

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  6. Asynchronous Message Service Reference Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  7. Reliability calculations

    International Nuclear Information System (INIS)

    Petersen, K.E.

    1986-03-01

    Risk and reliability analysis is increasingly being used in evaluations of plant safety and plant reliability. The analysis can be performed either during the design process or during the operation time, with the purpose to improve the safety or the reliability. Due to plant complexity and safety and availability requirements, sophisticated tools, which are flexible and efficient, are needed. Such tools have been developed in the last 20 years and they have to be continuously refined to meet the growing requirements. Two different areas of application were analysed. In structural reliability probabilistic approaches have been introduced in some cases for the calculation of the reliability of structures or components. A new computer program has been developed based upon numerical integration in several variables. In systems reliability Monte Carlo simulation programs are used especially in analysis of very complex systems. In order to increase the applicability of the programs variance reduction techniques can be applied to speed up the calculation process. Variance reduction techniques have been studied and procedures for implementation of importance sampling are suggested. (author)

  8. Guidelines for designing messages in risk communication

    International Nuclear Information System (INIS)

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  9. Systems reliability/structural reliability

    International Nuclear Information System (INIS)

    Green, A.E.

    1980-01-01

    The question of reliability technology using quantified techniques is considered for systems and structures. Systems reliability analysis has progressed to a viable and proven methodology whereas this has yet to be fully achieved for large scale structures. Structural loading variants over the half-time of the plant are considered to be more difficult to analyse than for systems, even though a relatively crude model may be a necessary starting point. Various reliability characteristics and environmental conditions are considered which enter this problem. The rare event situation is briefly mentioned together with aspects of proof testing and normal and upset loading conditions. (orig.)

  10. Reliability data collection and use in risk and availability assessment

    International Nuclear Information System (INIS)

    Colombari, V.

    1989-01-01

    For EuReDatA it is a prevailing objective to initiate and support contact between experts, companies and institutions active in reliability engineering and research. Main topics of this 6th EuReDatA Conference are: Reliability data banks; incidents data banks; common cause data; source and propagation of uncertainties; computer aided risk analysis; reliability and incidents data acquisition and processing; human reliability; probabilistic safety and availability assessment; feedback of reliability into system design; data fusion; reliability modeling and techniques; structural and mechanical reliability; consequence modeling; software and electronic reliability; reliability tests. Some conference papers are separately indexed in the database. (HP)

  11. Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization

    DEFF Research Database (Denmark)

    Zhang, Chuanzong; Manchón, Carles Navarro; Wang, Zhongyong

    2015-01-01

    In this letter, we design iterative receiver algorithms for joint frequency-domain equalization and decoding in a single carrier system assuming perfect channel state information. Based on an approximate inference framework that combines belief propagation (BP) and the mean field (MF) approximation......, we propose two receiver algorithms with, respectively, parallel and sequential message-passing schedules in the MF part. A recently proposed receiver based on generalized approximate message passing (GAMP) is used as a benchmarking reference. The simulation results show that the BP-MF receiver...

  12. Reliability of Circumplex Axes

    Directory of Open Access Journals (Sweden)

    Micha Strack

    2013-06-01

    Full Text Available We present a confirmatory factor analysis (CFA procedure for computing the reliability of circumplex axes. The tau-equivalent CFA variance decomposition model estimates five variance components: general factor, axes, scale-specificity, block-specificity, and item-specificity. Only the axes variance component is used for reliability estimation. We apply the model to six circumplex types and 13 instruments assessing interpersonal and motivational constructs—Interpersonal Adjective List (IAL, Interpersonal Adjective Scales (revised; IAS-R, Inventory of Interpersonal Problems (IIP, Impact Messages Inventory (IMI, Circumplex Scales of Interpersonal Values (CSIV, Support Action Scale Circumplex (SAS-C, Interaction Problems With Animals (IPI-A, Team Role Circle (TRC, Competing Values Leadership Instrument (CV-LI, Love Styles, Organizational Culture Assessment Instrument (OCAI, Customer Orientation Circle (COC, and System for Multi-Level Observation of Groups (behavioral adjectives; SYMLOG—in 17 German-speaking samples (29 subsamples, grouped by self-report, other report, and metaperception assessments. The general factor accounted for a proportion ranging from 1% to 48% of the item variance, the axes component for 2% to 30%; and scale specificity for 1% to 28%, respectively. Reliability estimates varied considerably from .13 to .92. An application of the Nunnally and Bernstein formula proposed by Markey, Markey, and Tinsley overestimated axes reliabilities in cases of large-scale specificities but otherwise works effectively. Contemporary circumplex evaluations such as Tracey’s RANDALL are sensitive to the ratio of the axes and scale-specificity components. In contrast, the proposed model isolates both components.

  13. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    NARCIS (Netherlands)

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  14. Adaptive numerical modeling of dynamic crack propagation

    International Nuclear Information System (INIS)

    Adouani, H.; Tie, B.; Berdin, C.; Aubry, D.

    2006-01-01

    We propose an adaptive numerical strategy that aims at developing reliable and efficient numerical tools to model dynamic crack propagation and crack arrest. We use the cohesive zone theory as behavior of interface-type elements to model crack. Since the crack path is generally unknown beforehand, adaptive meshing is proposed to model the dynamic crack propagation. The dynamic study requires the development of specific solvers for time integration. As both geometry and finite element mesh of the studied structure evolve in time during transient analysis, the stability behavior of dynamic solver becomes a major concern. For this purpose, we use the space-time discontinuous Galerkin finite element method, well-known to provide a natural framework to manage meshes that evolve in time. As an important result, we prove that the space-time discontinuous Galerkin solver is unconditionally stable, when the dynamic crack propagation is modeled by the cohesive zone theory, which is highly non-linear. (authors)

  15. Error propagation analysis for a sensor system

    International Nuclear Information System (INIS)

    Yeater, M.L.; Hockenbury, R.W.; Hawkins, J.; Wilkinson, J.

    1976-01-01

    As part of a program to develop reliability methods for operational use with reactor sensors and protective systems, error propagation analyses are being made for each model. An example is a sensor system computer simulation model, in which the sensor system signature is convoluted with a reactor signature to show the effect of each in revealing or obscuring information contained in the other. The error propagation analysis models the system and signature uncertainties and sensitivities, whereas the simulation models the signatures and by extensive repetitions reveals the effect of errors in various reactor input or sensor response data. In the approach for the example presented, the errors accumulated by the signature (set of ''noise'' frequencies) are successively calculated as it is propagated stepwise through a system comprised of sensor and signal processing components. Additional modeling steps include a Fourier transform calculation to produce the usual power spectral density representation of the product signature, and some form of pattern recognition algorithm

  16. Merging Belief Propagation and the Mean Field Approximation: A Free Energy Approach

    DEFF Research Database (Denmark)

    Riegler, Erwin; Kirkelund, Gunvor Elisabeth; Manchón, Carles Navarro

    2013-01-01

    We present a joint message passing approach that combines belief propagation and the mean field approximation. Our analysis is based on the region-based free energy approximation method proposed by Yedidia et al. We show that the message passing fixed-point equations obtained with this combination...... correspond to stationary points of a constrained region-based free energy approximation. Moreover, we present a convergent implementation of these message passing fixed-point equations provided that the underlying factor graph fulfills certain technical conditions. In addition, we show how to include hard...

  17. Database for propagation models

    Science.gov (United States)

    Kantak, Anil V.

    1991-07-01

    A propagation researcher or a systems engineer who intends to use the results of a propagation experiment is generally faced with various database tasks such as the selection of the computer software, the hardware, and the writing of the programs to pass the data through the models of interest. This task is repeated every time a new experiment is conducted or the same experiment is carried out at a different location generating different data. Thus the users of this data have to spend a considerable portion of their time learning how to implement the computer hardware and the software towards the desired end. This situation may be facilitated considerably if an easily accessible propagation database is created that has all the accepted (standardized) propagation phenomena models approved by the propagation research community. Also, the handling of data will become easier for the user. Such a database construction can only stimulate the growth of the propagation research it if is available to all the researchers, so that the results of the experiment conducted by one researcher can be examined independently by another, without different hardware and software being used. The database may be made flexible so that the researchers need not be confined only to the contents of the database. Another way in which the database may help the researchers is by the fact that they will not have to document the software and hardware tools used in their research since the propagation research community will know the database already. The following sections show a possible database construction, as well as properties of the database for the propagation research.

  18. Human reliability

    International Nuclear Information System (INIS)

    Bubb, H.

    1992-01-01

    This book resulted from the activity of Task Force 4.2 - 'Human Reliability'. This group was established on February 27th, 1986, at the plenary meeting of the Technical Reliability Committee of VDI, within the framework of the joint committee of VDI on industrial systems technology - GIS. It is composed of representatives of industry, representatives of research institutes, of technical control boards and universities, whose job it is to study how man fits into the technical side of the world of work and to optimize this interaction. In a total of 17 sessions, information from the part of ergonomy dealing with human reliability in using technical systems at work was exchanged, and different methods for its evaluation were examined and analyzed. The outcome of this work was systematized and compiled in this book. (orig.) [de

  19. Microelectronics Reliability

    Science.gov (United States)

    2017-01-17

    inverters  connected in a chain. ................................................. 5  Figure 3  Typical graph showing frequency versus square root of...developing an experimental  reliability estimating methodology that could both illuminate the  lifetime  reliability of advanced devices,  circuits and...or  FIT of the device. In other words an accurate estimate of the device  lifetime  was found and thus the  reliability  that  can  be  conveniently

  20. Effects of Text Messaging on Academic Performance

    Directory of Open Access Journals (Sweden)

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  1. Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.

    Science.gov (United States)

    Liu, Yang; Xu, Songhua; Tourassi, Georgia

    2015-01-01

    In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.

  2. Hand hygiene posters: motivators or mixed messages?

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  3. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  4. Diabetes education via mobile text messaging.

    Science.gov (United States)

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  5. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  6. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  7. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Science.gov (United States)

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  8. Message Received: Virtual Ethnography in Online Message Boards

    Directory of Open Access Journals (Sweden)

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  9. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  10. Evaluation of Sexual Communication Message Strategies

    Science.gov (United States)

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  11. E-cigarettes: facts, perceptions, and marketing messages.

    Science.gov (United States)

    Carr, Ellen R

    2014-02-01

    Electronic cigarettes (e-cigarettes) are perceived as an alternative to standard tobacco cigarette smoking, primarily because of the e-cigarette industry's marketing messages. However, scientific studies about e-cigarette safety and efficacy remain limited. This column presents some of the issues associated with e-cigarette use, such as potential components of regulation, perceptions that e-cigarettes can help users quit smoking, and free-wheeling marketing strategies that include expanding e-cigarette use to young people. Nurses can be a reliable source of information about e-cigarettes.

  12. Redefining reliability

    International Nuclear Information System (INIS)

    Paulson, S.L.

    1995-01-01

    Want to buy some reliability? The question would have been unthinkable in some markets served by the natural gas business even a few years ago, but in the new gas marketplace, industrial, commercial and even some residential customers have the opportunity to choose from among an array of options about the kind of natural gas service they need--and are willing to pay for. The complexities of this brave new world of restructuring and competition have sent the industry scrambling to find ways to educate and inform its customers about the increased responsibility they will have in determining the level of gas reliability they choose. This article discusses the new options and the new responsibilities of customers, the needed for continuous education, and MidAmerican Energy Company's experiment in direct marketing of natural gas

  13. Propagation of waves

    CERN Document Server

    David, P

    2013-01-01

    Propagation of Waves focuses on the wave propagation around the earth, which is influenced by its curvature, surface irregularities, and by passage through atmospheric layers that may be refracting, absorbing, or ionized. This book begins by outlining the behavior of waves in the various media and at their interfaces, which simplifies the basic phenomena, such as absorption, refraction, reflection, and interference. Applications to the case of the terrestrial sphere are also discussed as a natural generalization. Following the deliberation on the diffraction of the "ground? wave around the ear

  14. Coding for Parallel Links to Maximize the Expected Value of Decodable Messages

    Science.gov (United States)

    Klimesh, Matthew A.; Chang, Christopher S.

    2011-01-01

    When multiple parallel communication links are available, it is useful to consider link-utilization strategies that provide tradeoffs between reliability and throughput. Interesting cases arise when there are three or more available links. Under the model considered, the links have known probabilities of being in working order, and each link has a known capacity. The sender has a number of messages to send to the receiver. Each message has a size and a value (i.e., a worth or priority). Messages may be divided into pieces arbitrarily, and the value of each piece is proportional to its size. The goal is to choose combinations of messages to send on the links so that the expected value of the messages decodable by the receiver is maximized. There are three parts to the innovation: (1) Applying coding to parallel links under the model; (2) Linear programming formulation for finding the optimal combinations of messages to send on the links; and (3) Algorithms for assisting in finding feasible combinations of messages, as support for the linear programming formulation. There are similarities between this innovation and methods developed in the field of network coding. However, network coding has generally been concerned with either maximizing throughput in a fixed network, or robust communication of a fixed volume of data. In contrast, under this model, the throughput is expected to vary depending on the state of the network. Examples of error-correcting codes that are useful under this model but which are not needed under previous models have been found. This model can represent either a one-shot communication attempt, or a stream of communications. Under the one-shot model, message sizes and link capacities are quantities of information (e.g., measured in bits), while under the communications stream model, message sizes and link capacities are information rates (e.g., measured in bits/second). This work has the potential to increase the value of data returned from

  15. Data dissemination of emergency messages in mobile multi-sink wireless sensor networks

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Havinga, Paul J.M.

    In wireless sensor networks (WSNs), data dissemination is generally performed from sensor nodes to a static sink. If the data under consideration is an emergency message such as a fire alarm, it must be transmitted as fast and reliably as possible towards the sink of WSN. In such mission critical

  16. Expectancy Theory in Media and Message Selection.

    Science.gov (United States)

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  17. Should We Ban Instant Messaging In School?

    Science.gov (United States)

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  18. 78 FR 64202 - Quantitative Messaging Research

    Science.gov (United States)

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  19. Undergraduates' Text Messaging Language and Literacy Skills

    Science.gov (United States)

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  20. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  1. Messages about Sexuality: An Ecological Perspective

    Science.gov (United States)

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  2. Suspecting Neurological Dysfunction From E Mail Messages ...

    African Journals Online (AJOL)

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  3. Propagation environments [Chapter 4

    Science.gov (United States)

    Douglass F. Jacobs; Thomas D. Landis; Tara Luna

    2009-01-01

    An understanding of all factors influencing plant growth in a nursery environment is needed for the successful growth and production of high-quality container plants. Propagation structures modify the atmospheric conditions of temperature, light, and relative humidity. Native plant nurseries are different from typical horticultural nurseries because plants must be...

  4. Uncertainty Propagation in OMFIT

    Science.gov (United States)

    Smith, Sterling; Meneghini, Orso; Sung, Choongki

    2017-10-01

    A rigorous comparison of power balance fluxes and turbulent model fluxes requires the propagation of uncertainties in the kinetic profiles and their derivatives. Making extensive use of the python uncertainties package, the OMFIT framework has been used to propagate covariant uncertainties to provide an uncertainty in the power balance calculation from the ONETWO code, as well as through the turbulent fluxes calculated by the TGLF code. The covariant uncertainties arise from fitting 1D (constant on flux surface) density and temperature profiles and associated random errors with parameterized functions such as a modified tanh. The power balance and model fluxes can then be compared with quantification of the uncertainties. No effort is made at propagating systematic errors. A case study will be shown for the effects of resonant magnetic perturbations on the kinetic profiles and fluxes at the top of the pedestal. A separate attempt at modeling the random errors with Monte Carlo sampling will be compared to the method of propagating the fitting function parameter covariant uncertainties. Work supported by US DOE under DE-FC02-04ER54698, DE-FG2-95ER-54309, DE-SC 0012656.

  5. The Weinberg propagators

    International Nuclear Information System (INIS)

    Dvoeglazov, V.V.

    1997-01-01

    An analog of the j = 1/2 Feynman-Dyson propagator is presented in the framework of the j = 1 Weinberg's theory. The basis for this construction is the concept of the Weinberg field as a system of four field functions differing by parity and by dual transformations. (orig.)

  6. UWB Propagation through Walls

    Czech Academy of Sciences Publication Activity Database

    Schejbal, V.; Bezoušek, P.; Čermák, D.; NĚMEC, Z.; Fišer, Ondřej; Hájek, M.

    2006-01-01

    Roč. 15, č. 1 (2006), s. 17-24 ISSN 1210-2512 R&D Projects: GA MPO(CZ) FT-TA2/030 Institutional research plan: CEZ:AV0Z30420517 Keywords : Ultra wide band * UWB antennas * UWB propagation * multipath effects Subject RIV: JB - Sensors, Measurment, Regulation

  7. Tropical Cyclone Propagation

    National Research Council Canada - National Science Library

    Gray, William

    1994-01-01

    This paper discusses the question of tropical cyclone propagation or why the average tropical cyclone moves 1-2 m/s faster and usually 10-20 deg to the left of its surrounding (or 5-7 deg radius) deep layer (850-300 mb) steering current...

  8. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  9. Factors influencing message dissemination through social media

    Science.gov (United States)

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  10. Hand hygiene posters: selling the message.

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  11. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Science.gov (United States)

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  12. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  13. Path Loss Analysis of WSN Wave Propagation in Vegetation

    International Nuclear Information System (INIS)

    Sabri, Naseer; Aljunid, S A; Ahmad, R B; Malek, M F; Salim, M S; Kamaruddin, R

    2013-01-01

    Deployment of a successful wireless sensor network requires precise prediction models that provide a reliable communication links of wireless nodes. Prediction models fused with foliage models provide sensible parameters of wireless nodes separation distance, antenna height, and power transmission which affect the reliability and communication coverage of a network. This paper review the line of sight and the two ray propagation models combined with the most known foliage models that cover the propagation of wireless communications in vegetative environments, using IEEE 802.15.4 standard. Simulation of models is presented and the impacts of the communication parameters, environment and vegetation have been reported.

  14. Text messages as a learning tool for midwives | Woods | South ...

    African Journals Online (AJOL)

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  15. A Message Without a Code?

    Directory of Open Access Journals (Sweden)

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  16. Message Passing Framework for Globally Interconnected Clusters

    International Nuclear Information System (INIS)

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  17. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  18. Propagator of stochastic electrodynamics

    International Nuclear Information System (INIS)

    Cavalleri, G.

    1981-01-01

    The ''elementary propagator'' for the position of a free charged particle subject to the zero-point electromagnetic field with Lorentz-invariant spectral density proportionalω 3 is obtained. The nonstationary process for the position is solved by the stationary process for the acceleration. The dispersion of the position elementary propagator is compared with that of quantum electrodynamics. Finally, the evolution of the probability density is obtained starting from an initial distribution confined in a small volume and with a Gaussian distribution in the velocities. The resulting probability density for the position turns out to be equal, to within radiative corrections, to psipsi* where psi is the Kennard wave packet. If the radiative corrections are retained, the present result is new since the corresponding expression in quantum electrodynamics has not yet been found. Besides preceding quantum electrodynamics for this problem, no renormalization is required in stochastic electrodynamics

  19. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  20. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  1. An Introduction To Reliability

    International Nuclear Information System (INIS)

    Park, Kyoung Su

    1993-08-01

    This book introduces reliability with definition of reliability, requirement of reliability, system of life cycle and reliability, reliability and failure rate such as summary, reliability characteristic, chance failure, failure rate which changes over time, failure mode, replacement, reliability in engineering design, reliability test over assumption of failure rate, and drawing of reliability data, prediction of system reliability, conservation of system, failure such as summary and failure relay and analysis of system safety.

  2. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Science.gov (United States)

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  3. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    National Research Council Canada - National Science Library

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  4. Weighted community detection and data clustering using message passing

    Science.gov (United States)

    Shi, Cheng; Liu, Yanchen; Zhang, Pan

    2018-03-01

    Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.

  5. Equipment Reliability Program in NPP Krsko

    International Nuclear Information System (INIS)

    Skaler, F.; Djetelic, N.

    2006-01-01

    Operation that is safe, reliable, effective and acceptable to public is the common message in a mission statement of commercial nuclear power plants (NPPs). To fulfill these goals, nuclear industry, among other areas, has to focus on: 1 Human Performance (HU) and 2 Equipment Reliability (EQ). The performance objective of HU is as follows: The behaviors of all personnel result in safe and reliable station operation. While unwanted human behaviors in operations mostly result directly in the event, the behavior flaws either in the area of maintenance or engineering usually cause decreased equipment reliability. Unsatisfied Human performance leads even the best designed power plants into significant operating events, which can be found as well-known examples in nuclear industry. Equipment reliability is today recognized as the key to success. While the human performance at most NPPs has been improving since the start of WANO / INPO / IAEA evaluations, the open energy market has forced the nuclear plants to reduce production costs and operate more reliably and effectively. The balance between these two (opposite) goals has made equipment reliability even more important for safe, reliable and efficient production. Insisting on on-line operation by ignoring some principles of safety could nowadays in a well-developed safety culture and human performance environment exceed the cost of electricity losses. In last decade the leading USA nuclear companies put a lot of effort to improve equipment reliability primarily based on INPO Equipment Reliability Program AP-913 at their NPP stations. The Equipment Reliability Program is the key program not only for safe and reliable operation, but also for the Life Cycle Management and Aging Management on the way to the nuclear power plant life extension. The purpose of Equipment Reliability process is to identify, organize, integrate and coordinate equipment reliability activities (preventive and predictive maintenance, maintenance

  6. Evaluating North American Electric Grid Reliability Using the Barabasi-Albert Network Model

    OpenAIRE

    Chassin, David P.; Posse, Christian

    2004-01-01

    The reliability of electric transmission systems is examined using a scale-free model of network structure and failure propagation. The topologies of the North American eastern and western electric networks are analyzed to estimate their reliability based on the Barabasi-Albert network model. A commonly used power system reliability index is computed using a simple failure propagation model. The results are compared to the values of power system reliability indices previously obtained using s...

  7. Message passing for quantified Boolean formulas

    International Nuclear Information System (INIS)

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  8. Anxiety, Construct Differentiation, and Message Production.

    Science.gov (United States)

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  9. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    African Journals Online (AJOL)

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  10. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  11. Photometric requirements for portable changeable message signs.

    Science.gov (United States)

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  12. Wyoming CV Pilot Traveler Information Message Sample

    Data.gov (United States)

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  13. Getting the message across: age differences in the positive and negative framing of health care messages.

    Science.gov (United States)

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  14. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  15. Wave propagation in elastic solids

    CERN Document Server

    Achenbach, Jan

    1984-01-01

    The propagation of mechanical disturbances in solids is of interest in many branches of the physical scienses and engineering. This book aims to present an account of the theory of wave propagation in elastic solids. The material is arranged to present an exposition of the basic concepts of mechanical wave propagation within a one-dimensional setting and a discussion of formal aspects of elastodynamic theory in three dimensions, followed by chapters expounding on typical wave propagation phenomena, such as radiation, reflection, refraction, propagation in waveguides, and diffraction. The treat

  16. NASA Lunar Base Wireless System Propagation Analysis

    Science.gov (United States)

    Hwu, Shian U.; Upanavage, Matthew; Sham, Catherine C.

    2007-01-01

    There have been many radio wave propagation studies using both experimental and theoretical techniques over the recent years. However, most of studies have been in support of commercial cellular phone wireless applications. The signal frequencies are mostly at the commercial cellular and Personal Communications Service bands. The antenna configurations are mostly one on a high tower and one near the ground to simulate communications between a cellular base station and a mobile unit. There are great interests in wireless communication and sensor systems for NASA lunar missions because of the emerging importance of establishing permanent lunar human exploration bases. Because of the specific lunar terrain geometries and RF frequencies of interest to the NASA missions, much of the published literature for the commercial cellular and PCS bands of 900 and 1800 MHz may not be directly applicable to the lunar base wireless system and environment. There are various communication and sensor configurations required to support all elements of a lunar base. For example, the communications between astronauts, between astronauts and the lunar vehicles, between lunar vehicles and satellites on the lunar orbits. There are also various wireless sensor systems among scientific, experimental sensors and data collection ground stations. This presentation illustrates the propagation analysis of the lunar wireless communication and sensor systems taking into account the three dimensional terrain multipath effects. It is observed that the propagation characteristics are significantly affected by the presence of the lunar terrain. The obtained results indicate the lunar surface material, terrain geometry and antenna location are the important factors affecting the propagation characteristics of the lunar wireless systems. The path loss can be much more severe than the free space propagation and is greatly affected by the antenna height, surface material and operating frequency. The

  17. Message-driven factors influencing opening and forwarding of mobile advertising messages

    OpenAIRE

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  18. When message-frame fits salient cultural-frame, messages feel more persuasive

    OpenAIRE

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  19. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Science.gov (United States)

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  20. Improving Type Error Messages in OCaml

    Directory of Open Access Journals (Sweden)

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  1. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  2. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  3. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  4. A message-queuing framework for STAR's online monitoring and metadata collection

    International Nuclear Information System (INIS)

    Arkhipkin, D; Lauret, J; Betts, W

    2011-01-01

    We report our experience on migrating STARs Online Services (Run Control System, Data Acquisition System, Slow Control System and Subsystem Monitoring) from direct read/write database accesses to a modern non-blocking message-oriented infrastructure. Based on the Advanced Messaging Queuing Protocol (AMQP) and standards, this novel approach does not specify the message data structure, allowing great flexibility in its use. After careful consideration, we chose Google Protocol Buffers as our primary (de)serialization format for structured data exchange. This migration allows us to reduce the overall system complexity and greatly improve the reliability of the metadata collection and the performance of our online services in general. We will present this new framework through its software architecture overview, providing details about our staged and non-disruptive migration process as well as details of the implementation of pluggable components to provide future improvements without compromising stability and availability of services.

