Sample records for message forwarding system

  1. A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    NASA Astrophysics Data System (ADS)

    Carrilho, Sergio; Esaki, Hiroshi

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  2. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOEpatents

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  3. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) Environment: Evidence that Size Does Matter in DoD Business Process Engineering

    DTIC Science & Technology

    2007-06-01

    data repository that will create a metadata card for each message for use by the federated search catalog as a reference. c. Joint DMS Core Product...yet. Once resolved, NREMS can move forward afloat. The AMHS in concert with NCES will be updated with the federated search capability. AMHS

  4. Remote Asynchronous Message Service Gateway

    NASA Technical Reports Server (NTRS)

    Wang, Shin-Ywan; Burleigh, Scott C.

    2011-01-01

    The Remote Asynchronous Message Service (RAMS) gateway is a special-purpose AMS application node that enables exchange of AMS messages between nodes residing in different AMS "continua," notionally in different geographical locations. JPL s implementation of RAMS gateway functionality is integrated with the ION (Interplanetary Overlay Network) implementation of the DTN (Delay-Tolerant Networking) bundle protocol, and with JPL s implementation of AMS itself. RAMS protocol data units are encapsulated in ION bundles and are forwarded to the neighboring RAMS gateways identified in the source gateway s AMS management information base. Each RAMS gateway has interfaces in two communication environments: the AMS message space it serves, and the RAMS network - the grid or tree of mutually aware RAMS gateways - that enables AMS messages produced in one message space to be forwarded to other message spaces of the same venture. Each gateway opens persistent, private RAMS network communication channels to the RAMS gateways of other message spaces for the same venture, in other continua. The interconnected RAMS gateways use these communication channels to forward message petition assertions and cancellations among themselves. Each RAMS gateway subscribes locally to all subjects that are of interest in any of the linked message spaces. On receiving its copy of a message on any of these subjects, the RAMS gateway node uses the RAMS network to forward the message to every other RAMS gateway whose message space contains at least one node that has subscribed to messages on that subject. On receiving a message via the RAMS network from some other RAMS gateway, the RAMS gateway node forwards the message to all subscribers in its own message space.

  5. Integrating Communication and Navigation: Next Generation Broadcast Service (NGBS)

    NASA Technical Reports Server (NTRS)

    Donaldson, Jennifer

    2017-01-01

    NASA Goddard has been investing in technology demonstrations of a beacon service, now called Next Generation Broadcast Services (NGBS). NGBS is a global, space-based, communications and navigation service for users of Global Navigation Satellite Systems (GNSS) and the Tracking and Data Relay Satellite System (TDRSS). NGBS will provide an S-band beacon messaging source and radio navigation available to users at orbital altitudes 1400 km and below, increasing the autonomy and resiliency of onboard communication and navigation. NGBS will deliver both one-way radiometric (Doppler and pseudorange) and fast forward data transport services to users. Portions of the overall forward data volume will be allocated for fixed message types while the remaining data volume will be left for user forward command data. The NGBS signal will reside within the 2106.43 MHz spectrum currently allocated for the Space Networks multiple access forward (MAF) service and a live service demonstration is currently being planned via the 2nd and 3rd generation TDRS satellites.

  6. A two-stage broadcast message propagation model in social networks

    NASA Astrophysics Data System (ADS)

    Wang, Dan; Cheng, Shun-Jun

    2016-11-01

    Message propagation in social networks is becoming a popular topic in complex networks. One of the message types in social networks is called broadcast message. It refers to a type of message which has a unique and unknown destination for the publisher, such as 'lost and found'. Its propagation always has two stages. Due to this feature, rumor propagation model and epidemic propagation model have difficulty in describing this message's propagation accurately. In this paper, an improved two-stage susceptible-infected-removed model is proposed. We come up with the concept of the first forwarding probability and the second forwarding probability. Another part of our work is figuring out the influence to the successful message transmission chance in each level resulting from multiple reasons, including the topology of the network, the receiving probability, the first stage forwarding probability, the second stage forwarding probability as well as the length of the shortest path between the publisher and the relevant destination. The proposed model has been simulated on real networks and the results proved the model's effectiveness.

  7. Secure quantum signatures: a practical quantum technology (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Andersson, Erika

    2016-10-01

    Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

  8. Transfer-Efficient Face Routing Using the Planar Graphs of Neighbors in High Density WSNs

    PubMed Central

    Kim, Sang-Ha

    2017-01-01

    Face routing has been adopted in wireless sensor networks (WSNs) where topological changes occur frequently or maintaining full network information is difficult. For message forwarding in networks, a planar graph is used to prevent looping, and because long edges are removed by planarization and the resulting planar graph is composed of short edges, and messages are forwarded along multiple nodes connected by them even though they can be forwarded directly. To solve this, face routing using information on all nodes within 2-hop range was adopted to forward messages directly to the farthest node within radio range. However, as the density of the nodes increases, network performance plunges because message transfer nodes receive and process increased node information. To deal with this problem, we propose a new face routing using the planar graphs of neighboring nodes to improve transfer efficiency. It forwards a message directly to the farthest neighbor and reduces loads and processing time by distributing network graph construction and planarization to the neighbors. It also decreases the amount of location information to be transmitted by sending information on the planar graph nodes rather than on all neighboring nodes. Simulation results show that it significantly improves transfer efficiency. PMID:29053623

  9. An Emergency Packet Forwarding Scheme for V2V Communication Networks

    PubMed Central

    2014-01-01

    This paper proposes an effective warning message forwarding scheme for cooperative collision avoidance. In an emergency situation, an emergency-detecting vehicle warns the neighbor vehicles via an emergency warning message. Since the transmission range is limited, the warning message is broadcast in a multihop manner. Broadcast packets lead two challenges to forward the warning message in the vehicular network: redundancy of warning messages and competition with nonemergency transmissions. In this paper, we study and address the two major challenges to achieve low latency in delivery of the warning message. To reduce the intervehicle latency and end-to-end latency, which cause chain collisions, we propose a two-way intelligent broadcasting method with an adaptable distance-dependent backoff algorithm. Considering locations of vehicles, the proposed algorithm controls the broadcast of a warning message to reduce redundant EWM messages and adaptively chooses the contention window to compete with nonemergency transmission. Via simulations, we show that our proposed algorithm reduces the probability of rear-end crashes by 70% compared to previous algorithms by reducing the intervehicle delay. We also show that the end-to-end propagation delay of the warning message is reduced by 55%. PMID:25054181

  10. Reliability and throughput issues for optical wireless and RF wireless systems

    NASA Astrophysics Data System (ADS)

    Yu, Meng

    The fast development of wireless communication technologies has two main trends. On one hand, in point-to-point communications, the demand for higher throughput called for the emergence of wireless broadband techniques including optical wireless (OW). One the other hand, wireless networks are becoming pervasive. New application of wireless networks ask for more flexible system infrastructures beyond the point-to-point prototype to achieve better performance. This dissertation investigates two topics on the reliability and throughput issues of new wireless technologies. The first topic is to study the capacity, and practical forward error control strategies for OW systems. We investigate the performance of OW systems under weak atmospheric turbulence. We first investigate the capacity and power allocation for multi-laser and multi-detector systems. Our results show that uniform power allocation is a practically optimal solution for paralleled channels. We also investigate the performance of Reed Solomon (RS) codes and turbo codes for OW systems. We present RS codes as good candidates for OW systems. The second topic targets user cooperation in wireless networks. We evaluate the relative merits of amplify-forward (AF) and decode-forward (DF) in practical scenarios. Both analysis and simulations show that the overall system performance is critically affected by the quality of the inter-user channel. Following this result, we investigate two schemes to improve the overall system performance. We first investigate the impact of the relay location on the overall system performance and determine the optimal location of relay. A best-selective single-relay 1 system is proposed and evaluated. Through the analysis of the average capacity and outage, we show that a small candidate pool of 3 to 5 relays suffices to reap most of the "geometric" gain available to a selective system. Second, we propose a new user cooperation scheme to provide an effective better inter-user channel. Most user cooperation protocols work in a time sharing manner, where a node forwards others' messages and sends its own message at different sections within a provisioned time slot. In the proposed scheme the two messages are encoded together in a single codework using network coding and transmitted in the given time slot. We also propose a general multiple-user cooperation framework. Under this framework, we show that network coding can achieve better diversity and provide effective better inter-user channels than time sharing. The last part of the dissertation focuses on multi-relay packet transmission. We propose an adaptive and distributive coding scheme for the relay nodes to adaptively cooperate and forward messages. The adaptive scheme shows performance gain over fixed schemes. Then we shift our viewpoint and represent the network as part of encoders and part of decoders.

  11. A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

    PubMed Central

    Moon, Soo Young; Cho, Tae Ho

    2014-01-01

    Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%. PMID:25136649

  12. In the Face of Cybersecurity: How the Common Information Model Can Be Used

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Skare, Paul; Falk, Herbert; Rice, Mark

    2016-01-01

    Efforts are underway to combine smart grid information, devices, networking, and emergency response information to create messages that are not dependent on specific standards development organizations (SDOs). This supports a future-proof approach of allowing changes in the canonical data models (CDMs) going forward without having to perform forklift replacements of solutions that use the messages. This also allows end users (electric utilities) to upgrade individual components of a larger system while keeping the message payload definitions intact. The goal is to enable public and private information sharing securely in a standards-based approach that can be integrated into existing operations. Wemore » provide an example architecture that could benefit from this multi-SDO, secure message approach. This article also describes how to improve message security« less

  13. High capacity low delay packet broadcasting multiaccess schemes for satellite repeater systems

    NASA Astrophysics Data System (ADS)

    Bose, S. K.

    1980-12-01

    Demand assigned packet radio schemes using satellite repeaters can achieve high capacities but often exhibit relatively large delays under low traffic conditions when compared to random access. Several schemes which improve delay performance at low traffic but which have high capacity are presented and analyzed. These schemes allow random acess attempts by users, who are waiting for channel assignments. The performance of these are considered in the context of a multiple point communication system carrying fixed length messages between geographically distributed (ground) user terminals which are linked via a satellite repeater. Channel assignments are done following a BCC queueing discipline by a (ground) central controller on the basis of requests correctly received over a collision type access channel. In TBACR Scheme A, some of the forward message channels are set aside for random access transmissions; the rest are used in a demand assigned mode. Schemes B and C operate all their forward message channels in a demand assignment mode but, by means of appropriate algorithms for trailer channel selection, allow random access attempts on unassigned channels. The latter scheme also introduces framing and slotting of the time axis to implement a more efficient algorithm for trailer channel selection than the former.

  14. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  15. The Use of Social Networking Sites (SNSs) in Health Communication Campaigns: Review and Recommendations.

    PubMed

    Shi, Jingyuan; Poorisat, Thanomwong; Salmon, Charles T

    2018-01-01

    The past decade has witnessed a rapid increase in the use of Social Networking Sites (SNSs) in health communication campaigns seeking to achieve an ambitious range of health-related impacts. This article provides a review of 40 studies and research protocols, with a focus on two key factors that differentiate SNSs from more traditional health communication approaches of the past. The first is the potential dualism between message sender and receiver, in which receivers become receiver-sources who forward and amplify the content and reach of health messages. The second is the potential dualism between message and message impact, in which the act of forwarding and modifying messages by receiver-sources itself becomes a measure of message impact. Each of these dualisms has implications for the design and evaluation of contemporary health communication campaigns. The review concludes with a series of observations and recommendations for future health communication research.

  16. Impact of Repeated Exposures on Information Spreading in Social Networks

    PubMed Central

    Zhou, Cangqi; Zhao, Qianchuan; Lu, Wenbo

    2015-01-01

    Clustered structure of social networks provides the chances of repeated exposures to carriers with similar information. It is commonly believed that the impact of repeated exposures on the spreading of information is nontrivial. Does this effect increase the probability that an individual forwards a message in social networks? If so, to what extent does this effect influence people’s decisions on whether or not to spread information? Based on a large-scale microblogging data set, which logs the message spreading processes and users’ forwarding activities, we conduct a data-driven analysis to explore the answer to the above questions. The results show that an overwhelming majority of message samples are more probable to be forwarded under repeated exposures, compared to those under only a single exposure. For those message samples that cover various topics, we observe a relatively fixed, topic-independent multiplier of the willingness of spreading when repeated exposures occur, regardless of the differences in network structure. We believe that this finding reflects average people’s intrinsic psychological gain under repeated stimuli. Hence, it makes sense that the gain is associated with personal response behavior, rather than network structure. Moreover, we find that the gain is robust against the change of message popularity. This finding supports that there exists a relatively fixed gain brought by repeated exposures. Based on the above findings, we propose a parsimonious model to predict the saturated numbers of forwarding activities of messages. Our work could contribute to better understandings of behavioral psychology and social media analytics. PMID:26465749

  17. Pilot Overmyer reviews TAGS teleprinter printout on middeck

    NASA Technical Reports Server (NTRS)

    1982-01-01

    Pilot Overmyer reviews Text and Graphics System (TAGS) teleprinter printout of instructions and messages from Houston Mission Control Center (MCC) in front of the forward middeck lockers. Development Flight Instrument (DFI) unit and control panels on starboard wall appear in the background.

  18. Fault-Tolerant, Real-Time, Multi-Core Computer System

    NASA Technical Reports Server (NTRS)

    Gostelow, Kim P.

    2012-01-01

    A document discusses a fault-tolerant, self-aware, low-power, multi-core computer for space missions with thousands of simple cores, achieving speed through concurrency. The proposed machine decides how to achieve concurrency in real time, rather than depending on programmers. The driving features of the system are simple hardware that is modular in the extreme, with no shared memory, and software with significant runtime reorganizing capability. The document describes a mechanism for moving ongoing computations and data that is based on a functional model of execution. Because there is no shared memory, the processor connects to its neighbors through a high-speed data link. Messages are sent to a neighbor switch, which in turn forwards that message on to its neighbor until reaching the intended destination. Except for the neighbor connections, processors are isolated and independent of each other. The processors on the periphery also connect chip-to-chip, thus building up a large processor net. There is no particular topology to the larger net, as a function at each processor allows it to forward a message in the correct direction. Some chip-to-chip connections are not necessarily nearest neighbors, providing short cuts for some of the longer physical distances. The peripheral processors also provide the connections to sensors, actuators, radios, science instruments, and other devices with which the computer system interacts.

  19. Optimal mapping of neural-network learning on message-passing multicomputers

    NASA Technical Reports Server (NTRS)

    Chu, Lon-Chan; Wah, Benjamin W.

    1992-01-01

    A minimization of learning-algorithm completion time is sought in the present optimal-mapping study of the learning process in multilayer feed-forward artificial neural networks (ANNs) for message-passing multicomputers. A novel approximation algorithm for mappings of this kind is derived from observations of the dominance of a parallel ANN algorithm over its communication time. Attention is given to both static and dynamic mapping schemes for systems with static and dynamic background workloads, as well as to experimental results obtained for simulated mappings on multicomputers with dynamic background workloads.

  20. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... a secondary, non-interference basis by amateur stations participating in digital message forwarding... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based licensee's predicted 38 dBu signal level contour shall be calculated using the F(50, 50) field strength...

  1. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... a secondary, non-interference basis by amateur stations participating in digital message forwarding... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based licensee's predicted 38 dBu signal level contour shall be calculated using the F(50, 50) field strength...

  2. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... a secondary, non-interference basis by amateur stations participating in digital message forwarding... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based licensee's predicted 38 dBu signal level contour shall be calculated using the F(50, 50) field strength...

  3. Communication theory and the search for effective feedback.

    PubMed

    Simonds, S K

    1995-01-01

    If messages transmitted to the public, patients and health professionals could be assured of being received, understood and acted on as intended by the senders of messages, there would be little need to focus on communications and feedback. That the physician's office, the healthcare system and the community are littered with messages that 'never got through' attests to the problem of ineffective communications and the absence of effective feedback. Communication theorists, health psychologists and thoughtful health professionals, particularly those working in community hypertension programmes, have developed approaches that improve the probabilities of 'getting the message through'. Theory-based communications with built-in feedback and 'feed-forward' enhance the probabilities of success considerably. This presentation explores these problems using the SMCR model of communication. Differences between linear models and transactional models are discussed. On the assumption that the health message environments of the future will be increasingly complex with highly differentiated target audiences in a rapid paced computer and electronically driven world, 'getting the message through' will become an even greater challenge than in the recent past. Specific steps to change communication approaches in this setting are proposed.

  4. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond

    PubMed Central

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment. PMID:27898712

  5. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond.

    PubMed

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment.

  6. Online Meta-data Collection and Monitoring Framework for the STAR Experiment at RHIC

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Lauret, J.; Betts, W.; Van Buren, G.

    2012-12-01

    The STAR Experiment further exploits scalable message-oriented model principles to achieve a high level of control over online data streams. In this paper we present an AMQP-powered Message Interface and Reliable Architecture framework (MIRA), which allows STAR to orchestrate the activities of Meta-data Collection, Monitoring, Online QA and several Run-Time and Data Acquisition system components in a very efficient manner. The very nature of the reliable message bus suggests parallel usage of multiple independent storage mechanisms for our meta-data. We describe our experience with a robust data-taking setup employing MySQL- and HyperTable-based archivers for meta-data processing. In addition, MIRA has an AJAX-enabled web GUI, which allows real-time visualisation of online process flow and detector subsystem states, and doubles as a sophisticated alarm system when combined with complex event processing engines like Esper, Borealis or Cayuga. The performance data and our planned path forward are based on our experience during the 2011-2012 running of STAR.

  7. Factors influencing message dissemination through social media

    NASA Astrophysics Data System (ADS)

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  8. 47 CFR 64.3100 - Restrictions on mobile service commercial messages.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... advertise or promote a product, service, or Internet website of the person or entity forwarding the message... subscriber; (2) Include a functioning return electronic mail address or other Internet-based mechanism that... communications made to the electronic mail address, other Internet-based mechanism or, if applicable, other...

  9. President's Message: "Forward"

    ERIC Educational Resources Information Center

    Starkman, Ken

    2006-01-01

    In this message from the ITEA president, he states that it is imperative that ITEA convey a shared mission and philosophy, foster leadership, and grow a large audience of supportive professional members while remaining agile enough to withstand generational and political changes that naturally occur over time. The strategic plan of ITEA focuses on…

  10. Distributed Systems Technology Survey.

    DTIC Science & Technology

    1987-03-01

    and prolocols. 2. Hardware Technology Ecnomic factor we a majo reonm for the prolierat of dlstbted systoe. Processors, memory, an magne tc ndoptical...destined messages and pertorn the a pro te forwarding. There gImsno agreement that a ightweight process mechanism is essential to support com- monly used...Xerox PARC environment [311. Shared file servers, discussed below, are essential to the success of such a scheme. 11. ecurlity A distributed

  11. Free Space Optical Communication in the Military Environment

    DTIC Science & Technology

    2014-09-01

    Communications Commission FDA Food and Drug Administration FMV Full Motion Video FOB Forward Operating Base FOENEX Free-Space Optical Experimental Network...from radio and voice to chat message and email. Data-rich multimedia content, such as high-definition pictures, video chat, video files, and...introduction of full-motion video (FMV) via numerous different Intelligence Surveillance and Reconnaissance (ISR) systems, such as targeting pods on

  12. Beyond NextGen: AutoMax Overview and Update

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal; Alexandrov, Natalia

    2013-01-01

    Main Message: National and Global Needs - Develop scalable airspace operations management system to accommodate increased mobility needs, emerging airspace uses, mix, future demand. Be affordable and economically viable. Sense of Urgency. Saturation (delays), emerging airspace uses, proactive development. Autonomy is Needed for Airspace Operations to Meet Future Needs. Costs, time critical decisions, mobility, scalability, limits of cognitive workload. AutoMax to Accommodate National and Global Needs. Auto: Automation, autonomy, autonomicity for airspace operations. Max: Maximizing performance of the National Airspace System. Interesting Challenges and Path Forward.

  13. Description of the L1C signal

    USGS Publications Warehouse

    Betz, J.W.; Blanco, M.A.; Cahn, C.R.; Dafesh, P.A.; Hegarty, C.J.; Hudnut, K.W.; Kasemsri, V.; Keegan, R.; Kovach, K.; Lenahan, L.S.; Ma, H.H.; Rushanan, J.J.; Sklar, D.; Stansell, T.A.; Wang, C.C.; Yi, S.K.

    2006-01-01

    Detailed design of the modernized LI civil signal (L1C) signal has been completed, and the resulting draft Interface Specification IS-GPS-800 was released in Spring 2006. The novel characteristics of the optimized L1C signal design provide advanced capabilities while offering to receiver designers considerable flexibility in how to use these capabilities. L1C provides a number of advanced features, including: 75% of power in a pilot component for enhanced signal tracking, advanced Weilbased spreading codes, an overlay code on the pilot that provides data message synchronization, support for improved reading of clock and ephemeris by combining message symbols across messages, advanced forward error control coding, and data symbol interleaving to combat fading. The resulting design offers receiver designers the opportunity to obtain unmatched performance in many ways. This paper describes the design of L1C. A summary of LIC's background and history is provided. The signal description then proceeds with the overall signal structure consisting of a pilot component and a carrier component. The new L1C spreading code family is described, along with the logic used for generating these spreading codes. Overlay codes on the pilot channel are also described, as is the logic used for generating the overlay codes. Spreading modulation characteristics are summarized. The data message structure is also presented, showing the format for providing time, ephemeris, and system data to users, along with features that enable receivers to perform code combining. Encoding of rapidly changing time bits is described, as are the Low Density Parity Check codes used for forward error control of slowly changing time bits, clock, ephemeris, and system data. The structure of the interleaver is also presented. A summary of L 1C's unique features and their benefits is provided, along with a discussion of the plan for L1C implementation.