  5. Bolt beam propagation analysis

    Science.gov (United States)

    Shokair, I. R.

    BOLT (Beam on Laser Technology) is a rocket experiment to demonstrate electron beam propagation on a laser ionized plasma channel across the geomagnetic field in the ion focused regime (IFR). The beam parameters for BOLT are: beam current I(sub b) = 100 Amps, beam energy of 1--1.5 MeV (gamma =3-4), and a Gaussian beam and channel of radii r(sub b) = r(sub c) = 1.5 cm. The N+1 ionization scheme is used to ionize atomic oxygen in the upper atmosphere. This scheme utilizes 130 nm light plus three IR lasers to excite and then ionize atomic oxygen. The limiting factor for the channel strength is the energy of the 130 nm laser, which is assumed to be 1.6 mJ for BOLT. At a fixed laser energy and altitude (fixing the density of atomic oxygen), the range can be varied by adjusting the laser tuning, resulting in a neutralization fraction axial profile of the form: f(z) = f(sub 0) e(exp minus z)/R, where R is the range. In this paper we consider the propagation of the BOLT beam and calculate the range of the electron beam taking into account the fact that the erosion rates (magnetic and inductive) vary with beam length as the beam and channel dynamically respond to sausage and hose instabilities.

  6. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  7. Characterizing and improving generalized belief propagation algorithms on the 2D Edwards–Anderson model

    International Nuclear Information System (INIS)

    Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico; Rizzo, Tommaso

    2011-01-01

    We study the performance of different message passing algorithms in the two-dimensional Edwards–Anderson model. We show that the standard belief propagation (BP) algorithm converges only at high temperature to a paramagnetic solution. Then, we test a generalized belief propagation (GBP) algorithm, derived from a cluster variational method (CVM) at the plaquette level. We compare its performance with BP and with other algorithms derived under the same approximation: double loop (DL) and a two-way message passing algorithm (HAK). The plaquette-CVM approximation improves BP in at least three ways: the quality of the paramagnetic solution at high temperatures, a better estimate (lower) for the critical temperature, and the fact that the GBP message passing algorithm converges also to nonparamagnetic solutions. The lack of convergence of the standard GBP message passing algorithm at low temperatures seems to be related to the implementation details and not to the appearance of long range order. In fact, we prove that a gauge invariance of the constrained CVM free energy can be exploited to derive a new message passing algorithm which converges at even lower temperatures. In all its region of convergence this new algorithm is faster than HAK and DL by some orders of magnitude

  8. Propagation of Aquilaria malaccensis seedlings through tissue culture techniques

    International Nuclear Information System (INIS)

    Salahbiah Abdul Majid; Zaiton Ahmad; Mohd Rafaie Abdul Salam; Nurhayati Irwan; Affrida Abu Hassan; Rusli Ibrahim

    2010-01-01

    Aquilaria malaccensis or karas is the principal source of gaharu resin, which is used in many cultures for incense, perfumes and traditional medicines. The species is mainly propagated conventionally through seeds, cuttings and graftings. Propagation by seeds is usually a reliable method for other forest species, but for karas, this technique is inadequate to meet the current demand of seedling supplies. This is principally due to its low seed viability, low germination rate, delayed rooting of seedlings, long life-cycle and rare seed production. Tissue culture has several advantages over conventional propagation, especially for obtaining large number of uniform and high-yielding plantlets or clones. This paper presents the current progress on mass-propagation of Aquilaria malaccensis seedlings through tissue culture technique at Nuclear Malaysia. (author)

  9. Art messaging to engage homeless young adults.

    Science.gov (United States)

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  10. Frontiers of reliability

    CERN Document Server

    Basu, Asit P; Basu, Sujit K

    1998-01-01

    This volume presents recent results in reliability theory by leading experts in the world. It will prove valuable for researchers, and users of reliability theory. It consists of refereed invited papers on a broad spectrum of topics in reliability. The subjects covered include Bayesian reliability, Bayesian reliability modeling, confounding in a series system, DF tests, Edgeworth approximation to reliability, estimation under random censoring, fault tree reduction for reliability, inference about changes in hazard rates, information theory and reliability, mixture experiment, mixture of Weibul

  11. Message Oriented Approach to WOM Effects in Service Industries

    Directory of Open Access Journals (Sweden)

    MUSTAFA DILBER

    2017-12-01

    Full Text Available In this study a search-based and an experience-based service were examined in Word-of-Mouth (WOM context. The study aimed at revealing the extent to which consumer choices in movie theatre and repair and maintenance shop services are influenced by the experience communicated by personal sources. Four key contributions are planned. Firstly, although it has attracted attention and criticism there is no empirical examination regarding message characteristics. In this study, the effects of messages delivered by senders concerning purchase decisions are investigated. Secondly, a more powerful scale regarding active information search was developed. Thirdly, perceptual homophily and sender characteristics were added to the model in a unique construct. Fourthly, to measure the effects of personal sources a classification of services is applied for the first time in WOM researches in this context. Data was subjected to an exploratory factor analysis (EFA and reliability analysis in the first stage of the analysis. At the second stage, confirmatory factor analysis (CFA was conducted and the model's hypotheses were tested by using structural equation modeling (SEM.

  12. The ICRP message;Le message de la CIPR

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz Lopez, P. [Groupe de travail de la CIPR sur la prevention des expositions accidentelles liees a l' utilisation des nouvelles technologies de Radiotherapie par Faisceau Externe, Madrid (Spain)

    2009-12-15

    The ICRP gives its recommendations in the case of use of new technologies in radiotherapy: lessons learned from conventional technologies and also applicable to the new ones. Training, and specialization of the personnel as well as the need in personnel must be evaluated again. Managers of a radiotherapy service should bear in mind that the work environment must focus on concentration and avoid the risk of inattention. Manufacturers, for their part must provide reliable equipment with correct calibration files and documentation. the acquisition and implementation programs must focus not only on devices for treatment but also on treatment planning systems, computer systems and imaging devices used in radiation therapy, software, procedures and whole clinical process. The devices and procedures need to be re-classified after any changes to hardware, including upgrades and updates of software. The dosimetry protocols must be developed specially for the low doses irradiations and non standard irradiations. To increase the dose without increasing a probability of complication in sane tissues it is necessary to use a conformal therapy with a positioning of the patient. Communication is essential, especially concerning the activities of maintenance and repair that must ne notified to the physicists. In the same way, procedures of failures management in the computer systems must be implemented in order to avoid a loss of data susceptible to lead to serious accidental irradiations. The return of experience can be an help and then must be integrated in personnel training that is encouraged to share the experience in matter of incidents by providing information in a data base such the R.O.S.I.S. data base (radiation oncology safety information system). Before introducing new technologies it is recommended to realize probabilistic safety evaluations in order to develop quality assurance programmes integrating risk factors as, by example the analysis of failure modes and

  13. Design of Instant Messaging System of Multi-language E-commerce Platform

    Science.gov (United States)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  14. Emotional flow in persuasive health messages.

    Science.gov (United States)

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  15. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  16. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  17. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  18. Positive messaging promotes walking in older adults.

    Science.gov (United States)

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  19. Propagators and path integrals

    Energy Technology Data Exchange (ETDEWEB)

    Holten, J.W. van

    1995-08-22

    Path-integral expressions for one-particle propagators in scalar and fermionic field theories are derived, for arbitrary mass. This establishes a direct connection between field theory and specific classical point-particle models. The role of world-line reparametrization invariance of the classical action and the implementation of the corresponding BRST-symmetry in the quantum theory are discussed. The presence of classical world-line supersymmetry is shown to lead to an unwanted doubling of states for massive spin-1/2 particles. The origin of this phenomenon is traced to a `hidden` topological fermionic excitation. A different formulation of the pseudo-classical mechanics using a bosonic representation of {gamma}{sub 5} is shown to remove these extra states at the expense of losing manifest supersymmetry. (orig.).

  20. Curvilinear crack layer propagation

    Science.gov (United States)

    Chudnovsky, Alexander; Chaoui, Kamel; Moet, Abdelsamie

    1987-01-01

    An account is given of an experiment designed to allow observation of the effect of damage orientation on the direction of crack growth in the case of crack layer propagation, using polystyrene as the model material. The direction of crack advance under a given loading condition is noted to be determined by a competition between the tendency of the crack to maintain its current direction and the tendency to follow the orientation of the crazes at its tip. The orientation of the crazes is, on the other hand, determined by the stress field due to the interaction of the crack, the crazes, and the hole. The changes in craze rotation relative to the crack define the active zone rotation.

  1. Atomistics of crack propagation

    International Nuclear Information System (INIS)

    Sieradzki, K.; Dienes, G.J.; Paskin, A.; Massoumzadeh, B.

    1988-01-01

    The molecular dynamic technique is used to investigate static and dynamic aspects of crack extension. The material chosen for this study was the 2D triangular solid with atoms interacting via the Johnson potential. The 2D Johnson solid was chosen for this study since a sharp crack in this material remains stable against dislocation emission up to the critical Griffith load. This behavior allows for a meaningful comparison between the simulation results and continuum energy theorems for crack extension by appropriately defining an effective modulus which accounts for sample size effects and the non-linear elastic behavior of the Johnson solid. Simulation results are presented for the stress fields of moving cracks and these dynamic results are discussed in terms of the dynamic crack propagation theories, of Mott, Eshelby, and Freund

  2. Broadband unidirectional ultrasound propagation

    Science.gov (United States)

    Sinha, Dipen N.; Pantea, Cristian

    2017-12-12

    A passive, linear arrangement of a sonic crystal-based apparatus and method including a 1D sonic crystal, a nonlinear medium, and an acoustic low-pass filter, for permitting unidirectional broadband ultrasound propagation as a collimated beam for underwater, air or other fluid communication, are described. The signal to be transmitted is first used to modulate a high-frequency ultrasonic carrier wave which is directed into the sonic crystal side of the apparatus. The apparatus processes the modulated signal, whereby the original low-frequency signal exits the apparatus as a collimated beam on the side of the apparatus opposite the sonic crystal. The sonic crystal provides a bandpass acoustic filter through which the modulated high-frequency ultrasonic signal passes, and the nonlinear medium demodulates the modulated signal and recovers the low-frequency sound beam. The low-pass filter removes remaining high-frequency components, and contributes to the unidirectional property of the apparatus.

  3. Propagation into an unstable state

    International Nuclear Information System (INIS)

    Dee, G.

    1985-01-01

    We describe propagating front solutions of the equations of motion of pattern-forming systems. We make a number of conjectures concerning the properties of such fronts in connection with pattern selection in these systems. We describe a calculation which can be used to calculate the velocity and state selected by certain types of propagating fronts. We investigate the propagating front solutions of the amplitude equation which provides a valid dynamical description of many pattern-forming systems near onset

  4. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  5. Validation of Land Cover Products Using Reliability Evaluation Methods

    Directory of Open Access Journals (Sweden)

    Wenzhong Shi

    2015-06-01

    Full Text Available Validation of land cover products is a fundamental task prior to data applications. Current validation schemes and methods are, however, suited only for assessing classification accuracy and disregard the reliability of land cover products. The reliability evaluation of land cover products should be undertaken to provide reliable land cover information. In addition, the lack of high-quality reference data often constrains validation and affects the reliability results of land cover products. This study proposes a validation schema to evaluate the reliability of land cover products, including two methods, namely, result reliability evaluation and process reliability evaluation. Result reliability evaluation computes the reliability of land cover products using seven reliability indicators. Process reliability evaluation analyzes the reliability propagation in the data production process to obtain the reliability of land cover products. Fuzzy fault tree analysis is introduced and improved in the reliability analysis of a data production process. Research results show that the proposed reliability evaluation scheme is reasonable and can be applied to validate land cover products. Through the analysis of the seven indicators of result reliability evaluation, more information on land cover can be obtained for strategic decision-making and planning, compared with traditional accuracy assessment methods. Process reliability evaluation without the need for reference data can facilitate the validation and reflect the change trends of reliabilities to some extent.

  6. Cacades: A reliable dissemination protocol for data collection sensor network

    Science.gov (United States)

    Peng, Y.; Song, W.; Huang, R.; Xu, M.; Shirazi, B.; LaHusen, R.; Pei, G.

    2009-01-01

    In this paper, we propose a fast and reliable data dissemination protocol Cascades to disseminate data from the sink(base station) to all or a subset of nodes in a data collection sensor network. Cascades makes use of the parentmonitor-children analogy to ensure reliable dissemination. Each node monitors whether or not its children have received the broadcast messages through snooping children's rebroadcasts or waiting for explicit ACKs. If a node detects a gap in its message sequences, it can fetch the missing messages from its neighbours reactively. Cascades also considers many practical issues for field deployment, such as dynamic topology, link/node failure, etc.. It therefore guarantees that a disseminated message from the sink will reach all intended receivers and the dissemination is terminated in a short time period. Notice that, all existing dissemination protocols either do not guarantee reliability or do not terminate [1, 2], which does not meet the requirement of real-time command control. We conducted experiment evaluations in both TOSSIM simulator and a sensor network testbed to compare Cascades with those existing dissemination protocols in TinyOS sensor networks, which show that Cascades achieves a higher degree of reliability, lower communication cost, and less delivery delay. ??2009 IEEE.

  7. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  8. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  9. System Reliability Engineering

    International Nuclear Information System (INIS)

    Lim, Tae Jin

    2005-02-01

    This book tells of reliability engineering, which includes quality and reliability, reliability data, importance of reliability engineering, reliability and measure, the poisson process like goodness of fit test and the poisson arrival model, reliability estimation like exponential distribution, reliability of systems, availability, preventive maintenance such as replacement policies, minimal repair policy, shock models, spares, group maintenance and periodic inspection, analysis of common cause failure, and analysis model of repair effect.

  10. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  11. Nuclear fuel cycle modelling using MESSAGE

    International Nuclear Information System (INIS)

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  12. Upon a Message-Oriented Trading API

    Directory of Open Access Journals (Sweden)

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  13. Propagating annular modes

    Science.gov (United States)

    Sheshadri, A.; Plumb, R. A.

    2017-12-01

    The leading "annular mode", defined as the dominant EOF of surface pressure or of zonal mean zonal wind variability, appears as a dipolar structure straddling the mean midlatitude jet and thus seems to describe north-south wobbling of the jet latitude. However, extratropical zonal wind anomalies frequently tend to migrate poleward. This behavior can be described by the first two EOFs, the first (AM1) being the dipolar structure, and the second (AM2) having a tripolar structure centered on the mean jet. Taken in isolation, AM1 thus describes a north-south wobbling of the jet position, while AM2 describes a strengthening and narrowing of the jet. However, despite the fact that they are spatially orthogonal, and their corresponding time series temporally orthogonal, AM1 and AM2 are not independent, but show significant lag-correlations which reveal the propagation. The EOFs are not modes of the underlying dynamical system governing the zonal flow evolution. The true modes can be estimated using principal oscillation pattern (POP) analysis. In the troposphere, the leading POPs manifest themselves as a pair of complex conjugate structures with conjugate eigenvalues thus, in reality, constituting a single, complex, mode that describes propagating anomalies. Even though the principal components associated with the two leading EOFs decay at different rates, each decays faster than the true mode. These facts have implications for eddy feedback and the susceptibility of the mode to external perturbations. If one interprets the annular modes as the modes of the system, then simple theory predicts that the response to steady forcing will usually be dominated by AM1 (with the longest time scale). However, such arguments should really be applied to the true modes. Experiments with a simplified GCM show that climate response to perturbations do not necessarily have AM1 structures. Implications of these results for stratosphere-troposphere interactions are explored. The POP

  14. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  15. Propagation of Ion Acoustic Perturbations

    DEFF Research Database (Denmark)

    Pécseli, Hans

    1975-01-01

    Equations describing the propagation of ion acoustic perturbations are considered, using the assumption that the electrons are Boltzman distributed and isothermal at all times. Quasi-neutrality is also considered.......Equations describing the propagation of ion acoustic perturbations are considered, using the assumption that the electrons are Boltzman distributed and isothermal at all times. Quasi-neutrality is also considered....

  16. Sentiment Propagation in Social Networks: A Case Study in LiveJournal

    Science.gov (United States)

    Zafarani, Reza; Cole, William D.; Liu, Huan

    Social networking websites have facilitated a new style of communication through blogs, instant messaging, and various other techniques. Through collaboration, millions of users participate in millions of discussions every day. However, it is still difficult to determine the extent to which such discussions affect the emotions of the participants. We surmise that emotionally-oriented discussions may affect a given user's general emotional bent and be reflected in other discussions he or she may initiate or participate in. It is in this way that emotion (or sentiment) may propagate through a network. In this paper, we analyze sentiment propagation in social networks, review the importance and challenges of such a study, and provide methodologies for measuring this kind of propagation. A case study has been conducted on a large dataset gathered from the LiveJournal social network. Experimental results are promising in revealing some aspects of the sentiment propagation taking place in social networks.

  17. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  18. Propagation Engineering in Wireless Communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2012-01-01

    Wireless communications has seen explosive growth in recent decades, in a realm that is both broad and rapidly expanding to include satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems and much more. Propagation Engineering in Wireless Communications deals with the basic principles of radiowaves propagation for frequency bands used in radio-communications, offering descriptions of new achievements and newly developed propagation models. The book bridges the gap between theoretical calculations and approaches, and applied procedures needed for advanced radio links design. The primary objective of this two-volume set is to demonstrate the fundamentals, and to introduce propagation phenomena and mechanisms that engineers are likely to encounter in the design and evaluation of radio links of a given type and operating frequency. Volume one covers basic principles, along with tropospheric and ionospheric propagation,...

  19. Transionospheric propagation predictions

    Science.gov (United States)

    Klobucher, J. A.; Basu, S.; Basu, S.; Bernhardt, P. A.; Davies, K.; Donatelli, D. E.; Fremouw, E. J.; Goodman, J. M.; Hartmann, G. K.; Leitinger, R.

    1979-01-01

    The current status and future prospects of the capability to make transionospheric propagation predictions are addressed, highlighting the effects of the ionized media, which dominate for frequencies below 1 to 3 GHz, depending upon the state of the ionosphere and the elevation angle through the Earth-space path. The primary concerns are the predictions of time delay of signal modulation (group path delay) and of radio wave scintillation. Progress in these areas is strongly tied to knowledge of variable structures in the ionosphere ranging from the large scale (thousands of kilometers in horizontal extent) to the fine scale (kilometer size). Ionospheric variability and the relative importance of various mechanisms responsible for the time histories observed in total electron content (TEC), proportional to signal group delay, and in irregularity formation are discussed in terms of capability to make both short and long term predictions. The data base upon which predictions are made is examined for its adequacy, and the prospects for prediction improvements by more theoretical studies as well as by increasing the available statistical data base are examined.

  20. Dressing the nucleon propagator

    International Nuclear Information System (INIS)

    Fishman, S.; Gersten, A.

    1976-01-01

    The nucleon propagator in the ''nested bubbles'' approximation is analyzed. The approximation is built from the minimal set of diagrams which is needed to maintain the unitarity condition under two-pion production threshold in the two-nucleon Bethe--Salpeter equation. Recursive formulas for subsets of ''nested bubbles'' diagrams calculated in the framework of the pseudoscalar interaction are obtained by the use of dispersion relations. We prove that the sum of all the ''nested bubbles'' diverges. Moreover, the successive iterations are plagued with ghost poles. We prove that the first approximation--which is the so-called chain approximation--has ghost poles for any nonvanishing coupling constant. In an earlier paper we have shown that ghost poles lead to ghost cuts. These cuts are present in the ''nested bubbles.'' Ghost elimination procedures are discussed. Modifications of the ''nested bubbles'' approximation are introduced in order to obtain convergence and in order to eliminate the ghost poles and ghost cuts. In a similar way as in the Lee model, cutoff functions are introduced in order to eliminate the ghost poles. The necessary and sufficient conditions for the absence of ghost poles are formulated and analyzed. The spectral functions of the modified ''nested bubbles'' are analyzed and computed. Finally, we present a theorem, similar in its form to Levinson's theorem in scattering theory, which enables one to compute in a simple way the number of ghost poles

  1. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.

    Science.gov (United States)

    Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos

    2018-03-23

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  2. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

    Directory of Open Access Journals (Sweden)

    Ali Balador

    2018-03-01

    Full Text Available Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  3. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Science.gov (United States)

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  4. University Advertising and Universality in Messaging

    Science.gov (United States)

    Diel, Stan R.; Katsinas, Stephen

    2018-01-01

    University and college institutional advertisements, which typically are broadcast as public service announcements during the halftime of football games, were the subject of a quantitative analysis focused on commonality in messaging and employment of the semiotic theory of brand advertising. Findings indicate advertisements focus on students'…

  5. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  6. Message passing with parallel queue traversal

    Science.gov (United States)

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  7. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  8. Picture Book Soldiers: Men and Messages.

    Science.gov (United States)

    Desai, Christina M.

    2001-01-01

    Examines children's picture books about soldiers and war, including fiction, folktales, and historical fiction, analyzing their implicit and explicit messages about war and the military, and evaluating them for gender stereotyping. Finds that the soldiers conform almost uniformly to an exaggerated male stereotype. Shows different value judgments…

  9. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  10. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  11. Princess Picture Books: Content and Messages

    Science.gov (United States)

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  12. Increasing the Operational Value of Event Messages

    Science.gov (United States)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  13. An Interpersonal Approach to Writing Negative Messages.

    Science.gov (United States)

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  14. Interactive or interruptive? Instant messaging at work

    NARCIS (Netherlands)

    Ou, C.X.J.; Davison, R.M.

    2011-01-01

    The use of instant messaging (IM) technology at work is controversial, due to the interruptions it may cause and the difficulties associated with quantifying its benefits for individuals, teams and organizations. In this study, we investigate the use and impact of IM tools in the workplace. Based on

  15. Using Instant Messaging for Online Reference Service

    Science.gov (United States)

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  16. Partition function expansion on region graphs and message-passing equations

    International Nuclear Information System (INIS)

    Zhou, Haijun; Wang, Chuang; Xiao, Jing-Qing; Bi, Zedong

    2011-01-01

    Disordered and frustrated graphical systems are ubiquitous in physics, biology, and information science. For models on complete graphs or random graphs, deep understanding has been achieved through the mean-field replica and cavity methods. But finite-dimensional 'real' systems remain very challenging because of the abundance of short loops and strong local correlations. A statistical mechanics theory is constructed in this paper for finite-dimensional models based on the mathematical framework of the partition function expansion and the concept of region graphs. Rigorous expressions for the free energy and grand free energy are derived. Message-passing equations on the region graph, such as belief propagation and survey propagation, are also derived rigorously. (letter)

  17. Dike Propagation Near Drifts

    International Nuclear Information System (INIS)

    2002-01-01

    The purpose of this Analysis and Model Report (AMR) supporting the Site Recommendation/License Application (SR/LA) for the Yucca Mountain Project is the development of elementary analyses of the interactions of a hypothetical dike with a repository drift (i.e., tunnel) and with the drift contents at the potential Yucca Mountain repository. This effort is intended to support the analysis of disruptive events for Total System Performance Assessment (TSPA). This AMR supports the Process Model Report (PMR) on disruptive events (CRWMS M and O 2000a). This purpose is documented in the development plan (DP) ''Coordinate Modeling of Dike Propagation Near Drifts Consequences for TSPA-SR/LA'' (CRWMS M and O 2000b). Evaluation of that Development Plan and the work to be conducted to prepare Interim Change Notice (ICN) 1 of this report, which now includes the design option of ''Open'' drifts, indicated that no revision to that DP was needed. These analyses are intended to provide reasonable bounds for a number of expected effects: (1) Temperature changes to the waste package from exposure to magma; (2) The gas flow available to degrade waste containers during the intrusion; (3) Movement of the waste package as it is displaced by the gas, pyroclasts and magma from the intruding dike (the number of packages damaged); (4) Movement of the backfill (Backfill is treated here as a design option); (5) The nature of the mechanics of the dike/drift interaction. These analyses serve two objectives: to provide preliminary analyses needed to support evaluation of the consequences of an intrusive event and to provide a basis for addressing some of the concerns of the Nuclear Regulatory Commission (NRC) expressed in the Igneous Activity Issue Resolution Status Report

  18. Effectiveness of safety and public service announcement messages on dynamic message signs.

    Science.gov (United States)

    2014-07-01

    The number of transportation agencies that use dynamic message signs (DMS) to provide traffic information to motorists has increased dramatically over the past four decades. This growing trend of DMS deployment is a reflection of the public interest ...

  19. AMSAA Reliability Growth Guide

    National Research Council Canada - National Science Library

    Broemm, William

    2000-01-01

    ... has developed reliability growth methodology for all phases of the process, from planning to tracking to projection. The report presents this methodology and associated reliability growth concepts.

  20. Laser beam propagation generation and propagation of customized light

    CERN Document Server

    Forbes, Andrew

    2014-01-01

    ""The text is easy to read and is accompanied by beautiful illustrations. It is an excellent book for anyone working in laser beam propagation and an asset for any library.""-Optics & Photonics News, July 2014

  1. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  2. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Directory of Open Access Journals (Sweden)

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  3. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  4. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  5. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  6. Outpatient blood pressure monitoring using bi-directional text messaging.

    Science.gov (United States)

    Anthony, Chris A; Polgreen, Linnea A; Chounramany, James; Foster, Eric D; Goerdt, Christopher J; Miller, Michelle L; Suneja, Manish; Segre, Alberto M; Carter, Barry L; Polgreen, Philip M

    2015-05-01

    To diagnose hypertension, multiple blood pressure (BP) measurements are recommended. We randomized patients into three groups: EMR-only (patients recorded BP measurements in an electronic medical record [EMR] web portal), EMR + reminders (patients were sent text message reminders to record their BP measurements in the EMR), and bi-directional text messaging (patients were sent a text message asking them to respond with their current BP). Subjects were asked to complete 14 measurements. Automated messages were sent to each patient in the bi-directional text messaging and EMR + reminder groups twice daily. Among 121 patients, those in the bi-directional text messaging group reported the full 14 measurements more often than both the EMR-only group (P text messaging is an effective way to gather patient BP data. Text-message-based reminders alone are an effective way to encourage patients to record BP measurements. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  7. Effects of Instant Messaging on School Performance in Adolescents.

    Science.gov (United States)

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  8. Contribution to high voltage matrix switches reliability

    International Nuclear Information System (INIS)

    Lausenaz, Yvan

    2000-01-01

    Nowadays, power electronic equipment requirements are important, concerning performances, quality and reliability. On the other hand, costs have to be reduced in order to satisfy the market rules. To provide cheap, reliability and performances, many standard components with mass production are developed. But the construction of specific products must be considered following these two different points: in one band you can produce specific components, with delay, over-cost problems and eventuality quality and reliability problems, in the other and you can use standard components in a adapted topologies. The CEA of Pierrelatte has adopted this last technique of power electronic conception for the development of these high voltage pulsed power converters. The technique consists in using standard components and to associate them in series and in parallel. The matrix constitutes high voltage macro-switch where electrical parameters are distributed between the synchronized components. This study deals with the reliability of these structures. It brings up the high reliability aspect of MOSFETs matrix associations. Thanks to several homemade test facilities, we obtained lots of data concerning the components we use. The understanding of defects propagation mechanisms in matrix structures has allowed us to put forwards the necessity of robust drive system, adapted clamping voltage protection, and careful geometrical construction. All these reliability considerations in matrix associations have notably allowed the construction of a new matrix structure regrouping all solutions insuring reliability. Reliable and robust, this product has already reaches the industrial stage. (author) [fr

  9. The Effectiveness of Campaign Messages on Turnout and Vote Choice

    OpenAIRE

    Friedel, Sylvia

    2013-01-01

    In this dissertation, I study campaign effects on turnout and vote choice. I analyze different campaign messages and the way they affect voters across various situations. First, through an online survey experiment, I study the impact of campaign messages and ideological cues on voters as they make inferences on candidates. Next, through a field experiment, I test whether microtargeted messages or general messages on the economy have any effect on turnout. Lastly, using online survey data, I e...

  10. Flow of emotional messages in artificial social networks

    OpenAIRE

    Chmiel, Anna; Holyst, Janusz A.

    2010-01-01

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account t...

  11. A reliability simulation language for reliability analysis

    International Nuclear Information System (INIS)

    Deans, N.D.; Miller, A.J.; Mann, D.P.

    1986-01-01

    The results of work being undertaken to develop a Reliability Description Language (RDL) which will enable reliability analysts to describe complex reliability problems in a simple, clear and unambiguous way are described. Component and system features can be stated in a formal manner and subsequently used, along with control statements to form a structured program. The program can be compiled and executed on a general-purpose computer or special-purpose simulator. (DG)

  12. Methodologies of Uncertainty Propagation Calculation

    International Nuclear Information System (INIS)

    Chojnacki, Eric

    2002-01-01

    After recalling the theoretical principle and the practical difficulties of the methodologies of uncertainty propagation calculation, the author discussed how to propagate input uncertainties. He said there were two kinds of input uncertainty: - variability: uncertainty due to heterogeneity, - lack of knowledge: uncertainty due to ignorance. It was therefore necessary to use two different propagation methods. He demonstrated this in a simple example which he generalised, treating the variability uncertainty by the probability theory and the lack of knowledge uncertainty by the fuzzy theory. He cautioned, however, against the systematic use of probability theory which may lead to unjustifiable and illegitimate precise answers. Mr Chojnacki's conclusions were that the importance of distinguishing variability and lack of knowledge increased as the problem was getting more and more complex in terms of number of parameters or time steps, and that it was necessary to develop uncertainty propagation methodologies combining probability theory and fuzzy theory

  13. Propagation engineering in wireless communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2016-01-01

    This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

  14. Wave propagation in electromagnetic media

    CERN Document Server

    Davis, Julian L

    1990-01-01

    This is the second work of a set of two volumes on the phenomena of wave propagation in nonreacting and reacting media. The first, entitled Wave Propagation in Solids and Fluids (published by Springer-Verlag in 1988), deals with wave phenomena in nonreacting media (solids and fluids). This book is concerned with wave propagation in reacting media-specifically, in electro­ magnetic materials. Since these volumes were designed to be relatively self­ contained, we have taken the liberty of adapting some of the pertinent material, especially in the theory of hyperbolic partial differential equations (concerned with electromagnetic wave propagation), variational methods, and Hamilton-Jacobi theory, to the phenomena of electromagnetic waves. The purpose of this volume is similar to that of the first, except that here we are dealing with electromagnetic waves. We attempt to present a clear and systematic account of the mathematical methods of wave phenomena in electromagnetic materials that will be readily accessi...

  15. Massive propagators in instanton fields

    International Nuclear Information System (INIS)

    Brown, L.S.; Lee, C.

    1978-01-01

    Green's functions for massive spinor and vector particles propagating in a self-dual but otherwise arbitrary non-Abelian gauge field are shown to be completely determined by the corresponding Green's functions of massive scalar particles

  16. Teaching Students the Persuasive Message through Small Group Activity

    Science.gov (United States)

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  17. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  18. Using Text-Messaging in the Secondary Classroom

    Science.gov (United States)

    Thomas, Kevin; Orthober, Corrie

    2011-01-01

    To examine the potential uses of and barriers to text-messaging in secondary schools, three classes (66 students) of high school students used their personal mobile phones to receive out of school, course-related text-messages from teachers. Forty-six students (70%) agreed to receive text-messages. Findings indicate that participants found…

  19. Driver memory for in-vehicle visual and auditory messages

    Science.gov (United States)

    1999-12-01

    Three experiments were conducted in a driving simulator to evaluate effects of in-vehicle message modality and message format on comprehension and memory for younger and older drivers. Visual icons and text messages were effective in terms of high co...

  20. Understanding health food messages on Twitter for health literacy promotion.

    Science.gov (United States)

    Zhou, J; Liu, F; Zhou, H

    2018-05-01

    With the popularity of social media, Twitter has become an important tool to promote health literacy. However, many health-related messages on Twitter are dead-ended and cannot reach many people. This is unhelpful for health literacy promotion. This article aims to examine the features of online health food messages that people like to retweet. We adopted rumour theory as our theoretical foundation and extracted seven characteristics (i.e. emotional valence, attractiveness, sender's authoritativeness, external evidence, argument length, hashtags, and direct messages). A total of 10,025 health-related messages on Twitter were collected, and 1496 messages were randomly selected for further analysis. Each message was treated as one unit and then coded. All the hypotheses were tested with logistic regression. Emotional valence, attractiveness, sender's authoritativeness, argument length, and direct messages in a Twitter message had positive effects on people's retweet behaviour. The effect of external evidence was negative. Hashtags had no significant effect after consideration of other variables. Online health food messages containing positive emotions, including pictures, containing direct messages, having an authoritative sender, having longer arguments, or not containing external URLs are more likely to be retweeted. However, a message only containing positive or negative emotions or including direct messages without any support information will not be retweeted.

  1. Lol: New Language and Spelling in Instant Messaging

    Science.gov (United States)

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  2. 19 CFR 4.7d - Container status messages.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements pursuant...

  3. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive

  4. MMS: An electronic message management system for emergency response

    DEFF Research Database (Denmark)

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    among messages can be viewed in a graphic tree-like display. By employing the extensive filtration facilities offered by the MMS. users are able to monitor the current status of messages. And, in general, filtration provides users with means of surveying a possibly large number of responses to messages...... contingency plan and procedures to be applied during predefined stages of an emergency....

  5. Propagation of dynamic measurement uncertainty

    International Nuclear Information System (INIS)

    Hessling, J P

    2011-01-01

    The time-dependent measurement uncertainty has been evaluated in a number of recent publications, starting from a known uncertain dynamic model. This could be defined as the 'downward' propagation of uncertainty from the model to the targeted measurement. The propagation of uncertainty 'upward' from the calibration experiment to a dynamic model traditionally belongs to system identification. The use of different representations (time, frequency, etc) is ubiquitous in dynamic measurement analyses. An expression of uncertainty in dynamic measurements is formulated for the first time in this paper independent of representation, joining upward as well as downward propagation. For applications in metrology, the high quality of the characterization may be prohibitive for any reasonably large and robust model to pass the whiteness test. This test is therefore relaxed by not directly requiring small systematic model errors in comparison to the randomness of the characterization. Instead, the systematic error of the dynamic model is propagated to the uncertainty of the measurand, analogously but differently to how stochastic contributions are propagated. The pass criterion of the model is thereby transferred from the identification to acceptance of the total accumulated uncertainty of the measurand. This increases the relevance of the test of the model as it relates to its final use rather than the quality of the calibration. The propagation of uncertainty hence includes the propagation of systematic model errors. For illustration, the 'upward' propagation of uncertainty is applied to determine if an appliance box is damaged in an earthquake experiment. In this case, relaxation of the whiteness test was required to reach a conclusive result

  6. Semiclassical propagation of Wigner functions.

    Science.gov (United States)

    Dittrich, T; Gómez, E A; Pachón, L A

    2010-06-07

    We present a comprehensive study of semiclassical phase-space propagation in the Wigner representation, emphasizing numerical applications, in particular as an initial-value representation. Two semiclassical approximation schemes are discussed. The propagator of the Wigner function based on van Vleck's approximation replaces the Liouville propagator by a quantum spot with an oscillatory pattern reflecting the interference between pairs of classical trajectories. Employing phase-space path integration instead, caustics in the quantum spot are resolved in terms of Airy functions. We apply both to two benchmark models of nonlinear molecular potentials, the Morse oscillator and the quartic double well, to test them in standard tasks such as computing autocorrelation functions and propagating coherent states. The performance of semiclassical Wigner propagation is very good even in the presence of marked quantum effects, e.g., in coherent tunneling and in propagating Schrodinger cat states, and of classical chaos in four-dimensional phase space. We suggest options for an effective numerical implementation of our method and for integrating it in Monte-Carlo-Metropolis algorithms suitable for high-dimensional systems.

  7. SDN-enabled hybrid emergency message transmission architecture in internet-of-vehicles

    Science.gov (United States)

    Zhu, Wanting; Gao, Deyun; Zhao, Weicheng; Zhang, Hongke; Chiang, Hua-Pei

    2018-04-01

    With the increasing number of vehicles connected to the Internet-of-Things (IoT), Internet-of-Vehicles (IoV) is becoming a hot research topic. It can improve traffic safety and efficiency and promote the development of the intelligent transportation that is a very important element in Smart Cities. As an important part of the safety application in IoV, the emergency message transmission is designed to inform all the vehicles in the relevant area timely of the accident information through the multi-hop broadcast communication. In this paper, we propose a hybrid emergency message transmission (HEMT), which introduces the SDN technology into the vehicular network environment and utilizes the flexibility of inter-vehicle communication. By deploying SDN-enabled central controller and RSU switches, we can obtain reliable and fast emergency message dissemination. Moreover, considering the space between the coverages of RSUs caused by the sparse deployment, we also use inter-vehicle multi-hop broadcast communication to improve the message coverage ratio by adding the packet modification module on the RSU switch. Simulation results show the feasibility and effectiveness of our proposed scheme.

  8. Politeness Strategies Used in Text Messaging

    Directory of Open Access Journals (Sweden)

    Shahrzad Eshghinejad

    2016-03-01

    Full Text Available One aspect of short message service (SMS communication through a cell phone is use of politeness strategies. As it is extensively argued that females are more polite language users, the present study sought to describe the strategies used by these two groups and to find out whether there is any significant difference between male and female English as a foreign language (EFL learners in the use of positive and negative politeness strategies in sending SMS to their professors, considering that there is an asymmetric power relation and social distance between them. To this end, a corpus of 300 L1 (Persian and L2 (English request messages was compiled. Results of qualitative and quantitative data analysis showed no significant difference between the two groups. Results of the study have implication in politeness research.

  9. Text Messaging for Addiction: A Review

    Science.gov (United States)

    Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P.

    2015-01-01

    Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published randomized controlled trials (RCTs) evaluating text messaging-based interventions for tobacco smoking, 4 studies for reducing alcohol consumption, 1 pilot study in former methamphetamine (MA) users, and 1 study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at 6 and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems. PMID:25950596

  10. Mobile text messaging solutions for obesity prevention

    Science.gov (United States)

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  11. Dynamical Models for Computer Viruses Propagation

    Directory of Open Access Journals (Sweden)

    José R. C. Piqueira

    2008-01-01

    Full Text Available Nowadays, digital computer systems and networks are the main engineering tools, being used in planning, design, operation, and control of all sizes of building, transportation, machinery, business, and life maintaining devices. Consequently, computer viruses became one of the most important sources of uncertainty, contributing to decrease the reliability of vital activities. A lot of antivirus programs have been developed, but they are limited to detecting and removing infections, based on previous knowledge of the virus code. In spite of having good adaptation capability, these programs work just as vaccines against diseases and are not able to prevent new infections based on the network state. Here, a trial on modeling computer viruses propagation dynamics relates it to other notable events occurring in the network permitting to establish preventive policies in the network management. Data from three different viruses are collected in the Internet and two different identification techniques, autoregressive and Fourier analyses, are applied showing that it is possible to forecast the dynamics of a new virus propagation by using the data collected from other viruses that formerly infected the network.

  12. The perfect message at the perfect moment.

    Science.gov (United States)

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  13. Mobile phone messaging for preventive health care.

    Science.gov (United States)

    Vodopivec-Jamsek, Vlasta; de Jongh, Thyra; Gurol-Urganci, Ipek; Atun, Rifat; Car, Josip

    2012-12-12

    Preventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care. To assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes. We searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features

  14. Encoding and decoding messages with chaotic lasers

    International Nuclear Information System (INIS)

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  15. Blind sensor calibration using approximate message passing

    International Nuclear Information System (INIS)

    Schülke, Christophe; Caltagirone, Francesco; Zdeborová, Lenka

    2015-01-01

    The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure. (paper)

  16. Antioxidant health messages in Canadian women's magazines.

    Science.gov (United States)

    Steinberg, Alissa; Paisley, Judy; Bandayrel, Kristofer

    2011-01-01

    Recently, antioxidants have taken centre stage in media and advertising messages. While 80% of Canadians think they are well-informed about nutrition, many are confused about the health effects of specific nutrients. Forty-six percent of Canadians seek information from newspapers and books, and 67% of women rely on magazines. We examined the content and accuracy of antioxidant health messages in Canadian women's magazines. The top three Canadian magazines targeted at women readers were selected. A screening tool was developed, pilot tested, and used to identify eligible articles. A coding scheme was created to define variables, which were coded and analyzed. Seventy-seven percent of 36 magazine issues contained articles that mentioned antioxidants (n=56). Seventy-one percent (n=40) of articles reported positive health effects related to antioxidant consumption, and 36% and 40% of those articles framed those effects as definite and potential, respectively (p<0.01). The articles sampled conveyed messages about positive antioxidant health effects that are not supported by current evidence. Improved standards of health reporting are needed. Nutrition professionals may need to address this inaccuracy when they develop communications on antioxidants and health risk.

  17. ZeroMQ: Messaging Made Simple

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  18. Development of a scale to measure problem use of short message service: the SMS Problem Use Diagnostic Questionnaire.

    Science.gov (United States)

    Rutland, J Brian; Sheets, Tilman; Young, Tony

    2007-12-01

    This exploratory study examines a subset of mobile phone use, the compulsive use of short message service (SMS) text messaging. A measure of SMS use, the SMS Problem Use Diagnostic Questionnaire (SMS-PUDQ), was developed and found to possess acceptable reliability and validity when compared to other measures such as self-reports of time spent using SMS and scores on a survey of problem mobile phone use. Implications for the field of addiction research, technological and behavioral addictions in particular, are discussed, and directions for future research are suggested.

  19. The influence of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages

    NARCIS (Netherlands)

    Moorman, M.; van den Putte, B.

    2008-01-01

    This study explores the combined effect of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages. Pre- and post-message measures of quit intention, attitude toward smoking cessation, and perceived behavioral control were taken in two

  20. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing

    NARCIS (Netherlands)

    Riet, J.P. van 't; Cox, A.D.; Cox, D.; Zimet, G.D.; Bruijn, G.J. de; Putte, B. van den; Vries, H. de; Werrij, M.Q.; Ruiter, R.A.C.

    2016-01-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour

  1. An Exploratory Study of Gambling Operators' Use of Social Media and the Latent Messages Conveyed.

    Science.gov (United States)

    Gainsbury, Sally M; Delfabbro, Paul; King, Daniel L; Hing, Nerilee

    2016-03-01

    Advertisements for gambling products have historically been restricted due to their potential to normalize gambling and contribute to excessive gambling behaviours among vulnerable populations. However, social media enables gambling operators to promote products and brands with fewer constraints than in traditional forms of media. This study investigated how social media is used by gambling operators to promote gambling activities including an analysis of the latent messages that are conveyed. A representative sample of major land-based and online gambling venues and operators, including casinos, clubs, hotels, lottery and wagering operators (n = 101), was obtained. Websites and social media profiles of gambling operators were audited to investigate the types of social media used, content of promotions, and prevalence of responsible gambling messaging. The results showed that Facebook and Twitter were the dominant platforms used, most commonly by casinos and online wagering operators. A key finding was that online gambling operators included gambling content in conjunction with related news and events, as well as unrelated content, as way of normalizing gambling within a broader social context. Unlike land-based gambling promotions, responsible gambling information tended not to feature in operators' posts and profiles. The key messages propagated in social media gambling promotions were positively framed, and tended to encourage gambling using a range of cross-promotional tactics to emphasize the winning aspect of gambling. The implications of freely accessible and pervasive gambling promotions via social media are discussed with respect to the general community as well as vulnerable populations.

  2. The prototype message broadcast system for the Superconducting Super Collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab

  3. The prototype message broadcast system for the superconducting super collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1991-01-01

    This paper presents a prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system

  4. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  5. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  6. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  7. TXT@WORK: pediatric hospitalists and text messaging.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  8. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  9. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  10. Reliability data banks

    International Nuclear Information System (INIS)

    Cannon, A.G.; Bendell, A.

    1991-01-01

    Following an introductory chapter on Reliability, what is it, why it is needed, how it is achieved and measured, the principles of reliability data bases and analysis methodologies are the subject of the next two chapters. Achievements due to the development of data banks are mentioned for different industries in the next chapter, FACTS, a comprehensive information system for industrial safety and reliability data collection in process plants are covered next. CREDO, the Central Reliability Data Organization is described in the next chapter and is indexed separately, as is the chapter on DANTE, the fabrication reliability Data analysis system. Reliability data banks at Electricite de France and IAEA's experience in compiling a generic component reliability data base are also separately indexed. The European reliability data system, ERDS, and the development of a large data bank come next. The last three chapters look at 'Reliability data banks, - friend foe or a waste of time'? and future developments. (UK)

  11. Suncor maintenance and reliability

    Energy Technology Data Exchange (ETDEWEB)

    Little, S. [Suncor Energy, Calgary, AB (Canada)

    2006-07-01

    Fleet maintenance and reliability at Suncor Energy was discussed in this presentation, with reference to Suncor Energy's primary and support equipment fleets. This paper also discussed Suncor Energy's maintenance and reliability standard involving people, processes and technology. An organizational maturity chart that graphed organizational learning against organizational performance was illustrated. The presentation also reviewed the maintenance and reliability framework; maintenance reliability model; the process overview of the maintenance and reliability standard; a process flow chart of maintenance strategies and programs; and an asset reliability improvement process flow chart. An example of an improvement initiative was included, with reference to a shovel reliability review; a dipper trip reliability investigation; bucket related failures by type and frequency; root cause analysis of the reliability process; and additional actions taken. Last, the presentation provided a graph of the results of the improvement initiative and presented the key lessons learned. tabs., figs.

  12. System of message for gamma-radiation monitor

    International Nuclear Information System (INIS)

    Bolic, M.D.; Koturovic, A.M.

    2001-01-01

    Paper describes a system of voice messages for gamma-radiation monitor based on PC. The systems reproduces recorded messages that is simpler than the process of their synthesis. Message choice is based on combination of recorded digital results and/or received reference messages or warnings. The system of generation of voice messages applies the Windows based software. The total memory array required to create independent voice system is maximum 1.7 mbyte. The monitor may be used for continuous monitoring of radioactivity level with 5-8 s period of message repetition. Another option of the system operation is based on monitor application for the environment monitoring. Period of messages in this case is equal to 5-30 min [ru

  13. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  14. The Accelerator Reliability Forum

    CERN Document Server

    Lüdeke, Andreas; Giachino, R

    2014-01-01

    A high reliability is a very important goal for most particle accelerators. The biennial Accelerator Reliability Workshop covers topics related to the design and operation of particle accelerators with a high reliability. In order to optimize the over-all reliability of an accelerator one needs to gather information on the reliability of many different subsystems. While a biennial workshop can serve as a platform for the exchange of such information, the authors aimed to provide a further channel to allow for a more timely communication: the Particle Accelerator Reliability Forum [1]. This contribution will describe the forum and advertise it’s usage in the community.

  15. Group symmetries and information propagation

    International Nuclear Information System (INIS)

    Draayer, J.P.

    1980-01-01

    Spectroscopy concerns itself with the ways in which the Hamiltonian and other interesting operators defined in few-particle spaces are determined or determine properties of many-particle systems. But the action of the central limit theorem (CLT) filters the transmission of information between source and observed so whether propagating forward from a few-particle defining space, as is usual in theoretical studies, or projecting backward to it from measured things, each is only sensitive to averaged properties of the other. Our concern is with the propagation of spectroscopic information in the presence of good symmetries when filtering action of the CLT is effective. Specifically, we propose to address the question, What propagates and how. We begin with some examples, using both scalar and isospin geometries to illustrate simple propagation. Examples of matrix propagation are studied; contact with standard tensor algebra is established and an algorithm put forward for the expansion of any operator in terms of another set, complete or not; shell-model results for 20 Ne using a realistic interaction and two trace-equivalent forms are presented; and some further challenges are mentioned

  16. Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS

    CERN Document Server

    Onyisi, Peter; The ATLAS collaboration

    2015-01-01

    During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.

  17. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  18. When communications collide with recipients' actions: effects of post-message behavior on intentions to follow the message recommendation.

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B; Kumkale, G Tarcan

    2003-07-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance.

  19. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  20. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages.

    Science.gov (United States)

    Cole, Galen E; Keller, Punam A; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-03-01

    The Centers for Disease Control and Prevention's Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces.

  1. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  2. The Use of WhatsApp Smartphone Messaging Improves Communication Efficiency within an Orthopaedic Surgery Team.

    Science.gov (United States)

    Ellanti, Prasad; Moriarty, Andrew; Coughlan, Fionn; McCarthy, Thomas

    2017-02-18

    Effective and timely communication is important for any surgical specialty to function. The use of smartphones is prevalent amongst doctors. Numerous smartphone applications offer the potential for fast and cost-effective communication. WhatsApp is a commonly used application that is free, easy to use, and capable of text and multimedia messaging. We report on the use of WhatsApp over a six month period in our unit. WhatsApp communication between non-consultant members of an orthopaedic team over a six-month period was analysed. Both the phones and the WhatsApp application were password-protected, and patient details were anonymised. A series of 20 communications using the hospital pager system and the telephone system were also analysed. A total of 5,492 messages were sent during the six-month period and were part of 1,916 separate communication events. The vast majority of messages, 5,090, were related to patient care. A total of 195 multimedia messages were sent and these included images of radiographs and wounds. When using the hospital telephones, the length of time spent on a communication averaged 5.78 minutes and using the hospital pager system averaged 7.45 minutes. Using the WhatsApp messaging system has potentially saved up to 7,664 minutes over the study period. All participants found WhatsApp easy to use and found it to be more efficient than the traditional pager system Conclusion: Compared to the traditional pager systems, the use of WhatsApp is easy, inexpensive, and reliable and can help improve the efficiency of communication within a surgical team.