  14. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  15. A social activity and physical contact-based routing algorithm in mobile opportunistic networks for emergency response to sudden disasters

    NASA Astrophysics Data System (ADS)

    Wang, Xiaoming; Lin, Yaguang; Zhang, Shanshan; Cai, Zhipeng

    2017-05-01

    Sudden disasters such as earthquake, flood and hurricane necessitate the employment of communication networks to carry out emergency response activities. Routing has a significant impact on the functionality, performance and flexibility of communication networks. In this article, the routing problem is studied considering the delivery ratio of messages, the overhead ratio of messages and the average delay of messages in mobile opportunistic networks (MONs) for enterprise-level emergency response communications in sudden disaster scenarios. Unlike the traditional routing methods for MONS, this article presents a new two-stage spreading and forwarding dynamic routing algorithm based on the proposed social activity degree and physical contact factor for mobile customers. A new modelling method for describing a dynamic evolving process of the topology structure of a MON is first proposed. Then a multi-copy spreading strategy based on the social activity degree of nodes and a single-copy forwarding strategy based on the physical contact factor between nodes are designed. Compared with the most relevant routing algorithms such as Epidemic, Prophet, Labelled-sim, Dlife-comm and Distribute-sim, the proposed routing algorithm can significantly increase the delivery ratio of messages, and decrease the overhead ratio and average delay of messages.

  16. Healthy Children: Networking of People Concerned about the Quality of Life of Young Children.

    ERIC Educational Resources Information Center

    Cohen, Patti-Beth; Carlton, M. Patricia

    The move from disease treatment to disease prevention represents an exciting and positive step forward in promoting the health of young children. In modern society, though, health-related messages are part of a broad socialization process in which adults often transmit confusing and contradictory messages to children. To counter this condition,…

  17. Characterization of Mesoscale Predictability

    DTIC Science & Technology

    2017-11-09

    Manager Department of At110spheric Sciences University of Washington phone 206-543-7842 fa, 206-S43-0308 ac;s29@atmos.uw . edu -- Forwarded Message...Attached Message P’art------------------------------------------------------- Dale Durran, Proressor and Ctiair Atmospheric. Sciences Box 351640...public release; distribution is unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT One of the major efforts in the atmospheric sciences has been to

  18. PubMedAlertMe - Standalone Windows-based PubMed SDI Software Application

    PubMed Central

    Ma’ayan, Avi

    2008-01-01

    PubMedAlertMe is a Windows-based software system for automatically receiving e-mail alert messages about recent publications listed on PubMed. The e-mail messages contain links to newly available abstracts listed on PubMed describing publications that were selectively returned from a specified list of queries. Links are also provided to directly export citations to EndNote, and links are provided to directly forward articles to colleagues. The program is standalone. Thus, it does not require a remote mail server or user registration. PubMedAlertMe is free software, and can be downloaded from: http://amp.pharm.mssm.edu/PubMedAlertMe/PubMedAlertMe_setup.zip PMID:18402930

  19. An integrated gateway for various PHDs in U-healthcare environments.

    PubMed

    Park, KeeHyun; Pak, JuGeon

    2012-01-01

    We propose an integrated gateway for various personal health devices (PHDs). This gateway receives measurements from various PHDs and conveys them to a remote monitoring server (MS). It provides two kinds of transmission modes: immediate transmission and integrated transmission. The former mode operates if a measurement exceeds a predetermined threshold or in the case of an emergency. In the latter mode, the gateway retains the measurements instead of forwarding them. When the reporting time comes, the gateway extracts all the stored measurements, integrates them into one message, and transmits the integrated message to the MS. Through this mechanism, the transmission overhead can be reduced. On the basis of the proposed gateway, we construct a u-healthcare system comprising an activity monitor, a medication dispenser, and a pulse oximeter. The evaluation results show that the size of separate messages from various PHDs is reduced through the integration process, and the process does not require much time; the integration time is negligible.

  20. An Integrated Gateway for Various PHDs in U-Healthcare Environments

    PubMed Central

    Park, KeeHyun; Pak, JuGeon

    2012-01-01

    We propose an integrated gateway for various personal health devices (PHDs). This gateway receives measurements from various PHDs and conveys them to a remote monitoring server (MS). It provides two kinds of transmission modes: immediate transmission and integrated transmission. The former mode operates if a measurement exceeds a predetermined threshold or in the case of an emergency. In the latter mode, the gateway retains the measurements instead of forwarding them. When the reporting time comes, the gateway extracts all the stored measurements, integrates them into one message, and transmits the integrated message to the MS. Through this mechanism, the transmission overhead can be reduced. On the basis of the proposed gateway, we construct a u-healthcare system comprising an activity monitor, a medication dispenser, and a pulse oximeter. The evaluation results show that the size of separate messages from various PHDs is reduced through the integration process, and the process does not require much time; the integration time is negligible. PMID:22899891

  1. Inspiration from role models and advice for moving forward.

    PubMed

    Newman, Michelle G; McGinn, Lata K

    2012-12-01

    This Behavior Therapy series on overcoming the glass ceiling followed from a highly attended panel at ABCT on the same topic. The current paper summarizes the common themes across the various papers in this series with respect to obstacles prominent women have faced, and how we can learn from their stories to help inform the future. These themes include the importance of role models, messages from a supportive environment, difficulties balancing careers with children, coordinating careers with family, importance of taking charge of one's career, moving forward despite negative internal and external messages, and questions about whether things have changed substantially. In addition, this paper contains a summary of the helpful advice from accomplished women in academia for navigating the academic waters. It is our aspiration that going forward this series will stimulate other conversations as well as increase thought, behavior, solidarity, and awareness about this topic so that we can continue to work toward a future when things will continue to improve for women. Copyright © 2012. Published by Elsevier Ltd.

  2. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications.

    PubMed

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-09-18

    Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.

  3. Text messaging during simulated driving.

    PubMed

    Drews, Frank A; Yazdani, Hina; Godfrey, Celeste N; Cooper, Joel M; Strayer, David L

    2009-10-01

    This research aims to identify the impact of text messaging on simulated driving performance. In the past decade, a number of on-road, epidemiological, and simulator-based studies reported the negative impact of talking on a cell phone on driving behavior. However, the impact of text messaging on simulated driving performance is still not fully understood. Forty participants engaged in both a single task (driving) and a dual task (driving and text messaging) in a high-fidelity driving simulator. Analysis of driving performance revealed that participants in the dual-task condition responded more slowly to the onset of braking lights and showed impairments in forward and lateral control compared with a driving-only condition. Moreover, text-messaging drivers were involved in more crashes than drivers not engaged in text messaging. Text messaging while driving has a negative impact on simulated driving performance. This negative impact appears to exceed the impact of conversing on a cell phone while driving. The results increase our understanding of driver distraction and have potential implications for public safety and device development.

  4. Delay/Disruption Tolerant Network-Based Message Forwarding for a River Pollution Monitoring Wireless Sensor Network Application.

    PubMed

    Velásquez-Villada, Carlos; Donoso, Yezid

    2016-03-25

    Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river's course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas' movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.

  5. Collective navigation of complex networks: Participatory greedy routing.

    PubMed

    Kleineberg, Kaj-Kolja; Helbing, Dirk

    2017-06-06

    Many networks are used to transfer information or goods, in other words, they are navigated. The larger the network, the more difficult it is to navigate efficiently. Indeed, information routing in the Internet faces serious scalability problems due to its rapid growth, recently accelerated by the rise of the Internet of Things. Large networks like the Internet can be navigated efficiently if nodes, or agents, actively forward information based on hidden maps underlying these systems. However, in reality most agents will deny to forward messages, which has a cost, and navigation is impossible. Can we design appropriate incentives that lead to participation and global navigability? Here, we present an evolutionary game where agents share the value generated by successful delivery of information or goods. We show that global navigability can emerge, but its complete breakdown is possible as well. Furthermore, we show that the system tends to self-organize into local clusters of agents who participate in the navigation. This organizational principle can be exploited to favor the emergence of global navigability in the system.

  6. A clinician's artificial organ? Instant messaging applications in medical care.

    PubMed

    Tazegul, Gokhan; Bozoglan, Humeyra; Ogut, Tahir S; Balcı, Mustafa K

    2017-09-15

    After the development of the first phone at the end of 19th century, communication technologies took a great leap forward in the 20th century. With the birth of the "smartphone" in the 21st century, communication technologies exponentially evolved and became an important part of our daily routine. Effective communications between clinicians is critical in medical care and miscommunications are a source of errors. Although telecommunication technologies have proliferated dramatically in the last decade, there is scarce evidence-based information on the use of this technology in medical care. For the purposes of medical communication, we can now consult each other about patients individually and within a group via instant messaging applications by using text messages, photos, audio messages and even videos. In this review, we examine the uses and drawbacks of instant messaging applications in medical communications.

  7. [Sexting as a risk? : On consensual and non-consensual distribution of personal erotic pictures using digital media].

    PubMed

    Dekker, Arne; Thula Koops

    2017-09-01

    Digital media are used for the purpose of various sexual experiences. In recent years the exchange of erotic text messages or images ("sexting") has gained the attention of academic research and has increasingly been the center of public discussion on sexual boundary violations and violence via digital media. The unwanted forwarding of images to a third party is especially relevant in this respect. In contrast to media reports about sexting as a risk behavior with serious consequences, there is little empirical analysis about the actual sexting practice of adolescents and adults in Germany. This paper is the first to describe sexting behavior of young adults in Germany on the basis of a large representative student sample. Data were collected in 2012 in the course of a nationwide study. Students from 15 universities were asked among other things about their experiences with sending erotic text messages or images, the non-consensual forwarding of images and its consequences. More than half of the student sample reported sending erotic text messages, 26.8% of women and 16.8% of men had sent erotic images to someone, in most cases to their partner. Of the sexters, 2% mentioned that their images had been forwarded to another person without their consent. The results indicate that in Germany sexting is mostly practiced in the context of a romantic relationship. Only a small percentage experience unwanted forwarding of images, and negative consequences are not reported for all incidents; however, this does not relativize the impact of those events implicating serious negative consequences for the involved person.

  8. Baseband-processed SS-TDMA communication system architecture and design concepts

    NASA Technical Reports Server (NTRS)

    Attwood, S.; Sabourin, D.

    1982-01-01

    The architecture and system design for a commercial satellite communications system planned for the 1990's was developed by Motorola for NASA's Lewis Research Center. The system provides data communications between individual users via trunking and customer premises service terminals utilizing a central switching satellite operating in a time-division multiple-access (TDMA) mode. The major elements of the design incorporating baseband processing include: demand-assigned multiple access reservation protocol, spectral utilization, system synchronization, modulation technique and forward error control implementation. Motorola's baseband processor design, which is being proven in a proof-of-concept advanced technology development, will perform data regeneration and message routing for individual users on-board the spacecraft.

  9. A Server-Based Mobile Coaching System

    PubMed Central

    Baca, Arnold; Kornfeind, Philipp; Preuschl, Emanuel; Bichler, Sebastian; Tampier, Martin; Novatchkov, Hristo

    2010-01-01

    A prototype system for monitoring, transmitting and processing performance data in sports for the purpose of providing feedback has been developed. During training, athletes are equipped with a mobile device and wireless sensors using the ANT protocol in order to acquire biomechanical, physiological and other sports specific parameters. The measured data is buffered locally and forwarded via the Internet to a server. The server provides experts (coaches, biomechanists, sports medicine specialists etc.) with remote data access, analysis and (partly automated) feedback routines. In this way, experts are able to analyze the athlete’s performance and return individual feedback messages from remote locations. PMID:22163490

  10. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  11. Distributed Sensing and Processing Adaptive Collaboration Environment (D-SPACE)

    DTIC Science & Technology

    2014-07-01

    to the query graph, or subgraph permutations with the same mismatch cost (often the case for homogeneous and/or symmetrical data/query). To avoid...decisions are generated in a bottom-up manner using the metric of entropy at the cluster level (Figure 9c). Using the definition of belief messages...for a cluster and a set of data nodes in this cluster , we compute the entropy for forward and backward messages as (,) = −∑ (

  12. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications

    PubMed Central

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-01-01

    Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces. PMID:27649209

  13. Delay/Disruption Tolerant Network-Based Message Forwarding for a River Pollution Monitoring Wireless Sensor Network Application

    PubMed Central

    Velásquez-Villada, Carlos; Donoso, Yezid

    2016-01-01

    Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river’s course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas’ movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols. PMID:27023554

  14. Method and apparatus for eliminating unsuccessful tries in a search tree

    NASA Technical Reports Server (NTRS)

    Peterson, John C. (Inventor); Chow, Edward (Inventor); Madan, Herb S. (Inventor)

    1991-01-01

    A circuit switching system in an M-ary, n-cube connected network completes a best-first path from an originating node to a destination node by latching valid legs of the path as the path is being sought out. Each network node is provided with a routing hyperswitch sub-network, (HSN) connected between that node and bidirectional high capacity communication channels of the n-cube network. The sub-networks are all controlled by routing algorithms which respond to message identification headings (headers) on messages to be routed along one or more routing legs. The header includes information embedded therein which is interpreted by each sub-network to route and historically update the header. A logic circuit, available at every node, implements the algorithm and automatically forwards or back-tracks the header in the network legs of various paths until a completed path is latched.

  15. Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter

    PubMed Central

    Chu, Kar-Hai; Unger, Jennifer B.; Allem, Jon-Patrick; Pattarroyo, Monica; Soto, Daniel; Cruz, Tess Boley; Yang, Haodong; Jiang, Ling; Yang, Christopher C.

    2015-01-01

    Objective This study explores the presence and actions of an electronic cigarette (e-cigarette) brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding) functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender’s local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed. Methods We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread. Results The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes. Conclusions Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion. PMID:26684746

  16. Hippocratic messages for modern medicine (the vindication of Hippocrates).

    PubMed

    Katsambas, A; Marketos, S G

    2007-07-01

    Medicine feels the need to combine more than ever the traditional concepts of Hippocrates in perfect balance with the enormous power of modern biotechnology. In our times, the old message 'go back to Hippocrates' sounds like a utopian vision. On the other hand, technological progress tends to remove modern medicine from its anthropocentric mission. The realistic message for tomorrow's physicians must be 'to go forward' together with his perennial humanistic values and clinical messages, combining the recent advances of biotechnology with the Hippocratic rationalism, which is based on logical reasoning, on careful clinical examination, and on a whole humane approach to the patient and his environment. Today's physician can still learn from the Hippocratic heritage and will need to be an expert Hippocratic physician, ever more humane and competent to use all new methods and facilities of basic dermatological research.

  17. Decaf: Decoupled Dataflows for In Situ High-Performance Workflows

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dreher, M.; Peterka, T.

    Decaf is a dataflow system for the parallel communication of coupled tasks in an HPC workflow. The dataflow can perform arbitrary data transformations ranging from simply forwarding data to complex data redistribution. Decaf does this by allowing the user to allocate resources and execute custom code in the dataflow. All communication through the dataflow is efficient parallel message passing over MPI. The runtime for calling tasks is entirely message-driven; Decaf executes a task when all messages for the task have been received. Such a messagedriven runtime allows cyclic task dependencies in the workflow graph, for example, to enact computational steeringmore » based on the result of downstream tasks. Decaf includes a simple Python API for describing the workflow graph. This allows Decaf to stand alone as a complete workflow system, but Decaf can also be used as the dataflow layer by one or more other workflow systems to form a heterogeneous task-based computing environment. In one experiment, we couple a molecular dynamics code with a visualization tool using the FlowVR and Damaris workflow systems and Decaf for the dataflow. In another experiment, we test the coupling of a cosmology code with Voronoi tessellation and density estimation codes using MPI for the simulation, the DIY programming model for the two analysis codes, and Decaf for the dataflow. Such workflows consisting of heterogeneous software infrastructures exist because components are developed separately with different programming models and runtimes, and this is the first time that such heterogeneous coupling of diverse components was demonstrated in situ on HPC systems.« less

  18. ConformRank: A conformity-based rank for finding top-k influential users

    NASA Astrophysics Data System (ADS)

    Wang, Qiyao; Jin, Yuehui; Cheng, Shiduan; Yang, Tan

    2017-05-01

    Finding influential users is a hot topic in social networks. For example, advertisers identify influential users to make a successful campaign. Retweeters forward messages from original users, who originally publish messages. This action is referred to as retweeting. Retweeting behaviors generate influence. Original users have influence on retweeters. Whether retweeters keep the same sentiment as original users is taken into consideration in this study. Influence is calculated based on conformity from emotional perspective after retweeting. A conformity-based algorithm, called ConformRank, is proposed to find top-k influential users, who make the most users keep the same sentiment after retweeting messages. Emotional conformity is introduced to denote how users conform to original users from the emotional perspective. Conforming weights are introduced to denote how two users keep the same sentiment after retweeting messages. Emotional conformity is applied for users and conforming weights are used for relations. Experiments were conducted on Sina Weibo. Experimental results show that users have larger influence when they publish positive messages.

  19. Cassini/Huygens your messages en route for Titan

    NASA Astrophysics Data System (ADS)

    1997-02-01

    This unprecedented operation will soon be coming to an end. The Internet site will not be accepting messages after 1 March 1997, although it will remain active to incorporate regularly updated information on the Cassini/Huygens mission at least until the launch in October 1997. ESA has decided to open the site to audio messages as well until 1 March 1997. Files, which must be no larger than 250 KB, should sent to the electronic letterbox sound@huygens.com in WAV or AIFF format. We shall be concluding this exceptional operation by producing a CD-ROM containing written and audio messages within the limits of the space available. We therefore propose that all media announce the forthcoming end of the operation and stress the additional possibility of sending in audio as well as written messages that will leave for Titan in October 1997. Radio or television stations wishing to offer listeners or viewers the opportunity to transmit their messages over the air can forward them to us on audio or video (Betacam) cassettes. N.B. No more than three twenty-second messages per station. For further information, please contact : ESA Public Relations Division Tel: +33.1.53.69.71.55 Fax : +33.1.53.69.76.90

  20. Study on Dissemination Patterns in Location-Aware Gossiping Networks

    NASA Astrophysics Data System (ADS)

    Kami, Nobuharu; Baba, Teruyuki; Yoshikawa, Takashi; Morikawa, Hiroyuki

    We study the properties of information dissemination over location-aware gossiping networks leveraging location-based real-time communication applications. Gossiping is a promising method for quickly disseminating messages in a large-scale system, but in its application to information dissemination for location-aware applications, it is important to consider the network topology and patterns of spatial dissemination over the network in order to achieve effective delivery of messages to potentially interested users. To this end, we propose a continuous-space network model extended from Kleinberg's small-world model applicable to actual location-based applications. Analytical and simulation-based study shows that the proposed network achieves high dissemination efficiency resulting from geographically neutral dissemination patterns as well as selective dissemination to proximate users. We have designed a highly scalable location management method capable of promptly updating the network topology in response to node movement and have implemented a distributed simulator to perform dynamic target pursuit experiments as one example of applications that are the most sensitive to message forwarding delay. The experimental results show that the proposed network surpasses other types of networks in pursuit efficiency and achieves the desirable dissemination patterns.

  1. Method and apparatus for autonomous, in-receiver prediction of GNSS ephemerides

    NASA Technical Reports Server (NTRS)

    Bar-Sever, Yoaz E. (Inventor); Bertiger, William I. (Inventor)

    2012-01-01

    Methods and apparatus for autonomous in-receiver prediction of orbit and clock states of Global Navigation Satellite Systems (GNSS) are described. Only the GNSS broadcast message is used, without need for periodic externally-communicated information. Earth orientation information is extracted from the GNSS broadcast ephemeris. With the accurate estimation of the Earth orientation parameters it is possible to propagate the best-fit GNSS orbits forward in time in an inertial reference frame. Using the estimated Earth orientation parameters, the predicted orbits are then transformed into Earth-Centered-Earth-Fixed (ECEF) coordinates to be used to assist the GNSS receiver in the acquisition of the signals. GNSS satellite clock states are also extracted from the broadcast ephemeris and a parameterized model of clock behavior is fit to that data. The estimated modeled clocks are then propagated forward in time to enable, together with the predicted orbits, quicker GNSS signal acquisition.

  2. Space Flight Middleware: Remote AMS over DTN for Delay-Tolerant Messaging

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott

    2011-01-01

    This paper describes a technique for implementing scalable, reliable, multi-source multipoint data distribution in space flight communications -- Delay-Tolerant Reliable Multicast (DTRM) -- that is fully supported by the "Remote AMS" (RAMS) protocol of the Asynchronous Message Service (AMS) proposed for standardization within the Consultative Committee for Space Data Systems (CCSDS). The DTRM architecture enables applications to easily "publish" messages that will be reliably and efficiently delivered to an arbitrary number of "subscribing" applications residing anywhere in the space network, whether in the same subnet or in a subnet on a remote planet or vehicle separated by many light minutes of interplanetary space. The architecture comprises multiple levels of protocol, each included for a specific purpose and allocated specific responsibilities: "application AMS" traffic performs end-system data introduction and delivery subject to access control; underlying "remote AMS" directs this application traffic to populations of recipients at remote locations in a multicast distribution tree, enabling the architecture to scale up to large networks; further underlying Delay-Tolerant Networking (DTN) Bundle Protocol (BP) advances RAMS protocol data units through the distribution tree using delay-tolerant storeand- forward methods; and further underlying reliable "convergence-layer" protocols ensure successful data transfer over each segment of the end-to-end route. The result is scalable, reliable, delay-tolerant multi-source multicast that is largely self-configuring.

  3. Relay Forward-Link File Management Services (MaROS Phase 2)

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Hy, Franklin H.; Gladden, Roy E.

    2013-01-01

    This software provides the service-level functionality to manage the delivery of files from a lander mission repository to an orbiter mission repository for eventual spacelink relay by the orbiter asset on a specific communications pass. It provides further functions to deliver and track a set of mission-defined messages detailing lander authorization instructions and orbiter data delivery state. All of the information concerning these transactions is persisted in a database providing a high level of accountability of the forward-link relay process.

  4. Transition Flight Control Room Automation

    NASA Technical Reports Server (NTRS)

    Welborn, Curtis Ray

    1990-01-01

    The Workstation Prototype Laboratory is currently working on a number of projects which we feel can have a direct impact on ground operations automation. These projects include: The Fuel Cell Monitoring System (FCMS), which will monitor and detect problems with the fuel cells on the Shuttle. FCMS will use a combination of rules (forward/backward) and multi-threaded procedures which run concurrently with the rules, to implement the malfunction algorithms of the EGIL flight controllers. The combination of rule based reasoning and procedural reasoning allows us to more easily map the malfunction algorithms into a real-time system implementation. A graphical computation language (AGCOMPL). AGCOMPL is an experimental prototype to determine the benefits and drawbacks of using a graphical language to design computations (algorithms) to work on Shuttle or Space Station telemetry and trajectory data. The design of a system which will allow a model of an electrical system, including telemetry sensors, to be configured on the screen graphically using previously defined electrical icons. This electrical model would then be used to generate rules and procedures for detecting malfunctions in the electrical components of the model. A generic message management (GMM) system. GMM is being designed as a message management system for real-time applications which send advisory messages to a user. The primary purpose of GMM is to reduce the risk of overloading a user with information when multiple failures occurs and in assisting the developer in devising an explanation facility. The emphasis of our work is to develop practical tools and techniques, while determining the feasibility of a given approach, including identification of appropriate software tools to support research, application and tool building activities.

  5. Transition flight control room automation

    NASA Technical Reports Server (NTRS)

    Welborn, Curtis Ray

    1990-01-01

    The Workstation Prototype Laboratory is currently working on a number of projects which can have a direct impact on ground operations automation. These projects include: (1) The fuel cell monitoring system (FCMS), which will monitor and detect problems with the fuel cells on the shuttle. FCMS will use a combination of rules (forward/backward) and multithreaded procedures, which run concurrently with the rules, to implement the malfunction algorithms of the EGIL flight controllers. The combination of rule-based reasoning and procedural reasoning allows us to more easily map the malfunction algorithms into a real-time system implementation. (2) A graphical computation language (AGCOMPL) is an experimental prototype to determine the benefits and drawbacks of using a graphical language to design computations (algorithms) to work on shuttle or space station telemetry and trajectory data. (3) The design of a system will allow a model of an electrical system, including telemetry sensors, to be configured on the screen graphically using previously defined electrical icons. This electrical model would then be used to generate rules and procedures for detecting malfunctions in the electrical components of the model. (4) A generic message management (GMM) system is being designed for real-time applications as a message management system which sends advisory messages to a user. The primary purpose of GMM is to reduce the risk of overloading a user with information when multiple failures occur and to assist the developer in the devising an explanation facility. The emphasis of our work is to develop practical tools and techniques, including identification of appropriate software tools to support research, application, and tool building activities, while determining the feasibility of a given approach.

  6. Soft real-time alarm messages for ATLAS TDAQ

    NASA Astrophysics Data System (ADS)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-05-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG—Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring "interesting" parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  7. Model of epidemic control based on quarantine and message delivery

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Zhao, Tianfang; Qin, Xiaomeng

    2016-09-01

    The model provides two novel strategies for the preventive control of epidemic diseases. One approach is related to the different isolating rates in latent period and invasion period. Experiments show that the increasing of isolating rates in invasion period, as long as over 0.5, contributes little to the preventing of epidemic; the improvement of isolation rate in latent period is key to control the disease spreading. Another is a specific mechanism of message delivering and forwarding. Information quality and information accumulating process are also considered there. Macroscopically, diseases are easy to control as long as the immune messages reach a certain quality. Individually, the accumulating messages bring people with certain immunity to the disease. Also, the model is performed on the classic complex networks like scale-free network and small-world network, and location-based social networks. Results show that the proposed measures demonstrate superior performance and significantly reduce the negative impact of epidemic disease.

  8. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  9. Understanding Barriers for Communicating Injury Prevention Messages and Strategies Moving Forward: Perspectives from Community Stakeholders.

    PubMed

    Mack, Diane E; Aymar, Matt; Cosby, Jarold; Wilson, Philip M; Bradley, Christina; Walters Gray, Casey

    2016-01-01

    The primary objective of this study was to elicit the perspectives of direct care providers on barriers and facilitators to communicating injury prevention messages to parents/caregivers of children under 4 years of age. The secondary objective was to examine characteristics of an injury prevention messaging strategy preferred by direct care providers. This qualitative study was conducted across four regions in Ontario Canada. Fifty-nine direct care providers were purposefully sampled and data interpreted using focus group analysis. Transcripts were analyzed verbatim using content and discourse analysis. Several barriers to communicating injury prevention messages were identified encompassing (a) role, (b) parental, (c) social determinants, and (d) evidence impediments. In an effort to offset some of these barriers, participants endorsed the development of a tailored multicomponent injury prevention strategy adopting action-based messages. The results of this study provide an in-depth exploration of direct care providers perceptions that can inform the design of materials and dissemination strategies to help increase and optimize access to injury prevention information. Injury prevention messages should be action-oriented, specifically tailored to the stage of child development, and disseminated through both face-to-face interactions and mobile technology. © 2015 Wiley Periodicals, Inc.

  10. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  11. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  12. Human dynamic model co-driven by interest and social identity in the MicroBlog community

    NASA Astrophysics Data System (ADS)

    Yan, Qiang; Yi, Lanli; Wu, Lianren

    2012-02-01

    This paper analyzes the behavior of releasing messages in the MicroBlog community and presents a human dynamic model co-driven by interest and social identity. According to the empirical analysis and simulation results, the messaging interval distribution follows a power law, which is mainly influenced by the degree of users' interests. Meanwhile, social identity plays a significant role regarding the change of interests and may slow down the decline of the latter. A positive correlation between social identity and numbers of comments or forwarding of messages is illustrated. Besides, the analysis of data for each 24 h reveals obvious differences between micro-blogging and website visits, email, instant communication, and the use of mobile phones, reflecting how people use small amounts of time via mobile Internet technology.

  13. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    NASA Astrophysics Data System (ADS)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  14. The Joy of No Sex

    ERIC Educational Resources Information Center

    Wasley, Paula

    2007-01-01

    This article reports on Justin F. Murray and Sarah M. Kinsella, the founders of a Harvard University student group called True Love Revolution that promotes the practical benefits of sexual abstinence until marriage and how Murray and Kinsella look forward to living the message after graduation. These "true love" revolutionaries cast…

  15. Effects of Messages Delivered by Mobile Phone on Increasing Compliance With Shoulder Exercises Among Patients With a Frozen Shoulder.

    PubMed

    Chen, Hui-Chun; Chuang, Tai-Yuan; Lin, Pi-Chu; Lin, Yen-Kuang; Chuang, Yeu-Hui

    2017-07-01

    The aim of this study was to examine the effects of reminders, encouragement, and educational messages delivered by mobile phone on shoulder exercise compliance and improvements in shoulder function among patients with a frozen shoulder. A randomized controlled trial design was used. A convenience sample of patients with a frozen shoulder in an orthopedic outpatient clinic was recruited. All participants were instructed on how to do shoulder exercises and were provided with a printed pamphlet about shoulder exercises. Then, the intervention group received reminders, encouragement, and educational messages by mobile phone daily for the next 2 weeks, while the comparison group did not. The intervention group had higher compliance with shoulder exercises than did the comparison group (t = 2.263, p = .03) and had significant improvements in shoulder forward flexion (F = 12.067, p = .001), external rotation (F = 13.61, p = .001), and internal rotation (F = 5.903, p = .018) compared to those in the comparison group after the 2-week intervention. The text messages significantly increased patient compliance with shoulder exercises and thus improved patients' shoulder range of motion. Hospital or clinics can send appropriate messages to patients via text message platforms in order to remind and encourage them to do shoulder exercises. © 2017 Sigma Theta Tau International.

  16. Head flexion angle while using a smartphone.

    PubMed

    Lee, Sojeong; Kang, Hwayeong; Shin, Gwanseob

    2015-01-01

    Repetitive or prolonged head flexion posture while using a smartphone is known as one of risk factors for pain symptoms in the neck. To quantitatively assess the amount and range of head flexion of smartphone users, head forward flexion angle was measured from 18 participants when they were conducing three common smartphone tasks (text messaging, web browsing, video watching) while sitting and standing in a laboratory setting. It was found that participants maintained head flexion of 33-45° (50th percentile angle) from vertical when using the smartphone. The head flexion angle was significantly larger (p < 0.05) for text messaging than for the other tasks, and significantly larger while sitting than while standing. Study results suggest that text messaging, which is one of the most frequently used app categories of smartphone, could be a main contributing factor to the occurrence of neck pain of heavy smartphone users. Practitioner Summary: In this laboratory study, the severity of head flexion of smartphone users was quantitatively evaluated when conducting text messaging, web browsing and video watching while sitting and standing. Study results indicate that text messaging while sitting caused the largest head flexion than that of other task conditions.

  17. Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita

    2014-09-22

    Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed bymore » the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.« less

  18. CISN Display - Reliable Delivery of Real-time Earthquake Information, Including Rapid Notification and ShakeMap to Critical End Users

    NASA Astrophysics Data System (ADS)

    Rico, H.; Hauksson, E.; Thomas, E.; Friberg, P.; Given, D.

    2002-12-01

    The California Integrated Seismic Network (CISN) Display is part of a Web-enabled earthquake notification system alerting users in near real-time of seismicity, and also valuable geophysical information following a large earthquake. It will replace the Caltech/USGS Broadcast of Earthquakes (CUBE) and Rapid Earthquake Data Integration (REDI) Display as the principal means of delivering graphical earthquake information to users at emergency operations centers, and other organizations. Features distinguishing the CISN Display from other GUI tools are a state-full client/server relationship, a scalable message format supporting automated hyperlink creation, and a configurable platform-independent client with a GIS mapping tool; supporting the decision-making activities of critical users. The CISN Display is the front-end of a client/server architecture known as the QuakeWatch system. It is comprised of the CISN Display (and other potential clients), message queues, server, server "feeder" modules, and messaging middleware, schema and generators. It is written in Java, making it platform-independent, and offering the latest in Internet technologies. QuakeWatch's object-oriented design allows components to be easily upgraded through a well-defined set of application programming interfaces (APIs). Central to the CISN Display's role as a gateway to other earthquake products is its comprehensive XML-schema. The message model starts with the CUBE message format, but extends it by provisioning additional attributes for currently available products, and those yet to be considered. The supporting metadata in the XML-message provides the data necessary for the client to create a hyperlink and associate it with a unique event ID. Earthquake products deliverable to the CISN Display are ShakeMap, Ground Displacement, Focal Mechanisms, Rapid Notifications, OES Reports, and Earthquake Commentaries. Leveraging the power of the XML-format, the CISN Display provides prompt access to earthquake information on the Web. The links are automatically created when product generators deliver CUBE formatted packets to a Quake Data Distribution System (QDDS) hub (new distribution methods may be used later). The "feeder" modules tap into the QDDS hub and convert the packets into XML-messages. These messages are forwarded to message queues, and then distributed to clients where URLs are dynamically created for these products and linked to events on the CISN Display map. The products may be downloaded out-of-band; and with the inclusion of a GIS mapping tool users can plot organizational assets on the CISN Display map and overlay them against key spectral data, such as ground accelerations. This gives Emergency Response Managers information useful in allocating limited personnel and resources after a major event. At the heart of the system's robustness is a well-established and reliable set of communication protocols for best-effort delivery of data. For critical users a Common Object Request Broker Architecture (CORBA) state-full connection is used via a dedicated signaling channel. The system employs several CORBA methods that alert users of changes in the link status. Loss of connectivity triggers a strategy that attempts to reconnect through various physical and logical paths. Thus, by building on past application successes and proven Internet advances the CISN Display targets a specific audience by providing enhancements previously not available from other applications.

  19. "Bringing the Message Forward": Using Poetic Re-Presentation to Solve Research Dilemmas

    ERIC Educational Resources Information Center

    Ward, Angela

    2011-01-01

    Researchers cannot always rely on traditional methods for solving research dilemmas. In a research project that explored the friendships and social relationships of four students with severe disabilities in four secondary schools in New Zealand, the author uses poetic re-presentation to solve several ethical and pragmatic research dilemmas. Within…

  20. Diversity and Diversity Management: Messages from Recent Research

    ERIC Educational Resources Information Center

    Morrison, Marlene; Lumby, Jacky; Sood, Krishan

    2006-01-01

    This article explores a paradox, namely the rhetoric of engagement with diversity and social justice among education leaders, yet the paucity in forward-looking critical theory and practice to develop that engagement. It draws upon relatively new as well as established concepts, including the Capabilities Approach, to suggest how and why diversity…

  1. The broadcast classical-quantum capacity region of a two-phase bidirectional relaying channel

    NASA Astrophysics Data System (ADS)

    Boche, Holger; Cai, Minglai; Deppe, Christian

    2015-10-01

    We studied a three-node quantum network that enables bidirectional communication between two nodes with a half-duplex relay node for transmitting classical messages. A decode-and-forward protocol is used to perform the communication in two phases. In the first phase, the messages of two nodes are transmitted to the relay node. The capacity of the first phase is well known by previous works. In the second phase, the relay node broadcasts a re-encoded composition to the two nodes. We determine the capacity region of the broadcast phase. To the best of our knowledge, this is the first paper analyzing quantum bidirectional relay networks.

  2. Downlink Cooperative Broadcast Transmission Based on Superposition Coding in a Relaying System for Future Wireless Sensor Networks.

    PubMed

    Liu, Yang; Han, Guangjie; Shi, Sulong; Li, Zhengquan

    2018-06-20

    This study investigates the superiority of cooperative broadcast transmission over traditional orthogonal schemes when applied in a downlink relaying broadcast channel (RBC). Two proposed cooperative broadcast transmission protocols, one with an amplify-and-forward (AF) relay, and the other with a repetition-based decode-and-forward (DF) relay, are investigated. By utilizing superposition coding (SupC), the source and the relay transmit the private user messages simultaneously instead of sequentially as in traditional orthogonal schemes, which means the channel resources are reused and an increased channel degree of freedom is available to each user, hence the half-duplex penalty of relaying is alleviated. To facilitate a performance evaluation, theoretical outage probability expressions of the two broadcast transmission schemes are developed, based on which, we investigate the minimum total power consumption of each scheme for a given traffic requirement by numerical simulation. The results provide details on the overall system performance and fruitful insights on the essential characteristics of cooperative broadcast transmission in RBCs. It is observed that better overall outage performances and considerable power gains can be obtained by utilizing cooperative broadcast transmissions compared to traditional orthogonal schemes.

  3. Modelling of information diffusion on social networks with applications to WeChat

    NASA Astrophysics Data System (ADS)

    Liu, Liang; Qu, Bo; Chen, Bin; Hanjalic, Alan; Wang, Huijuan

    2018-04-01

    Traces of user activities recorded in online social networks open new possibilities to systematically understand the information diffusion process on social networks. From the online social network WeChat, we collected a large number of information cascade trees, each of which tells the spreading trajectory of a message/information such as which user creates the information and which users view or forward the information shared by which neighbours. In this work, we propose two heterogeneous non-linear models, one for the topologies of the information cascade trees and the other for the stochastic process of information diffusion on a social network. Both models are validated by the WeChat data in reproducing and explaining key features of cascade trees. Specifically, we apply the Random Recursive Tree (RRT) to model the growth of cascade trees. The RRT model could capture key features, i.e. the average path length and degree variance of a cascade tree in relation to the number of nodes (size) of the tree. Its single identified parameter quantifies the relative depth or broadness of the cascade trees and indicates that information propagates via a star-like broadcasting or viral-like hop by hop spreading. The RRT model explains the appearance of hubs, thus a possibly smaller average path length as the cascade size increases, as observed in WeChat. We further propose the stochastic Susceptible View Forward Removed (SVFR) model to depict the dynamic user behaviour including creating, viewing, forwarding and ignoring a message on a given social network. Beside the average path length and degree variance of the cascade trees in relation to their sizes, the SVFR model could further explain the power-law cascade size distribution in WeChat and unravel that a user with a large number of friends may actually have a smaller probability to read a message (s)he receives due to limited attention.

  4. Infection prevention and control of the Ebola outbreak in Liberia, 2014-2015: key challenges and successes.

    PubMed

    Cooper, Catherine; Fisher, Dale; Gupta, Neil; MaCauley, Rose; Pessoa-Silva, Carmem L

    2016-01-05

    Prior to the 2014-2015 Ebola outbreak, infection prevention and control (IPC) activities in Liberian healthcare facilities were basic. There was no national IPC guidance, nor dedicated staff at any level of government or healthcare facility (HCF) to ensure the implementation of best practices. Efforts to improve IPC early in the outbreak were ad hoc and messaging was inconsistent. In September 2014, at the height of the outbreak, the national IPC Task Force was established with a Ministry of Health (MoH) mandate to coordinate IPC response activities. A steering group of the Task Force, including representatives of the World Health Organization (WHO) and the United States Centers for Disease Control and Prevention (CDC), supported MoH leadership in implementing standardized messaging and IPC training for the health workforce. This structure, and the activities implemented under this structure, played a crucial role in the implementation of IPC practices and successful containment of the outbreak. Moving forward, a nationwide culture of IPC needs to be maintained through this governance structure in Liberia's health system to prevent and respond to future outbreaks.

  5. Hazard of deceptive advertising of athletic footwear.

    PubMed

    Robbins, S; Waked, E

    1997-12-01

    Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.

  6. Hazard of deceptive advertising of athletic footwear.

    PubMed Central

    Robbins, S; Waked, E

    1997-01-01

    OBJECTIVES: Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. METHODS: Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. RESULTS: Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). CONCLUSIONS: These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices. PMID:9429006

  7. Effect of text message follow-up on patient's self-reported level of pain and anxiety.

    PubMed

    Keith, Daniel J; Rinchuse, Daniel J; Kennedy, Meghan; Zullo, Thomas

    2013-07-01

    To determine whether a text message reduces the severity of patient self-reported levels of pain and anxiety following initial placement of orthodontic appliances. Thirty-nine orthodontic patients were randomly assigned to one of two groups and matched for age, gender, and bracket type (self-ligating vs conventional). The subjects completed baseline questionnaires to ascertain their levels of pain and anxiety before initiating orthodontic treatment. Following the initial appointment, subjects completed the pain questionnaire and anxiety inventory at the same time daily for 1 week. One group received a structured text message showing concern and reassurance, while the second group served as a control and received no postprocedural communication. There was a statistically significant difference in pain in relation to time between the text message group and the control group as it was demonstrated that demonstrated that compared with the text message group, mean pain intensity increased and selfreported discomfort was longer in the control group. Anxiety was determined to be at its peak the day following initial orthodontic appliance placement and gradually tapered off from that time point. No intergroup difference was noted when analyzing anxiety. This study demonstrated that a text message sent from an orthodontic office following initial appliance placement resulted in a lower level of patient's self-reported pain. Additionally, patient anxiety is at its peak the day following the initial appointment and decreases from that point forward.

  8. Using Publish-Subscribe Messaging for System Status and Automation

    NASA Technical Reports Server (NTRS)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  9. An improved PRoPHET routing protocol in delay tolerant network.

    PubMed

    Han, Seung Deok; Chung, Yun Won

    2015-01-01

    In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity) protocol by employing epidemic protocol for disseminating message m, if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.

  10. A monitoring system for vegetable greenhouses based on a wireless sensor network.

    PubMed

    Li, Xiu-hong; Cheng, Xiao; Yan, Ke; Gong, Peng

    2010-01-01

    A wireless sensor network-based automatic monitoring system is designed for monitoring the life conditions of greenhouse vegetables. The complete system architecture includes a group of sensor nodes, a base station, and an internet data center. For the design of wireless sensor node, the JN5139 micro-processor is adopted as the core component and the Zigbee protocol is used for wireless communication between nodes. With an ARM7 microprocessor and embedded ZKOS operating system, a proprietary gateway node is developed to achieve data influx, screen display, system configuration and GPRS based remote data forwarding. Through a Client/Server mode the management software for remote data center achieves real-time data distribution and time-series analysis. Besides, a GSM-short-message-based interface is developed for sending real-time environmental measurements, and for alarming when a measurement is beyond some pre-defined threshold. The whole system has been tested for over one year and satisfactory results have been observed, which indicate that this system is very useful for greenhouse environment monitoring.

  11. Defense.gov Special Report: Warrior Care Month - 2013

    Science.gov Websites

    instructors. Story Leaders: Best Yet to Come for Wounded Warriors In this look back at the 2013 Warrior Games , a top Navy leader said the biggest message everyone should take away from the games is that " battles with the talks about why he participates in the Warrior Games. Story Reservist Moves Forward With

  12. Driver's Education for the Information Super Highway: Computer Mediated Communication on a Local Area Network.

    ERIC Educational Resources Information Center

    Kilgore, Beverly M.

    This document describes a project whereby a researcher spent time in a fifth-grade classroom teaching students to use electronic mail. For two 40-minute periods each week over a period of 18 weeks, 28 students received instruction on mechanics such as sending and reading mail, attaching and retrieving files, and forwarding messages with their own…

  13. Using information communication technology to identify deficits in rural health care: a mixed-methods evaluation from Guatemala.

    PubMed

    Wahedi, Katharina; Flores, Walter; Beiersmann, Claudia; Bozorgmehr, Kayvan; Jahn, Albrecht

    2018-01-01

    In August 2014, the Centre for the Studies of Equity and Governance in Health Systems (CEGSS) in Guatemala launched an online platform, which facilitates complaints about health services via text messages. The aim is to collect, systemise and forward such complaints to relevant institutions, and to create a data pool on perceived deficits of health care in rural Guatemala. To evaluate if the online platform is an accepted, user-friendly and efficient medium to engage citizens in the reporting of health care deficiencies in Guatemala. The general study design of this research was a mixed-method approach including a quantitative analysis of complaints received and a qualitative exploration of the attitude of community leaders towards the platform. User statistics showed that a total of N = 228 messages were sent to the platform in the period August 2014-March 2015. The majority of complaints (n = 162, 71%) fell under the 'lack of drugs, equipment or supplies' category. The community leaders welcomed the platform, describing it as modern and progressive. Despite feedback mechanisms and methods to respond to complaints not yet being fully developed, many users showed a high intrinsic motivation to use the new tool. Others, however, were restrained by fear of personal consequences and distrust of the state's judicial system. Access to mobile phones, reception, and phone credit or battery life did not pose major obstacles, but the producing and sending of correctly formatted messages was observed to be difficult. The online platform paired with SMS technology appears to be a viable approach to collect citizens' complaints in health care and connect citizens with relevant institutions. Further studies should be conducted to quantify follow-up activities and the impact on local health care provision.

  14. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  15. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  16. Discrete-event simulation of a wide-area health care network.