  3. Human Reliability Program Overview

    Energy Technology Data Exchange (ETDEWEB)

    Bodin, Michael

    2012-09-25

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  4. Power electronics reliability analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Mark A.; Atcitty, Stanley

    2009-12-01

    This report provides the DOE and industry with a general process for analyzing power electronics reliability. The analysis can help with understanding the main causes of failures, downtime, and cost and how to reduce them. One approach is to collect field maintenance data and use it directly to calculate reliability metrics related to each cause. Another approach is to model the functional structure of the equipment using a fault tree to derive system reliability from component reliability. Analysis of a fictitious device demonstrates the latter process. Optimization can use the resulting baseline model to decide how to improve reliability and/or lower costs. It is recommended that both electric utilities and equipment manufacturers make provisions to collect and share data in order to lay the groundwork for improving reliability into the future. Reliability analysis helps guide reliability improvements in hardware and software technology including condition monitoring and prognostics and health management.

  5. Reliability of software

    International Nuclear Information System (INIS)

    Kopetz, H.

    1980-01-01

    Common factors and differences in the reliability of hardware and software; reliability increase by means of methods of software redundancy. Maintenance of software for long term operating behavior. (HP) [de

  6. Wave equations for pulse propagation

    International Nuclear Information System (INIS)

    Shore, B.W.

    1987-01-01

    Theoretical discussions of the propagation of pulses of laser radiation through atomic or molecular vapor rely on a number of traditional approximations for idealizing the radiation and the molecules, and for quantifying their mutual interaction by various equations of propagation (for the radiation) and excitation (for the molecules). In treating short-pulse phenomena it is essential to consider coherent excitation phenomena of the sort that is manifest in Rabi oscillations of atomic or molecular populations. Such processes are not adequately treated by rate equations for excitation nor by rate equations for radiation. As part of a more comprehensive treatment of the coupled equations that describe propagation of short pulses, this memo presents background discussion of the equations that describe the field. This memo discusses the origin, in Maxwell's equations, of the wave equation used in the description of pulse propagation. It notes the separation into lamellar and solenoidal (or longitudinal and transverse) and positive and negative frequency parts. It mentions the possibility of separating the polarization field into linear and nonlinear parts, in order to define a susceptibility or index of refraction and, from these, a phase and group velocity. The memo discusses various ways of characterizing the polarization characteristics of plane waves, that is, of parameterizing a transverse unit vector, such as the Jones vector, the Stokes vector, and the Poincare sphere. It discusses the connection between macroscopically defined quantities, such as the intensity or, more generally, the Stokes parameters, and microscopic field amplitudes. The material presented here is a portion of a more extensive treatment of propagation to be presented separately. The equations presented here have been described in various books and articles. They are collected here as a summary and review of theory needed when treating pulse propagation

  7. Wave propagation in electromagnetic media

    International Nuclear Information System (INIS)

    Davis, J.L.

    1990-01-01

    This book is concerned with wave propagation in reacting media, specifically in electromagnetic materials. An account is presented of the mathematical methods of wave phenomena in electromagnetic materials. The author presents the theory of time-varying electromagnetic fields, which involves a discussion of Faraday's laws, Maxwell's equations and their application to electromagnetic wave propagation under a variety of conditions. The author gives a discussion of magnetohydrodynamics and plasma physics. Chapters are included on quantum mechanics and the theory of relativity. The mathematical foundation of electromagnetic waves vis a vis partial differential equations is discussed

  8. Vegetative propagation of Bambusa vulgaris

    Directory of Open Access Journals (Sweden)

    Rafael Malfitano Braga

    2017-06-01

    Full Text Available Bamboo is an important source of raw material of multiple uses. The development of simple techniques for its propagation is a practical way to enable its implementation in ownership of low technology. The present work had the objective of evaluating artisanal propagation methods for Bambusa vulgaris. Two types of propagules were tested, with buds budded or not, and three relative positions to the removal of vegetative material on the culm. The best propagule was with only one node, extracted from the lower thirds of the stem, presenting 72% of rooting. This result demonstrates its potential for seedling production of this species under low tech.

  9. Nonequilibrium theory of flame propagation

    International Nuclear Information System (INIS)

    Merzhanov, A.G.

    1995-01-01

    The nonequilibrium theory of flame propagation is considered as applied to the following three processes of wave propagation: the combustion waves of the second kind, the combustion waves with broad reaction zones, and the combustion waves with chemical stages. Kinetic and combustion wave parameters are presented for different in composition mixtures of boron and transition metals, such as Zr, Hf, Ti, Nb, Ta, Mo, as well as for the Ta-N, Zr-C-H, Nb-B-O systems to illustrate specific features of the above-mentioned processes [ru

  10. Getting your message out with social marketing.

    Science.gov (United States)

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  11. Electronic folklore among teenagers: SMS messages

    Directory of Open Access Journals (Sweden)

    Cvjetićanin Tijana

    2006-01-01

    Full Text Available The development of ICT media made way for a new form of folklore communication. Newly developed media, such as mobile phones, make it possible for their users to participate in electronically mediated communication, thus approaching the form of oral communication. The exchange of special type of SMS text messages represents a new way of transmitting contemporary folklore short forms. These messages use poetic language, they have standard style themes, patterns and formulas, and they form different genres and categories corresponding with already existing familiar folklore forms. The communication process that happens during the exchange of these messages also has folklore’s characteristics: it takes place within small groups, the communication is informal, the texts circulate in chain style, and undergo different transformation which generates the making of variants, etc. This form of electronic folklore is especially popular among teenagers, where it’s social functions and meanings are also most emphasized. Within this population, it adds to an older tradition of children’s written folklore poetry albums. Like poetry albums, SMS exchange influences the development of girls’ gender identity, providing also a socially defined channel for contacts between the sexes. It also functions as a mechanism of socialization and stratification within the group. At the same time, it creates a new field of meaning, which derives from the very media’s novelty and significance. In this sense, the exchange of SMS represents a symbolic act of acknowledging one’s belonging to the group of mobile telephone users. In this way, a new phenomenon is being symbolically processed through a new form of folklore.

  12. Reliable Design Versus Trust

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    This presentation focuses on reliability and trust for the users portion of the FPGA design flow. It is assumed that the manufacturer prior to hand-off to the user tests FPGA internal components. The objective is to present the challenges of creating reliable and trusted designs. The following will be addressed: What makes a design vulnerable to functional flaws (reliability) or attackers (trust)? What are the challenges for verifying a reliable design versus a trusted design?

  13. Pocket Handbook on Reliability

    Science.gov (United States)

    1975-09-01

    exponencial distributions Weibull distribution, -xtimating reliability, confidence intervals, relia- bility growth, 0. P- curves, Bayesian analysis. 20 A S...introduction for those not familiar with reliability and a good refresher for those who are currently working in the area. LEWIS NERI, CHIEF...includes one or both of the following objectives: a) prediction of the current system reliability, b) projection on the system reliability for someI future

  14. Real Time Assessment of Young Adults' Attitudes toward Tobacco Messages.

    Science.gov (United States)

    Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L

    2018-01-01

    We used ecological momentary assessment (EMA) to examine young adults' attitudes towards pro-tobacco messages encountered in real time and their association with intentions to use tobacco. Young adults (N = 92, ages 18-29) recorded sightings of marketing or social media related to tobacco in real time via mobile app for 28 days. Participants reported message characteristics, their attitudes towards the message, and intentions to use the depicted product for each submission. We used generalized linear mixed models to examine factors related to attitude towards message and intentions to use tobacco. Messages depicting e-cigarettes (p < .001) or hookah (p < .05) were associated with significantly more favorable attitudes compared with traditional cigarettes. Positive attitude towards the message was significantly associated with intention to use the depicted product (p < .001). Messages depicting e-cigarettes and hookah were significantly associated with higher intention to use. Message source was not significantly related to attitudes towards the message or product use intentions. Marketing featuring e-cigarettes and hookah is an important target for future regulation. Given that pro-tobacco and e-cigarette messages are prevalent online, future research should consider the Internet and social media as important venues for counter-marketing and intervention efforts.

  15. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  16. The religious message in action - a case study

    Directory of Open Access Journals (Sweden)

    René Gothóni

    1975-01-01

    Full Text Available We understand a religious message to be the product of a religious movement. In studying such a message, it is very much to the purpose to place it in the context in which it operates. The cultural and social context of a religious message is some religious movement. Hence, the message should be examined against that framework. Each message has a certain structure, and its detection is of prime importance. Messages are not only part of the tradition, but themselves unique in their respective communicative situations. Thus, in our view, structural analysis does not have analytical use-value unless the message's symbols are set into their communicative context. The aim of this paper is dual: On the one hand, we intend to analyze and clarify the structure of a religious message of the Laestadian movement, how the message operates, also how the members of that movement respond to the codes of the message, and what kind of functions it fulfills; on the other, to develop and test an analytical model which would combine structural and interactional analysis.

  17. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    This article presents the results of a study of two SMS services aimed at providing young people with information on cannabis and helping them to reduce their consumption of the drug. The attitude of the 12 participants in the study towards the SMS services is generally positive, but they prefer...... factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...

  18. Neuroscience and education: myths and messages.

    Science.gov (United States)

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.

  19. Principles of Bridge Reliability

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Nowak, Andrzej S.

    The paper gives a brief introduction to the basic principles of structural reliability theory and its application to bridge engineering. Fundamental concepts like failure probability and reliability index are introduced. Ultimate as well as serviceability limit states for bridges are formulated......, and as an example the reliability profile and a sensitivity analyses for a corroded reinforced concrete bridge is shown....

  20. Reliability in engineering '87

    International Nuclear Information System (INIS)

    Tuma, M.

    1987-01-01

    The participants heard 51 papers dealing with the reliability of engineering products. Two of the papers were incorporated in INIS, namely ''Reliability comparison of two designs of low pressure regeneration of the 1000 MW unit at the Temelin nuclear power plant'' and ''Use of probability analysis of reliability in designing nuclear power facilities.''(J.B.)

  1. Starting Off on the Best Foot: A Review of Message Framing and Message Tailoring, and Recommendations for the Comprehensive Messaging Strategy for Sustained Behavior Change.

    Science.gov (United States)

    Pope, J Paige; Pelletier, Luc; Guertin, Camille

    2018-09-01

    Health promotion programs represent a salient means through which physical activity promoters can cultivate positive health behavior change and maintenance. The messages communicated within these programs serve as an essential component as they are often used to convey valuable information, resources, or tools that facilitate health behavior initiation and sustained engagement. Identifying the most effective way to communicate health promotion information is, therefore, of considerable importance to ensuring that people not only attend to these messages, but also connect with and internalize the information conveyed within them. This paper was written to (1) summarize and evaluate the most prominent reviewed research approaches of message framing and tailoring to message design; and (2) offer a comprehensive messaging strategy to promote sustained health behavior change. A review of the literature demonstrated that a messaging strategy that has consistently led to healthy behavior change has yet to be identified. Furthermore, scholars have articulated that a multi-theoretical approach that places emphasis on facilitating motivation and healthy behavior change needs to be employed. Thus, this paper proposes and provides recommendations for employing the Comprehensive Messaging Strategy for Sustained Behavior Change (CMSSBC), which advocates tailoring messages to peoples' stage of change and framing them to focus on self-determined motives and intrinsic goals.

  2. User's guide to the Reliability Estimation System Testbed (REST)

    Science.gov (United States)

    Nicol, David M.; Palumbo, Daniel L.; Rifkin, Adam

    1992-01-01

    The Reliability Estimation System Testbed is an X-window based reliability modeling tool that was created to explore the use of the Reliability Modeling Language (RML). RML was defined to support several reliability analysis techniques including modularization, graphical representation, Failure Mode Effects Simulation (FMES), and parallel processing. These techniques are most useful in modeling large systems. Using modularization, an analyst can create reliability models for individual system components. The modules can be tested separately and then combined to compute the total system reliability. Because a one-to-one relationship can be established between system components and the reliability modules, a graphical user interface may be used to describe the system model. RML was designed to permit message passing between modules. This feature enables reliability modeling based on a run time simulation of the system wide effects of a component's failure modes. The use of failure modes effects simulation enhances the analyst's ability to correctly express system behavior when using the modularization approach to reliability modeling. To alleviate the computation bottleneck often found in large reliability models, REST was designed to take advantage of parallel processing on hypercube processors.

  3. In vitro propagation of the medicinal plant Ziziphora tenuior L. and evaluation of its antioxidant activity

    OpenAIRE

    Dakah, Abdulkarim; Zaid, Salim; Suleiman, Mohamad; Abbas, Sami; Wink, Michael

    2014-01-01

    Ziziphora tenuior L. (Lamiaceae) is an aromatic herb used for its medicinal values against fungi, bacteria. Micropropagation can be used for large-scale multiplication of essential oil producing plants thus avoiding an overexploitation of natural resources. This work aims to develop a reliable protocol for the in vitro propagation of Z. tenuior, and to compare the antioxidant activity between in vitro propagated and wild plants.

  4. Reliable computer systems.

    Science.gov (United States)

    Wear, L L; Pinkert, J R

    1993-11-01

    In this article, we looked at some decisions that apply to the design of reliable computer systems. We began with a discussion of several terms such as testability, then described some systems that call for highly reliable hardware and software. The article concluded with a discussion of methods that can be used to achieve higher reliability in computer systems. Reliability and fault tolerance in computers probably will continue to grow in importance. As more and more systems are computerized, people will want assurances about the reliability of these systems, and their ability to work properly even when sub-systems fail.

  5. Human factor reliability program

    International Nuclear Information System (INIS)

    Knoblochova, L.

    2017-01-01

    The human factor's reliability program was at Slovenske elektrarne, a.s. (SE) nuclear power plants. introduced as one of the components Initiatives of Excellent Performance in 2011. The initiative's goal was to increase the reliability of both people and facilities, in response to 3 major areas of improvement - Need for improvement of the results, Troubleshooting support, Supporting the achievement of the company's goals. The human agent's reliability program is in practice included: - Tools to prevent human error; - Managerial observation and coaching; - Human factor analysis; -Quick information about the event with a human agent; -Human reliability timeline and performance indicators; - Basic, periodic and extraordinary training in human factor reliability(authors)

  6. Persuasiveness of Anti-Smoking Messages: Self-Construal and Message Focus

    Science.gov (United States)

    Yang, Bo; Nan, Xiaoli; Zhao, Xinyan

    2017-01-01

    Purpose: The purpose of this paper is to examine the role of independent vs interdependent self-construal in non-smokers' responses to an anti-smoking message that focuses on either personal or relational consequences of smoking. Design/methodology/approach: Two web-based experimental studies were conducted among US college non-smokers. In the…

  7. (In-)Secure messaging with the Silent Circle instant messaging protocol

    NARCIS (Netherlands)

    Verschoor, S.R.; Lange, T.

    2016-01-01

    Silent Text, the instant messaging application by the company Silent Circle, provides its users with end-to-end encrypted communication on the Blackphone and other smartphones. The underlying protocol, SCimp, has received many extensions during the update to version 2, but has not been subjected to

  8. Language Implications for Advertising in International Markets: A Model for Message Content and Message Execution.

    Science.gov (United States)

    Beard, John; Yaprak, Attila

    A content analysis model for assessing advertising themes and messages generated primarily for United States markets to overcome barriers in the cultural environment of international markets was developed and tested. The model is based on three primary categories for generating, evaluating, and executing advertisements: rational, emotional, and…

  9. Independent Auditor’s Report: Messages Conveyed and Implications

    Directory of Open Access Journals (Sweden)

    Saher Aqel

    2014-10-01

    Full Text Available Auditing plays a crucial role in the business environment by providing assurance services to the public so as to decrease information risk by increasing the reliability of financial information provided by the business entities. As the final product of the audit, the audit report is a way by which the auditor communicates with the public the findings of the audit process. The auditor‟s report is the only aspect of the work of auditor that can be available to the public. Thus, users are likely to assess the auditor‟s professionalism and competence by this report. The purpose of this study is to address the meaning and implication of the audit report in addition to a discussion of the messages perceived from the auditor‟s report. Differences in perceptions of the meaning of the auditor‟s report may exist between the auditors and users. Users may misperceive the nature and scope of the audit function and the level of assurance when they read the audit report

  10. Physics of Earthquake Rupture Propagation

    Science.gov (United States)

    Xu, Shiqing; Fukuyama, Eiichi; Sagy, Amir; Doan, Mai-Linh

    2018-05-01

    A comprehensive understanding of earthquake rupture propagation requires the study of not only the sudden release of elastic strain energy during co-seismic slip, but also of other processes that operate at a variety of spatiotemporal scales. For example, the accumulation of the elastic strain energy usually takes decades to hundreds of years, and rupture propagation and termination modify the bulk properties of the surrounding medium that can influence the behavior of future earthquakes. To share recent findings in the multiscale investigation of earthquake rupture propagation, we held a session entitled "Physics of Earthquake Rupture Propagation" during the 2016 American Geophysical Union (AGU) Fall Meeting in San Francisco. The session included 46 poster and 32 oral presentations, reporting observations of natural earthquakes, numerical and experimental simulations of earthquake ruptures, and studies of earthquake fault friction. These presentations and discussions during and after the session suggested a need to document more formally the research findings, particularly new observations and views different from conventional ones, complexities in fault zone properties and loading conditions, the diversity of fault slip modes and their interactions, the evaluation of observational and model uncertainties, and comparison between empirical and physics-based models. Therefore, we organize this Special Issue (SI) of Tectonophysics under the same title as our AGU session, hoping to inspire future investigations. Eighteen articles (marked with "this issue") are included in this SI and grouped into the following six categories.

  11. Invisibility cloaking without superluminal propagation

    Energy Technology Data Exchange (ETDEWEB)

    Perczel, Janos; Leonhardt, Ulf [School of Physics and Astronomy, University of St Andrews, North Haugh, St Andrews KY16 9SS (United Kingdom); Tyc, Tomas, E-mail: jp394@st-andrews.ac.uk, E-mail: tomtyc@physics.muni.cz, E-mail: ulf@st-andrews.ac.uk [Faculty of Science, Kotlarska 2 and Faculty of Informatics, Botanicka 68a, Masaryk University, 61137 Brno (Czech Republic)

    2011-08-15

    Conventional cloaking based on Euclidean transformation optics requires that the speed of light should tend to infinity on the inner surface of the cloak. Non-Euclidean cloaking still needs media with superluminal propagation. Here we show by giving an example that this is no longer necessary.

  12. Propagating Class and Method Combination

    DEFF Research Database (Denmark)

    Ernst, Erik

    1999-01-01

    number of implicit combinations. For example, it is possible to specify separate aspects of a family of classes, and then combine several aspects into a full-fledged class family. The combination expressions would explicitly combine whole-family aspects, and by propagation implicitly combine the aspects...

  13. Comics: a medium for today's development messages.

    Science.gov (United States)

    Opilas, E A

    1978-03-01

    Filipino illustrated magazines, or the comics, may yet prove to be the most effective media, if not the most effective, for spreading the country's development messages. Long criticized by intellectuals and the social elite, the comics have been grossly underrated in their potential to inform, persuade, and even influence the life-style of the people. The government's Commission on Population (Popcom) has developed an information-education-communication program using the comics, among other media, to disseminate stories on family planning, responsible parenthood, and related topics. Its best quality is popular appeal, and for publishers and distribution outlets, the comics provide good business. A review of these materials shows that their themes reflect the following topics or issues: 1) population trends and consequences; 2) socioeconomic benefits of family planning; 3) customs which influence family planning; 4) family planning concepts; 5) family planning methods; 6) human sexuality and reproduction; 7) the husband-wife relationship; 8) guides for family planning motivation or communication; and 9) guides for teaching family planning. The materials were developed with 4 qualities in mind so as to attract audience or reader interest: simplicity, familiarity, realism, and attractiveness of materials. The consensus is that in the comics, population and development agencies may have found a "secret weapon" in getting these messages across, and that this new-found use for the illustrated magazines may be giving them a new respectability without in any way diminishing their popular appeal.

  14. Experimental effects of climate messages vary geographically

    Science.gov (United States)

    Zhang, Baobao; van der Linden, Sander; Mildenberger, Matto; Marlon, Jennifer R.; Howe, Peter D.; Leiserowitz, Anthony

    2018-05-01

    Social science scholars routinely evaluate the efficacy of diverse climate frames using local convenience or nationally representative samples1-5. For example, previous research has focused on communicating the scientific consensus on climate change, which has been identified as a `gateway' cognition to other key beliefs about the issue6-9. Importantly, although these efforts reveal average public responsiveness to particular climate frames, they do not describe variation in message effectiveness at the spatial and political scales relevant for climate policymaking. Here we use a small-area estimation method to map geographical variation in public responsiveness to information about the scientific consensus as part of a large-scale randomized national experiment (n = 6,301). Our survey experiment finds that, on average, public perception of the consensus increases by 16 percentage points after message exposure. However, substantial spatial variation exists across the United States at state and local scales. Crucially, responsiveness is highest in more conservative parts of the country, leading to national convergence in perceptions of the climate science consensus across diverse political geographies. These findings not only advance a geographical understanding of how the public engages with information about scientific agreement, but will also prove useful for policymakers, practitioners and scientists engaged in climate change mitigation and adaptation.

  15. The impact of cultural exposure and message framing on oral health behavior: Exploring the role of message memory

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N.; Updegraff, John A.; Ehret, Phillip J.; Areguin, Maira A.; Sherman, David K.

    2015-01-01

    Background Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically decide on message features to promote adherence to recommended behaviors. We present exposure to United States (U.S.) culture as a moderator of the impact of gain- vs. loss-frame messages. Since U.S. culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to U.S. culture would show these advantages for loss-framed messages. Methods 223 participants viewed a written oral health message in one of three randomized conditions: gain-frame, loss-frame, or no-message control, and were given ten flosses. Cultural exposure was measured with the proportions of life spent and parents born in the U.S. At baseline and one week later, participants completed recall tests and reported recent flossing behavior. Results Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over one week. E.g., those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Limitations Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. Conclusions In healthcare settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. PMID:25654986

  16. Impact of Cultural Exposure and Message Framing on Oral Health Behavior: Exploring the Role of Message Memory.

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N; Updegraff, John A; Ehret, Phillip J; Areguin, Maira A; Sherman, David K

    2016-10-01

    Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically choose message features to promote adherence to recommended behaviors. We present exposure to US culture as a moderator of the impact of gain-frame versus loss-frame messages. Since US culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to US culture would show these advantages for loss-framed messages. 223 participants viewed a written oral health message in 1 of 3 randomized conditions-gain-frame, loss-frame, or no-message control-and were given 10 flosses. Cultural exposure was measured with the proportions of life spent and parents born in the US. At baseline and 1 week later, participants completed recall tests and reported recent flossing behavior. Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over 1 week; for example, those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. In health care settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. © The Author(s) 2015.

  17. A CONTENT ANALYSIS OF MILITARY COMMANDER MESSAGES ABOUT TOBACCO AND OTHER HEALTH ISSUES IN MILITARY INSTALLATION NEWSPAPERS: WHAT DO MILITARY COMMANDERS SAY ABOUT TOBACCO?

    Science.gov (United States)

    Poston, Walker S.C.; Haddock, Christopher K.; Jahnke, Sara A.; Hyder, Melissa L.; Jitnarin, Nattinee

    2014-01-01

    Military installation newspapers are a primary means used by military commanders to communicate information about topics important to military personnel including leadership, training issues, installation events, safety concerns, and vital health issues. We conducted a content analysis of military commanders’ messages about health issues that were published in online military installation newspapers/newsfeeds. We identified a total of 75 publicly accessible installation newspapers/newsfeeds with commanders’ messages (n=39 Air Force, n=19 Army, n=7 Navy, n=1 Marine, and n=9 Joint Bases). Commander messages published between January 2012–December 2012 were collected, screened, and coded. Coder inter-rater reliability was 98.9%. Among the 2,479 coded commanders’ messages, 132 (5.3%) addressed a health topic as the primary focus. There were no significant differences between service branches in the percentage of health-oriented messages (χ2=5.019, p=0.285). The most commonly addressed health topics were exercise/fitness (23.5%), other mental health concerns (19.7%), alcohol/DUI (13.6%), and suicide (12.1%). Tobacco use was directly addressed as a primary health aim in only two commanders’ messages (1.5%). Health topics, and particularly tobacco-related content, are rarely written about by military commanders. The absence of tobacco-related health messages from line leadership contributes to the perception that tobacco control is a low priority. PMID:26032388

  18. Countering Islamic State Messaging Through “Linkage-Based” Analysis

    Directory of Open Access Journals (Sweden)

    J.M. Berger

    2017-08-01

    Full Text Available The Islamic State’s recent losses on the battlefield, including significant casualties within its media and propaganda division, offer a unique opportunity to inject competing and alternative messages into the information space. This paper proposes that the content of such messages should be guided by a linkage-based analysis of existing Islamic State messaging. A linkage-based analysis of a top-level 2017 audio message by Islamic State spokesperson Abu Hasan al Muhajir offers several potential insights into crafting effective content for competing and alternative messages. A comparison of the 2017 work to earlier Islamic State messaging also reveals specific opportunities to undermine the credibility of the organisation’s broader propaganda programme by highlighting the organisation’s repeated failure to follow through on its extravagantly promised commitment to achieving its stated goals.

  19. The Message Logging System for NOνA Experiment

    International Nuclear Information System (INIS)

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  20. VISUAL ART AND REGULATORY FIT MESSAGES ON CONSUMER EVALUATIONS

    Directory of Open Access Journals (Sweden)

    Danielle Mantovani

    2016-03-01

    Full Text Available In this study, we demonstrate that the art infusion effect, in which the presence of visual art causes a positive impact on consumers’ perceptions of products and advertising messages, might have a moderation effect on regulatory fit and non-fit messages. We investigate the impact of visual art on advertisement evaluations in regulatory (non- fit conditions. Regulatory focus theory suggests that consumers rely on their motivational focus (prevention vs. promotion for their evaluations and decisions. Usually, consumers prefer products that fit with their personal motivational focus. In the present study, the results of three experiments indicate that using visual art with a promotion or prevention fit message is recommended, while non-art images increase message persuasiveness when non-fit messages are presented. Therefore, not all information compatible with the consumer’s motivational focus are best evaluated. When non-art images are presented, non-fit messages might be more persuasive.

  1. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  2. An Improved Split-Step Wavelet Transform Method for Anomalous Radio Wave Propagation Modelling

    Directory of Open Access Journals (Sweden)

    A. Iqbal

    2014-12-01

    Full Text Available Anomalous tropospheric propagation caused by ducting phenomenon is a major problem in wireless communication. Thus, it is important to study the behavior of radio wave propagation in tropospheric ducts. The Parabolic Wave Equation (PWE method is considered most reliable to model anomalous radio wave propagation. In this work, an improved Split Step Wavelet transform Method (SSWM is presented to solve PWE for the modeling of tropospheric propagation over finite and infinite conductive surfaces. A large number of numerical experiments are carried out to validate the performance of the proposed algorithm. Developed algorithm is compared with previously published techniques; Wavelet Galerkin Method (WGM and Split-Step Fourier transform Method (SSFM. A very good agreement is found between SSWM and published techniques. It is also observed that the proposed algorithm is about 18 times faster than WGM and provide more details of propagation effects as compared to SSFM.

  3. Tendency to Message Delivery in Internet Viral Marketing

    OpenAIRE

    Mostafa Ghazizadeh; Ahmad Sardari; Seyyed Reza Shojaee; Mehdi Samizadeh

    2011-01-01

    Abstract The main goal of this research is to review and determine the factors associated with tendency to forward the marketing messages in viral marketing plans of Fast-food industries. In other words, in this study, the effects of three critical determinants, i.e. commercial intention, attractiveness, and media richness have been examined on receivers' intention to forward marketing message in Tehran, Isfahan and Shiraz. Findings imply that receivers’ attitude toward the message has pos...

  4. Error message recording and reporting in the SLC control system

    International Nuclear Information System (INIS)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-01-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  5. Error message recording and reporting in the SLC control system

    International Nuclear Information System (INIS)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  6. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  7. Subjective knowledge and fear appeal effectiveness: implications for message design.

    Science.gov (United States)

    Nabi, Robin L; Roskos-Ewoldsen, David; Carpentier, Francesca Dillman

    2008-01-01

    This research investigates the role of perceived health knowledge on the effectiveness of fear-based persuasive appeals. Undergraduates (N = 263) read a strong fear, weak fear, or efficacy-only message encouraging breast or testicular self-examination. As expected, results indicated that men high in subjective knowledge were less reactant and more persuaded by the efficacy-only message whereas those low in subjective knowledge did not evidence this pattern. Contrary to expectation, women high in subjective knowledge had comparable reactions to each of the 3 messages. Implications for fear appeal theory and message design are discussed.

  8. Motivating Smoking Cessation Text Messages: Perspectives from Pregnant Smokers.

    Science.gov (United States)

    Schindler-Ruwisch, Jennifer M; Leavitt, Leah E; Macherelli, Laura E; Turner, Monique M; Abroms, Lorien C

    2018-06-01

    The purpose of this research is to analyze cessation text-messages written by pregnant smokers to elucidate the target population's preferred content and message attributes. To achieve this goal, the objectives of this study are three-fold; to qualitatively code messages written by pregnant smokers for frame, type of appeal, and intended target. Study participants were recruited as part of a larger trial of pregnant smokers who were enrolled in a text-messaging program or control group and surveyed 1 month post-enrollment. Each participant was asked to write a brief message to another pregnant smoker and two independent coders qualitatively analyzed responses. User generated messages (N = 51) were equally loss and gain framed, and the most common appeals were: fear, guilt, cognitive, hope and empathy, in order of most to least frequent. The target of the majority of the messages was the baby. Allowing pregnant smokers to write cessation text-messages for other pregnant women can provide relevant insight into intervention content. Specifically, pregnant smokers appear to equally promote gain and loss frames, but may prefer messages that include components of fear and guilt related to the impact of smoking on their baby. Additional research is needed to systematically uncover perspectives of pregnant smokers to ensure interventions are optimally effective.

  9. Creating Effective Media Messaging for Rural Smoke-free Policy.

    Science.gov (United States)

    Riker, Carol A; Butler, Karen M; Ricks, JaNelle M; Record, Rachael A; Begley, Kathy; Anderson, Debra Gay; Hahn, Ellen J

    2015-01-01

    Objectives were to (1) explore perceived effectiveness of existing smoke-free print advertisements in rural communities and (2) generate message content, characteristics, and media delivery channels that resonate with residents. Qualitative methods design. Thirty-nine rural adults recruited by community partners. Content analysis of findings from individuals in four focus groups who participated in general discussion and reviewed eight print ads related to secondhand smoke (SHS) and smoke-free policy. Six content themes were identified: smoking/SHS dangers, worker health, analogies, economic impact, rights, and nostalgia. Seven message characteristics were recognized: short/to the point, large enough to read, graphic images, poignant stories, statistics/charts/graphs, message sender, and messages targeting different groups. Four media delivery channels were considered most effective: local media, technology, billboard messages, and print materials. Seeking input from key informants is essential to reaching rural residents. Use of analogies in media messaging is a distinct contribution to the literature on effective smoke-free campaigns. Other findings support previous studies of effective messaging and delivery channels. Further research is needed to examine effectiveness of themes related to message content in smoke-free ads and delivery strategies. Effective media messaging can lead to policy change in rural communities to reduce exposure to SHS. © 2015 Wiley Periodicals, Inc.

  10. Bidirectional Text Messaging to Improve Adherence to Recommended Lipid Testing.

    Science.gov (United States)

    Baldwin, Laura-Mae; Morrison, Caitlin; Griffin, Jonathan; Anderson, Nick; Edwards, Kelly; Green, Jeff; Waldren, Cleary; Reiter, William

    2017-01-01

    Synergies between technology and health care in the United States are accelerating, increasing opportunities to leverage these technologies to improve patient care. This study was a collaboration between an academic study team, a rural primary care clinic, and a local nonprofit informatics company developing tools to improve patient care through population management. Our team created a text messaging management tool, then developed methods for and tested the feasibility of bidirectional text messaging to remind eligible patients about the need for lipid testing. We measured patient response to the text messages, then interviewed 8 patients to explore their text messaging experience. Of the 129 patients the clinic was able to contact by phone, 29.4% had no cell phone or text-messaging capabilities. An additional 20% refused to participate. Two thirds of the 28 patients who participated in the text messaging intervention (67.9%) responded to at least 1 of the up to 3 messages. Seven of 8 interviewed patients had a positive text-messaging experience. Bidirectional text messaging is a feasible and largely acceptable form of communication for test reminders that has the potential to reach large numbers of patients in clinical care. © Copyright 2017 by the American Board of Family Medicine.

  11. Mental health message appeals and audience engagement: Evidence from Australia.

    Science.gov (United States)

    Yap, Jo En; Zubcevic-Basic, Nives; Johnson, Lester W; Lodewyckx, Michaela A

    2017-09-07

    Social media platforms are increasingly used to disseminate social marketing messages about mental health and wellbeing. This study presents a range of message appeals used in social media enabled mental health promotion and stigma reduction messages. Furthermore, it examines the relationship between the type of message appeals and audience engagement. A content analysis of 65 organisation-generated YouTube videos about depression and anxiety and stigma reduction was conducted. The most utilised message appeal was Sorrow, followed by Affiliation, Ease/Convenience, Hope, Humour, Guilt/Shame, Heroic/Successful, and Fear. Multiple regression analysis was used to examine the relationship between the type of message appeals and audience engagement in terms of the number of likes, comments, and shares. The analysis revealed that Sorrow is the most useful message appeal for generating audience comments. However, Sorrow is negatively associated with the number of likes and shares. The results suggest that mental health promotion messages may engage a larger audience through Affiliation and Hope as they have a positive impact on the number of shares. This could, in effect, turn audiences into vocal advocates for mental health promotion and stigma reduction messages. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Preliminary investigation on reliability assessment of passive safety system

    International Nuclear Information System (INIS)

    Huang Changfan; Kuang Bo

    2012-01-01

    The reliability evaluation of passive safety system plays an important part in probabilistic safety assessment (PSA) of nuclear power plant applying passive safety design, which depends quantitatively on reliabilities of passive safety system. According to the object of reliability assessment of passive safety system, relevant parameters are identified. Then passive system behavior during accident scenarios are studied. A practical example of this method is given for the case of reliability assessment of AP1000 passive heat removal system in loss of normal feedwater accident. Key and design parameters of PRHRS are identified and functional failure criteria are established. Parameter combinations acquired by Latin hyper~ cube sampling (LHS) in possible parametric ranges are input and calculations of uncertainty propagation through RELAP5/MOD3 code are carried out. Based on the calculations, sensitivity assessment on PRHRS functional criteria and reliability evaluation of the system are presented, which might provide further PSA with PRHR system reliability. (authors)

  13. Applications of Short Message Service and WAP in Operating Remotely Triggered Laboratories

    Directory of Open Access Journals (Sweden)

    Ananda Maiti

    2011-11-01

    Full Text Available Mobile devices are becoming more powerful, reliable and common every year. Hence we can use mobile devices for conducting laboratory sessions in distance education. This paper discusses issues of integrating Short Message Service (SMS to operate instruments of hardware-based remotely triggered laboratories. Components of the system include searching an experiment, performing experiment, result handling, error handling and method of exchanging information. It is designed using the National Instruments (NI Laboratory Virtual Instrument Engineering Workbench (LabVIEW development system and web services. The scheme will enable students to conduct hardware experiments with mobile devices using SMS from anywhere and anytime.

  14. A reliable and real-time aggregation aware data dissemination in a chain-based wireless sensor network

    NARCIS (Netherlands)

    Taghikhaki, Zahra; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    Time-critical applications of Wireless Sensor Networks (WSNs) demand timely data delivery for fast identification of out-of-ordinary situations and fast and reliable delivery of notification and warning messages. Due to the low reliable links in WSNs, achieving real-time guarantees and providing

  15. Tree-based server-middleman-client architecture: improving scalability and reliability for voting-based network games in ad hoc wireless networks

    Science.gov (United States)

    Guo, Y.; Fujinoki, H.

    2006-10-01

    The concept of a new tree-based architecture for networked multi-player games was proposed by Matuszek to improve scalability in network traffic at the same time to improve reliability. The architecture (we refer it as "Tree-Based Server- Middlemen-Client architecture") will solve the two major problems in ad-hoc wireless networks: frequent link failures and significance in battery power consumption at wireless transceivers by using two new techniques, recursive aggregation of client messages and subscription-based propagation of game state. However, the performance of the TBSMC architecture has never been quantitatively studied. In this paper, the TB-SMC architecture is compared with the client-server architecture using simulation experiments. We developed an event driven simulator to evaluate the performance of the TB-SMC architecture. In the network traffic scalability experiments, the TB-SMC architecture resulted in less than 1/14 of the network traffic load for 200 end users. In the reliability experiments, the TB-SMC architecture improved the number of successfully delivered players' votes by 31.6, 19.0, and 12.4% from the clientserver architecture at high (failure probability of 90%), moderate (50%) and low (10%) failure probability.

  16. An Orbit Propagation Software for Mars Orbiting Spacecraft

    Directory of Open Access Journals (Sweden)

    Young-Joo Song

    2004-12-01

    Full Text Available An orbit propagation software for the Mars orbiting spacecraft has been developed and verified in preparations for the future Korean Mars missions. Dynamic model for Mars orbiting spacecraft has been studied, and Mars centered coordinate systems are utilized to express spacecraft state vectors. Coordinate corrections to the Mars centered coordinate system have been made to adjust the effects caused by Mars precession and nutation. After spacecraft enters Sphere of Influence (SOI of the Mars, the spacecraft experiences various perturbation effects as it approaches to Mars. Every possible perturbation effect is considered during integrations of spacecraft state vectors. The Mars50c gravity field model and the Mars-GRAM 2001 model are used to compute perturbation effects due to Mars gravity field and Mars atmospheric drag, respectively. To compute exact locations of other planets, JPL's DE405 ephemerides are used. Phobos and Deimos's ephemeris are computed using analytical method because their informations are not released with DE405. Mars Global Surveyor's mapping orbital data are used to verify the developed propagator performances. After one Martian day propagation (12 orbital periods, the results show about maximum ±5 meter errors, in every position state components(radial, cross-track and along-track, when compared to these from the Astrogator propagation in the Satellite Tool Kit. This result shows high reliability of the developed software which can be used to design near Mars missions for Korea, in future.

  17. Human reliability analysis

    International Nuclear Information System (INIS)

    Dougherty, E.M.; Fragola, J.R.

    1988-01-01

    The authors present a treatment of human reliability analysis incorporating an introduction to probabilistic risk assessment for nuclear power generating stations. They treat the subject according to the framework established for general systems theory. Draws upon reliability analysis, psychology, human factors engineering, and statistics, integrating elements of these fields within a systems framework. Provides a history of human reliability analysis, and includes examples of the application of the systems approach

  18. Reliability of electronic systems

    International Nuclear Information System (INIS)

    Roca, Jose L.

    2001-01-01

    Reliability techniques have been developed subsequently as a need of the diverse engineering disciplines, nevertheless they are not few those that think they have been work a lot on reliability before the same word was used in the current context. Military, space and nuclear industries were the first ones that have been involved in this topic, however not only in these environments it is that it has been carried out this small great revolution in benefit of the increase of the reliability figures of the products of those industries, but rather it has extended to the whole industry. The fact of the massive production, characteristic of the current industries, drove four decades ago, to the fall of the reliability of its products, on one hand, because the massively itself and, for other, to the recently discovered and even not stabilized industrial techniques. Industry should be changed according to those two new requirements, creating products of medium complexity and assuring an enough reliability appropriated to production costs and controls. Reliability began to be integral part of the manufactured product. Facing this philosophy, the book describes reliability techniques applied to electronics systems and provides a coherent and rigorous framework for these diverse activities providing a unifying scientific basis for the entire subject. It consists of eight chapters plus a lot of statistical tables and an extensive annotated bibliography. Chapters embrace the following topics: 1- Introduction to Reliability; 2- Basic Mathematical Concepts; 3- Catastrophic Failure Models; 4-Parametric Failure Models; 5- Systems Reliability; 6- Reliability in Design and Project; 7- Reliability Tests; 8- Software Reliability. This book is in Spanish language and has a potentially diverse audience as a text book from academic to industrial courses. (author)

  19. Automation of testing the metrological reliability of nondestructive control systems

    International Nuclear Information System (INIS)

    Zhukov, Yu.A.; Isakov, V.B.; Karlov, Yu.K.; Kovalevskij, Yu.A.

    1987-01-01

    Opportunities of microcomputers are used to solve the problem of testing control-measuring systems. Besides the main program the program of data processing when characterizing the nondestructive control systems is written in the microcomputer. The program includes two modules. The first module contains tests-programs, by which accuracy of functional elements of the microcomputer and interface elements with issuing a message to the operator on readiness of the elements for operation and failure of a certain element are determined. The second module includes: calculational programs when determining metrological reliability of measuring channel reliability, a calculational subprogram for random statistical measuring error, time instability and ''dead time''. Automation of testing metrological reliability of the nondestructive control systems increases reliability of determining metrological parameters and reduces time of system testing

  20. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  1. Operational safety reliability research

    International Nuclear Information System (INIS)

    Hall, R.E.; Boccio, J.L.

    1986-01-01

    Operating reactor events such as the TMI accident and the Salem automatic-trip failures raised the concern that during a plant's operating lifetime the reliability of systems could degrade from the design level that was considered in the licensing process. To address this concern, NRC is sponsoring the Operational Safety Reliability Research project. The objectives of this project are to identify the essential tasks of a reliability program and to evaluate the effectiveness and attributes of such a reliability program applicable to maintaining an acceptable level of safety during the operating lifetime at the plant

  2. Circuit design for reliability

    CERN Document Server

    Cao, Yu; Wirth, Gilson

    2015-01-01

    This book presents physical understanding, modeling and simulation, on-chip characterization, layout solutions, and design techniques that are effective to enhance the reliability of various circuit units.  The authors provide readers with techniques for state of the art and future technologies, ranging from technology modeling, fault detection and analysis, circuit hardening, and reliability management. Provides comprehensive review on various reliability mechanisms at sub-45nm nodes; Describes practical modeling and characterization techniques for reliability; Includes thorough presentation of robust design techniques for major VLSI design units; Promotes physical understanding with first-principle simulations.

  3. The propagator of stochastic electrodynamics

    Science.gov (United States)

    Cavalleri, G.

    1981-01-01

    The "elementary propagator" for the position of a free charged particle subject to the zero-point electromagnetic field with Lorentz-invariant spectral density ~ω3 is obtained. The nonstationary process for the position is solved by the stationary process for the acceleration. The dispersion of the position elementary propagator is compared with that of quantum electrodynamics. Finally, the evolution of the probability density is obtained starting from an initial distribution confined in a small volume and with a Gaussian distribution in the velocities. The resulting probability density for the position turns out to be equal, to within radiative corrections, to ψψ* where ψ is the Kennard wave packet. If the radiative corrections are retained, the present result is new since the corresponding expression in quantum electrodynamics has not yet been found. Besides preceding quantum electrodynamics for this problem, no renormalization is required in stochastic electrodynamics.

  4. Designing Microblog Direct Messages to Engage Social Media Users With Suicide Ideation: Interview and Survey Study on Weibo.

    Science.gov (United States)

    Tan, Ziying; Liu, Xingyun; Liu, Xiaoqian; Cheng, Qijin; Zhu, Tingshao

    2017-12-12

    While Web-based interventions can be efficacious, engaging a target population's attention remains challenging. We argue that strategies to draw such a population's attention should be tailored to meet its needs. Increasing user engagement in online suicide intervention development requires feedback from this group to prevent people who have suicide ideation from seeking treatment. The goal of this study was to solicit feedback on the acceptability of the content of messaging from social media users with suicide ideation. To overcome the common concern of lack of engagement in online interventions and to ensure effective learning from the message, this research employs a customized design of both content and length of the message. In study 1, 17 participants suffering from suicide ideation were recruited. The first (n=8) group conversed with a professional suicide intervention doctor about its attitudes and suggestions for a direct message intervention. To ensure the reliability and consistency of the result, an identical interview was conducted for the second group (n=9). Based on the collected data, questionnaires about this intervention were formed. Study 2 recruited 4222 microblog users with suicide ideation via the Internet. The results of the group interviews in study 1 yielded little difference regarding the interview results; this difference may relate to the 2 groups' varied perceptions of direct message design. However, most participants reported that they would be most drawn to an intervention where they knew that the account was reliable. Out of 4222 microblog users, we received responses from 725 with completed questionnaires; 78.62% (570/725) participants were not opposed to online suicide intervention and they valued the link for extra suicide intervention information as long as the account appeared to be trustworthy. Their attitudes toward the intervention and the account were similar to those from study 1, and 3 important elements were found

  5. An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility.

    Science.gov (United States)

    Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok

    2017-04-19

    The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.

  6. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  7. Interprocedural Analysis with Lazy Propagation

    DEFF Research Database (Denmark)

    Jensen, Simon Holm; Møller, Anders; Thiemann, Peter

    2010-01-01

    We propose lazy propagation as a technique for flow- and context-sensitive interprocedural analysis of programs with objects and first-class functions where transfer functions may not be distributive. The technique is described formally as a systematic modification of a variant of the monotone fr...... framework and its theoretical properties are shown. It is implemented in a type analysis tool for JavaScript where it results in a significant improvement in performance....

  8. Crack propagation in dynamic thermoelasticity

    International Nuclear Information System (INIS)

    Bui, H.D.

    1980-01-01

    We study the singular thermoelastic fields near the crack tip, in the linear strain assumption. The equations are coupled and non linear. The asymptotic expansions of the displacement and the temperature are given for the first and the second order. It is shown that the temperature is singular when the crack propagates. However, this field does not change the dominant singularity of the mechanical field which is the same as that obtained in the theory of isothermal elasticity [fr

  9. Information Propagation on Permissionless Blockchains

    OpenAIRE

    Ersoy, Oguzhan; Ren, Zhijie; Erkin, Zekeriya; Lagendijk, Reginald L.

    2017-01-01

    Blockchain technology, as a decentralized and non-hierarchical platform, has the potential to replace centralized systems. Yet, there are several challenges inherent in the blockchain structure. One of the deficiencies of the existing blockchains is a convenient information propagation technique enhancing incentive-compatibility and bandwidth efficiency. The transition from a centralized system into distributed one brings along game theoretical concerns. Especially for the permissionless bloc...

  10. Quantum noise and superluminal propagation

    International Nuclear Information System (INIS)

    Segev, Bilha; Milonni, Peter W.; Babb, James F.; Chiao, Raymond Y.

    2000-01-01

    Causal ''superluminal'' effects have recently been observed and discussed in various contexts. The question arises whether such effects could be observed with extremely weak pulses, and what would prevent the observation of an ''optical tachyon.'' Aharonov, Reznik, and Stern (ARS) [Phys. Rev. Lett. 81, 2190 (1998)] have argued that quantum noise will preclude the observation of a superluminal group velocity when the pulse consists of one or a few photons. In this paper we reconsider this question both in a general framework and in the specific example, suggested by Chiao, Kozhekin, and Kurizki (CKK) [Phys. Rev. 77, 1254 (1996)], of off-resonant, short-pulse propagation in an optical amplifier. We derive in the case of the amplifier a signal-to-noise ratio that is consistent with the general ARS conclusions when we impose their criteria for distinguishing between superluminal propagation and propagation at the speed c. However, results consistent with the semiclassical arguments of CKK are obtained if weaker criteria are imposed, in which case the signal can exceed the noise without being ''exponentially large.'' We show that the quantum fluctuations of the field considered by ARS are closely related to superfluorescence noise. More generally, we consider the implications of unitarity for superluminal propagation and quantum noise and study, in addition to the complete and truncated wave packets considered by ARS, the residual wave packet formed by their difference. This leads to the conclusion that the noise is mostly luminal and delayed with respect to the superluminal signal. In the limit of a very weak incident signal pulse, the superluminal signal will be dominated by the noise part, and the signal-to-noise ratio will therefore be very small. (c) 2000 The American Physical Society

  11. Propagation functions in pseudoparticle fields

    International Nuclear Information System (INIS)

    Brown, L.S.; Carlitz, R.D.; Creamer, D.B.; Lee, C.

    1978-01-01

    The Green's functions for massless spinor and vector particles propagating in a self-dual but otherwise arbitrary non-Abelian gauge field are shown to be completely determined by the corrresponding Green's functions of scalar particles. Simple, explicit algebraic expressions are constructed for the scalar Green's functions of isospin-1/2 and isospin-1 particles in the self-dual field of a configuration of n pseudoparticles described by 5n arbitrary parameters

  12. Propagation calculation for reactor cases

    Energy Technology Data Exchange (ETDEWEB)

    Yang Yanhua [School of Power and Energy Engineering, Shanghai Jiao Tong Univ., Shanghai (China); Moriyama, K.; Maruyama, Y.; Nakamura, H.; Hashimoto, K. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2000-11-01

    The propagation of steam explosion for real reactor geometry and conditions are investigated by using the computer code JASMINE-pro. The ex-vessel steam explosion is considered, which is described as follow: during the accident of reactor core meltdown, the molten core melts a hole at the bottom of reactor vessel and causes the higher temperature core fuel being leaked into the water pool below reactor vessel. During the melt-water mixing interaction process, the high temperature melt evaporates the cool water at an extreme high rate and might induce a steam explosion. A steam explosion could experience first the premixing phase and then the propagation explosion phase. For a propagation calculation, we should know the information about the initial fragmentation time, the total melt mass, premixing region size, initial void fraction and distribution of the melt volume fraction, and so on. All the initial conditions used in this calculation are based on analyses from some simple assumptions and the observation from the experiments. The results show that the most important parameter for the initial condition of this phase is the total mass and its initial distribution. This gives the requirement for a premixing calculation. On the other hand, for higher melt volume fraction case, the fragmentation is strong so that the local pressure can exceed over the EOS maximum pressure of the code, which lead to the incorrect calculation or divergence of the calculation. (Suetake, M.)