    PubMed Central

    McDaniel, J G

    1995-01-01

    OBJECTIVE: Predict the behavior and estimate the telecommunication cost of a wide-area message store-and-forward network for health care providers that uses the telephone system. DESIGN: A tool with which to perform large-scale discrete-event simulations was developed. Network models for star and mesh topologies were constructed to analyze the differences in performances and telecommunication costs. The distribution of nodes in the network models approximates the distribution of physicians, hospitals, medical labs, and insurers in the Province of Saskatchewan, Canada. Modeling parameters were based on measurements taken from a prototype telephone network and a survey conducted at two medical clinics. Simulation studies were conducted for both topologies. RESULTS: For either topology, the telecommunication cost of a network in Saskatchewan is projected to be less than $100 (Canadian) per month per node. The estimated telecommunication cost of the star topology is approximately half that of the mesh. Simulations predict that a mean end-to-end message delivery time of two hours or less is achievable at this cost. A doubling of the data volume results in an increase of less than 50% in the mean end-to-end message transfer time. CONCLUSION: The simulation models provided an estimate of network performance and telecommunication cost in a specific Canadian province. At the expected operating point, network performance appeared to be relatively insensitive to increases in data volume. Similar results might be anticipated in other rural states and provinces in North America where a telephone-based network is desired. PMID:7583646

  17. Information diffusion in structured online social networks

    NASA Astrophysics Data System (ADS)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  18. Fostering the future of health promotion as seen through the 'Message from Youth Delegates on Health Promotion and Sustainable Development'.

    PubMed

    Rodgers, Sara

    2017-03-01

    The World Health Organization 9th Global Conference on Health Promotion presented us with the Shanghai Declaration for promoting health in the 2030 Agenda for Sustainable Development. At the same time, the participants of the conference symposium, 'How can youth become future leaders in delivering on the 2030 Agenda for Sustainable Development?' produced the 'Message from Youth Delegates on Health Promotion and Sustainable Development' as its complement. This 'Message from Youth Delegates' outlined pledges of young leaders in health promotion and proposed the necessary steps to ensure the future of health promotion includes more meaningful participation by young people. In order to fulfil the newest promises of the Shanghai Declaration and the past promises of the Ottawa Charter for Health Promotion, we must think to close the divides between generations of health promoters and move forward on actions designed to develop the best possible future leaders for the field of global health. (Global Health Promotion, 2017; 24(1): 62-65).

  19. Superdense coding interleaved with forward error correction

    DOE PAGES

    Humble, Travis S.; Sadlier, Ronald J.

    2016-05-12

    Superdense coding promises increased classical capacity and communication security but this advantage may be undermined by noise in the quantum channel. We present a numerical study of how forward error correction (FEC) applied to the encoded classical message can be used to mitigate against quantum channel noise. By studying the bit error rate under different FEC codes, we identify the unique role that burst errors play in superdense coding, and we show how these can be mitigated against by interleaving the FEC codewords prior to transmission. As a result, we conclude that classical FEC with interleaving is a useful methodmore » to improve the performance in near-term demonstrations of superdense coding.« less

  20. Like a Swallow, Moving Forward in Circles: On the Future Dimension of Environmental Care and Education

    ERIC Educational Resources Information Center

    Postma, Dirk Willem; Smeyers, Paul

    2012-01-01

    After the moral framework of sustainable development, the focus on climate change appears to take a lead in the practice and theory of environmental education. Inherent in this perspective is an apocalyptic message: if we do not rapidly change our use of energy resources, we will severely harm the life conditions of our children and grandchildren.…

  1. Data forwarding mechanism for supporting real-time services during relocations in UMTS systems

    NASA Astrophysics Data System (ADS)

    Cai, Wei; Liao, Xianglong; Zheng, Liang; Liu, Zehong

    2004-04-01

    To minimize the interruption during the handovers or relocations invoked by subscribers moving is a very critical factor to enhance the performance of the UMTS systems. We know that the 2G systems have been optimized to minimize the interruption of speech during handovers by two main technologies: one is the bi-casting for the DL traffic and the other is the fast radio resynchronization by the UE for the UL traffic. In the UMTS systems, we have also implemented lossless relocations for non real-time services with high reliability by data buffering in the source RNC and target RNC for the UE. However, the UMTS systems support four QoS classes traffic flow: conversational class, streaming class, interactive class and background class. The main distinguishing factor between these QoS classes is how delay sensitive the traffic is: Conversational and Streaming classes are mainly used to carry real-time traffic flows, like video telephony, interactive and background classes are mainly used by traditional Internet applications like WWW, E-mail and FTP. It"s essential to provide the solutions for supporting real-time services to meet the requirement for QoS in UMTS systems. Apparently, the Data buffering mechanism is not adapted to real-time services because of it"s delay may exceed the basic requirement for real-time services. Under this background, the paper discussed two data forwarding solutions for real-time services from the PS domain in the UMTS systems: packet duplication and Core Network bi-casting. The former mechanism does not require any new procedures, messages nor information elements. The later mechanism requires that the GGSN or SGSN is able to bi-cast the DL traffic to the target RNC according to the relocations involving two SGSNs or just involving one SGSN. It also implicitly shows that we need change procedures at the nodes SGSN, GGSN and RNC which are involved in the relocation procedure based on existing procedures that we have already designed if adopt the later solution. In a detail way, the paper analyzed the characteristic for these two solutions respectively, concentrated on the packet flows and the message flows in those nodes involved in relocations. Additionally, also gave out the impact on present transport technologies in the wireless communication systems. However we shall minimize the impact of evolution of transport mechanism and utilize the resource efficiently according to the general requirements for QoS in UMTS systems.

  2. An approach enabling adaptive FEC for OFDM in fiber-VLLC system

    NASA Astrophysics Data System (ADS)

    Wei, Yiran; He, Jing; Deng, Rui; Shi, Jin; Chen, Shenghai; Chen, Lin

    2017-12-01

    In this paper, we propose an orthogonal circulant matrix transform (OCT)-based adaptive frame-level-forward error correction (FEC) scheme for fiber-visible laser light communication (VLLC) system and experimentally demonstrate by Reed-Solomon (RS) Code. In this method, no extra bits are spent for adaptive message, except training sequence (TS), which is simultaneously used for synchronization and channel estimation. Therefore, RS-coding can be adaptively performed frames by frames via the last received codeword-error-rate (CER) feedback estimated by the TSs of the previous few OFDM frames. In addition, the experimental results exhibit that over 20 km standard single-mode fiber (SSMF) and 8 m visible light transmission, the costs of RS codewords are at most 14.12% lower than those of conventional adaptive subcarrier-RS-code based 16-QAM OFDM at bit error rate (BER) of 10-5.

  3. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    PubMed

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  4. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network

    PubMed Central

    Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users. PMID:27367610

  5. Distributed parallel messaging for multiprocessor systems

    DOEpatents

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  6. Driver performance while text messaging using handheld and in-vehicle systems.

    PubMed

    Owens, Justin M; McLaughlin, Shane B; Sudweeks, Jeremy

    2011-05-01

    This study presents an evaluation of driver performance while text messaging via handheld mobile phones and an in-vehicle texting system. Participants sent and received text messages while driving with an experimenter on a closed-road course, using their personal mobile phones and the vehicle's system. The test vehicle was an instrumented 2010 Mercury Mariner equipped with an OEM in-vehicle system that supports text messaging and voice control of mobile devices via Bluetooth, which was modified to allow text message sending during driving. Twenty participants were tested, 11 younger (19-34) and 9 older (39-51). All participants were regular users of the in-vehicle system, although none had experience with the texting functions. Results indicated that handheld text message sending and receiving resulted in higher mental demand, more frequent and longer glances away from the roadway, and degraded steering measures compared to baseline. Using the in-vehicle system to send messages showed less performance degradation, but still had more task-related interior glance time and higher mental demand than baseline; using the system's text-to-speech functionality for incoming messages showed no differences from baseline. These findings suggest that using handheld phones to send and receive text messages may interfere with drivers' visual and steering behaviors; the in-vehicle system showed improvement, but performance was not at baseline levels during message sending. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. A Monitoring System for Vegetable Greenhouses based on a Wireless Sensor Network

    PubMed Central

    Li, Xiu-hong; Cheng, Xiao; Yan, Ke; Gong, Peng

    2010-01-01

    A wireless sensor network-based automatic monitoring system is designed for monitoring the life conditions of greenhouse vegetatables. The complete system architecture includes a group of sensor nodes, a base station, and an internet data center. For the design of wireless sensor node, the JN5139 micro-processor is adopted as the core component and the Zigbee protocol is used for wireless communication between nodes. With an ARM7 microprocessor and embedded ZKOS operating system, a proprietary gateway node is developed to achieve data influx, screen display, system configuration and GPRS based remote data forwarding. Through a Client/Server mode the management software for remote data center achieves real-time data distribution and time-series analysis. Besides, a GSM-short-message-based interface is developed for sending real-time environmental measurements, and for alarming when a measurement is beyond some pre-defined threshold. The whole system has been tested for over one year and satisfactory results have been observed, which indicate that this system is very useful for greenhouse environment monitoring. PMID:22163391

  8. Engineered cell-cell communication via DNA messaging

    PubMed Central

    2012-01-01

    Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia. PMID:22958599

  9. Launch Control System Master Console Event Message Reduction

    NASA Technical Reports Server (NTRS)

    Nguyen, Uyen

    2014-01-01

    System monitoring and control (SMC) message browsers receive so many messages daily that operators do not need to see. Important messages are often mixed up among the less important ones. My job is to reduce the messages displayed in the message browser so that warning and emergency messages can be seen easily and therefore, responded promptly. There are multiple methods to achieve this. Firstly, duplicate messages should not appear many times in the message browser. Instead, the message should appear only once but with a number that counts the times that it appears. This method is called duplicate message suppression. Secondly, messages that update the most recent state (e.g. up/down) of a component should replace the old-state messages. This method is called state based message correlation. Thirdly, messages that display "normal" alarm level should be suppressed unless it's a response to an operator action. In addition to message reduction, I also work on correcting the severity level and text formats on messages.

  10. System and Method for Providing a Real Time Audible Message to a Pilot

    NASA Technical Reports Server (NTRS)

    Johnson, Walter W. (Inventor); Lachter, Joel B. (Inventor); Koteskey, Robert W. (Inventor); Battiste, Vernol (Inventor)

    2016-01-01

    A system and method for providing information to a crew of the aircraft while in-flight. The system includes a module having: a receiver for receiving a message while in-flight; a filter having a set of screening parameters and operative to filter the message based on the set of screening parameters; and a converter for converting the message into an audible message. The message includes a pilot report having at least one of weather information, separation information, congestion information, flight deviation information and destination information. The message is sent to the aircraft by another aircraft or an air traffic controller.

  11. An experimental study of search in global social networks.

    PubMed

    Dodds, Peter Sheridan; Muhamad, Roby; Watts, Duncan J

    2003-08-08

    We report on a global social-search experiment in which more than 60,000 e-mail users attempted to reach one of 18 target persons in 13 countries by forwarding messages to acquaintances. We find that successful social search is conducted primarily through intermediate to weak strength ties, does not require highly connected "hubs" to succeed, and, in contrast to unsuccessful social search, disproportionately relies on professional relationships. By accounting for the attrition of message chains, we estimate that social searches can reach their targets in a median of five to seven steps, depending on the separation of source and target, although small variations in chain lengths and participation rates generate large differences in target reachability. We conclude that although global social networks are, in principle, searchable, actual success depends sensitively on individual incentives.

  12. Quantifying uncertainties influencing the long-term impacts of oil prices on energy markets and carbon emissions

    NASA Astrophysics Data System (ADS)

    McCollum, David L.; Jewell, Jessica; Krey, Volker; Bazilian, Morgan; Fay, Marianne; Riahi, Keywan

    2016-07-01

    Oil prices have fluctuated remarkably in recent years. Previous studies have analysed the impacts of future oil prices on the energy system and greenhouse gas emissions, but none have quantitatively assessed how the broader, energy-system-wide impacts of diverging oil price futures depend on a suite of critical uncertainties. Here we use the MESSAGE integrated assessment model to study several factors potentially influencing this interaction, thereby shedding light on which future unknowns hold the most importance. We find that sustained low or high oil prices could have a major impact on the global energy system over the next several decades; and depending on how the fuel substitution dynamics play out, the carbon dioxide consequences could be significant (for example, between 5 and 20% of the budget for staying below the internationally agreed 2 ∘C target). Whether or not oil and gas prices decouple going forward is found to be the biggest uncertainty.

  13. Comparative analysis of data base management systems

    NASA Technical Reports Server (NTRS)

    Smith, R.

    1983-01-01

    A study to determine if the Remote File Inquiry (RFI) system would handle the future requirements of the user community is discussed. RFI is a locally written and locally maintained on-line query/update package. The current and future on-line requirements of the user community were studied. Additional consideration was given to the types of data structuring the users required. The survey indicated the features of greatest benefit were: sort, subtotals, totals, record selection, storage of queries, global updating and the ability to page break. The major deficiencies were: one level of hierarchy, excessive response time, software unreliability, difficult to add, delete and modify records, complicated error messages and the lack of ability to perform interfield comparisons. Missing features users required were: formatted screens, interfield comparions, interfield arithmetic, multiple file access, security and data integrity. The survey team recommended Kennedy Space Center move forward to state-of-the-art software, a Data Base Management System which is thoroughly tested and easy to implement and use.

  14. LCS Master Console Event Message Reduction

    NASA Technical Reports Server (NTRS)

    Nguyen, Uyen

    2014-01-01

    System monitoring and control (SMC) message browsers receive so many messages daily that operators are unable to keep track all of them. Important messages are often mixed up among the less important ones. My job is to reduce the messages so that warning and emergency messages can be seen easily and therefore, responded promptly. There are multiple methods to achieve this. Firstly, messages that look the same should not appear many times in the message browser. Instead, the message should appear only once but with a number that counts the times that it appears. This method is called duplicate message suppression. Messages that display "normal" or "advisory" alarm level should be suppressed. Secondly, messages that update the most recent status of a system should replace the old-status messages. This method is called state based message correlation. Thirdly, some unnecessary messages should be sent straight to history after being displayed or not displayed at all. For an example, normal messages that are not a response to an operator's action should not be displayed. I also work on fixing messages that are not color-coded and formatted properly.

  15. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.

    PubMed

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-06-05

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.

  16. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks

    PubMed Central

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-01-01

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037

  17. TTEthernet for Integrated Spacecraft Networks

    NASA Technical Reports Server (NTRS)

    Loveless, Andrew

    2015-01-01

    Aerospace projects have traditionally employed federated avionics architectures, in which each computer system is designed to perform one specific function (e.g. navigation). There are obvious downsides to this approach, including excessive weight (from so much computing hardware), and inefficient processor utilization (since modern processors are capable of performing multiple tasks). There has therefore been a push for integrated modular avionics (IMA), in which common computing platforms can be leveraged for different purposes. This consolidation of multiple vehicle functions to shared computing platforms can significantly reduce spacecraft cost, weight, and design complexity. However, the application of IMA principles introduces significant challenges, as the data network must accommodate traffic of mixed criticality and performance levels - potentially all related to the same shared computer hardware. Because individual network technologies are rarely so competent, the development of truly integrated network architectures often proves unreasonable. Several different types of networks are utilized - each suited to support a specific vehicle function. Critical functions are typically driven by precise timing loops, requiring networks with strict guarantees regarding message latency (i.e. determinism) and fault-tolerance. Alternatively, non-critical systems generally employ data networks prioritizing flexibility and high performance over reliable operation. Switched Ethernet has seen widespread success filling this role in terrestrial applications. Its high speed, flexibility, and the availability of inexpensive commercial off-the-shelf (COTS) components make it desirable for inclusion in spacecraft platforms. Basic Ethernet configurations have been incorporated into several preexisting aerospace projects, including both the Space Shuttle and International Space Station (ISS). However, classical switched Ethernet cannot provide the high level of network determinism required by real-time spacecraft applications. Even with modern advancements, the uncoordinated (i.e. event-driven) nature of Ethernet communication unavoidably leads to message contention within network switches. The arbitration process used to resolve such conflicts introduces variation in the time it takes for messages to be forwarded. TTEthernet1 introduces decentralized clock synchronization to switched Ethernet, enabling message transmission according to a time-triggered (TT) paradigm. A network planning tool is used to allocate each device a finite amount of time in which it may transmit a frame. Each time slot is repeated sequentially to form a periodic communication schedule that is then loaded onto each TTEthernet device (e.g. switches and end systems). Each network participant references the synchronized time in order to dispatch messages at predetermined instances. This schedule guarantees that no contention exists between time-triggered Ethernet frames in the network switches, therefore eliminating the need for arbitration (and the timing variation it causes). Besides time-triggered messaging, TTEthernet networks may provide two additional traffic classes to support communication of different criticality levels. In the rate-constrained (RC) traffic class, the frame payload size and rate of transmission along each communication channel are limited to predetermined maximums. The network switches can therefore be configured to accommodate the known worst-case traffic pattern, and buffer overflows can be eliminated. The best-effort (BE) traffic class behaves akin to classical Ethernet. No guarantees are provided regarding transmission latency or successful message delivery. TTEthernet coordinates transmission of all three traffic classes over the same physical connections, therefore accommodating the full spectrum of traffic criticality levels required in IMA architectures. Common computing platforms (e.g. LRUs) can share networking resources in such a way that failures in non-critical systems (using BE or RC communication modes) cannot impact flight-critical functions (using TT communication). Furthermore, TTEthernet hardware (e.g. switches, cabling) can be shared by both TTEthernet and classical Ethernet traffic.

  18. Hierarchy of conversational rule violations involving utterance-based augmentative and alternative communication systems.

    PubMed

    Hoag, Linda A; Bedrosian, Jan L; McCoy, Kathleen F; Johnson, Dallas E

    2008-01-01

    This study examined the effects of using messages with conversational rule violations on attitudes toward people who used utterance-based augmentative and alternative communication (AAC) systems in transactional interactions. Specifically, the ratings were compared across messages with relevance, informativeness, and brevity violations, when latency remained constant (i.e., short). The 96 participating sales clerks viewed scripted, videotaped bookstore conversations and completed an attitude questionnaire. Results indicated that the prestored message with repeated words/phrases was rated the highest, followed by the message with excessive information; next was the message with inadequate information, followed by the message with partly relevant information. The findings may be useful to those using utterance-based systems when making message choices during interactions with service providers. Technological implications point to the development of schema/script-based systems and intelligent editing.

  19. MEETING REPORT: OMG Technical Committee Meeting in Orlando, FL, sees significant enhancement to CORBA

    NASA Astrophysics Data System (ADS)

    1998-06-01

    The Object Management Group (OMG) Platform Technology Committee (PTC) ratified its support for a new asynchronous messaging service for CORBA at OMG's recent Technical Committee Meeting in Orlando, FL. The meeting, held from 8 - 12 June, saw the PTC send the Messaging Service out for a final vote among the OMG membership. The Messaging Service, which will integrate Message Oriented Middleware (MOM) with CORBA, will give CORBA a true asynchronous messaging capability - something of great interest to users and developers. Formal adoption of the specification will most likely occur by the end of the year. The Messaging Service The Messaging Service, when adopted, will be the world's first standard for Message Oriented Middleware and will give CORBA a true asynchronous messaging capability. Asynchronous messaging allows developers to build simpler, richer client environments. With asynchronous messaging there is less need for multi-threaded clients because the Asynchronous Method Invocation is non-blocking, meaning the client thread can continue work while the application waits for a reply. David Curtis, Director of Platform Technology for OMG, said: `This messaging service is one of the more valuable additions to CORBA. It enhances CORBA's existing asynchronous messaging capabilities which is a feature of many popular message oriented middleware products. This service will allow better integration between ORBs and MOM products. This enhanced messaging capability will only make CORBA more valuable for builders of distributed object systems.' The Messaging Service is one of sixteen technologies currently being worked on by the PTC. Additionally, seventeen Revision Task Forces (RTFs) are working on keeping OMG specifications up to date. The purpose of these Revision Task Forces is to take input from the implementors of OMG specifications and clarify or make necessary changes based on the implementor's input. The RTFs also ensure that the specifications remain up to date with changes in the OMA and with industry advances in general. Domain work Thirty-eight technology processes are ongoing in the Domain Technology Committee (DTC). These range over a wide variety of industries, including healthcare, telecommunications, life sciences, manufacturing, business objects, electronic commerce, finance, transportation, utilities, and distributed simulation. These processes aim to enhance CORBA's value and provide interoperability for specific vertical industries. At the Orlando meeting, the Domain Technology Committee issued the following requests to industry: Telecom Wireless Access Request For Information (RFI); Statistics RFI; Clinical Image Access Service Request For Proposal (RFP); Distributed Simulation Request For Comment (RFC). The newly-formed Statistics group at OMG plans to standarize interfaces for Statistical Services in CORBA, and their RFI, to which any person or company can respond, asks for input and guidance as they start this work which will impact the broad spectrum of industries and processes which use statistics. The Clinical Image Access Service will standarize access to important medical images including digital x-rays, MRI scans, and other formats. The Distributed Simulation RFC, when complete, will establish the Distributed Simulation High-Level Architecture of the US Defense Military Simulation Office as an OMG standard. For the next 90 days any person or company, not only OMG members, may submit their comments on the submission. The OMG looks forward to its next meeting to be held in Helsinki, Finland, on 27 - 31 July and hosted by Nokia. OMG encourages anyone considering OMG membership to attend the meeting as a guest. For more information on attending call +1-508-820-4300 or e-mail info@omg.org. Note: descriptions for all RFPs, RFIs and RFCs in progress are available for viewing on the OMG Website at http://www.omg.org/schedule.htm, or contact OMG for a copy of the `Work in Progress' document. For more information on the OMG Technology Process please call Jeurgen Boldt, OMG Process Manager, at +1-508-820-4300 or email jeurgen@omg.org.

  20. Parallel deterministic neutronics with AMR in 3D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clouse, C.; Ferguson, J.; Hendrickson, C.

    1997-12-31

    AMTRAN, a three dimensional Sn neutronics code with adaptive mesh refinement (AMR) has been parallelized over spatial domains and energy groups and runs on the Meiko CS-2 with MPI message passing. Block refined AMR is used with linear finite element representations for the fluxes, which allows for a straight forward interpretation of fluxes at block interfaces with zoning differences. The load balancing algorithm assumes 8 spatial domains, which minimizes idle time among processors.

  1. Design of Instant Messaging System of Multi-language E-commerce Platform

    NASA Astrophysics Data System (ADS)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  2. Extended write combining using a write continuation hint flag

    DOEpatents

    Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin; Vranas, Pavlos

    2013-06-04

    A computing apparatus for reducing the amount of processing in a network computing system which includes a network system device of a receiving node for receiving electronic messages comprising data. The electronic messages are transmitted from a sending node. The network system device determines when more data of a specific electronic message is being transmitted. A memory device stores the electronic message data and communicating with the network system device. A memory subsystem communicates with the memory device. The memory subsystem stores a portion of the electronic message when more data of the specific message will be received, and the buffer combines the portion with later received data and moves the data to the memory device for accessible storage.