  13. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  14. Propagating separable equalities in an MDD store

    DEFF Research Database (Denmark)

    Hadzic, Tarik; Hooker, John N.; Tiedemann, Peter

    2008-01-01

    We present a propagator that achieves MDD consistency for a separable equality over an MDD (multivalued decision diagram) store in pseudo-polynomial time. We integrate the propagator into a constraint solver based on an MDD store introduced in [1]. Our experiments show that the new propagator pro...... provides substantial computational advantage over propagation of two inequality constraints, and that the advantage increases when the maximum width of the MDD store increases....

  15. Refusals and Rejections: Designing Messages to Serve Multiple Goals.

    Science.gov (United States)

    Saeki, Mimako; O'Keefe, Barbara J.

    1994-01-01

    Tests a rational model of the elaboration of themes found in rejection messages, using Japanese and American participants. Finds partial support for the initial rational model but notes two key revisions: identifies two new themes in rejection messages and suggests substantial differences in the way Americans and Japanese elaborate themes to serve…

  16. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  17. Tracing How Normative Messages May Influence Physical Activity Intention.

    Science.gov (United States)

    van Bavel, René; Esposito, Gabriele; Baranowski, Tom; Duch-Brown, Néstor

    2017-04-01

    Normative messages have been shown to increase intention to do physical activity. We traced how "positive" and "negative" normative messages influenced physical activity intention by comparing constructs of the model of goal-directed behavior with descriptive norms (MGDB + DNs) across control and treatment groups in an experiment. For this purpose, 16-24-year-old respondents (n = 1,200) in Bulgaria, Croatia, and Romania were asked about their age, sex, and levels of physical activity before being exposed to positive and negative normative messages and completing a questionnaire with MGDB + DNs scales. Different MGDB + DNs constructs were influenced by the normative messages: compared with the control, the negative message group showed stronger attitudes (p = .003) and the positive message group showed higher positive anticipated emotions (p = .005). The positive message's effect is consistent with the literature on conformity to social norms. The negative message's effect lends itself to interpretations based on social identity and deviance regulation theories.

  18. Advertising Message Customisation/Standardisation And Corporate And Consumer Culture

    Directory of Open Access Journals (Sweden)

    Cristea Sanda Ligia

    2015-11-01

    Full Text Available Advertising translators should be familiarised with the cultural conventions in the target market so that they can re-create the message conveyed in ads. However, advertising message adaptation depends not only on the customer profile but also on corporate culture. The paper focuses on the correlation between these elements and the linguistic choices made by some copywriters.

  19. Preferred breast cancer message sources and frames amongst ...

    African Journals Online (AJOL)

    This descriptive study set out to verify the Kenyan women's knowledge of the various risk factors associated with breast cancer, their preferred framing of the breast cancer messages and their preferred channels for receiving those messages. Three hundred and ninety-three (393) women aged 20-64 years from the Kisumu ...

  20. Children's Text Messaging: Abbreviations, Input Methods and Links with Literacy

    Science.gov (United States)

    Kemp, N.; Bushnell, C.

    2011-01-01

    This study investigated the effects of mobile phone text-messaging method (predictive and multi-press) and experience (in texters and non-texters) on children's textism use and understanding. It also examined popular claims that the use of text-message abbreviations, or "textese" spelling, is associated with poor literacy skills. A sample of 86…

  1. College Students' Text Messaging, Use of Textese and Literacy Skills

    Science.gov (United States)

    Drouin, M. A.

    2011-01-01

    In this study, I examined reported frequency of text messaging, use of textese and literacy skills (reading accuracy, spelling and reading fluency) in a sample of American college students. Participants reported using text messaging, social networking sites and textese more often than was reported in previous (2009) research, and their frequency…

  2. The Message Is the Massage: Orality and Literacy Once More.

    Science.gov (United States)

    Brandt, Deborah

    1989-01-01

    Reappraises conventional distinctions between oral-like and literate-like discourse, particularly Tannen's distinction between involvement focus and message focus. Treats message as an embodiment of involvement, and cohesion as an aspect of a developing writer-reader relationship. Offers speculations for rethinking "literate…

  3. Emotional Responses to Environmental Messages and Future Behavioral Intentions

    Science.gov (United States)

    Perrin, Jeffrey L.

    2011-01-01

    The present research investigated effects of message framing (losses-framed or gains-framed), message modality (video with text or text-only) and emotional arousal on environmentally responsible behavioral intentions. The sample consisted of 161 college students. The present research did not find a significant difference in behavioral intentions…

  4. Instant messaging at the hospital: supporting articulation work?

    Science.gov (United States)

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  5. Persuasion with Unintelligible Messages: A Cognitive Response Analysis.

    Science.gov (United States)

    Padgett, Vernon R.; Brock, Timothy C.

    Theories of persuasion have long assumed a process which includes comprehension of the message by the recipient. Several hundred undergraduates at Ohio State University and Marshall University (Ohio) participated in six experiments examining persuasion and the use of unintelligible messages. Subjects in individual cubicles of a university language…

  6. Fast Heat Pulse Propagation by Turbulence Spreading

    DEFF Research Database (Denmark)

    Naulin, Volker; Juul Rasmussen, Jens; Mantica, Paola

    2009-01-01

    The propagation of a cold pulse initiated by edge cooling in JET is compared to propagation of the heat wave originating from a modulation of the heating source roughly at mid radius. It is found that the propagation of the cold pulse is by far faster than what could be predicted on the basis of ...

  7. Short message service or disService: issues with text messaging in a complex medical environment.

    Science.gov (United States)

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  8. Designing Skin Cancer Prevention Messages: Should We Emphasize Gains or Losses? Message Framing, Risk Type, and Prior Experience.

    Science.gov (United States)

    Lee, Moon J; Kang, Hannah

    2018-05-01

    To test whether message framing (ie, gain vs. loss) and risk type (ie, health vs appearance risk) in skin cancer prevention messages interact with one's prior experience. Two experiments with a 2 (message framing: gain vs loss) × 2 (risk type: health vs appearance risk) factorial design were conducted. The participants were given a URL to the experiment website via e-mail. On the first page of the website, the participants were told that they would be asked to evaluate a skin cancer print public service announcement (PSA): Online experiments. A total of 397 individuals participated (236 for experiment 1 and 161 for experiment 2). Apparatus: Four versions of the skin cancer print PSAs were developed. Four PSAs were identical except for the 2 manipulated components: message framing and risk type. Measures were adopted from Cho and Boster (message framing), Jones and Leary and Kiene et al. (risk type), De Vries, Mesters, van't Riet, Willems, and Reubsaet and Knight, Kirincich, Farmer, and Hood (prior experience), and Hammond, Fong, Zanna, Thrasher, and Borland and Hoffner and Ye (behavioral intent). General linear models were used to test hypotheses. Three-way interactions among message framing, risk type, and prior experience were found: When the intent of the message was to encourage sunscreen use, the effects of message framing and risk type were shown to be the exact opposite directions from when the intent was to discourage indoor/outdoor tanning. To discourage tanning among those with prior experience, messages emphasizing losses in terms of one's health will work better. For those with no prior experience, messages emphasizing potential appearance losses will work better for discouraging tanning while messages emphasizing gains like improving appearance will do a better job in encouraging sunscreen use.

  9. Radio-wave propagation for space communications systems

    Science.gov (United States)

    Ippolito, L. J.

    1981-01-01

    The most recent information on the effects of Earth's atmosphere on space communications systems is reviewed. The design and reliable operation of satellite systems that provide the many applications in space which rely on the transmission of radio waves for communications and scientific purposes are dependent on the propagation characteristics of the transmission path. The presence of atmospheric gases, clouds, fog, precipitation, and turbulence causes uncontrolled variations in the signal characteristics. These variations can result in a reduction of the quality and reliability of the transmitted information. Models and other techniques are used in the prediction of atmospheric effects as influenced by frequency, geography, elevation angle, and type of transmission. Recent data on performance characteristics obtained from direct measurements on satellite links operating to above 30 GHz have been reviewed. Particular emphasis has been placed on the effects of precipitation on the Earth/space path, including rain attenuation, and ice particle depolarization. Other factors are sky noise, antenna gain degradation, scintillations, and bandwidth coherence. Each of the various propagation factors has an effect on design criteria for communications systems. These criteria include link reliability, power margins, noise contribution, modulation and polarization factors, channel cross talk, error rate, and bandwidth limitations.

  10. Propagated failure analysis for non-repairable systems considering both global and selective effects

    International Nuclear Information System (INIS)

    Wang Chaonan; Xing Liudong; Levitin, Gregory

    2012-01-01

    This paper proposes an algorithm for the reliability analysis of non-repairable binary systems subject to competing failure propagation and failure isolation events with both global and selective failure effects. A propagated failure that originates from a system component causes extensive damage to the rest of the system. Global effect happens when the propagated failure causes the entire system to fail; whereas selective effect happens when the propagated failure causes only failure of a subset of system components. In both cases, the failure propagation that originates from some system components (referred to as dependent components) can be isolated because of functional dependence between the dependent components and a component that prevents the failure propagation (trigger components) when the failure of the trigger component happens before the occurrence of the propagated failure. Most existing studies focus on the analysis of propagated failures with global effect. However, in many cases, propagated failures affect only a subset of system components not the entire system. Existing approaches for analyzing propagated failures with selective effect are limited to series-parallel systems. This paper proposes a combinatorial method for the propagated failure analysis considering both global and selective effects as well as the competition with the failure isolation in the time domain. The proposed method is not limited to series-parallel systems and has no limitation on the type of time-to-failure distributions for the system components. The method is verified using the Markov-based method. An example of computer memory systems is analyzed to demonstrate the application of the proposed method.

  11. Hawaii Electric System Reliability

    Energy Technology Data Exchange (ETDEWEB)

    Loose, Verne William [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva Monroy, Cesar Augusto [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2012-08-01

    This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers’ views of reliability “worth” and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers’ views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

  12. Hawaii electric system reliability.

    Energy Technology Data Exchange (ETDEWEB)

    Silva Monroy, Cesar Augusto; Loose, Verne William

    2012-09-01

    This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

  13. Improving machinery reliability

    CERN Document Server

    Bloch, Heinz P

    1998-01-01

    This totally revised, updated and expanded edition provides proven techniques and procedures that extend machinery life, reduce maintenance costs, and achieve optimum machinery reliability. This essential text clearly describes the reliability improvement and failure avoidance steps practiced by best-of-class process plants in the U.S. and Europe.

  14. LED system reliability

    NARCIS (Netherlands)

    Driel, W.D. van; Yuan, C.A.; Koh, S.; Zhang, G.Q.

    2011-01-01

    This paper presents our effort to predict the system reliability of Solid State Lighting (SSL) applications. A SSL system is composed of a LED engine with micro-electronic driver(s) that supplies power to the optic design. Knowledge of system level reliability is not only a challenging scientific

  15. Integrated system reliability analysis

    DEFF Research Database (Denmark)

    Gintautas, Tomas; Sørensen, John Dalsgaard

    Specific targets: 1) The report shall describe the state of the art of reliability and risk-based assessment of wind turbine components. 2) Development of methodology for reliability and risk-based assessment of the wind turbine at system level. 3) Describe quantitative and qualitative measures...

  16. Reliability of neural encoding

    DEFF Research Database (Denmark)

    Alstrøm, Preben; Beierholm, Ulrik; Nielsen, Carsten Dahl

    2002-01-01

    The reliability with which a neuron is able to create the same firing pattern when presented with the same stimulus is of critical importance to the understanding of neuronal information processing. We show that reliability is closely related to the process of phaselocking. Experimental results f...

  17. Pilot study of psychotherapeutic text messaging for depression.

    Science.gov (United States)

    Pfeiffer, Paul N; Henry, Jennifer; Ganoczy, Dara; Piette, John D

    2017-08-01

    Background Text messaging services could increase access to psychotherapeutic content for individuals with depression by avoiding barriers to in-person psychotherapy such as cost, transportation, and therapist availability. Determining whether text messages reflecting different psychotherapeutic techniques exhibit differences in acceptability or effectiveness may help guide service development. Objectives We aimed to determine: (1) the feasibility of delivering a psychotherapy-based text messaging service to people with depression identified via the internet, (2) whether there is variation in satisfaction with messages according to the type of psychotherapeutic technique they represent, and (3) whether symptoms of depression vary according to receipt of each message type and participants' satisfaction with the messages they received. Methods For this study 190 US adults who screened positive for a major depressive episode (Patient Health Questionnaire (PHQ-9) score ≥10) were recruited from online advertisements. Participants received a daily psychotherapy-based text message 6 days per week for 12 weeks. Text messages were developed by a team of psychiatrists, psychologists, and social workers to reflect three psychotherapeutic approaches: acceptance and commitment therapy (ACT), behavioural activation, and cognitive restructuring. Each week the message type for the week was randomly assigned from one of the three types, allowing for repeats. Participants were asked daily to rate each message. On the 7th day of each week, participants completed a two-item depression screener (PHQ-2). Web-based surveys at baseline, 6, and 12 weeks were used as the primary measure of depressive symptoms (PHQ-9). Results Of the 190 participants enrolled, 85 (45%) completed the 6-week web survey and 67 (35%) completed the 12-week survey. The mean baseline PHQ-9 score was 19.4 (SD 4.2) and there was a statistically significant mean improvement in PHQ-9 scores of -2.9 (SD 6.0; p

  18. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  19. Actors with Multi-Headed Message Receive Patterns

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  20. Impact of nutrition messages on children's food choice: pilot study.

    Science.gov (United States)

    Bannon, Katie; Schwartz, Marlene B

    2006-03-01

    This pilot study tested the influence of nutrition message framing on snack choice among kindergarteners. Three classrooms were randomly assigned to watch one of the following 60s videos: (a) a gain-framed nutrition message (i.e. the positive benefits of eating apples) (n=14); (b) a loss-framed message (i.e. the negative consequences of not eating apples) (n=18); or (c) a control scene (children playing a game) (n=18). Following this, the children were offered a choice between animal crackers and an apple for their snack. Among the children who saw one of the nutrition message videos, 56% chose apples rather than animal crackers; in the control condition only 33% chose apples. This difference was statistically significant (chi2=7.56, p<0.01). These results suggest that videos containing nutritional messages may have a positive influence on children's short-term food choices.

  1. A one-mode-for-all predictor for text messaging

    Directory of Open Access Journals (Sweden)

    Vimala Balakrishnan

    2011-08-01

    Full Text Available This paper discusses the enhancements made on the current mobile phone messaging software, namely the predictive text entry. In addition, the application also has a facility to abbreviate any unabbreviated words that exist in the dictionary, so that the message length can be reduced. The application was tested in a computer-simulated mobile environment and the results of the tests are presented here. These additional features will potentially enable users to send messages at a reduced length and thus reduce the cost of sending messages. Moreover, users who are not adept in using the abbreviations can now do so with features made available on their mobile phones. It is believed that these additional features will also encourage more users to use the predictive software as well as further improve users’ messaging satisfaction.

  2. Flow of Emotional Messages in Artificial Social Networks

    Science.gov (United States)

    Chmiel, Anna; Hołyst, Janusz A.

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account that the preferential selection of message receivers depends on the communication intensity during the recent period only. We also model the phenomenon of secondary social sharing when the reception of an emotional e-mail triggers the distribution of several emotional e-mails to other people.

  3. Framing Effects in Narrative and Non-Narrative Risk Messages.

    Science.gov (United States)

    Steinhardt, Joseph; Shapiro, Michael A

    2015-08-01

    Narrative messages are increasingly popular in health and risk campaigns, yet gain/loss framing effects have never been tested with such messages. Three experiments examined framing in narrative messages. Experiment 1 found that only the character's decision, not framing, influenced judgments about characters in a narrative derived from a prospect theory context. Experiment 2 found that a framing effect that occurred when presented in a decision format did not occur when the same situation was presented as a narrative. Using a different story/decision context, Experiment 3 found no significant difference in preference for surgery over radiation therapy in a narrative presentation compared to a non-narrative presentation. The results suggest that health and risk campaigns cannot assume that framing effects will be the same in narrative messages and non-narrative messages. Potential reasons for these differences and suggestions for future research are discussed. © 2015 Society for Risk Analysis.

  4. Communication with Orthopedic Trauma Patients via an Automated Mobile Phone Messaging Robot.

    Science.gov (United States)

    Anthony, Chris A; Volkmar, Alexander; Shah, Apurva S; Willey, Mike; Karam, Matt; Marsh, J Lawrence

    2017-12-20

    Communication with orthopedic trauma patients is traditionally problematic with low response rates (RRs). The purpose of this investigation was to (1) evaluate the feasibility of communicating with orthopedic trauma patients postoperatively, utilizing an automated mobile phone messaging platform; and (2) assess the first 2 weeks of postoperative patient-reported pain and opioid use after lower extremity orthopedic trauma procedures. This was a prospective investigation at a Level 1 trauma center in the United States. Adult patients who were capable of mobile phone messaging and were undergoing common, lower extremity orthopedic trauma procedures were enrolled in the study. Patients received a daily mobile phone message protocol inquiring about their current pain level and amount of opioid medication they had taken in the past 24 h starting on postoperative day (POD) 3 and continuing through POD 17. Our analysis considered (1) Patient completion rate of mobile phone questions, (2) Patient-reported pain level (0-10 scale), and (3) Number and percentage of daily prescribed opioid medication patients reported taking. Twenty-five patients were enrolled in this investigation. Patients responded to 87.5% of the pain and opioid medication inquiries they received over the 2-week study period. There were no differences in RRs by patient age, sex, or educational attainment. Patient-reported pain decreased over the initial 2-week study period from an average of 4.9 ± 1.7 on POD 3 to 3 ± 2.2 on POD 16-17. Patients took an average of 68% of their maximum daily narcotic prescription on POD 3 compared with 35% of their prescribed pain medication on POD 16-17. We found that in orthopedic trauma patients, an automated mobile phone messaging platform elicited a high patient RR that improved upon prior methods in the literature. This method may be used to reliably obtain pain and medication utilization data after trauma procedures.

  5. Design reliability engineering

    International Nuclear Information System (INIS)

    Buden, D.; Hunt, R.N.M.

    1989-01-01

    Improved design techniques are needed to achieve high reliability at minimum cost. This is especially true of space systems where lifetimes of many years without maintenance are needed and severe mass limitations exist. Reliability must be designed into these systems from the start. Techniques are now being explored to structure a formal design process that will be more complete and less expensive. The intent is to integrate the best features of design, reliability analysis, and expert systems to design highly reliable systems to meet stressing needs. Taken into account are the large uncertainties that exist in materials, design models, and fabrication techniques. Expert systems are a convenient method to integrate into the design process a complete definition of all elements that should be considered and an opportunity to integrate the design process with reliability, safety, test engineering, maintenance and operator training. 1 fig

  6. Bayesian methods in reliability

    Science.gov (United States)

    Sander, P.; Badoux, R.

    1991-11-01

    The present proceedings from a course on Bayesian methods in reliability encompasses Bayesian statistical methods and their computational implementation, models for analyzing censored data from nonrepairable systems, the traits of repairable systems and growth models, the use of expert judgment, and a review of the problem of forecasting software reliability. Specific issues addressed include the use of Bayesian methods to estimate the leak rate of a gas pipeline, approximate analyses under great prior uncertainty, reliability estimation techniques, and a nonhomogeneous Poisson process. Also addressed are the calibration sets and seed variables of expert judgment systems for risk assessment, experimental illustrations of the use of expert judgment for reliability testing, and analyses of the predictive quality of software-reliability growth models such as the Weibull order statistics.

  7. Scalable High Performance Message Passing over InfiniBand for Open MPI

    Energy Technology Data Exchange (ETDEWEB)

    Friedley, A; Hoefler, T; Leininger, M L; Lumsdaine, A

    2007-10-24

    InfiniBand (IB) is a popular network technology for modern high-performance computing systems. MPI implementations traditionally support IB using a reliable, connection-oriented (RC) transport. However, per-process resource usage that grows linearly with the number of processes, makes this approach prohibitive for large-scale systems. IB provides an alternative in the form of a connectionless unreliable datagram transport (UD), which allows for near-constant resource usage and initialization overhead as the process count increases. This paper describes a UD-based implementation for IB in Open MPI as a scalable alternative to existing RC-based schemes. We use the software reliability capabilities of Open MPI to provide the guaranteed delivery semantics required by MPI. Results show that UD not only requires fewer resources at scale, but also allows for shorter MPI startup times. A connectionless model also improves performance for applications that tend to send small messages to many different processes.

  8. Text messaging-based smoking cessation intervention: a narrative review.

    Science.gov (United States)

    Kong, Grace; Ells, Daniel M; Camenga, Deepa R; Krishnan-Sarin, Suchitra

    2014-05-01

    Smoking cessation interventions delivered via text messaging on mobile phones may enhance motivations to quit smoking. The goal of this narrative review is to describe the text messaging interventions' theoretical contents, frequency and duration, treatment outcome, and sample characteristics such as age and motivation to quit, to better inform the future development of this mode of intervention. Studies were included if text messaging was primarily used to deliver smoking cessation intervention and published in English in a peer-reviewed journal. All articles were coded by two independent raters to determine eligibility and to extract data. Twenty-two studies described 15 text messaging interventions. About half of the interventions recruited adults (ages 30-40) and the other half targeted young adults (ages 18-29). Fourteen interventions sent text messages during the quit phase, 10 had a preparation phase and eight had a maintenance phase. The number of text messages and the duration of the intervention varied. All used motivational messages grounded in social cognitive behavioral theories, 11 used behavioral change techniques, and 14 used individually tailored messages. Eleven interventions also offered other smoking cessation tools. Three interventions yielded smoking cessation outcomes greater than the control condition. The proliferation of text messaging in recent years suggests that text messaging interventions may have the potential to improve smoking cessation rates. Detailed summary of the interventions suggests areas for future research and clinical application. More rigorous studies are needed to identify components of the interventions that can enhance their acceptability, feasibility and efficacy. Copyright © 2013. Published by Elsevier Ltd.

  9. Reliability In A White Rabbit Network

    CERN Document Server

    Lipiński, M; Wlostowski, T; Prados, C

    2011-01-01

    White Rabbit (WR) is a time-deterministic, low-latency Ethernet-based network which enables transparent, subns accuracy timing distribution. It is being developed to replace the General Machine Timing (GMT) system currently used at CERN and will become the foundation for the control system of the Facility for Antiproton and Ion Research (FAIR) at GSI. High reliability is an important issue inWR’s design, since unavailability of the accelerator’s control system will directly translate into expensive downtime of the machine. A typical WR network is required to lose not more than a single message per year. Due toWR’s complexity, the translation of this real-world-requirement into a reliability-requirement constitutes an interesting issue on its own – a WR network is considered functional only if it provides all its services to all its clients at any time. This paper defines reliability in WR and describes how it was addressed by dividing it into sub-domains: deterministic packet delivery, data resilience...

  10. Short Message Service (SMS) Texting Symbols: A Functional Analysis of 10,000 Cellular Phone Text Messages

    Science.gov (United States)

    Beasley, Robert E.

    2009-01-01

    The purpose of this study was to investigate the use of symbolic expressions (e.g., "BTW," "LOL," "UR") in an SMS text messaging corpus consisting of over 10,000 text messages. More specifically, the purpose was to determine, not only how frequently these symbolic expressions are used, but how they are utilized in terms of the language functions…

  11. Semiclassical propagator of the Wigner function.

    Science.gov (United States)

    Dittrich, Thomas; Viviescas, Carlos; Sandoval, Luis

    2006-02-24

    Propagation of the Wigner function is studied on two levels of semiclassical propagation: one based on the Van Vleck propagator, the other on phase-space path integration. Leading quantum corrections to the classical Liouville propagator take the form of a time-dependent quantum spot. Its oscillatory structure depends on whether the underlying classical flow is elliptic or hyperbolic. It can be interpreted as the result of interference of a pair of classical trajectories, indicating how quantum coherences are to be propagated semiclassically in phase space. The phase-space path-integral approach allows for a finer resolution of the quantum spot in terms of Airy functions.

  12. The propagator of quantum gravity in minisuperspace

    International Nuclear Information System (INIS)

    Louko, J.

    1985-04-01

    We study the quantum gravitational propagation amplitude between two spacelike three-surfaces in minisuperspaces where the supermomentum constraints are identically satisfied. We derive a well-defined path integral formula for the propagator and show that the propagator is an inverse of the canonical Hamiltonian operator. In an exactly solvable deSitter minisuperspace model the propagator is found to obey semi-classically correct boundary conditions. We discuss the implications for the full theory and suggest an approach to unravelling the physical meaning of the propagator. (orig.)