  3. Mention effect in information diffusion on a micro-blogging network.

    PubMed

    Bao, Peng; Shen, Hua-Wei; Huang, Junming; Chen, Haiqiang

    2018-01-01

    Micro-blogging systems have become one of the most important ways for information sharing. Network structure and users' interactions such as forwarding behaviors have aroused considerable research attention, while mention, as a key feature in micro-blogging platforms which can improve the visibility of a message and direct it to a particular user beyond the underlying social structure, is seldom studied in previous works. In this paper, we empirically study the mention effect in information diffusion, using the dataset from a population-scale social media website. We find that users with high number of followers would receive much more mentions than others. We further investigate the effect of mention in information diffusion by examining the response probability with respect to the number of mentions in a message and observe a saturation at around 5 mentions. Furthermore, we find that the response probability is the highest when a reciprocal followship exists between users, and one is more likely to receive a target user's response if they have similar social status. To illustrate these findings, we propose the response prediction task and formulate it as a binary classification problem. Extensive evaluation demonstrates the effectiveness of discovered factors. Our results have consequences for the understanding of human dynamics on the social network, and potential implications for viral marketing and public opinion monitoring.

  4. Hypertext: Improved Capability for Shipboard Naval Messages

    DTIC Science & Technology

    1989-09-01

    message handling system; a complete working model of the system has not been developed . 3 D. ORGANIZATION OF STUDY 1. The "Paperless" Ship Initiative...work in tandem to improve afloat message handling procedures. The objective of the PCMT project is to develop a system that could be installed on...working group has identified a list of requirements to guide the DoD’s progress towards improving its message communication system. These

  5. Monitoring tools of COMPASS experiment at CERN

    NASA Astrophysics Data System (ADS)

    Bodlak, M.; Frolov, V.; Huber, S.; Jary, V.; Konorov, I.; Levit, D.; Novy, J.; Salac, R.; Tomsa, J.; Virius, M.

    2015-12-01

    This paper briefly introduces the data acquisition system of the COMPASS experiment and is mainly focused on the part that is responsible for the monitoring of the nodes in the whole newly developed data acquisition system of this experiment. The COMPASS is a high energy particle experiment with a fixed target located at the SPS of the CERN laboratory in Geneva, Switzerland. The hardware of the data acquisition system has been upgraded to use FPGA cards that are responsible for data multiplexing and event building. The software counterpart of the system includes several processes deployed in heterogenous network environment. There are two processes, namely Message Logger and Message Browser, taking care of monitoring. These tools handle messages generated by nodes in the system. While Message Logger collects and saves messages to the database, the Message Browser serves as a graphical interface over the database containing these messages. For better performance, certain database optimizations have been used. Lastly, results of performance tests are presented.

  6. Efficient Data Generation and Publication as a Test Tool

    NASA Technical Reports Server (NTRS)

    Einstein, Craig Jakob

    2017-01-01

    A tool to facilitate the generation and publication of test data was created to test the individual components of a command and control system designed to launch spacecraft. Specifically, this tool was built to ensure messages are properly passed between system components. The tool can also be used to test whether the appropriate groups have access (read/write privileges) to the correct messages. The messages passed between system components take the form of unique identifiers with associated values. These identifiers are alphanumeric strings that identify the type of message and the additional parameters that are contained within the message. The values that are passed with the message depend on the identifier. The data generation tool allows for the efficient creation and publication of these messages. A configuration file can be used to set the parameters of the tool and also specify which messages to pass.

  7. Dispatching packets on a global combining network of a parallel computer

    DOEpatents

    Almasi, Gheorghe [Ardsley, NY; Archer, Charles J [Rochester, MN

    2011-07-19

    Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.

  8. Using information communication technology to identify deficits in rural health care: a mixed-methods evaluation from Guatemala

    PubMed Central

    Wahedi, Katharina; Flores, Walter; Beiersmann, Claudia; Bozorgmehr, Kayvan; Jahn, Albrecht

    2018-01-01

    ABSTRACT Background: In August 2014, the Centre for the Studies of Equity and Governance in Health Systems (CEGSS) in Guatemala launched an online platform, which facilitates complaints about health services via text messages. The aim is to collect, systemise and forward such complaints to relevant institutions, and to create a data pool on perceived deficits of health care in rural Guatemala. Objective: To evaluate if the online platform is an accepted, user-friendly and efficient medium to engage citizens in the reporting of health care deficiencies in Guatemala. Methods: The general study design of this research was a mixed-method approach including a quantitative analysis of complaints received and a qualitative exploration of the attitude of community leaders towards the platform. Results: User statistics showed that a total of N = 228 messages were sent to the platform in the period August 2014–March 2015. The majority of complaints (n = 162, 71%) fell under the ‘lack of drugs, equipment or supplies’ category. The community leaders welcomed the platform, describing it as modern and progressive. Despite feedback mechanisms and methods to respond to complaints not yet being fully developed, many users showed a high intrinsic motivation to use the new tool. Others, however, were restrained by fear of personal consequences and distrust of the state’s judicial system. Access to mobile phones, reception, and phone credit or battery life did not pose major obstacles, but the producing and sending of correctly formatted messages was observed to be difficult. Conclusion: The online platform paired with SMS technology appears to be a viable approach to collect citizens’ complaints in health care and connect citizens with relevant institutions. Further studies should be conducted to quantify follow-up activities and the impact on local health care provision. PMID:29661072

  9. Multisensor interoperability for persistent surveillance and FOB protection with multiple technologies during the TNT exercise at Camp Roberts, California

    NASA Astrophysics Data System (ADS)

    Murarka, Naveen; Chambers, Jon

    2012-06-01

    Multiple sensors, providing actionable intelligence to the war fighter, often have difficulty interoperating with each other. Northrop Grumman (NG) is dedicated to solving these problems and providing complete solutions for persistent surveillance. In August, 2011, NG was invited to participate in the Tactical Network Topology (TNT) Capabilities Based Experimentation at Camp Roberts, CA to demonstrate integrated system capabilities providing Forward Operating Base (FOB) protection. This experiment was an opportunity to leverage previous efforts from NG's Rotorcraft Avionics Innovation Laboratory (RAIL) to integrate five prime systems with widely different capabilities. The five systems included a Hostile Fire and Missile Warning Sensor System, SCORPION II Unattended Ground Sensor system, Smart Integrated Vehicle Area Network (SiVAN), STARLite Synthetic Aperture Radar (SAR)/Ground Moving Target Indications (GMTI) radar system, and a vehicle with Target Location Module (TLM) and Laser Designation Module (LDM). These systems were integrated with each other and a Tactical Operations Center (TOC) equipped with RaptorX and Falconview providing a Common Operational Picture (COP) via Cursor on Target (CoT) messages. This paper will discuss this exercise, and the lessons learned, by integrating these five prime systems for persistent surveillance and FOB protection.

  10. AMS -- The Unix ADAM Message System

    NASA Astrophysics Data System (ADS)

    Kelly, B. D.; Chipperfield, A. J.

    The ADAM Message System (AMS) library, which implements the ADAM inter-task communications protocol under Unix, is described, along with its Fortran-callable interface (FAMS). The description of AMS is distinguished from the current implementation which uses the Message System Primitives (MSP).

  11. Patients’ Engagement With “Sweet Talk” – A Text Messaging Support System for Young People With Diabetes

    PubMed Central

    Franklin, Victoria Louise; Greene, Alexandra; Waller, Annalu; Greene, Stephen Alan

    2008-01-01

    Background Guidelines for optimizing type 1 diabetes in young people advocate intensive insulin therapy coupled with personal support from the health care team. “Sweet Talk” is a novel intervention designed to support patients between clinic visits using text messages sent to a mobile phone. Scheduled messages are tailored to patient profiles and diabetes self-management goals, and generic messages include topical “newsletters” and anonymized tips from other participants. The system also allows patients to submit data and questions to the diabetes care team. Objectives The aim was to explore how patients with type 1 diabetes interact with the Sweet Talk system in order to understand its utility to this user group. Methods Subjects were 64 young people with diabetes who were participating in the intervention arms of a randomized controlled trial. All text messages submitted to Sweet Talk during a 12-month period were recorded. Messaging patterns and content were analyzed using mixed quantitative and qualitative methods. Results Patients submitted 1180 messages during the observation period (mean 18.4, median 6). Messaging frequency ranged widely between participants (0-240) with a subset of 5 high users contributing 52% of the total. Patients’ clinical and sociodemographic characteristics were not associated with total messaging frequency, although girls sent significantly more messages unrelated to diabetes than did boys (P = .002). The content of patients’ messages fell into 8 main categories: blood glucose readings, diabetes questions, diabetes information, personal health administration, social messages, technical messages, message errors, and message responses. Unprompted submission of blood glucose values was the most frequent incoming message type (35% of total). Responses to requests for personal experiences and tips generated 40% of all the incoming messages, while topical news items also generated good responses. Patients also used the service to ask questions, submit information about their self-management, and order supplies. No patients nominated supporters to receive text messages about their self-management goals. Another option that was not used was the birthday reminder service. Conclusions Automated, scheduled text messaging successfully engaged young people with diabetes. While the system was primarily designed to provide “push” support to patients, submission of clinical data and queries illustrates that it was seen as a trusted medium for communicating with care providers. Responses to the newsletters and submission of personal experiences and tips for circulation to other participants also illustrate the potential value of such interventions for establishing a sense of community. Although participants submitted relatively few messages, positive responses to the system suggest that most derived passive support from reading the messages. The Sweet Talk system could be readily adapted to suit other chronic disease models and age groups, and the results of this study may help to inform the design of future text message support interventions. PMID:18653444

  12. The clinical usefulness of a web-based messaging system between patients with Crohn disease and their physicians.

    PubMed

    Jeong, Da Eun; Kim, Kyeong Ok; Jang, Byung Ik; Kim, Eun Young; Jung, Jin Tae; Jeon, Seong Woo; Lee, Hyun Seok; Kim, Eun Soo; Park, Kyung Sik; Cho, Kwang Bum

    2016-06-01

    To avoid missing events associated with clinical activity, the authors previously developed a novel, web-based, self-reporting Crohn disease (CD) symptom diary. However, although this diary provided a means of self-checking based on responses to set questions based on Harvey-Bradshaw index scores, it was limited in terms of describing other specific symptoms. Thus, the authors added a space to the questionnaire, which allows patients to send clinicians questions or a description of unpredictable events. The aim of the present study was to assess the clinical usefulness of this messaging system by analyzing patients' messages.The messaging system between patients and their doctors was included in a webpage created for recording patients' symptom diaries (www.cdsd.or.kr). Using this system, patients can send messages easily at any time and doctors can read and respond to these messages immediately using a smart phone or computer. In the present study, the authors retrospectively reviewed 686 messages sent by 152 patients from July 2012 to July 2014 and patient medical records.Mean patient age was 29.0 ± 11.6 years and the male-to-female ratio was 99:53. Most messages regarded symptoms (381 messages, 55.5%), which was followed by self-reports about general condition (195 messages, 28.4%) and questions about treatment (71 messages, 10.3%). With respect to symptoms, abdominal pain was most common (145 cases, 21.1%) followed by hematochezia (36 cases, 5.2%). Problems about medication were the most frequently associated with treatment (65, 91.5%). Patients above 40 years showed a greater tendency to focus on symptoms and treatment (P = 0.025). The doctor answer rate was 56.3% (n = 386), and based on these responses, an early visit was needed in 28 cases (7.3%).Using this web-based messaging system, patients were able to obtain proper advice from their physicians without visiting clinics or searching the Internet, and in addition, 7.3% of messages prompted an early visit. Although longer follow-up is required, this study shows that the devised messaging system provides a clinically relevant communication tool for patients and physicians.

  13. Development of a text messaging system to improve receipt of survivorship care in adolescent and young adult survivors of childhood cancer.

    PubMed

    Casillas, Jacqueline; Goyal, Anju; Bryman, Jason; Alquaddoomi, Faisal; Ganz, Patricia A; Lidington, Emma; Macadangdang, Joshua; Estrin, Deborah

    2017-08-01

    This study aimed to develop and examine the acceptability, feasibility, and usability of a text messaging, or Short Message Service (SMS), system for improving the receipt of survivorship care for adolescent and young adult (AYA) survivors of childhood cancer. Researchers developed and refined the text messaging system based on qualitative data from AYA survivors in an iterative three-stage process. In stage 1, a focus group (n = 4) addressed acceptability; in stage 2, key informant interviews (n = 10) following a 6-week trial addressed feasibility; and in stage 3, key informant interviews (n = 23) following a 6-week trial addressed usability. Qualitative data were analyzed using a constant comparative analytic approach exploring in-depth themes. The final system includes programmed reminders to schedule and attend late effect screening appointments, tailored suggestions for community resources for cancer survivors, and messages prompting participant feedback regarding the appointments and resources. Participants found the text messaging system an acceptable form of communication, the screening reminders and feedback prompts feasible for improving the receipt of survivorship care, and the tailored suggestions for community resources usable for connecting survivors to relevant services. Participants suggested supplementing survivorship care visits and forming AYA survivor social networks as future implementations for the text messaging system. The text messaging system may assist AYA survivors by coordinating late effect screening appointments, facilitating a partnership with the survivorship care team, and connecting survivors with relevant community resources. The text messaging system has the potential to improve the receipt of survivorship care.

  14. Impact of coalition interoperability on PKI

    NASA Astrophysics Data System (ADS)

    Krall, Edward J.

    2003-07-01

    This paper examines methods for providing PKI interoperability among units of a coalition of armed forces drawn from different nations. The area in question is tactical identity management, for the purposes of confidentiality, integrity and non-repudiation in such a dynamic coalition. The interoperating applications under consideration range from email and other forms of store-and-forward messaging to TLS and IPSEC-protected real-time communications. Six interoperability architectures are examined with advantages and disadvantages of each described in the paper.

  15. An Introduction to Message-Bus Architectures for Space Systems

    NASA Technical Reports Server (NTRS)

    Smith, Danford; Gregory, Brian

    2005-01-01

    This course presents technical and programmatic information on the development of message-based architectures for space mission ground and flight software systems. Message-based architecture approaches provide many significant advantages over the more traditional socket-based one-of-a-kind integrated system development approaches. The course provides an overview of publish/subscribe concepts, the use of common isolation layer API's, approaches to message standardization, and other technical topics. Several examples of currently operational systems are discussed and possible changes to the system discussed and time for questions and answers will be provided.

  16. Simulation studies of a wide area health care network.

    PubMed Central

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  17. SMSaúde: Design, Development, and Implementation of a Remote/Mobile Patient Management System to Improve Retention in Care for HIV/AIDS and Tuberculosis Patients.

    PubMed

    Nhavoto, José António; Grönlund, Åke; Chaquilla, Walter Ponce

    2015-03-09

    The widespread and low cost of mobile phones and the convenience of short message service (SMS) text messaging suggest potential suitability for use with alternative strategies for supporting retention in care and adherence to the treatment of various chronic diseases, such as HIV and tuberculosis (TB). Despite the growing body of literature reporting positive outcomes of SMS text message-based communication with patients, there is yet very little research about the integration of communication technologies and electronic medical records or electronic patient tracking systems. To design, develop, and implement an integrated mobile phone text messaging system used to follow up with patients with HIV and TB in treatment in Mozambique. Following the design science research methodology, we developed a Web-based system that provides support to patients. A case study involving three health care sites in Mozambique was a basis for discussing design issues for this kind of system. We used brainstorming techniques to solicit usability requirements, focus group meetings to discuss and define system architecture, and prototyping to test in real environments and to improve the system. We found six sets of system requirements that need to be addressed for success: data collection, telecommunication costs, privacy and data security, text message content, connectivity, and system scalability. A text messaging system was designed and implemented in three health facilities. These sites feed data into a central data repository, which can be used for analysis of operations and decision support. Based on the treatment schedule, the system automatically sent SMS text message appointment reminders, medication reminders, as well as motivational and educational messages to patients enrolled in antiretroviral therapy and TB treatment programs. We successfully defined the requirements for, designed, and implemented a mobile phone text messaging system to support HIV and TB treatments. Implementation of this system could improve patients' self-management skills and strengthen communication between patients and health care providers.

  18. Towards collaborative filtering recommender systems for tailored health communications.

    PubMed

    Marlin, Benjamin M; Adams, Roy J; Sadasivam, Rajani; Houston, Thomas K

    2013-01-01

    The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient "profiles" and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user's past ratings contributes the most to predictive accuracy.

  19. Towards Collaborative Filtering Recommender Systems for Tailored Health Communications

    PubMed Central

    Marlin, Benjamin M.; Adams, Roy J.; Sadasivam, Rajani; Houston, Thomas K.

    2013-01-01

    The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient “profiles” and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user’s past ratings contributes the most to predictive accuracy. PMID:24551430

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perry, Marcia

    The IRCD is an IRC server that was originally distributed by the IRCD Hybrid developer team for use as a server in IRC message over the public Internet. By supporting the IRC protocol defined in the IRC RFC, IRCD allows the users to create and join channels for group or one-to-one text-based instant messaging. It stores information about channels (e.g., whether it is public, secret, or invite-only, the topic set, membership) and users (who is online and what channels they are members of). It receives messages for a specific user or channel and forwards these messages to the targeted destination.more » Since server-to-server communication is also supported, these targeted destinations may be connected to different IRC servers. Messages are exchanged over TCP connections that remain open between the client and the server. The IRCD is being used within the Pervasive Computing Collaboration Environment (PCCE) as the 'chat server' for message exchange over public and private channels. After an LBNLSecureMessaging(PCCE chat) client has been authenticated, the client connects to IRCD with its assigned nickname or 'nick.' The client can then create or join channels for group discussions or one-to-one conversations. These channels can have an initial mode of public or invite-only and the mode may be changed after creation. If a channel is public, any one online can join the discussion; if a channel is invite-only, users can only join if existing members of the channel explicity invite them. Users can be invited to any type of channel and users may be members of multiple channels simultaneously. For use with the PCCE environment, the IRCD application (which was written in C) was ported to Linux and has been tested and installed under Linux Redhat 7.2. The source code was also modified with SSL so that all messages exchanged over the network are encrypted. This modified IRC server also verifies with an authentication server that the client is who he or she claims to be and that this user is authorized to ain access to the IRCD.« less

  1. Generic Ada code in the NASA space station command, control and communications environment

    NASA Technical Reports Server (NTRS)

    Mcdougall, D. P.; Vollman, T. E.

    1986-01-01

    The results of efforts to apply powerful Ada constructs to the formatted message handling process are described. The goal of these efforts was to extend the state-of-technology in message handling while at the same time producing production-quality, reusable code. The first effort was initiated in September, 1984 and delivered in April, 1985. That product, the Generic Message Handling Facility, met initial goals, was reused, and is available in the Ada Repository on ARPANET. However, it became apparent during its development that the initial approach to building a message handler template was not optimal. As a result of this initial effort, several alternate approaches were identified, and research is now on-going to identify an improved product. The ultimate goal is to be able to instantly build a message handling system for any message format given a specification of that message format. The problem lies in how to specify the message format, and one that is done, how to use that information to build the message handler. Message handling systems and message types are described. The initial efforts, its results and its shortcomings are detailed. The approach now being taken to build a system which will be significantly easier to implement, and once implemented, easier to use, is described. Finally, conclusions are offered.

  2. SMC Message Browser Projects

    NASA Technical Reports Server (NTRS)

    Wichmann, Benjamin C.

    2013-01-01

    I work directly with the System Monitoring and Control (SMC) software engineers who develop, test and release custom and commercial software in support of the Kennedy Space Center Spaceport Command and Control System. (SCCS). SMC uses Commercial Off-The-Shelf (COTS) Enterprise Management Systems (EMS) software which provides a centralized subsystem for configuring, monitoring, and controlling SCCS hardware and software used in the Control Rooms. There are multiple projects being worked on using the COTS EMS software. I am currently working with the HP Operations Manager for UNIX (OMU) software which allows Master Console Operators (MCO) to access, view and interpret messages regarding the status of the SCCS hardware and software. The OMU message browser gets cluttered with messages which can make it difficult for the MCO to manage. My main project involves determining ways to reduce the number of messages being displayed in the OMU message browser. I plan to accomplish this task in two different ways: (1) by correlating multiple messages into one single message being displayed and (2) to create policies that will determine the significance of each message and whether or not it needs to be displayed to the MCO. The core idea is to lessen the number of messages being sent to the OMU message browser so the MCO can more effectively use it.

  3. Performance management of multiple access communication networks

    NASA Astrophysics Data System (ADS)

    Lee, Suk; Ray, Asok

    1993-12-01

    This paper focuses on conceptual design, development, and implementation of a performance management tool for computer communication networks to serve large-scale integrated systems. The objective is to improve the network performance in handling various types of messages by on-line adjustment of protocol parameters. The techniques of perturbation analysis of Discrete Event Dynamic Systems (DEDS), stochastic approximation (SA), and learning automata have been used in formulating the algorithm of performance management. The efficacy of the performance management tool has been demonstrated on a network testbed. The conceptual design presented in this paper offers a step forward to bridging the gap between management standards and users' demands for efficient network operations since most standards such as ISO (International Standards Organization) and IEEE address only the architecture, services, and interfaces for network management. The proposed concept of performance management can also be used as a general framework to assist design, operation, and management of various DEDS such as computer integrated manufacturing and battlefield C(sup 3) (Command, Control, and Communications).

  4. Secure message authentication system for node to node network

    NASA Astrophysics Data System (ADS)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  5. Murmer, a message generator and reporter for Unix, VMS, and VxWorks

    NASA Astrophysics Data System (ADS)

    Oleynik, G.; Appleton, B.; Moore, C.; Sergey, G.; Udumula, L.

    1994-02-01

    Murmer is a Unix based message generation, reporting, display, and logging system that we have developed for use in data acquisition systems at Fermilab. Murmer is a tool for the production and management of message reporting. Its usefulness ranges from software product development and maintenance to system level shakedown and diagnostics. Murmer provides a VMS MESSAGE-like function code generation utility, a client routine package for sending these codes over the network to a central server, and a server which translates the codes into meaningful visual information, writes the information to a logfile, and display it on B&W or color X windows. Because Murmer stores message information in keyed access files, it can provide advanced features such as popping up help when a displayed message is clicked on by the mouse and executing 'action' shell scripts when selected messages are received by the server.

  6. Evaluating user experiences of the secure messaging tool on the Veterans Affairs' patient portal system.

    PubMed

    Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-03-06

    The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users' experiences in a representative sample to validate qualitative findings.

  7. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Message elements. 10.420 Section 10.420 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message Requirements § 10.420 Message elements. A CMAS Alert Message processed by a Participating CMS Provider shall...

  8. A Secure Multicast Framework in Large and High-Mobility Network Groups

    NASA Astrophysics Data System (ADS)

    Lee, Jung-San; Chang, Chin-Chen

    With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.

  9. Introduction to Message-Bus Architectures for Space Systems

    NASA Technical Reports Server (NTRS)

    Smith, Dan; Gregory, Brian

    2005-01-01

    This course presents technical and programmatic information on the development of message-based architectures for space mission ground and flight software systems. Message-based architecture approaches provide many significant advantages over the more traditional socket-based one-of-a-kind integrated system development approaches. The course provides an overview of publish/subscribe concepts, the use of common isolation layer API's, approaches to message standardization, and other technical topics. Several examples of currently operational systems are discussed and possible changes to the system development process are presented. Benefits and lessons learned will be discussed and time for questions and answers will be provided.

  10. I-39 dynamic message sign project summary

    DOT National Transportation Integrated Search

    2005-01-01

    The Illinois Department of Transportation (IDOT) sought to deploy a message sign system consisting of permanently-mounted dynamic message signs around the Rockford metropolitan area. The project goal was to begin building a system of remotely-activat...

  11. Two Women with Multiple Disabilities Communicate with Distant Partners via a Special Text Messaging System

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Green, Vanessa A.; Oliva, Doretta; Alberti, Gloria; Carrella, Luigina

    2013-01-01

    This study extended the research on a special text messaging system, which allows persons with multiple disabilities to (a) write and send messages to distant partners and (b) have messages from those partners read out to them. The study involved two women with multiple disabilities (including blindness or minimal residual vision). The system…

  12. Airborne Data Link Operational Evaluation Test Plan

    DTIC Science & Technology

    1993-08-01

    be provided by a combination of glare shield mounted, blue lens , aviation-type lamps and lighted distinctive message indicators on the CDUs or CDU...consist of either SELCAL sound only or SELCAL tone combined with forward primary field of view visual alerting (a blue light mounted on the glare shield in...INCORPORATED DOT/FAA/CT-TN93/30 9. Pe’form,"g Orgaoniatio Name end Address 10. Work Unit No. (TRAIS) CTA, INCORPORATED Suite 1000 11 Contac of Great me. 2500

  13. The role of short- and long-term cognitive empathy activation in preventing cyberbystander reinforcing cyberbullying behavior.

    PubMed

    Barlińska, Julia; Szuster, Anna; Winiewski, Mikołaj

    2015-04-01

    The long- versus short-term effectiveness of empathy activation on reducing bystander behavior reinforcing cyberbullying was tested. The focus was on limiting the frequency of forwarding a message ridiculing a peer. Experimental research on adolescent students was conducted in conditions simulating online contact. The results confirmed the significance of cognitive empathy activated immediately prior to decision making on limiting involvement in reinforcing cyberbullying behavior. The long-term impact of empathy was markedly limited.

  14. Assigning new meanings to traditional literature: illustrations for HIV educators.

    PubMed

    Leoutsakas, D

    1996-08-01

    Folk literature (folktales, fairy tales, and myths) has always had a psychological and sociological impact on humans. Parents and educators have been using stories from folk literature for generations to convey significant ideas and cultural values. With HIV being a major health concern, there is a need to establish diverse approaches to health education. Literature as a genre, and storytelling as an art form, can be used to help forward public health messages. Examples of storytelling in educational settings are provided.

  15. Driver memory retention of in-vehicle information system messages

    DOT National Transportation Integrated Search

    1997-01-01

    Memory retention of drivers was tested for traffic- and traveler-related messages displayed on an in-vehicle information system (IVIS). Three research questions were asked: (a) How does in-vehicle visual message format affect comprehension? (b) How d...

  16. Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System

    PubMed Central

    Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-01-01

    Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Conclusions Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users’ experiences in a representative sample to validate qualitative findings. PMID:24610454

  17. Predictors for assessing electronic messaging between nurses and general practitioners as a useful tool for communication in home health care services: a cross-sectional study.

    PubMed

    Lyngstad, Merete; Hofoss, Dag; Grimsmo, Anders; Hellesø, Ragnhild

    2015-02-17

    Nurses providing home health care services are dependent on access to patient information and communicating with general practitioners (GPs) to deliver safe and effective health care to patients. Information and communication technology (ICT) systems are viewed as powerful tools for this purpose. In Norway, a standardized electronic messaging (e-messaging) system is currently being established in health care. The aim of this study was to explore home health care nurses' assessments of the utility of the e-messaging system for communicating with GPs and identify elements that influence the assessment of e-messaging as a useful communication tool. The data were collected using a self-developed questionnaire based on variables identified by focus group interviews with home health care nurses (n=425) who used e-messaging and existing research. Data were analyzed using logistic regression analyses. Over two-thirds (425/632, 67.2%) of the home health care nurses returned the questionnaire. A high proportion (388/399, 97.2%) of the home health care nurses who returned the questionnaire found the e-messaging system to be a useful tool for communication with GPs. The odds of reporting that e-messaging was a useful tool were over five times higher (OR 5.1, CI 2.489-10.631, P<.001) if the nurses agreed or strongly agreed that e-messaging was easy to use. The odds of finding e-messaging easy to use were nearly seven times higher (OR 6.9, CI 1.713-27.899, P=.007) if the nurses did not consider the system functionality poor. If the nurses had received training in the use of e-messaging, the odds were over six times higher (OR 6.6, CI 2.515-17.437, P<.001) that they would consider e-messaging easy to use. The odds that a home health care nurse would experience e-messaging as easy to use increased as the full-time equivalent percentage of the nurses increased (OR 1.032, CI 1.001-1.064, P=.045). This study has shown that technical (ease of use and system functionality), organizational (training), and individual (full-time equivalent percentage) elements had an impact on home health care nurses' assessments of using e-messaging to communicate with GPs. By identifying these elements, it is easier to determine which interventions are the most important for the development and implementation of ICT systems in home health care services.

  18. Predictors for Assessing Electronic Messaging Between Nurses and General Practitioners as a Useful Tool for Communication in Home Health Care Services: A Cross-Sectional Study

    PubMed Central

    Hofoss, Dag; Grimsmo, Anders; Hellesø, Ragnhild

    2015-01-01

    Background Nurses providing home health care services are dependent on access to patient information and communicating with general practitioners (GPs) to deliver safe and effective health care to patients. Information and communication technology (ICT) systems are viewed as powerful tools for this purpose. In Norway, a standardized electronic messaging (e-messaging) system is currently being established in health care. Objective The aim of this study was to explore home health care nurses’ assessments of the utility of the e-messaging system for communicating with GPs and identify elements that influence the assessment of e-messaging as a useful communication tool. Methods The data were collected using a self-developed questionnaire based on variables identified by focus group interviews with home health care nurses (n=425) who used e-messaging and existing research. Data were analyzed using logistic regression analyses. Results Over two-thirds (425/632, 67.2%) of the home health care nurses returned the questionnaire. A high proportion (388/399, 97.2%) of the home health care nurses who returned the questionnaire found the e-messaging system to be a useful tool for communication with GPs. The odds of reporting that e-messaging was a useful tool were over five times higher (OR 5.1, CI 2.489-10.631, P<.001) if the nurses agreed or strongly agreed that e-messaging was easy to use. The odds of finding e-messaging easy to use were nearly seven times higher (OR 6.9, CI 1.713-27.899, P=.007) if the nurses did not consider the system functionality poor. If the nurses had received training in the use of e-messaging, the odds were over six times higher (OR 6.6, CI 2.515-17.437, P<.001) that they would consider e-messaging easy to use. The odds that a home health care nurse would experience e-messaging as easy to use increased as the full-time equivalent percentage of the nurses increased (OR 1.032, CI 1.001-1.064, P=.045). Conclusions This study has shown that technical (ease of use and system functionality), organizational (training), and individual (full-time equivalent percentage) elements had an impact on home health care nurses’ assessments of using e-messaging to communicate with GPs. By identifying these elements, it is easier to determine which interventions are the most important for the development and implementation of ICT systems in home health care services. PMID:25691234

  19. Towards ontology personalization to enrich social conversations on AAC systems

    NASA Astrophysics Data System (ADS)

    Mancilla V., Daniela; Sastoque H., Sebastian; Iregui G., Marcela

    2015-01-01

    Communication is one of the essential needs of human beings. Augmentative and Alternative Communication Systems (AAC) seek to help in the generation of oral and written language to people with physical disorders that limit their natural communication. These systems present significant challenges such as: the composition of consistent messages according to syntactic and semantic rules, the improvement of message production times, the application to social contexts and, consequently, the incorporation of user-specific information. This work presents an original ontology personalization approach for an AAC instant messaging system incorporating personalized information to improve the efficacy and efficiency of the message production. This proposal is based on a projection of a general ontology into a more specific one, avoiding storage redundancy and data coupling, representing a big opportunity to enrich communication capabilities of current AAC systems. The evaluation was performed for a study case based on an AAC system for assistance in composing messages. The results show that adding user-specific information allows generation of enriched phrases, so improving the accuracy of the message, facilitating the communication process.

  20. Time Triggered Ethernet System Testing Means and Method

    NASA Technical Reports Server (NTRS)

    Smithgall, William Todd (Inventor); Hall, Brendan (Inventor); Varadarajan, Srivatsan (Inventor)

    2014-01-01

    Methods and apparatus are provided for evaluating the performance of a Time Triggered Ethernet (TTE) system employing Time Triggered (TT) communication. A real TTE system under test (SUT) having real input elements communicating using TT messages with output elements via one or more first TTE switches during a first time interval schedule established for the SUT. A simulation system is also provided having input simulators that communicate using TT messages via one or more second TTE switches with the same output elements during a second time interval schedule established for the simulation system. The first and second time interval schedules are off-set slightly so that messages from the input simulators, when present, arrive at the output elements prior to messages from the analogous real inputs, thereby having priority over messages from the real inputs and causing the system to operate based on the simulated inputs when present.

  1. Unified messaging solution for biosurveillance and disease surveillance.

    PubMed

    Abellera, John P; Srinivasan, Arunkumar; Danos, C Scott; McNabb, Scott; Rhodes, Barry

    2007-10-11

    Biosurveillance and disease surveillance systems serve different purposes. However, the richness and quality of an existing data stream and infrastructure used in biosurveillance may prove beneficial for any state-based electronic disease surveillance system, especially if an electronic laboratory data feed does not exist between a hospital and state-based system. The use of an Enterprise Application Integration(EAI) engine, such as the BioSense Integrator,will be necessary to map heterogeneous messages into standard representations, then validate and route them [1] to a disparate system. This poster illustrates the use of an existing BioSense Integrator in order to create a unified message to support the exchange of electronic lab messages necessary for reportable disease notification. An evaluation of the infrastructure for data messaging will be examined and presented, along with a cost and benefit analysis between hospital and state-based system.

  2. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    NASA Technical Reports Server (NTRS)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated independently as a simplex link. Without negotiation, the COTS routers are prevented from entering into the IP header compression mode, and no IP header compression would be performed. An algorithm is proposed to enable IP header compression in COTS routers on a simplex link with no negotiation or with a one-way messaging. In doing so, COTS routers can enter IP header compression mode without the need to handshake through a bidirectional link as required by FRF.20. This technique would spoof the routers locally and thereby allow the routers to enter into IP header compression mode without having the negotiations between routers actually occur. The spoofing function is conducted by a frame relay adapter (also COTS) with the capability to generate control messages according to the FRF.20 descriptions. Therefore, negotiation is actually performed between the FRF.20 adapter and the connecting COTS router locally and never occurs over the space link. Through understanding of the handshaking protocol described by FRF.20, the necessary FRF.20 negotiations messages can be generated to control the connecting router, not only to turn on IP header compression but also to adjust the compression parameters. The FRF.20 negotiation (or control) message is composed in the FRF.20 adapter by interpreting the incoming router request message. Many of the fields are simply transcribed from request to response while the control field indicating response and type are modified.

  3. Managing the Alert Process at NewYork-Presbyterian Hospital

    PubMed Central

    Kuperman, Gilad J; Diamente, Rosanna; Khatu, Vrinda; Chan-Kraushar, Terri; Stetson, Pete; Boyer, Aurelia; Cooper, Mary

    2005-01-01

    Clinical decision support can improve the quality of care, but requires substantial knowledge management activities. At NewYork-Presbyterian Hospital in New York City, we have implemented a formal alert management process whereby only hospital committees and departments can request alerts. An explicit requestor, who will help resolve the details of the alert logic and the alert message must be identified. Alerts must be requested in writing using a structured alert request form. Alert requests are reviewed by the Alert Committee and then forwarded to the Information Systems department for a software development estimate. The model required that clinical committees and departments become more actively involved in the development of alerts than had previously been necessary. In the 12 months following implementation, 10 alert requests were received. The model has been well received. A lot of the knowledge engineering work has been distributed and burden has been removed from scarce medical informatics resources. PMID:16779073

  4. Buildings' integral role in good health.

    PubMed

    Hall, Chris

    2014-05-01

    As reported in last month's HEJ, the new Sustainable Development Strategy for the Health, Public Health and Social Care System for 2014-20 rightly emphasises the importance of the built environment to health and well-being. Chris Hall, the BRE's health sector lead, says this message 'stretches far beyond hospitals and healthcare buildings into the communities and homes that people live in'. Here he highlights some of the key elements relating to the current carbon efficiency of healthcare buildings, considers the impact of 'good' housing on health and preventing illness, and looks forward to a series of joint IHEEM and BRE 'Building Sustainable Development' mini-conference events planned in the run-up to October's Healthcare Estates 2014 event in response to the new Strategy, designed to share ideas and good practice on sustainable estates issues. The first takes place in London later this month (see panel below).

  5. Assisted entry mitigates text messaging-based driving detriment.

    PubMed

    Sawyer, Benjamin D; Hancock, Peter A

    2012-01-01

    Previous research using cell phones indicates that manual manipulation is not a principal component of text messaging relating driving detriment. This paper suggests that manipulation of a phone in conjunction with the cognitive need to compose the message itself co-act to contribute to driving degradation. This being so, drivers sending text messages might experience reduced interference to the driving task if the text messaging itself were assisted through the predictive T9 system. We evaluated undergraduate drivers in a simulator who drove and texted using either Assisted Text entry, via Nokia's T9 system, or unassisted entry via the multitap interface. Results supported the superiority of the T9 system over the multitap system implying that specific assistive technologies can modulate the degradation of capacity which texting tragically induces.

  6. A pilot test of a tailored mobile and web-based diabetes messaging system for adolescents.

    PubMed

    Mulvaney, Shelagh A; Anders, Shilo; Smith, Annie K; Pittel, Eric J; Johnson, Kevin B

    2012-03-01

    We conducted a pilot trial of a new mobile and web-based intervention to improve diabetes adherence. The text messaging system was designed to motivate and remind adolescents about diabetes self-care tasks. Text messages were tailored according to individually-reported barriers to diabetes self-care. A total of 23 adolescents with type 1 diabetes used the system for a period of three months. On average, they received 10 text messages per week (range 8-12). A matched historical control group from the same clinic was used for comparison. After three months, system users rated the content, usability and experiences with the system, which were very favourable. Comparison of the intervention and control groups indicated a significant interaction between group and time. Both groups had similar HbA(1c) levels at baseline. After three months, the mean HbA(1c) level in the intervention group was unchanged (8.8%), but the mean level in the control group was significantly higher (9.9%), P = 0.006. The results demonstrate the feasibility of the messaging system, user acceptance and a promising effect on glycaemic control. Integrating this type of messaging system with online educational programming could prove to be beneficial.

  7. Adjoint of the global Eulerian-Lagrangian coupled atmospheric transport model (A-GELCA v1.0): development and validation

    NASA Astrophysics Data System (ADS)

    Belikov, Dmitry A.; Maksyutov, Shamil; Yaremchuk, Alexey; Ganshin, Alexander; Kaminski, Thomas; Blessing, Simon; Sasakawa, Motoki; Gomez-Pelaez, Angel J.; Starchenko, Alexander

    2016-02-01

    We present the development of the Adjoint of the Global Eulerian-Lagrangian Coupled Atmospheric (A-GELCA) model that consists of the National Institute for Environmental Studies (NIES) model as an Eulerian three-dimensional transport model (TM), and FLEXPART (FLEXible PARTicle dispersion model) as the Lagrangian Particle Dispersion Model (LPDM). The forward tangent linear and adjoint components of the Eulerian model were constructed directly from the original NIES TM code using an automatic differentiation tool known as TAF (Transformation of Algorithms in Fortran; http://www.FastOpt.com, with additional manual pre- and post-processing aimed at improving transparency and clarity of the code and optimizing the performance of the computing, including MPI (Message Passing Interface). The Lagrangian component did not require any code modification, as LPDMs are self-adjoint and track a significant number of particles backward in time in order to calculate the sensitivity of the observations to the neighboring emission areas. The constructed Eulerian adjoint was coupled with the Lagrangian component at a time boundary in the global domain. The simulations presented in this work were performed using the A-GELCA model in forward and adjoint modes. The forward simulation shows that the coupled model improves reproduction of the seasonal cycle and short-term variability of CO2. Mean bias and standard deviation for five of the six Siberian sites considered decrease roughly by 1 ppm when using the coupled model. The adjoint of the Eulerian model was shown, through several numerical tests, to be very accurate (within machine epsilon with mismatch around to ±6 e-14) compared to direct forward sensitivity calculations. The developed adjoint of the coupled model combines the flux conservation and stability of an Eulerian discrete adjoint formulation with the flexibility, accuracy, and high resolution of a Lagrangian backward trajectory formulation. A-GELCA will be incorporated into a variational inversion system designed to optimize surface fluxes of greenhouse gases.

  8. Mention effect in information diffusion on a micro-blogging network

    PubMed Central

    Shen, Hua-Wei; Huang, Junming; Chen, Haiqiang

    2018-01-01

    Micro-blogging systems have become one of the most important ways for information sharing. Network structure and users’ interactions such as forwarding behaviors have aroused considerable research attention, while mention, as a key feature in micro-blogging platforms which can improve the visibility of a message and direct it to a particular user beyond the underlying social structure, is seldom studied in previous works. In this paper, we empirically study the mention effect in information diffusion, using the dataset from a population-scale social media website. We find that users with high number of followers would receive much more mentions than others. We further investigate the effect of mention in information diffusion by examining the response probability with respect to the number of mentions in a message and observe a saturation at around 5 mentions. Furthermore, we find that the response probability is the highest when a reciprocal followship exists between users, and one is more likely to receive a target user’s response if they have similar social status. To illustrate these findings, we propose the response prediction task and formulate it as a binary classification problem. Extensive evaluation demonstrates the effectiveness of discovered factors. Our results have consequences for the understanding of human dynamics on the social network, and potential implications for viral marketing and public opinion monitoring. PMID:29558498

  9. Mission Services Evolution Center Message Bus

    NASA Technical Reports Server (NTRS)

    Mayorga, Arturo; Bristow, John O.; Butschky, Mike

    2011-01-01

    The Goddard Mission Services Evolution Center (GMSEC) Message Bus is a robust, lightweight, fault-tolerant middleware implementation that supports all messaging capabilities of the GMSEC API. This architecture is a distributed software system that routes messages based on message subject names and knowledge of the locations in the network of the interested software components.

  10. DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers.

    PubMed

    Sujansky, Walter; Wilson, Tom

    2015-04-01

    This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Tailored motivational message generation: A model and practical framework for real-time physical activity coaching.

    PubMed

    Op den Akker, Harm; Cabrita, Miriam; Op den Akker, Rieks; Jones, Valerie M; Hermens, Hermie J

    2015-06-01

    This paper presents a comprehensive and practical framework for automatic generation of real-time tailored messages in behavior change applications. Basic aspects of motivational messages are time, intention, content and presentation. Tailoring of messages to the individual user may involve all aspects of communication. A linear modular system is presented for generating such messages. It is explained how properties of user and context are taken into account in each of the modules of the system and how they affect the linguistic presentation of the generated messages. The model of motivational messages presented is based on an analysis of existing literature as well as the analysis of a corpus of motivational messages used in previous studies. The model extends existing 'ontology-based' approaches to message generation for real-time coaching systems found in the literature. Practical examples are given on how simple tailoring rules can be implemented throughout the various stages of the framework. Such examples can guide further research by clarifying what it means to use e.g. user targeting to tailor a message. As primary example we look at the issue of promoting daily physical activity. Future work is pointed out in applying the present model and framework, defining efficient ways of evaluating individual tailoring components, and improving effectiveness through the creation of accurate and complete user- and context models. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks †

    PubMed Central

    Zeng, Feng; Zhao, Nan; Li, Wenjia

    2017-01-01

    In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of “circles of friends” in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the “circles of friends”. We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the “circles of friends” of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms. PMID:28498309

  13. Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.

    PubMed

    Zeng, Feng; Zhao, Nan; Li, Wenjia

    2017-05-12

    In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of "circles of friends" in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the "circles of friends". We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the "circles of friends" of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms.

  14. Instant messaging at the hospital: supporting articulation work?

    PubMed

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  15. Defining the ATC Controller Interface for Data Link Clearances

    NASA Technical Reports Server (NTRS)

    Rankin, James

    1998-01-01

    The Controller Interface (CI) is the primary method for Air Traffic Controllers to communicate with aircraft via Controller-Pilot Data Link Communications (CPDLC). The controller, wearing a microphone/headset, aurally gives instructions to aircraft as he/she would with today's voice radio systems. The CI's voice recognition system converts the instructions to digitized messages that are formatted according to the RTCA DO-219 Operational Performance Standards for ATC Two-Way Data Link Communications. The DO-219 messages are transferred via RS-232 to the ATIDS system for uplink using a Mode-S datalink. Pilot acknowledgments of controller messages are downlinked to the ATIDS system and transferred to the Cl. A computer monitor is used to convey information to the controller. Aircraft data from the ARTS database are displayed on flight strips. The flight strips are electronic versions of the strips currently used in the ATC system. Outgoing controller messages cause the respective strip to change color to indicate an unacknowledged transmission. The message text is shown on the flight strips for reference. When the pilot acknowledges the message, the strip returns to its normal color. A map of the airport can also be displayed on the monitor. In addition to voice recognition, the controller can enter messages using the monitor's touch screen or by mouse/keyboard.