  13. Tropospheric radiowave propagation beyond the horizon

    CERN Document Server

    Du Castel, François

    1966-01-01

    Tropospheric Radiowave Propagation Beyond the Horizon deals with developments concerning the tropospheric propagation of ultra-short radio waves beyond the horizon, with emphasis on the relationship between the theoretical and the experimental. Topics covered include the general conditions of propagation in the troposphere; general characteristics of propagation beyond the horizon; and attenuation in propagation. This volume is comprised of six chapters and begins with a brief historical look at the various stages that have brought the technique of transhorizon links to its state of developmen

  14. Light propagation in linear optical media

    CERN Document Server

    Gillen, Glen D; Guha, Shekhar

    2013-01-01

    Light Propagation in Linear Optical Media describes light propagation in linear media by expanding on diffraction theories beyond what is available in classic optics books. In one volume, this book combines the treatment of light propagation through various media, interfaces, and apertures using scalar and vector diffraction theories. After covering the fundamentals of light and physical optics, the authors discuss light traveling within an anisotropic crystal and present mathematical models for light propagation across planar boundaries between different media. They describe the propagation o

  15. A message-passing approach to random constraint satisfaction problems with growing domains

    International Nuclear Information System (INIS)

    Zhao, Chunyan; Zheng, Zhiming; Zhou, Haijun; Xu, Ke

    2011-01-01

    Message-passing algorithms based on belief propagation (BP) are implemented on a random constraint satisfaction problem (CSP) referred to as model RB, which is a prototype of hard random CSPs with growing domain size. In model RB, the number of candidate discrete values (the domain size) of each variable increases polynomially with the variable number N of the problem formula. Although the satisfiability threshold of model RB is exactly known, finding solutions for a single problem formula is quite challenging and attempts have been limited to cases of N ∼ 10 2 . In this paper, we propose two different kinds of message-passing algorithms guided by BP for this problem. Numerical simulations demonstrate that these algorithms allow us to find a solution for random formulas of model RB with constraint tightness slightly less than p cr , the threshold value for the satisfiability phase transition. To evaluate the performance of these algorithms, we also provide a local search algorithm (random walk) as a comparison. Besides this, the simulated time dependence of the problem size N and the entropy of the variables for growing domain size are discussed

  16. The Comparison of Propagation Model for Terrestrial Trunked Radio (TETRA

    Directory of Open Access Journals (Sweden)

    Ayu Kartika R

    2013-12-01

    Full Text Available A system of digital radio Terrestrial Trunked Radio (TETRA is designed for communication which need specialility, better privacy, better quality of audio with speed transmission data and access capacity to the internet and telephone network. TETRA system of TMO and DMO operation mode which has wide coverage and reliable than the interference so that the TETRA planning needs a propagation model which corresponding with environment. Therefore, this research compare a pathloss value of calculation of propagation model such as Free Space Loss, Wickson, Bacon, CEPT SE21, Ericsson (9999, ITU-R SM 2028 and Okumura Hata based on the environment are clutter urban, sub urban dan rural. The calculation of pathloss provide that Bacon propagation model is an corresponding model for DMO operation mode with a frequency of 380 MHz, height handhelds 1.5 m and 2 m with pathloss value of 76.82 dB at a distance of 100 m and 113.63 dB at a distance of 1 km while the 400 MHz frequency pathloss value of 77.08 dB at a distance of 100 m and 113.6 dB at a distance of 1 km. The propagation model which corresponding to the TMO operation mode with a frequency of 400 MHz distance of 1 km, the transmitter antenna height (hb 30 m and receiver antenna height (hm 1.5 m is a model of Ericsson (9999 on urban clutter with pathloss value of 96.4 dB, the model ITU-R SM2028 in suburban clutter with a pathloss value of 101.13 dB, and the model ITU-R SM2028 on rural clutter with pathloss value of 83.59 dB. Keywords: TETRA, propagation model, urban, suburban, rural

  17. Empowerment in the process of health messaging for rural low-income mothers: an exploratory message design project.

    Science.gov (United States)

    Aldoory, Linda; Braun, Bonnie; Maring, Elisabeth Fost; Duggal, Mili; Briones, Rowena Lynn

    2015-01-01

    Rural, low-income mothers face challenges to their health equal to or greater than those of low-income mothers from urban areas. This study put health message design into the hands of low-income rural mothers. The current study filled a research gap by analyzing a participatory process used to design health messages tailored to the everyday lives of rural low-income mothers. A total of forty-three mothers participated in nine focus groups, which were held from 2012 to 2013, in eight states. The mothers were from different racial and ethnic backgrounds. Participants discussed food security, physical activity, and oral health information. They created messages by considering several elements: visuals, length of message, voice/perspective, self-efficacy and personal control, emotional appeals, positive and negative reinforcements, and steps to health behavior change. This study was innovative in its focus on empowerment as a key process to health message design.

  18. Propagation phenomena in real world networks

    CERN Document Server

    Fay, Damien; Gabryś, Bogdan

    2015-01-01

    Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. The compendium will be of interest to researchers, those working in social networking, communications and finance and is aimed at providin...

  19. Wave Propagation in Bimodular Geomaterials

    Science.gov (United States)

    Kuznetsova, Maria; Pasternak, Elena; Dyskin, Arcady; Pelinovsky, Efim

    2016-04-01

    Observations and laboratory experiments show that fragmented or layered geomaterials have the mechanical response dependent on the sign of the load. The most adequate model accounting for this effect is the theory of bimodular (bilinear) elasticity - a hyperelastic model with different elastic moduli for tension and compression. For most of geo- and structural materials (cohesionless soils, rocks, concrete, etc.) the difference between elastic moduli is such that their modulus in compression is considerably higher than that in tension. This feature has a profound effect on oscillations [1]; however, its effect on wave propagation has not been comprehensively investigated. It is believed that incorporation of bilinear elastic constitutive equations within theory of wave dynamics will bring a deeper insight to the study of mechanical behaviour of many geomaterials. The aim of this paper is to construct a mathematical model and develop analytical methods and numerical algorithms for analysing wave propagation in bimodular materials. Geophysical and exploration applications and applications in structural engineering are envisaged. The FEM modelling of wave propagation in a 1D semi-infinite bimodular material has been performed with the use of Marlow potential [2]. In the case of the initial load expressed by a harmonic pulse loading strong dependence on the pulse sign is observed: when tension is applied before compression, the phenomenon of disappearance of negative (compressive) strains takes place. References 1. Dyskin, A., Pasternak, E., & Pelinovsky, E. (2012). Periodic motions and resonances of impact oscillators. Journal of Sound and Vibration, 331(12), 2856-2873. 2. Marlow, R. S. (2008). A Second-Invariant Extension of the Marlow Model: Representing Tension and Compression Data Exactly. In ABAQUS Users' Conference.

  20. Systematic and heuristic processing of majority and minority-endorsed messages: the effects of varying outcome relevance and levels of orientation on attitude and message processing.

    Science.gov (United States)

    Martin, Robin; Hewstone, Miles; Martin, Pearl Y

    2007-01-01

    Two experiments investigated the conditions under which majority and minority sources instigate systematic processing of their messages. Both experiments crossed source status (majority vs. minority) with message quality (strong vs. weak arguments). In each experiment, message elaboration was manipulated by varying either motivational (outcome relevance, Experiment 1) or cognitive (orientating tasks, Experiment 2) factors. The results showed that when either motivational or cognitive factors encouraged low message elaboration, there was heuristic acceptance of the majority position without detailed message processing. When the level of message elaboration was intermediate, there was message processing only for the minority source. Finally, when message elaboration was high, there was message processing for both source conditions. These results show that majority and minority influence is sensitive to motivational and cognitive factors that constrain or enhance message elaboration and that both sources can lead to systematic processing under specific circumstances.

  1. Combinatorial analysis of systems with competing failures subject to failure isolation and propagation effects

    International Nuclear Information System (INIS)

    Xing Liudong; Levitin, Gregory

    2010-01-01

    This paper considers the reliability analysis of binary-state systems, subject to propagated failures with global effect, and failure isolation phenomena. Propagated failures with global effect are common-cause failures originated from a component of a system/subsystem causing the failure of the entire system/subsystem. Failure isolation occurs when the failure of one component (referred to as a trigger component) causes other components (referred to as dependent components) within the same system to become isolated from the system. On the one hand, failure isolation makes the isolated dependent components unusable; on the other hand, it prevents the propagation of failures originated from those dependent components. However, the failure isolation effect does not exist if failures originated in the dependent components already propagate globally before the trigger component fails. In other words, there exists a competition in the time domain between the failure of the trigger component that causes failure isolation and propagated failures originated from the dependent components. This paper presents a combinatorial method for the reliability analysis of systems subject to such competing propagated failures and failure isolation effect. Based on the total probability theorem, the proposed method is analytical, exact, and has no limitation on the type of time-to-failure distributions for the system components. An illustrative example is given to demonstrate the basics and advantages of the proposed method.

  2. Multispecimen fatigue crack propagation testing

    International Nuclear Information System (INIS)

    Ermi, A.M.; Bauer, R.E.; Chin, B.A.; Straalsund, J.L.

    1981-01-01

    Chains of miniature center-cracked-tension specimens were tested on a conventional testing machine and on a prototypic in-reactor fatigue machine as part of the fusion reactor materials alloy development program. Annealed and 20 percent cold-worked 316 stainless steel specimens were cycled under various conditions of temperature, frequency, stress ratio and chain length. Crack growth rates determined from multispecimen visual measurements and from an electrical potential technique were consistent with those obtained by conventional test methods. Results demonstrate that multispecimen chain testing is a valid method of obtaining fatigue crack propagation information for alloy development. 8 refs

  3. Radio Propagation into Modern Buildings

    DEFF Research Database (Denmark)

    Rodriguez Larrad, Ignacio; Nguyen, Huan Cong; Jørgensen, Niels T.K.

    2014-01-01

    Energy-efficient buildings are gaining momentum in order to comply with the new energy regulations. Especially in northern cold countries, thick reinforced walls and energy-efficient windows composed of several layers of glass plus metal coating are becoming the de facto elements in modern building...... constructions. These materials are used in favor of achieving a proper level of thermal isolation, but it has been noticed that they can impact heavily on radio signal propagation. This paper presents a measurement-based analysis of the outdoor-to-indoor attenuation experienced in several modern constructions...

  4. Fast imaging of streamer propagation

    International Nuclear Information System (INIS)

    Veldhuizen, E.M. van; Baede, A.H.F.M.; Hayashi, D.; Rutgers, W.R.

    2001-01-01

    Recently measurement methods are becoming available to study the corona discharge in more detail. One of the most promising methods is laser-induced fluorescence to determine radical density. Recent improvements in CCD cameras makes it now possible to improve measurements of the discharge structure to a resolution of 1 ns in time and 10 μm in space. This paper shows the first results of the spontaneous emission of a point-to-plane corona discharge in air using such a camera. It clearly indicates that the 2-D approach for streamer propagation under these conditions is insufficient

  5. Fast imaging of streamer propagation

    Energy Technology Data Exchange (ETDEWEB)

    Veldhuizen, E.M. van; Baede, A.H.F.M.; Hayashi, D.; Rutgers, W.R. [Eindhoven Univ. of Technology (Netherlands). Dept. of Applied Physics

    2001-07-01

    Recently measurement methods are becoming available to study the corona discharge in more detail. One of the most promising methods is laser-induced fluorescence to determine radical density. Recent improvements in CCD cameras makes it now possible to improve measurements of the discharge structure to a resolution of 1 ns in time and 10 {mu}m in space. This paper shows the first results of the spontaneous emission of a point-to-plane corona discharge in air using such a camera. It clearly indicates that the 2-D approach for streamer propagation under these conditions is insufficient.

  6. Modification Propagation in Complex Networks

    Science.gov (United States)

    Mouronte, Mary Luz; Vargas, María Luisa; Moyano, Luis Gregorio; Algarra, Francisco Javier García; Del Pozo, Luis Salvador

    To keep up with rapidly changing conditions, business systems and their associated networks are growing increasingly intricate as never before. By doing this, network management and operation costs not only rise, but are difficult even to measure. This fact must be regarded as a major constraint to system optimization initiatives, as well as a setback to derived economic benefits. In this work we introduce a simple model in order to estimate the relative cost associated to modification propagation in complex architectures. Our model can be used to anticipate costs caused by network evolution, as well as for planning and evaluating future architecture development while providing benefit optimization.

  7. Reliability of construction materials

    International Nuclear Information System (INIS)

    Merz, H.

    1976-01-01

    One can also speak of reliability with respect to materials. While for reliability of components the MTBF (mean time between failures) is regarded as the main criterium, this is replaced with regard to materials by possible failure mechanisms like physical/chemical reaction mechanisms, disturbances of physical or chemical equilibrium, or other interactions or changes of system. The main tasks of the reliability analysis of materials therefore is the prediction of the various failure reasons, the identification of interactions, and the development of nondestructive testing methods. (RW) [de

  8. Structural Reliability Methods

    DEFF Research Database (Denmark)

    Ditlevsen, Ove Dalager; Madsen, H. O.

    The structural reliability methods quantitatively treat the uncertainty of predicting the behaviour and properties of a structure given the uncertain properties of its geometry, materials, and the actions it is supposed to withstand. This book addresses the probabilistic methods for evaluation...... of structural reliability, including the theoretical basis for these methods. Partial safety factor codes under current practice are briefly introduced and discussed. A probabilistic code format for obtaining a formal reliability evaluation system that catches the most essential features of the nature...... of the uncertainties and their interplay is the developed, step-by-step. The concepts presented are illustrated by numerous examples throughout the text....

  9. Reliability and mechanical design

    International Nuclear Information System (INIS)

    Lemaire, Maurice

    1997-01-01

    A lot of results in mechanical design are obtained from a modelisation of physical reality and from a numerical solution which would lead to the evaluation of needs and resources. The goal of the reliability analysis is to evaluate the confidence which it is possible to grant to the chosen design through the calculation of a probability of failure linked to the retained scenario. Two types of analysis are proposed: the sensitivity analysis and the reliability analysis. Approximate methods are applicable to problems related to reliability, availability, maintainability and safety (RAMS)

  10. RTE - 2013 Reliability Report

    International Nuclear Information System (INIS)

    Denis, Anne-Marie

    2014-01-01

    RTE publishes a yearly reliability report based on a standard model to facilitate comparisons and highlight long-term trends. The 2013 report is not only stating the facts of the Significant System Events (ESS), but it moreover underlines the main elements dealing with the reliability of the electrical power system. It highlights the various elements which contribute to present and future reliability and provides an overview of the interaction between the various stakeholders of the Electrical Power System on the scale of the European Interconnected Network. (author)

  11. How to provide risk information. Based on citizen's evaluation of messages concerning radiation protection and anti-earthquake measures of nuclear power plant

    International Nuclear Information System (INIS)

    Tsuchiya, Tomoko; Kosugi, Motoko; Nakamura, Yasushi; Takahashi, Shigeaki; Harayama, Satoko

    2009-01-01

    The Framework for Nuclear Energy Policy in Japan, decided in 2005, requests implementation of risk communication to regain social trust on nuclear industry. Electric power companies, however, have few experiences of providing risk information as the first step of risk communication. This report analyzes which message is understandable, useful and trustworthy, by comparing two sets of different messages concerning radiation protection and anti-earthquake measures of nuclear power plant, respectively, based on interview survey for 30 people live in Tokyo metropolitan area. Participants in our survey evaluate the message about radiation protection including risk information is more reliable than one without risk information, but the former is less understandable and more anxious than the latter. In the case of messages regarding seismic measures of nuclear power plant, people are not satisfied with the argument which anti-earthquake measures are implemented, but want to know adequate grounds on which to admit that those measures are thorough. Another message of seismic measures we drafted contains basic knowledge about scales of earthquake, and shows that nuclear industry will consider bigger earthquake than ones in the past records, learn from past experience and improve their measures. 70% of participants assess this message more understandable, useful and trustworthy than the other to explain only seismic measures implemented. (author)

  12. Reliability analysis of structures under periodic proof tests in service

    Science.gov (United States)

    Yang, J.-N.

    1976-01-01

    A reliability analysis of structures subjected to random service loads and periodic proof tests treats gust loads and maneuver loads as random processes. Crack initiation, crack propagation, and strength degradation are treated as the fatigue process. The time to fatigue crack initiation and ultimate strength are random variables. Residual strength decreases during crack propagation, so that failure rate increases with time. When a structure fails under periodic proof testing, a new structure is built and proof-tested. The probability of structural failure in service is derived from treatment of all the random variables, strength degradations, service loads, proof tests, and the renewal of failed structures. Some numerical examples are worked out.

  13. ON SUN-TO-EARTH PROPAGATION OF CORONAL MASS EJECTIONS

    International Nuclear Information System (INIS)

    Liu, Ying D.; Luhmann, Janet G.; Möstl, Christian; Bale, Stuart D.; Lin, Robert P.; Lugaz, Noé; Davies, Jackie A.

    2013-01-01

    We investigate how coronal mass ejections (CMEs) propagate through, and interact with, the inner heliosphere between the Sun and Earth, a key question in CME research and space weather forecasting. CME Sun-to-Earth kinematics are constrained by combining wide-angle heliospheric imaging observations, interplanetary radio type II bursts, and in situ measurements from multiple vantage points. We select three events for this study, the 2012 January 19, 23, and March 7 CMEs. Different from previous event studies, this work attempts to create a general picture for CME Sun-to-Earth propagation and compare different techniques for determining CME interplanetary kinematics. Key results are obtained concerning CME Sun-to-Earth propagation: (1) the Sun-to-Earth propagation of fast CMEs can be approximately formulated into three phases: an impulsive acceleration, then a rapid deceleration, and finally a nearly constant speed propagation (or gradual deceleration); (2) the CMEs studied here are still accelerating even after the flare maximum, so energy must be continuously fed into the CME even after the time of the maximum heating and radiation has elapsed in the corona; (3) the rapid deceleration, presumably due to interactions with the ambient medium, mainly occurs over a relatively short timescale following the acceleration phase; and (4) CME-CME interactions seem a common phenomenon close to solar maximum. Our comparison between different techniques (and data sets) has important implications for CME observations and their interpretations: (1) for the current cases, triangulation assuming a compact CME geometry is more reliable than triangulation assuming a spherical front attached to the Sun for distances below 50-70 solar radii from the Sun, but beyond about 100 solar radii we would trust the latter more; (2) a proper treatment of CME geometry must be performed in determining CME Sun-to-Earth kinematics, especially when the CME propagation direction is far away from the

  14. Spatiotemporal Propagation of the Cortical Atrophy: Population and Individual Patterns

    Directory of Open Access Journals (Sweden)

    Igor Koval

    2018-05-01

    Full Text Available Repeated failures in clinical trials for Alzheimer’s disease (AD have raised a strong interest for the prodromal phase of the disease. A better understanding of the brain alterations during this early phase is crucial to diagnose patients sooner, to estimate an accurate disease stage, and to give a reliable prognosis. According to recent evidence, structural alterations in the brain are likely to be sensitive markers of the disease progression. Neuronal loss translates in specific spatiotemporal patterns of cortical atrophy, starting in the enthorinal cortex and spreading over other cortical regions according to specific propagation pathways. We developed a digital model of the cortical atrophy in the left hemisphere from prodromal to diseased phases, which is built on the temporal alignment and combination of several short-term observation data to reconstruct the long-term history of the disease. The model not only provides a description of the spatiotemporal patterns of cortical atrophy at the group level but also shows the variability of these patterns at the individual level in terms of difference in propagation pathways, speed of propagation, and age at propagation onset. Longitudinal MRI datasets of patients with mild cognitive impairments who converted to AD are used to reconstruct the cortical atrophy propagation across all disease stages. Each observation is considered as a signal spatially distributed on a network, such as the cortical mesh, each cortex location being associated to a node. We consider how the temporal profile of the signal varies across the network nodes. We introduce a statistical mixed-effect model to describe the evolution of the cortex alterations. To ensure a spatiotemporal smooth propagation of the alterations, we introduce a constrain on the propagation signal in the model such that neighboring nodes have similar profiles of the signal changes. Our generative model enables the reconstruction of personalized

  15. Signal Propagation Delay as a Barrier to Control Applications in WAN

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    With the advent in WAN of delay sensitive technical applications, such as remote control, signal propagation delay becomes a major problem. The extent of the problem is analysed by lower bounding the delay in relation to different transmission media. Requirements for reliability and bandwidth are...... are considered. The consequences of this bounding for communication network planning and provisioning are discussed in relation to mitigating the effects of signal propagation delay as a barrier to the penetration of control applications into WAN......With the advent in WAN of delay sensitive technical applications, such as remote control, signal propagation delay becomes a major problem. The extent of the problem is analysed by lower bounding the delay in relation to different transmission media. Requirements for reliability and bandwidth...

  16. Approach to reliability assessment

    International Nuclear Information System (INIS)

    Green, A.E.; Bourne, A.J.

    1975-01-01

    Experience has shown that reliability assessments can play an important role in the early design and subsequent operation of technological systems where reliability is at a premium. The approaches to and techniques for such assessments, which have been outlined in the paper, have been successfully applied in variety of applications ranging from individual equipments to large and complex systems. The general approach involves the logical and systematic establishment of the purpose, performance requirements and reliability criteria of systems. This is followed by an appraisal of likely system achievment based on the understanding of different types of variational behavior. A fundamental reliability model emerges from the correlation between the appropriate Q and H functions for performance requirement and achievement. This model may cover the complete spectrum of performance behavior in all the system dimensions

  17. Crack closure in near-threshold fatigue crack propagation in railway axle steel EA4T

    Czech Academy of Sciences Publication Activity Database

    Pokorný, Pavel; Vojtek, Tomáš; Náhlík, Luboš; Hutař, Pavel

    2017-01-01

    Roč. 185, NOV (2017), s. 2-19 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601 Institutional support: RVO:68081723 Keywords : Fatigue crack propagation * crack closure * EA4T * Railway axle Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering , reliability analysis Impact factor: 2.151, year: 2016

  18. Genetic conservation and paddlefish propagation

    Science.gov (United States)

    Sloss, Brian L.; Klumb, Robert A.; Heist, Edward J.

    2009-01-01

    The conservation of genetic diversity of our natural resources is overwhelmingly one of the central foci of 21st century management practices. Three recommendations related to the conservation of paddlefish Polyodon spathula genetic diversity are to (1) identify genetic diversity at both nuclear and mitochondrial DNA loci using a suggested list of 20 sampling locations, (2) use genetic diversity estimates to develop genetic management units, and (3) identify broodstock sources to minimize effects of supplemental stocking on the genetic integrity of native paddlefish populations. We review previous genetic work on paddlefish and described key principles and concepts associated with maintaining genetic diversity within and among paddlefish populations and also present a genetic case study of current paddlefish propagation at the U.S. Fish and Wildlife Service Gavins Point National Fish Hatchery. This study confirmed that three potential sources of broodfish were genetically indistinguishable at the loci examined, allowing the management agencies cooperating on this program flexibility in sampling gametes. This study also showed significant bias in the hatchery occurred in terms of male reproductive contribution, which resulted in a shift in the genetic diversity of progeny compared to the broodfish. This shift was shown to result from differential male contributions, partially attributed to the mode of egg fertilization. Genetic insights enable implementation of a paddlefish propagation program within an adaptive management strategy that conserves inherent genetic diversity while achieving demographic goals.

  19. Quantum propagation across cosmological singularities

    Science.gov (United States)

    Gielen, Steffen; Turok, Neil

    2017-05-01

    The initial singularity is the most troubling feature of the standard cosmology, which quantum effects are hoped to resolve. In this paper, we study quantum cosmology with conformal (Weyl) invariant matter. We show that it is natural to extend the scale factor to negative values, allowing a large, collapsing universe to evolve across a quantum "bounce" into an expanding universe like ours. We compute the Feynman propagator for Friedmann-Robertson-Walker backgrounds exactly, identifying curious pathologies in the case of curved (open or closed) universes. We then include anisotropies, fixing the operator ordering of the quantum Hamiltonian by imposing covariance under field redefinitions and again finding exact solutions. We show how complex classical solutions allow one to circumvent the singularity while maintaining the validity of the semiclassical approximation. The simplest isotropic universes sit on a critical boundary, beyond which there is qualitatively different behavior, with potential for instability. Additional scalars improve the theory's stability. Finally, we study the semiclassical propagation of inhomogeneous perturbations about the flat, isotropic case, at linear and nonlinear order, showing that, at least at this level, there is no particle production across the bounce. These results form the basis for a promising new approach to quantum cosmology and the resolution of the big bang singularity.

  20. Simplified propagation of standard uncertainties

    International Nuclear Information System (INIS)

    Shull, A.H.

    1997-01-01

    An essential part of any measurement control program is adequate knowledge of the uncertainties of the measurement system standards. Only with an estimate of the standards'' uncertainties can one determine if the standard is adequate for its intended use or can one calculate the total uncertainty of the measurement process. Purchased standards usually have estimates of uncertainty on their certificates. However, when standards are prepared and characterized by a laboratory, variance propagation is required to estimate the uncertainty of the standard. Traditional variance propagation typically involves tedious use of partial derivatives, unfriendly software and the availability of statistical expertise. As a result, the uncertainty of prepared standards is often not determined or determined incorrectly. For situations meeting stated assumptions, easier shortcut methods of estimation are now available which eliminate the need for partial derivatives and require only a spreadsheet or calculator. A system of simplifying the calculations by dividing into subgroups of absolute and relative uncertainties is utilized. These methods also incorporate the International Standards Organization (ISO) concepts for combining systematic and random uncertainties as published in their Guide to the Expression of Measurement Uncertainty. Details of the simplified methods and examples of their use are included in the paper

  1. Uncertainty propagation in nuclear forensics

    International Nuclear Information System (INIS)

    Pommé, S.; Jerome, S.M.; Venchiarutti, C.