  16. GMSEC Interface Specification Document 2016 March

    NASA Technical Reports Server (NTRS)

    Handy, Matthew

    2016-01-01

    The GMSEC Interface Specification Document contains the standard set of defined messages. Each GMSEC standard message contains a GMSEC Information Bus Header section and a Message Contents section. Each message section identifies required fields, optional fields, data type and recommended use of the fields. Additionally, this document includes the message subjects associated with the standard messages. The system design of the operations center should ensure the components that are selected use both the API and the defined standard messages in order to achieve full interoperability from component to component.

  17. C2 Core and UCore Message Design Capstone: Interoperable Message Structure

    DTIC Science & Technology

    2009-09-01

    there are sufficient resources to carry out a mission. The Team used the Theatre Battle Management Command System ( TBMCS ) to generate sample CMD...System ( TBMCS ) was used to generate CMD messages as inputs for both use cases. These were programmatically transformed into the three-layer message...used for the experiment was generated from the TBMCS in the form of a CMD XML document. The Capstone experiment included transforming that document to

  18. Creating buzz: the neural correlates of effective message propagation.

    PubMed

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  19. Translation of globin messenger RNA by the mouse ovum

    PubMed Central

    Brinster, R. L.; Chen, H. Y.; Trumbauer, M. E.; Avarbock, M. R.

    2016-01-01

    It has been demonstrated that the Xenopus oocyte can translate rabbit haemoglobin messenger RNA (mRNA) following microinjection of the message into the cell1. The Xenopus oocyte has since been shown to be capable of translating a variety of messenger RNAs from different species2–4. This system has proved useful in understanding the mechanism of message translation and has also provided information about the translation capability of the Xenopus oocyte5,6. Several other cell types, including HeLa cells and fibroblasts, can also translate exogenous message injected into the cell7,8. However, there have been no reports of injection of mRNA into oocytes or fertilised one-cell ova of mammalian species. Nevertheless, the latter system could be of considerable use in studying the processing of exogenous messages in a mammalian system undergoing development, as well as providing insight into the way the early embryo processes injected messages and the protein products of such messages. We report here the results of injecting message into the fertilised one-cell mouse ovum and show that both mouse and rabbit globin mRNA are translated in this system. PMID:7352032

  20. A Messaging Infrastructure for WLCG

    NASA Astrophysics Data System (ADS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-12-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  1. A Novel Free Flap Monitoring System Using Tissue Oximetry with Text Message Alerts.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Lin, Samuel J; Tobias, Adam M; Taghinia, Amir H; Lee, Bernard T

    2016-06-01

    Background The time to detection of vascular compromise is a significant predictor of free flap salvage outcomes as early reexploration improves salvage rates. Continuous transcutaneous near-infrared tissue oximetry is an objective, quantitative method of detecting flap vascular compromise and has been shown to allow earlier reexploration and higher salvage rates than clinical assessment alone. We designed a novel text messaging system to improve communication using tissue oximetry monitoring. Methods A retrospective review was performed of a prospectively collected database of all microsurgical breast reconstructions from 2008 to 2015. A novel text messaging system was introduced in 2013 and programmed to send text messages alert when the tissue oximetry readings suggested potential flap compromise based on established thresholds. Patient demographics and complications, including rate of reexploration and flap loss were assessed. Results There were 900 autologous microsurgical breast free flaps during the study period: 614 were monitored with standard clinical monitoring and tissue oximetry compared with 286 flaps with the additional text messaging system. There were 27 unplanned returns to the operating room in the tissue oximetry group and 5 in the text messaging group with 1 complete flap loss in each group. Reexploration occurred sooner as a result of these text message alerts (17.5 vs. 26.6 hours postoperatively), however, it did not achieve statistical significance. Conclusions We were able to demonstrate the use of a novel text messaging system for tissue oximetry. This alert system shows promise in identifying impending flap loss with rapid notification of the surgical team. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  2. PASTE: patient-centered SMS text tagging in a medication management system.

    PubMed

    Stenner, Shane P; Johnson, Kevin B; Denny, Joshua C

    2012-01-01

    To evaluate the performance of a system that extracts medication information and administration-related actions from patient short message service (SMS) messages. Mobile technologies provide a platform for electronic patient-centered medication management. MyMediHealth (MMH) is a medication management system that includes a medication scheduler, a medication administration record, and a reminder engine that sends text messages to cell phones. The object of this work was to extend MMH to allow two-way interaction using mobile phone-based SMS technology. Unprompted text-message communication with patients using natural language could engage patients in their healthcare, but presents unique natural language processing challenges. The authors developed a new functional component of MMH, the Patient-centered Automated SMS Tagging Engine (PASTE). The PASTE web service uses natural language processing methods, custom lexicons, and existing knowledge sources to extract and tag medication information from patient text messages. A pilot evaluation of PASTE was completed using 130 medication messages anonymously submitted by 16 volunteers via a website. System output was compared with manually tagged messages. Verified medication names, medication terms, and action terms reached high F-measures of 91.3%, 94.7%, and 90.4%, respectively. The overall medication name F-measure was 79.8%, and the medication action term F-measure was 90%. Other studies have demonstrated systems that successfully extract medication information from clinical documents using semantic tagging, regular expression-based approaches, or a combination of both approaches. This evaluation demonstrates the feasibility of extracting medication information from patient-generated medication messages.

  3. Tsunami.gov: NOAA's Tsunami Information Portal

    NASA Astrophysics Data System (ADS)

    Shiro, B.; Carrick, J.; Hellman, S. B.; Bernard, M.; Dildine, W. P.

    2014-12-01

    We present the new Tsunami.gov website, which delivers a single authoritative source of tsunami information for the public and emergency management communities. The site efficiently merges information from NOAA's Tsunami Warning Centers (TWC's) by way of a comprehensive XML feed called Tsunami Event XML (TEX). The resulting unified view allows users to quickly see the latest tsunami alert status in geographic context without having to understand complex TWC areas of responsibility. The new site provides for the creation of a wide range of products beyond the traditional ASCII-based tsunami messages. The publication of modern formats such as Common Alerting Protocol (CAP) can drive geographically aware emergency alert systems like FEMA's Integrated Public Alert and Warning System (IPAWS). Supported are other popular information delivery systems, including email, text messaging, and social media updates. The Tsunami.gov portal allows NOAA staff to easily edit content and provides the facility for users to customize their viewing experience. In addition to access by the public, emergency managers and government officials may be offered the capability to log into the portal for special access rights to decision-making and administrative resources relevant to their respective tsunami warning systems. The site follows modern HTML5 responsive design practices for optimized use on mobile as well as non-mobile platforms. It meets all federal security and accessibility standards. Moving forward, we hope to expand Tsunami.gov to encompass tsunami-related content currently offered on separate websites, including the NOAA Tsunami Website, National Tsunami Hazard Mitigation Program, NOAA Center for Tsunami Research, National Geophysical Data Center's Tsunami Database, and National Data Buoy Center's DART Program. This project is part of the larger Tsunami Information Technology Modernization Project, which is consolidating the software architectures of NOAA's existing TWC's into a single system. We welcome your feedback to help Tsunami.gov become an effective public resource for tsunami information and a medium to enable better global tsunami warning coordination.

  4. International Students, University Health Centers, and Memorable Messages about Health

    ERIC Educational Resources Information Center

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  5. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    NASA Technical Reports Server (NTRS)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  6. The data acquisition system for the Anglo-Australian Observatory 2-degree field project

    NASA Technical Reports Server (NTRS)

    Shortridge, K.; Farrell, T. J.; Bailey, J.

    1992-01-01

    The Anglo-Australian Observatory (AAO) is building a system that will provide a two-degree field of view at prime focus. A robot positioner will be used to locate up to 400 optical fibers at pre-determined positions in this field. While observations are being made using one set of 400 fibers, the robot will be positioning a second set of fibers in a background field that can be moved in to replace the first when the telescope is moved to a new position. The fibers feed two spectrographs each with a 1024 square CCD detector. The software system being produced to control this involves Vaxes for overall control and data recording, UNIX workstations for fiber configuration calculations and on-line data reduction, and VME systems running VxWorks for real-time control of critical parts such as the positioner robot. The system has to be able to interact with the observatory's present data acquisition systems, which use the ADAM system. As yet, the real-time parts of ADAM have not been ported to Unix, and so we are having to produce a smaller-scale system that is similar but inherently distributed (which ADAM is not). We are using this system as a testbed for ideas that we hope may eventually influence an ADAM II system. The system we are producing is based on a message system that is designed to be able to handle inter-process and inter-processor messages of any length, efficiently, and without ever requiring a task to block (i.e., be unresponsive to 'cancel' messages, enquiry messages), other than when deliberately waiting for external input - all of which will be through such messages. The essential requirement is that a message 'send' operation should never be able to block. The messages will be hierarchical, self-defining, machine-independent data structures. This allows us to provide very simple monitoring of messages for diagnostic purposes, and allows general purpose interface programs to be written without needing to share precise byte by byte message format definitions. Programs in this system have interfaces defined simply in terms of named actions and their parameters. Real-time control programs are required to be able to handle a number of such actions concurrently; data reduction programs will normally only need to handle one action at a time ('process an image', 'display a spectrum', etc).

  7. Mobile Delivery of Treatment for Alcohol Use Disorders

    PubMed Central

    Quanbeck, Andrew; Chih, Ming-Yuan; Isham, Andrew; Johnson, Roberta; Gustafson, David

    2014-01-01

    Several systems for treating alcohol-use disorders (AUDs) exist that operate on mobile phones. These systems are categorized into four groups: text-messaging monitoring and reminder systems, text-messaging intervention systems, comprehensive recovery management systems, and game-based systems. Text-messaging monitoring and reminder systems deliver reminders and prompt reporting of alcohol consumption, enabling continuous monitoring of alcohol use. Text-messaging intervention systems additionally deliver text messages designed to promote abstinence and recovery. Comprehensive recovery management systems use the capabilities of smart-phones to provide a variety of tools and services that can be tailored to individuals, including in-the-moment assessments and access to peer discussion groups. Game-based systems engage the user using video games. Although many commercial applications for treatment of AUDs exist, few (if any) have empirical evidence of effectiveness. The available evidence suggests that although texting-based applications may have beneficial effects, they are probably insufficient as interventions for AUDs. Comprehensive recovery management systems have the strongest theoretical base and have yielded the strongest and longest-lasting effects, but challenges remain, including cost, understanding which features account for effects, and keeping up with technological advances. PMID:26259005

  8. Some Features of Maritime Telex Service Communication.

    ERIC Educational Resources Information Center

    Johnson, Barry

    1995-01-01

    This article analyzes four categories of English-language maritime telex service communication: (1) standard, system- generated messages; (2) standard procedures for transmitting messages; (3) nonstandard messages related to maritime mobile radio service (MMRS); and (4) nonstandard messages related to the organization, procedures, or equipment of…

  9. Potential effects of the introduction of the discrete address beacon system data link on air/ground information transfer problems

    NASA Technical Reports Server (NTRS)

    Grayson, R. L.

    1981-01-01

    This study of Aviation Safety Reporting System reports suggests that benefits should accure from implementation of discrete address beacon system data link. The phase enhanced terminal information system service is expected to provide better terminal information than present systems by improving currency and accuracy. In the exchange of air traffic control messages, discrete address insures that only the intended recipient receives and acts on a specific message. Visual displays and printer copy of messages should mitigate many of the reported problems associated with voice communications. The problems that remain unaffected include error in addressing the intended recipient and messages whose content is wrong but are otherwise correct as to format and reasonableness.

  10. Usability Assessment of Secure Messaging for Clinical Document Sharing between Health Care Providers and Patients.

    PubMed

    Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L

    2018-04-01

     Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing.  This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents.  We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction.  Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks.  This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.

  11. System and method for transferring telemetry data between a ground station and a control center

    NASA Technical Reports Server (NTRS)

    Ray, Timothy J. (Inventor); Ly, Vuong T. (Inventor)

    2012-01-01

    Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for coordinating communications between a ground station, a control center, and a spacecraft. The method receives a call to a simple, unified application programmer interface implementing communications protocols related to outer space, when instruction relates to receiving a command at the control center for the ground station generate an abstract message by agreeing upon a format for each type of abstract message with the ground station and using a set of message definitions to configure the command in the agreed upon format, encode the abstract message to generate an encoded message, and transfer the encoded message to the ground station, and perform similar actions when the instruction relates to receiving a second command as a second encoded message at the ground station from the control center and when the determined instruction type relates to transmitting information to the control center.

  12. Prevalence and Risk Profile Of Unread Messages To Patients In A Patient Web Portal.

    PubMed

    Crotty, B H; Mostaghimi, A; O'Brien, J; Bajracharya, A; Safran, C; Landon, B E

    2015-01-01

    Excitement around the adoption of electronic communication between physicians and patients is tempered by the possibility of increased clinical and legal risk. If patients do not read messages in a timely fashion, duplicative communication efforts may be required and patient safety may be jeopardized. We sought to assess the prevalence and risk profile of unread messages in a mature patient portal. We analyzed six years of messages (2005-2010) from physicians to patients to determine the prevalence and associated characteristics of unread messages in a patient portal. We focused on clinical messages, and excluded announcements. Because some physicians sent clinical messages to groups of patients, we labeled messages sent to more than 5 patients as "outreach" messages and excluded them from general analyses. We performed a chart review of 75 clinical messages to assess for harm. We found that 3% of clinical messages were unread after 21 days. Messages arriving outside of business hours were slightly more likely to go unread (RR 1.15 95% CI 1.11-1.19). Patients who were male (OR 1.14 CI 1.04-1.26) African American (OR 1.69 CI 1.29-2.22) or Hispanic (OR 1.74 CI 1.17-2.59), or in the lowest income group (OR 1.72 CI 1.19-2.49) were more likely to have unread messages. Chart review showed no evidence of harm, but 13% of sampled unread messages were associated with potential delays in care. Incidentally, we found 50% of the physician-initiated outreach messages were unread. Overall, secure messaging appears a safe form of communication, but systems to notify senders when messages are unread may have value. While most clinical messages were read, many outreach messages were not, providing caution for relying on such systems for information dissemination. Similar to other studies, differences by race and income were observed and require further study.

  13. Human factors research problems in electronic voice warning system design

    NASA Technical Reports Server (NTRS)

    Simpson, C. A.; Williams, D. H.

    1975-01-01

    The speech messages issued by voice warning systems must be carefully designed in accordance with general principles of human decision making processes, human speech comprehension, and the conditions in which the warnings can occur. The operator's effectiveness must not be degraded by messages that are either inappropriate or difficult to comprehend. Important experimental variables include message content, linguistic redundancy, signal/noise ratio, interference with concurrent tasks, and listener expectations generated by the pragmatic or real world context in which the messages are presented.

  14. MESA: Message-Based System Analysis Using Runtime Verification

    NASA Technical Reports Server (NTRS)

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  15. Message development for surface markers at the Hanford Radwaste Disposal sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kaplan, M.F.

    1984-12-31

    At the Hanford Reservation in Washington, there are sites which received liquid and solid transuranic wastes from the late 1940`s until 1970. Rockwell Hanford Operations (Rockwell) is investigating the feasibility of several options for the permanent disposal of these wastes. One option is to stabilize the wastes in their present locations and to add barriers to minimize water infiltration and root penetration into the wastes. This report forms part of the project to develop a marking system for transuranic wastes on the Hanford Reservation. The focus of this report is the development of the message system to appear on themore » surface markers. A logical framework is developed to deduce what is required by the message system. Alternatives for each message component are evaluated and justification is provided for the choice of each component. The components are then laid out on the surface marker to provide a legible, comprehensible message system. The surface markers are tall, standing monoliths which ring the perimeter of each disposal area. Based on the logical framework, it is recommended that three domains of representation -- symbols, pictures, and language -- be used in the message system. The warning symbol chosen for the message system is the radiation trefoil. Two other options were considered, including the warning symbol developed by the Human Interference Task Force for a high-level waste repository. The trefoil was preferred because of the widespread usage and international acceptance which is already enjoys.« less

  16. PASTE: patient-centered SMS text tagging in a medication management system

    PubMed Central

    Johnson, Kevin B; Denny, Joshua C

    2011-01-01

    Objective To evaluate the performance of a system that extracts medication information and administration-related actions from patient short message service (SMS) messages. Design Mobile technologies provide a platform for electronic patient-centered medication management. MyMediHealth (MMH) is a medication management system that includes a medication scheduler, a medication administration record, and a reminder engine that sends text messages to cell phones. The object of this work was to extend MMH to allow two-way interaction using mobile phone-based SMS technology. Unprompted text-message communication with patients using natural language could engage patients in their healthcare, but presents unique natural language processing challenges. The authors developed a new functional component of MMH, the Patient-centered Automated SMS Tagging Engine (PASTE). The PASTE web service uses natural language processing methods, custom lexicons, and existing knowledge sources to extract and tag medication information from patient text messages. Measurements A pilot evaluation of PASTE was completed using 130 medication messages anonymously submitted by 16 volunteers via a website. System output was compared with manually tagged messages. Results Verified medication names, medication terms, and action terms reached high F-measures of 91.3%, 94.7%, and 90.4%, respectively. The overall medication name F-measure was 79.8%, and the medication action term F-measure was 90%. Conclusion Other studies have demonstrated systems that successfully extract medication information from clinical documents using semantic tagging, regular expression-based approaches, or a combination of both approaches. This evaluation demonstrates the feasibility of extracting medication information from patient-generated medication messages. PMID:21984605

  17. Perceptions of the Feasibility and Practicalities of Text Messaging-Based Infectious Disease Surveillance: A Questionnaire Survey.

    PubMed

    Dang, Linh Thuy; Vu, Nguyen Cong; Vu, Thiem Dinh; James, Spencer L; Katona, Peter; Katona, Lindsay; Rosen, Joseph M; Nguyen, Cuong Kieu

    2016-05-25

    In Vietnam, infectious disease surveillance data are collected via a paper-based system through four government tiers leading to a large delay. Meanwhile, mobile phones are abundant and very popular in the country, and known to be a useful tool in health care worldwide. Therefore, there is a great potential for the development of a timely disease surveillance system through the use of mobile phone short message service (SMS) text messages. This study aims to explore insights about the feasibility and practicalities of the utilization of SMS text messaging-based interventions in disease-reporting systems by identifying potential challenges and barriers in the text messaging process and looking at lessons learned. An SMS text messaging-based disease tracking system was set up in Vietnam with patient reports texted by clinic staff. Two 6-month trials utilizing this disease tracking system were designed and implemented in two northern provinces of Vietnam to report two infectious diseases: diarrhea and influenza-like illness. A structured self-reported questionnaire was developed to measure the feasibility and practicalities of the system from the participants. On the completion of the second trial in 2013, participating health staff from 40 commune health centers in the two pilot provinces were asked to complete the survey (N=80). Most participants were female (61%, 49/80) and nearly half (44%, 35/80) were heads of a commune health center. Approximately two-thirds (63%, 50/80) of participants retained the basic structure of the SMS text message report and there was a strong influence (OR 28.2, 95% CI 5.3-151.2) of those people on the time they spent texting the information. The majority (88%, 70/80) felt the information conveyed in the SMS text message report was not difficult to understand. Most (86%, 69/80) believed that they could report all 28 infectious diseases asked for by the Ministry of Health by using SMS text messaging. From a health center staff perspective, a disease-reporting system utilizing text messaging technology is easy to use and has great potential to be implemented and expanded nationwide. The survey showed positive perceptions and feedback from the participants and contributed to a promising practical solution to improve the surveillance system of infectious disease in Vietnam.

  18. Electronic health information quality challenges and interventions to improve public health surveillance data and practice.

    PubMed

    Dixon, Brian E; Siegel, Jason A; Oemig, Tanya V; Grannis, Shaun J

    2013-01-01

    We examined completeness, an attribute of data quality, in the context of electronic laboratory reporting (ELR) of notifiable disease information to public health agencies. We extracted more than seven million ELR messages from multiple clinical information systems in two states. We calculated and compared the completeness of various data fields within the messages that were identified to be important to public health reporting processes. We compared unaltered, original messages from source systems with similar messages from another state as well as messages enriched by a health information exchange (HIE). Our analysis focused on calculating completeness (i.e., the number of nonmissing values) for fields deemed important for inclusion in notifiable disease case reports. The completeness of data fields for laboratory transactions varied across clinical information systems and jurisdictions. Fields identifying the patient and test results were usually complete (97%-100%). Fields containing patient demographics, patient contact information, and provider contact information were suboptimal (6%-89%). Transactions enhanced by the HIE were found to be more complete (increases ranged from 2% to 25%) than the original messages. ELR data from clinical information systems can be of suboptimal quality. Public health monitoring of data sources and augmentation of ELR message content using HIE services can improve data quality.

  19. Six-Message Electromechanical Display System

    NASA Technical Reports Server (NTRS)

    Howard, Richard T.

    2007-01-01

    A proposed electromechanical display system would be capable of presenting as many as six distinct messages. In the proposed system, each display element would include a cylinder having a regular hexagonal cross section.

  20. Behavioral and electrophysiological signatures of word translation processes.

    PubMed

    Jost, Lea B; Radman, Narges; Buetler, Karin A; Annoni, Jean-Marie

    2018-01-31

    Translation is a demanding process during which a message is analyzed, translated and communicated from one language to another. Despite numerous studies on translation mechanisms, the electrophysiological processes underlying translation with overt production remain largely unexplored. Here, we investigated how behavioral response patterns and spatial-temporal brain dynamics differ in a translation compared to a control within-language word-generation task. We also investigated how forward and backward translation differs on the behavioral and electrophysiological level. To address these questions, healthy late bilingual subjects performed a translation and a within-language control task while a 128-channel EEG was recorded. Behavioral data showed faster responses for translation compared to within-language word generation and faster responses for backward than forward translation. The ERP-analysis revealed stronger early ( < 200ms) preparatory and attentional processes for between than within word generation. Later (424-630ms) differences were characterized by distinct engagement of domain-general control networks, namely self-monitoring and lexical access interference. Language asymmetry effects occurred at a later stage (600ms), reflecting differences in conceptual processing characterized by a larger involvement of areas implicated in attention, arousal and awareness for forward versus backward translation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Individual differences in drivers' cognitive processing of road safety messages.