    2014-01-01

    Uncertainty propagation formulae are presented for age dating in support of nuclear forensics. The age of radioactive material in this context refers to the time elapsed since a particular radionuclide was chemically separated from its decay product(s). The decay of the parent radionuclide and ingrowth of the daughter nuclide are governed by statistical decay laws. Mathematical equations allow calculation of the age of specific nuclear material through the atom ratio between parent and daughter nuclides, or through the activity ratio provided that the daughter nuclide is also unstable. The derivation of the uncertainty formulae of the age may present some difficulty to the user community and so the exact solutions, some approximations, a graphical representation and their interpretation are presented in this work. Typical nuclides of interest are actinides in the context of non-proliferation commitments. The uncertainty analysis is applied to a set of important parent–daughter pairs and the need for more precise half-life data is examined. - Highlights: • Uncertainty propagation formulae for age dating with nuclear chronometers. • Applied to parent–daughter pairs used in nuclear forensics. • Investigated need for better half-life data

  2. The rating reliability calculator

    Directory of Open Access Journals (Sweden)

    Solomon David J

    2004-04-01

    Full Text Available Abstract Background Rating scales form an important means of gathering evaluation data. Since important decisions are often based on these evaluations, determining the reliability of rating data can be critical. Most commonly used methods of estimating reliability require a complete set of ratings i.e. every subject being rated must be rated by each judge. Over fifty years ago Ebel described an algorithm for estimating the reliability of ratings based on incomplete data. While his article has been widely cited over the years, software based on the algorithm is not readily available. This paper describes an easy-to-use Web-based utility for estimating the reliability of ratings based on incomplete data using Ebel's algorithm. Methods The program is available public use on our server and the source code is freely available under GNU General Public License. The utility is written in PHP, a common open source imbedded scripting language. The rating data can be entered in a convenient format on the user's personal computer that the program will upload to the server for calculating the reliability and other statistics describing the ratings. Results When the program is run it displays the reliability, number of subject rated, harmonic mean number of judges rating each subject, the mean and standard deviation of the averaged ratings per subject. The program also displays the mean, standard deviation and number of ratings for each subject rated. Additionally the program will estimate the reliability of an average of a number of ratings for each subject via the Spearman-Brown prophecy formula. Conclusion This simple web-based program provides a convenient means of estimating the reliability of rating data without the need to conduct special studies in order to provide complete rating data. I would welcome other researchers revising and enhancing the program.

  3. Structural systems reliability analysis

    International Nuclear Information System (INIS)

    Frangopol, D.

    1975-01-01

    For an exact evaluation of the reliability of a structure it appears necessary to determine the distribution densities of the loads and resistances and to calculate the correlation coefficients between loads and between resistances. These statistical characteristics can be obtained only on the basis of a long activity period. In case that such studies are missing the statistical properties formulated here give upper and lower bounds of the reliability. (orig./HP) [de

  4. Reliability and maintainability

    International Nuclear Information System (INIS)

    1994-01-01

    Several communications in this conference are concerned with nuclear plant reliability and maintainability; their titles are: maintenance optimization of stand-by Diesels of 900 MW nuclear power plants; CLAIRE: an event-based simulation tool for software testing; reliability as one important issue within the periodic safety review of nuclear power plants; design of nuclear building ventilation by the means of functional analysis; operation characteristic analysis for a power industry plant park, as a function of influence parameters

  5. Reliability data book

    International Nuclear Information System (INIS)

    Bento, J.P.; Boerje, S.; Ericsson, G.; Hasler, A.; Lyden, C.O.; Wallin, L.; Poern, K.; Aakerlund, O.

    1985-01-01

    The main objective for the report is to improve failure data for reliability calculations as parts of safety analyses for Swedish nuclear power plants. The work is based primarily on evaluations of failure reports as well as information provided by the operation and maintenance staff of each plant. In the report are presented charts of reliability data for: pumps, valves, control rods/rod drives, electrical components, and instruments. (L.E.)

  6. Multidisciplinary System Reliability Analysis

    Science.gov (United States)

    Mahadevan, Sankaran; Han, Song; Chamis, Christos C. (Technical Monitor)

    2001-01-01

    The objective of this study is to develop a new methodology for estimating the reliability of engineering systems that encompass multiple disciplines. The methodology is formulated in the context of the NESSUS probabilistic structural analysis code, developed under the leadership of NASA Glenn Research Center. The NESSUS code has been successfully applied to the reliability estimation of a variety of structural engineering systems. This study examines whether the features of NESSUS could be used to investigate the reliability of systems in other disciplines such as heat transfer, fluid mechanics, electrical circuits etc., without considerable programming effort specific to each discipline. In this study, the mechanical equivalence between system behavior models in different disciplines are investigated to achieve this objective. A new methodology is presented for the analysis of heat transfer, fluid flow, and electrical circuit problems using the structural analysis routines within NESSUS, by utilizing the equivalence between the computational quantities in different disciplines. This technique is integrated with the fast probability integration and system reliability techniques within the NESSUS code, to successfully compute the system reliability of multidisciplinary systems. Traditional as well as progressive failure analysis methods for system reliability estimation are demonstrated, through a numerical example of a heat exchanger system involving failure modes in structural, heat transfer and fluid flow disciplines.

  7. Immediate increase in food intake following exercise messages.

    Science.gov (United States)

    Albarracin, Dolores; Wang, Wei; Leeper, Joshua

    2009-07-01

    Communications to stimulate weight loss include exercise-promotion messages that often produce unsatisfactory results due to compensatory behavioral and metabolic mechanisms triggered by physical activity. This research investigated potential automatic facilitation of eating immediately after exercise messages in the absence of actual exercise. Two controlled experiments demonstrated greater than control food intake following exposure to print messages typical of exercise campaigns as well as subliminal presentation of action words associated with exercise (e.g., "active"). These inadvertent effects may explain the limited efficacy of exercise-promotion programs for weight loss, particularly when systematic dietary guidelines are absent.

  8. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  9. The serial message-passing schedule for LDPC decoding algorithms

    Science.gov (United States)

    Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue

    2015-12-01

    The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.

  10. Expanding the Scope of Instant Messaging with Bidirectional Haptic Communication

    OpenAIRE

    Kim, Youngjae; Hahn, Minsoo

    2010-01-01

    This work was conducted on the combination of two fields, i.e., haptic and social messaging. Haptic is one of the most attention-drawing fields and the biggest buzzwords among nextgeneration users. Haptic is being applied to conventional devices such as the cellular phone and even the door lock. Diverse forms of media such as blogs, social network services, and instant messengers are used to send and receive messages. That is mainly why we focus on the messaging experience, the most frequent ...

  11. Impact of locus of control on health message effectiveness.

    Science.gov (United States)

    Kong, Ying; Shen, Fuyuan

    2011-10-01

    This article examined how individuals' locus of control might moderate the effect of health message frames. An experiment was conducted whereby participants read either individual- or social-responsibility message frames after their locus of control was primed. Results indicated that messages presented in individual-responsibility frames were more persuasive when people were primed with internal locus of control, whereas social-responsibility framed appeals were more persuasive when people were primed with external locus of control. These results were found for individuals in both high and low cognitive load conditions. Theoretical and practical implications of the findings are discussed.

  12. Model-based development and testing of advertising messages

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino

    2000-01-01

    The implementation of valid and comprehensible guidelines for message development potentially enhances the effects of advertising messages and improves the possibility of measuring such effects. Moreover, such guidelines also have potential implications for the managerial communication processes...... (client-agency and intra-agency) involved in the development of advertising messages. The purpose of the study described in this paper is to compare the development and effects of two campaign proposals, with the common aim of increasing the consumption of apples among young Danes (18 to 35 years of age......-test with the target group (n=500), as well as interviews with the involved advertising agency and client2 staff....

  13. Analysis and Application of Reliability

    International Nuclear Information System (INIS)

    Jeong, Hae Seong; Park, Dong Ho; Kim, Jae Ju

    1999-05-01

    This book tells of analysis and application of reliability, which includes definition, importance and historical background of reliability, function of reliability and failure rate, life distribution and assumption of reliability, reliability of unrepaired system, reliability of repairable system, sampling test of reliability, failure analysis like failure analysis by FEMA and FTA, and cases, accelerated life testing such as basic conception, acceleration and acceleration factor, and analysis of accelerated life testing data, maintenance policy about alternation and inspection.

  14. Integrated Markov-neural reliability computation method: A case for multiple automated guided vehicle system

    International Nuclear Information System (INIS)

    Fazlollahtabar, Hamed; Saidi-Mehrabad, Mohammad; Balakrishnan, Jaydeep

    2015-01-01

    This paper proposes an integrated Markovian and back propagation neural network approaches to compute reliability of a system. While states of failure occurrences are significant elements for accurate reliability computation, Markovian based reliability assessment method is designed. Due to drawbacks shown by Markovian model for steady state reliability computations and neural network for initial training pattern, integration being called Markov-neural is developed and evaluated. To show efficiency of the proposed approach comparative analyses are performed. Also, for managerial implication purpose an application case for multiple automated guided vehicles (AGVs) in manufacturing networks is conducted. - Highlights: • Integrated Markovian and back propagation neural network approach to compute reliability. • Markovian based reliability assessment method. • Managerial implication is shown in an application case for multiple automated guided vehicles (AGVs) in manufacturing networks

  15. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  16. A lightweight messaging-based distributed processing and workflow execution framework for real-time and big data analysis

    Science.gov (United States)

    Laban, Shaban; El-Desouky, Aly

    2014-05-01

    To achieve a rapid, simple and reliable parallel processing of different types of tasks and big data processing on any compute cluster, a lightweight messaging-based distributed applications processing and workflow execution framework model is proposed. The framework is based on Apache ActiveMQ and Simple (or Streaming) Text Oriented Message Protocol (STOMP). ActiveMQ , a popular and powerful open source persistence messaging and integration patterns server with scheduler capabilities, acts as a message broker in the framework. STOMP provides an interoperable wire format that allows framework programs to talk and interact between each other and ActiveMQ easily. In order to efficiently use the message broker a unified message and topic naming pattern is utilized to achieve the required operation. Only three Python programs and simple library, used to unify and simplify the implementation of activeMQ and STOMP protocol, are needed to use the framework. A watchdog program is used to monitor, remove, add, start and stop any machine and/or its different tasks when necessary. For every machine a dedicated one and only one zoo keeper program is used to start different functions or tasks, stompShell program, needed for executing the user required workflow. The stompShell instances are used to execute any workflow jobs based on received message. A well-defined, simple and flexible message structure, based on JavaScript Object Notation (JSON), is used to build any complex workflow systems. Also, JSON format is used in configuration, communication between machines and programs. The framework is platform independent. Although, the framework is built using Python the actual workflow programs or jobs can be implemented by any programming language. The generic framework can be used in small national data centres for processing seismological and radionuclide data received from the International Data Centre (IDC) of the Preparatory Commission for the Comprehensive Nuclear

  17. The influence of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages.

    Science.gov (United States)

    Moorman, Marjolein; van den Putte, Bas

    2008-10-01

    This study explores the combined effect of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages. Pre- and post-message measures of quit intention, attitude toward smoking cessation, and perceived behavioral control were taken in two separate waves from current cigarette smokers with varying levels of nicotine dependence (N=151). In the second wave, participants were randomly assigned to one of two groups. In the first group, participants read a smoking cessation message which emphasized the benefits of quitting (positive frame). In the second group participants read a message which emphasized the costs of not quitting (negative frame). Results show that smokers' intentions to quit smoking and their level of nicotine dependence jointly influence the persuasiveness of positive and negative message frames. When nicotine dependence and quitting intention are both high, a negative frame works best. Conversely, a positive frame is preferable when nicotine dependence or quitting intention is low. Smokers' level of processing is proposed as the underlying mechanism explaining the different effects of message frames.

  18. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing.

    Science.gov (United States)

    Van 't Riet, Jonathan; Cox, Anthony D; Cox, Dena; Zimet, Gregory D; De Bruijn, Gert-Jan; Van den Putte, Bas; De Vries, Hein; Werrij, Marieke Q; Ruiter, Robert A C

    2016-12-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour determines the relative persuasiveness of gain- and loss-framed messages. This 'risk-framing hypothesis', which was derived from prospect theory, has been central to health message-framing research for the better part of two decades and has enduring appeal to researchers and practitioners. It has found its way into several health communication handbooks and is communicated to the general public. The present article examines the validity of the risk-framing hypothesis anew by providing a review of the health message-framing literature. In spite of its ongoing appeal, we conclude that the hypothesis has severe theoretical flaws. In addition, we find that the empirical evidence in favour of the hypothesis is weak and inconsistent. It seems that, in applying prospect theory's tenets to a health-promotion context, some of the theory's key aspects have been lost in translation. At the close of the article, we offer a research agenda for the future, arguing that, above all, new methodology is needed to bring the message-framing literature further.

  19. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  20. Integral propagator solvers for Vlasov-Fokker-Planck equations

    International Nuclear Information System (INIS)

    Donoso, J M; Rio, E del

    2007-01-01

    We briefly discuss the use of short-time integral propagators on solving the so-called Vlasov-Fokker-Planck equation for the dynamics of a distribution function. For this equation, the diffusion tensor is singular and the usual Gaussian representation of the short-time propagator is no longer valid. However, we prove that the path-integral approach on solving the equation is, in fact, reliable by means of our generalized propagator, which is obtained through the construction of an auxiliary solvable Fokker-Planck equation. The new representation of the grid-free advancing scheme describes the inherent cross- and self-diffusion processes, in both velocity and configuration spaces, in a natural manner, although these processes are not explicitly depicted in the differential equation. We also show that some splitting methods, as well as some finite-difference schemes, could fail in describing the aforementioned diffusion processes, governed in the whole phase space only by the velocity diffusion tensor. The short-time transition probability offers a stable and robust numerical algorithm that preserves the distribution positiveness and its norm, ensuring the smoothness of the evolving solution at any time step. (fast track communication)

  1. Dynamic Propagation Channel Characterization and Modeling for Human Body Communication

    Science.gov (United States)

    Nie, Zedong; Ma, Jingjing; Li, Zhicheng; Chen, Hong; Wang, Lei

    2012-01-01

    This paper presents the first characterization and modeling of dynamic propagation channels for human body communication (HBC). In-situ experiments were performed using customized transceivers in an anechoic chamber. Three HBC propagation channels, i.e., from right leg to left leg, from right hand to left hand and from right hand to left leg, were investigated under thirty-three motion scenarios. Snapshots of data (2,800,000) were acquired from five volunteers. Various path gains caused by different locations and movements were quantified and the statistical distributions were estimated. In general, for a given reference threshold è = −10 dB, the maximum average level crossing rate of the HBC was approximately 1.99 Hz, the maximum average fade time was 59.4 ms, and the percentage of bad channel duration time was less than 4.16%. The HBC exhibited a fade depth of −4 dB at 90% complementary cumulative probability. The statistical parameters were observed to be centered for each propagation channel. Subsequently a Fritchman model was implemented to estimate the burst characteristics of the on-body fading. It was concluded that the HBC is motion-insensitive, which is sufficient for reliable communication link during motions, and therefore it has great potential for body sensor/area networks. PMID:23250278

  2. Message strategies in direct-to-consumer pharmaceutical advertising: a content analysis using Taylor's six-segment message strategy wheel.

    Science.gov (United States)

    Tsai, Wan-Hsiu Sunny; Lancaster, Alyse R

    2012-01-01

    This exploratory study applies Taylor's (1999) six-segment message strategy wheel to direct-to-consumer (DTC) pharmaceutical television commercials to understand message strategies adopted by pharmaceutical advertisers to persuade consumers. A convenience sample of 96 DTC commercial campaigns was analyzed. The results suggest that most DTC drug ads used a combination approach, providing consumers with medical and drug information while simultaneously appealing to the viewer's ego-related needs and desires. In contrast to ration and ego strategies, other approaches including routine, acute need, and social are relatively uncommon while sensory was the least common message strategy. Findings thus recognized the educational value of DTC commercials.

  3. Propagation engineering in radio links design

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2013-01-01

    Propagation Engineering in Radio Link Design covers the basic principles of radiowaves propagation in a practical manner.  This fundamental understanding enables the readers to design radio links efficiently. This book elaborates on new achievements as well as recently developed propagation models.  This is in addition to a comprehensive overview of fundamentals of propagation in various scenarios. It examines theoretical calculations, approaches and applied procedures needed for radio links design. The authors study and analysis of the main propagation phenomena and its mechanisms based on the recommendations of International Telecommunications Union, (ITU). The book has been organized in 9 chapters and examines the role of antennas and passive reflectors in radio services, propagation mechanisms related to radar, satellite, short distance, broadcasting and trans-horizon radio links, with two chapters devoted to radio noise and main  parameters of radio link design. The book presents some 278 illustration...

  4. The Effect of Education through Short Message Service (SMS) Messages on Diabetic Patients Adherence.

    Science.gov (United States)

    Adikusuma, Wirawan; Qiyaam, Nurul

    2017-05-12

    Poor adherence and a lack of understanding of medication instructions for oral antidiabetic use are key factors that inhibit the control of glycemic levels. The aforementioned situation needs intervention to improve medication adherence and the therapy. This study was conducted with a quasi-experimental design with prospective data collection. The subjects of this study were 50 outpatients with type 2 diabetes melitus (T2DM) who had received oral antidiabetic medicine therapy at least six months prior to adherence measurement. The patients were classified into two groups-the control group and the intervention group. The intervention group received Short Message Service (SMS) messages of diabetes education, while the control group did not. Data collection was conducted by doing interviews and administering the Morisky Medication Adherence Scale (MMAS) questionnaire. The results showed the increase in adherence in the intervention group as 1.15 ± 1.04 and that in the control group as 0.72 ± 0.90. These results indicated that there were significant differences in MMAS score between the control and intervention groups ( p < 0.05). The decrease in fasting blood glucose and glucose measured 2 h postprandially was greater in the intervention group than that in the control group. It was concluded that the provision of education through SMS had a positive effect on medication adherence and glycemic levels.

  5. Diffusion of Mass Media Messages among Brazilian Farmers.

    Science.gov (United States)

    Schneider, Ivo A.; Fett, John H.

    1978-01-01

    Reports on a study designed to discover the nature of the flow of messages about recommended agricultural practices first introduced through the mass media in a developing country, and to explore the role opinion leaders plan in the process. (GW)

  6. Alert Messaging in the CMS Distributed Workflow System

    International Nuclear Information System (INIS)

    Maxa, Zdenek

    2012-01-01

    WMAgent is the core component of the CMS workload management system. One of the features of this job managing platform is a configurable messaging system aimed at generating, distributing and processing alerts: short messages describing a given alert-worthy information or pathological condition. Apart from the framework's sub-components running within the WMAgent instances, there is a stand-alone application collecting alerts from all WMAgent instances running across the CMS distributed computing environment. The alert framework has a versatile design that allows for receiving alert messages also from other CMS production applications, such as PhEDEx data transfer manager. We present implementation details of the system, including its Python implementation using ZeroMQ, CouchDB message storage and future visions as well as operational experiences. Inter-operation with monitoring platforms such as Dashboard or Lemon is described.

  7. Image and Issue Political Information: Message Content or Interpretation?

    Science.gov (United States)

    Johnston, Deirdre D.

    1989-01-01

    Explores the existence of a cognitive bias that affects an individual's processing of political advertisements. Finds that whether voters see messages as issue or image material depends on their predisposition. (RS)

  8. Updated spam filters reduce amount of messages in spam folder

    CERN Multimedia

    IT Department

    2010-01-01

    The flow of spam (unsolicited e-mail) targetting CERN mailboxes is constantly increasing: 96% of the 2 million mails received daily at CERN consist in successfully filtered spam, but spammers get smarter and detecting spam is becoming ever more difficult. In order to address this evolution, a new spam-detection software engine will progressively be deployed in next weeks. The aim is to decrease number of SPAM messages which are delivered to users’ Inboxes and to spam folders. Users can notify mail service about SPAM messages. To submit a spam message one can send it as an attachment. For more details please refer to the help pages (see links below). Useful links: To report spam messages please refer to information on http://cern.ch/mail/Help/?fdid=31 To configure spam filtering for your CERN mailbox, go to http://cern.ch/mail and click ‘spam fight’. Thank you for your collaboration. CERN Mail Services

  9. MESSAGE 2 space experiment with Rhodospirillum rubrum S1H

    Data.gov (United States)

    National Aeronautics and Space Administration — R. rubrum S1H inoculated on solid agar rich media was sent to the ISS in October 2003 (MESSAGE-part 2 experiment). After 10 days flight R. rubrum cultures returned...

  10. Avoidance orientation moderates the effect of threatening messages

    NARCIS (Netherlands)

    Riet, van 't J.P.; Ruiter, R.A.C.; Vries, de H.

    2012-01-01

    This study investigated the influence of individual differences in people's dispositional avoidance orientation on the persuasive effects of low- and high-threat messages promoting moderate drinking. First, participents (N = 99) individual differences in avoidance orientation were assessed, after

  11. How peer conversations about HIV/AIDS media messages affect ...

    African Journals Online (AJOL)

    2016-06-16

    Jun 16, 2016 ... quency of conversations is positively related to health behaviour. For example ... consumption became more negative, the participants' intentions to refrain from ..... people, and perceived personal relevance of the message.

  12. Message Correlation Analysis Tool for NOvA

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic realtime correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the DAQ of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  13. Message Correlation Analysis Tool for NOvA

    International Nuclear Information System (INIS)

    Lu Qiming; Biery, Kurt A; Kowalkowski, James B

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  14. GOOF: OCTOPUS error messages, ORDER, ORDERLIB, FLOE, CHAT, and LOD

    Energy Technology Data Exchange (ETDEWEB)

    Whitten, G.

    1977-07-10

    This is a compilation of the error messages returned by five parts of the Livermore timesharing system: the ORDER batch-processor, the ORDERLIB subroutine library, the FLOE operating system, the CHAT compiler, and the LOD loader.

  15. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  16. Message correlation analysis tool for NOvA

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Qiming [Fermilab; Biery, Kurt A. [Fermilab; Kowalkowski, James B. [Fermilab

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  17. Multi-level scaling properties of instant-message communications

    Science.gov (United States)

    Chen, Guanxiong; Han, Xiaopu; Wang, Binghong

    2010-08-01

    To research the statistical properties of human's communication behaviors is one of the highlight areas of Human Dynamics. In this paper, we analyze the instant message data of QICQ from volunteers, and discover that there are many forms of non-Poisson characters, such as inter-event distributions of sending and receiving messages, communications between two friends, log-in activities, the distribution of online time, quantities of messages, and so on. These distributions not only denote the pattern of human communication activities, but also relate to the statistical property of human behaviors in using software. We find out that most of these exponents distribute between -1 and -2, which indicates that the Instant Message (IM) communication behavior of human is different from Non-IM communication behaviors; there are many fat-tail characters related to IM communication behavior.

  18. A clinician's artificial organ? Instant messaging applications in medical care.

    Science.gov (United States)

    Tazegul, Gokhan; Bozoglan, Humeyra; Ogut, Tahir S; Balcı, Mustafa K

    2017-09-15

    After the development of the first phone at the end of 19th century, communication technologies took a great leap forward in the 20th century. With the birth of the "smartphone" in the 21st century, communication technologies exponentially evolved and became an important part of our daily routine. Effective communications between clinicians is critical in medical care and miscommunications are a source of errors. Although telecommunication technologies have proliferated dramatically in the last decade, there is scarce evidence-based information on the use of this technology in medical care. For the purposes of medical communication, we can now consult each other about patients individually and within a group via instant messaging applications by using text messages, photos, audio messages and even videos. In this review, we examine the uses and drawbacks of instant messaging applications in medical communications.

  19. Synchronous message-based communication for distributed heterogeneous systems

    International Nuclear Information System (INIS)

    Wilkinson, N.; Dohan, D.

    1992-01-01

    The use of a synchronous, message-based real-time operating system (Unison) as the basis of transparent interprocess and inter-processor communication over VME-bus is described. The implementation of a synchronous, message-based protocol for network communication between heterogeneous systems is discussed. In particular, the design and implementation of a message-based session layer over a virtual circuit transport layer protocol using UDP/IP is described. Inter-process communication is achieved via a message-based semantic which is portable by virtue of its ease of implementation in other operating system environments. Protocol performance for network communication among heterogeneous architecture is presented, including VMS, Unix, Mach and Unison. (author)

  20. Evidence of Premeditation in Skin Messages in Suicide.

    Science.gov (United States)

    Byard, Roger W

    2016-03-01

    A 34-year-old man with manic-depressive disorder was found dead sitting in a vehicle with a hose running from the exhaust pipe to the cabin. Numerous suicide notes were found inside his house. At autopsy, the decedent was wearing jeans and a long-sleeved windcheater. Upon removal of his clothes, a series of messages were also found written on the legs and forearm. Death was due to carbon monoxide toxicity with a blood level of carboxyhemoglobin of 84%. Skin messages represent a rare form of suicide note that may suggest that a suicide has not been planned, as the decedent may have used the nearest surface to write on. This case demonstrates, however, that skin messages may be more organized, being written prior to dressing and setting up the fatal episode. They also may compliment other notes and messages. © 2015 American Academy of Forensic Sciences.