    PubMed

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message acceptance measures. As predicted, the degree of initial processing of the content of the social gain-framed message mediated the relationship between the reward sensitive trait and message effectiveness. Initial processing of the physical loss-framed message partially mediated the relationship between the punishment sensitive trait and both message effectiveness and behavioural intention ratings. These results show that reward sensitivity and punishment sensitivity traits influence cognitive processing of gain-framed and loss-framed message content, respectively, and subsequently, message effectiveness and behavioural intention ratings. Specifically, a range of road safety messages (i.e., gain-frame and loss-frame messages) could be designed which align with the processing biases associated with personality and which would target those individuals who are sensitive to rewards and those who are sensitive to punishments. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  3. Broadcasting a message in a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Ahmad A

    2013-04-16

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  4. Broadcasting a message in a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the childmore » nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.« less

  5. Send-side matching of data communications messages

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2014-06-17

    Send-side matching of data communications messages in a distributed computing system comprising a plurality of compute nodes, including: issuing by a receiving node to source nodes a receive message that specifies receipt of a single message to be sent from any source node, the receive message including message matching information, a specification of a hardware-level mutual exclusion device, and an identification of a receive buffer; matching by two or more of the source nodes the receive message with pending send messages in the two or more source nodes; operating by one of the source nodes having a matching send message the mutual exclusion device, excluding messages from other source nodes with matching send messages and identifying to the receiving node the source node operating the mutual exclusion device; and sending to the receiving node from the source node operating the mutual exclusion device a matched pending message.

  6. Multiple node remote messaging

    DOEpatents

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  7. Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks

    PubMed Central

    Mahjoub, Reem K.; Elleithy, Khaled

    2017-01-01

    The actor nodes are the spine of wireless sensor and actor networks (WSANs) that collaborate to perform a specific task in an unverified and uneven environment. Thus, there is a possibility of high failure rate in such unfriendly scenarios due to several factors such as power consumption of devices, electronic circuit failure, software errors in nodes or physical impairment of the actor nodes and inter-actor connectivity problem. Therefore, it is extremely important to discover the failure of a cut-vertex actor and network-disjoint in order to improve the Quality-of-Service (QoS). In this paper, we propose an Efficient Actor Recovery (EAR) paradigm to guarantee the contention-free traffic-forwarding capacity. The EAR paradigm consists of a Node Monitoring and Critical Node Detection (NMCND) algorithm that monitors the activities of the nodes to determine the critical node. In addition, it replaces the critical node with backup node prior to complete node-failure which helps balancing the network performance. The packets are handled using Network Integration and Message Forwarding (NIMF) algorithm that determines the source of forwarding the packets; either from actor or sensor. This decision-making capability of the algorithm controls the packet forwarding rate to maintain the network for a longer time. Furthermore, for handling the proper routing strategy, Priority-Based Routing for Node Failure Avoidance (PRNFA) algorithm is deployed to decide the priority of the packets to be forwarded based on the significance of information available in the packet. To validate the effectiveness of the proposed EAR paradigm, the proposed algorithms were tested using OMNET++ simulation. PMID:28420102

  8. Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks.

    PubMed

    Mahjoub, Reem K; Elleithy, Khaled

    2017-04-14

    The actor nodes are the spine of wireless sensor and actor networks (WSANs) that collaborate to perform a specific task in an unverified and uneven environment. Thus, there is a possibility of high failure rate in such unfriendly scenarios due to several factors such as power consumption of devices, electronic circuit failure, software errors in nodes or physical impairment of the actor nodes and inter-actor connectivity problem. Therefore, it is extremely important to discover the failure of a cut-vertex actor and network-disjoint in order to improve the Quality-of-Service (QoS). In this paper, we propose an Efficient Actor Recovery (EAR) paradigm to guarantee the contention-free traffic-forwarding capacity. The EAR paradigm consists of a Node Monitoring and Critical Node Detection (NMCND) algorithm that monitors the activities of the nodes to determine the critical node. In addition, it replaces the critical node with backup node prior to complete node-failure which helps balancing the network performance. The packets are handled using Network Integration and Message Forwarding (NIMF) algorithm that determines the source of forwarding the packets; either from actor or sensor. This decision-making capability of the algorithm controls the packet forwarding rate to maintain the network for a longer time. Furthermore, for handling the proper routing strategy, Priority-Based Routing for Node Failure Avoidance (PRNFA) algorithm is deployed to decide the priority of the packets to be forwarded based on the significance of information available in the packet. To validate the effectiveness of the proposed EAR paradigm, the proposed algorithms were tested using OMNET++ simulation.

  9. Alert!: In Emergencies, Schools Use Technology to Get the Message out Quickly

    ERIC Educational Resources Information Center

    Violino, Bob

    2008-01-01

    This article describes how a growing number of community colleges have begun deploying emergency alert systems that can be used to send information via e-mail and text messaging directly to students' cell phones and other portable devices. Such systems enable authorized campus administrators to send messages to thousands of people within minutes.…

  10. Efficient Implementation of Multigrid Solvers on Message-Passing Parrallel Systems

    NASA Technical Reports Server (NTRS)

    Lou, John

    1994-01-01

    We discuss our implementation strategies for finite difference multigrid partial differential equation (PDE) solvers on message-passing systems. Our target parallel architecture is Intel parallel computers: the Delta and Paragon system.

  11. Multimorbidity: A Review of the Complexity of Mental Health Issues in Bariatric Surgery Candidates Informed by Canadian Data.

    PubMed

    Taylor, Valerie H; Hensel, Jennifer

    2017-08-01

    Multimorbidity is significant for obesity and mental health issues. As a consequence, mental illness is overrepresented in patients seeking bariatric surgery. This review addresses that overlap, with a focus on Canadian data. The healthcare system in Canada is unique, but issues related to prevalence of mental health in patients seeking bariatric surgery are similar to those in studies conducted in other countries. Although data on suicide are lacking, Canadian data have shown similar rates of self-harm behaviours and linkages between psychopathology and weight regain after surgery. Geographic issues that make it difficult for individuals to attend regular follow-up appointments have encouraged the use of e-health tools to engage patients and ensure access to follow-up care, which may provide unique opportunities going forward. Additional work is needed to inform best practices in the Canadian system, but in keeping with other data, the consistent message from Canada is that appropriate evaluation and aftercare are essential components of a well-informed bariatric program. Copyright © 2017 Diabetes Canada. Published by Elsevier Inc. All rights reserved.

  12. Advanced CLIPS capabilities

    NASA Technical Reports Server (NTRS)

    Riley, Gary

    1991-01-01

    The C Language Integrated Production System (CLIPS) is a forward chaining rule based language developed by NASA. CLIPS was designed specifically to provide high portability, low cost, and easy integration with external systems. The current release of CLIPS, version 4.3, is being used by over 2500 users throughout the public and private community. The primary addition to the next release of CLIPS, version 5.0, will be the CLIPS Object Oriented Language (COOL). The major capabilities of COOL are: class definition with multiple inheritance and no restrictions on the number, types, or cardinality of slots; message passing which allows procedural code bundled with an object to be executed; and query functions which allow groups of instances to be examined and manipulated. In addition to COOL, numerous other enhancements were added to CLIPS including: generic functions (which allow different pieces of procedural code to be executed depending upon the types or classes of the arguments); integer and double precision data type support; multiple conflict resolution strategies; global variables; logical dependencies; type checking on facts; full ANSI compiler support; and incremental reset for rules.

  13. MessageSpace: a messaging system for health research

    NASA Astrophysics Data System (ADS)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  14. Development of a staff recall system for mass casualty incidents using cell phone text messaging.

    PubMed

    Epstein, Richard H; Ekbatani, Ali; Kaplan, Javier; Shechter, Ronen; Grunwald, Zvi

    2010-03-01

    After a mass casualty incident (MCI), rapid mobilization of hospital personnel is required because of an expected surge of victims. Risk assessment of our department's manual phone tree recall system revealed multiple weaknesses that would limit an effective response. Because cell phone use is widespread within the department, we developed and tested a staff recall system, based in our anesthesia information management system (AIMS), using Short Message Service (SMS) text messaging. We sent test text messages to anesthesia staff members' cell phone numbers, determined the distance from their home to the hospital, and stored this information in our AIMS. Latency testing for the time from transmission of SMS test messages from the server to return of an e-mail reply was determined at 2 different times on 2 different dates, 1 of which was a busy holiday weekend, using volunteers within the department. Two unannounced simulated disaster recall drills were conducted, with text messages sent asking for the anticipated time to return to the hospital. A timeline of available staff on site was determined. Reasons for failure to respond to the disaster notification message were tabulated. Latency data were fit by a log-normal distribution with an average of 82 seconds from message transmission to e-mail reply. Replies to the simulated disaster alert were received from approximately 50% of staff, with 16 projecting that they would have been able to be back at the hospital within 30 minutes on both dates. There would have been 21 and 23 staff in-house at 30 minutes, and 32 and 37 staff in-house at 60 minutes on the first and second test date, respectively, including in-house staff. Of the nonresponders to the alert, 48% indicated that their cell phone was not with them or was turned off, whereas 22% missed the message. Our SMS staff recall system is likely to be able to rapidly mobilize sufficient numbers of anesthesia personnel in response to an MCI, but actual performance cannot be predicted with confidence. Using our AIMS as the source for contact information and from which to send messages was simple, inexpensive, and easy to implement. Updating contact information, periodic testing, and analysis of responses to simulated disaster alerts are essential for the effective functioning of such a system. However, maintenance of alternative methods of communication is recommended, because there may be more significant message transmission delays and failures during an actual MCI, and not all staff will receive the text message in a timely fashion.

  15. New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm

    NASA Astrophysics Data System (ADS)

    Hoomod, Haider K.; Radi, A. M.

    2018-05-01

    The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.

  16. {open_quotes}Media-On-Demand{close_quotes} multimedia electronic mail: A tool for collaboration on the web

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tsoi, Kei Nam; Rahman, S.M.

    1996-12-31

    Undoubtedly, multimedia electronic mail has many advantages in exchanging information electronically in a collaborative work. The existing design of e-mail systems architecture is inefficient in exchanging multimedia message which has much larger volume, and requires more bandwidth and storage space than the text-only messages. This paper presents an innovative method for exchanging multimedia mail messages in a heterogeneous environment to support collaborative work over YAW on the Internet. We propose a {open_quotes}Parcel Collection{close_quotes} approach for exchanging multimedia electronic mail messages. This approach for exchanging multimedia electronic mail messages integrates the current WWW technologies with the existing electronic mail systems.

  17. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  18. Getting Your Message Across: Mobile Phone Text Messaging

    ERIC Educational Resources Information Center

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  19. High occupancy vehicle (HOV) lane management system : amendment A.

    DOT National Transportation Integrated Search

    2011-12-01

    This report describes a system designed to provide Single Occupancy Hybrid Vehicles (SOHVs) restriction : messages dynamically to drivers through variable message signs. This system will allow California to : comply with federal requirements (that Si...

  20. Eliminating livelock by assigning the same priority state to each message that is input into a flushable routing system during N time intervals

    DOEpatents

    Faber, V.

    1994-11-29

    Livelock-free message routing is provided in a network of interconnected nodes that is flushable in time T. An input message processor generates sequences of at least N time intervals, each of duration T. An input register provides for receiving and holding each input message, where the message is assigned a priority state p during an nth one of the N time intervals. At each of the network nodes a message processor reads the assigned priority state and awards priority to messages with priority state (p-1) during an nth time interval and to messages with priority state p during an (n+1) th time interval. The messages that are awarded priority are output on an output path toward the addressed output message processor. Thus, no message remains in the network for a time longer than T. 4 figures.

  1. Eliminating livelock by assigning the same priority state to each message that is inputted into a flushable routing system during N time intervals

    DOEpatents

    Faber, Vance

    1994-01-01

    Livelock-free message routing is provided in a network of interconnected nodes that is flushable in time T. An input message processor generates sequences of at least N time intervals, each of duration T. An input register provides for receiving and holding each input message, where the message is assigned a priority state p during an nth one of the N time intervals. At each of the network nodes a message processor reads the assigned priority state and awards priority to messages with priority state (p-1) during an nth time interval and to messages with priority state p during an (n+1) th time interval. The messages that are awarded priority are output on an output path toward the addressed output message processor. Thus, no message remains in the network for a time longer than T.

  2. Exact outage analysis of the effect of co-channel interference on secured multi-hop relaying networks

    NASA Astrophysics Data System (ADS)

    Quang Nguyen, Sang; Kong, Hyung Yun

    2016-11-01

    In this article, the presence of multi-hop relaying, eavesdropper and co-channel interference (CCI) in the same system model is investigated. Specifically, the effect of CCI on a secured multi-hop relaying network is studied, in which the source communicates with the destination via multi-relay-hopping under the presence of an eavesdropper and CCI at each node. The optimal relay at each cluster is selected to help forward the message from the source to the destination. We apply two relay selection approaches to such a system model, i.e. the optimal relay is chosen based on (1) the maximum channel gain from the transmitter to all relays in the desired cluster and (2) the minimum channel gain from the eavesdropper to all relays in each cluster. For the performance evaluation and comparison, we derived the exact closed form of the secrecy outage probability of the two approaches. That analysis is verified by Monte Carlo simulation. Finally, the effects of the number of hops, the transmit power at the source, relays and the external sources, the distance between the external sources and each node in the system, and the location of the eavesdropper are presented and discussed.

  3. SMS Security System on Mobile Devices Using Tiny Encryption Algorithm

    NASA Astrophysics Data System (ADS)

    Novelan, M. S.; Husein, A. M.; Harahap, M.; Aisyah, S.

    2018-04-01

    The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the Java programming language. JDK 1.7 as the Java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the Java compiler. Eclipse, a Java SDK and the Android SDK as a Java source code editor.

  4. A system for de-identifying medical message board text.

    PubMed

    Benton, Adrian; Hill, Shawndra; Ungar, Lyle; Chung, Annie; Leonard, Charles; Freeman, Cristin; Holmes, John H

    2011-06-09

    There are millions of public posts to medical message boards by users seeking support and information on a wide range of medical conditions. It has been shown that these posts can be used to gain a greater understanding of patients' experiences and concerns. As investigators continue to explore large corpora of medical discussion board data for research purposes, protecting the privacy of the members of these online communities becomes an important challenge that needs to be met. Extant entity recognition methods used for more structured text are not sufficient because message posts present additional challenges: the posts contain many typographical errors, larger variety of possible names, terms and abbreviations specific to Internet posts or a particular message board, and mentions of the authors' personal lives. The main contribution of this paper is a system to de-identify the authors of message board posts automatically, taking into account the aforementioned challenges. We demonstrate our system on two different message board corpora, one on breast cancer and another on arthritis. We show that our approach significantly outperforms other publicly available named entity recognition and de-identification systems, which have been tuned for more structured text like operative reports, pathology reports, discharge summaries, or newswire.

  5. Message-adjusted network (MAN) hypothesis in gastro-entero-pancreatic (GEP) endocrine system.

    PubMed

    Aykan, N Faruk

    2007-01-01

    Several types of communication coordinate body functions to maintain homeostasis. Clarifying intercellular communication systems is as important as intracellular signal mechanisms. In this study, we propose an intercellular network model to establish novel targets in GEP-endocrine system, based on up-to-date information from medical publications. As materials, two physiologic events which are Pavlov's sham-feeding assay and bicarbonate secretion into the duodenum from pancreas were explored by new biologic data from the literature. Major key words used in Pub-Med were modes of regulations (autocrine, paracrine, endocrine, neurocrine, juxtacrine, lumencrine), GEP cells, hormones, peptides and neuro-transmitters. In these two examples of physiologic events, we can design a model of network to clarify transmission of a message. When we take a simple, unique message, we can observe a complete intercellular network. In our examples, these messages are "food is coming" and "hydrogen ions are increasing" in human language (humanese). We need to find molecular counterparts of these unique messages in cell language (cellese). In this network (message-adjusted network; MAN), message is an input which can affect the physiologic equilibrium, mission is an output to improve the disequilibrium and aim is always maintenance of homeostasis. If we orientate to a transmission of a unique message we can distinguish that different cells use different chemical messengers in different modes of regulations to transmit the same message. This study also supports Shannon's information theory and cell language theories such as von Neumann-Patte principles. After human genome project (HU-GO) and protein organisations (HU-PO), finding true messages and the establishment of their networks (in our model HU-MAN project) can be a novel and exciting field in cell biology. We established an intercellular network model to understand intercellular communication in the physiology of GEP endocrine system. This model could help to explain complex physiologic events as well as to generate new treatment concepts.

  6. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  7. Nonblocking and orphan free message logging protocols

    NASA Astrophysics Data System (ADS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  8. Increasing the Automation and Autonomy for Spacecraft Operations with Criteria Action Table

    NASA Technical Reports Server (NTRS)

    Li, Zhen-Ping; Savki, Cetin

    2005-01-01

    The Criteria Action Table (CAT) is an automation tool developed for monitoring real time system messages for specific events and processes in order to take user defined actions based on a set of user-defined rules. CAT was developed by Lockheed Martin Space Operations as a part of a larger NASA effort at the Goddard Space Flight Center (GSFC) to create a component-based, middleware-based, and standard-based general purpose ground system architecture referred as GMSEC - the GSFC Mission Services Evolution Center. CAT has been integrated into the upgraded ground systems for Tropical Rainfall Measuring Mission (TRMM) and Small Explorer (SMEX) satellites and it plays the central role in their automation effort to reduce the cost and increase the reliability for spacecraft operations. The GMSEC architecture provides a standard communication interface and protocol for components to publish/describe messages to an information bus. It also provides a standard message definition so components can send and receive messages to the bus interface rather than each other, thus reducing the component-to-component coupling, interface, protocols, and link (socket) management. With the GMSEC architecture, components can publish standard event messages to the bus for all nominal, significant, and surprising events in regard to satellite, celestial, ground system, or any other activity. In addition to sending standard event messages, each GMSEC compliant component is required to accept and process GMSEC directive request messages.

  9. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care.

    PubMed

    Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.

  10. Patient-to-physician messaging: volume nearly tripled as more patients joined system, but per capita rate plateaued.

    PubMed

    Crotty, Bradley H; Tamrat, Yonas; Mostaghimi, Arash; Safran, Charles; Landon, Bruce E

    2014-10-01

    Patients want to be able to communicate with their physicians by e-mail. However, physicians are often concerned about the impact that such communications will have on their time, productivity, and reimbursement. Typically, physicians are not reimbursed for time spent communicating with patients electronically. But under federal meaningful-use criteria for information technology, physicians can receive a modest incentive for such communications. Little is known about trends in secure e-mail messaging between physicians and patients. To understand these trends, we analyzed the volume of messages in a large academic health system's patient portal in the period 2001-10. At the end of 2010, 49,778 patients (22.7 percent of all patients seen within the system) had enrolled in the portal, and 36.9 percent of enrolled patients (8.4 percent of all patients) had sent at least one message to a physician. Physicians in the aggregate saw a near tripling of e-mail messages during the study period. However, the number of messages per hundred patients per month stabilized between 2005 and 2010, at an average of 18.9 messages. As physician reimbursement moves toward global payments, physicians' and patients' participation in secure messaging will likely increase, and electronic communication should be considered part of physicians' job descriptions. Project HOPE—The People-to-People Health Foundation, Inc.

  11. Lessons learned from the implementation of clinical messaging systems.

    PubMed

    Barnes, Mike

    2007-10-11

    The Regenstrief Institute has designed and implemented two clinical messaging systems over the past six years, both called DOCS4DOCS. These systems receive HL7 messages from data sources and deliver results to clinicians via the web, fax, or as HL7 directed to an EMR. This paper focuses on some of the lessons we have learned, both good and bad. We discuss important issues in clinical messaging including provider mapping, document delivery and duplicate prevention, creating uniform HL7 outbound feeds, user authentication, the problems of allowing Active-X controls, why automatic printing of documents is not important although a frequently requested feature, and assorted other pearls of wisdom we have acquired.

  12. Lessons Learned from the Implementation of Clinical Messaging Systems

    PubMed Central

    Barnes, Mike

    2007-01-01

    The Regenstrief Institute has designed and implemented two clinical messaging systems over the past six years, both called DOCS4DOCS®. These systems receive HL7 messages from data sources and deliver results to clinicians via the web, fax, or as HL7 directed to an EMR. This paper focuses on some of the lessons we have learned, both good and bad. We discuss important issues in clinical messaging including provider mapping, document delivery and duplicate prevention, creating uniform HL7 outbound feeds, user authentication, the problems of allowing Active-X controls, why automatic printing of documents is not important although a frequently requested feature, and assorted other pearls of wisdom we have acquired. PMID:18693793

  13. An analysis of normative messages in signs at recreation settings

    Treesearch

    P.L. Winter; R.B. Cialdini; R.J. Bator; K. Rhoads; B.J. Sagarin

    1998-01-01

    The reliance on signs as a mode of agency communication with visitors requires an examination of message presentation and content in order to evaluate message impact and effectiveness. This paper reports on a system¬atic evaluation of signs and messages at 42 recreation areas in California and Arizona. A number of factors...

  14. The HUMSAT System: a CubeSat-based Constellation for In-situ and Inexpensive Environmental Measurements

    NASA Astrophysics Data System (ADS)

    Tubío-Pardavila, R.; Vigil, S. A.; Puig-Suari, J.; Aguado Agelet, F.

    2014-12-01

    There is a requirement for low cost in-situ measurements of environmental parameters such as air quality, meteorological data, and water quality in remote areas. Currently available solutions for such measurements include remote sensing from satellite and aircraft platforms, and in-situ measurements from mobile and aircraft platforms. Fixed systems such as eddy covariance networks, tall towers, and the Total Carbon Column Observing Network (TCCON) are providing precision greenhouse gas measurements. Within this context, the HUMSAT system designed by the University of Vigo (Spain) will complement existing high-precision measurement systems with low cost in-situ ground based sensors in remote locations using a constellation of CubeSats as a communications relay. The HUMSAT system standardizes radio communications in between deployed sensors and the CubeSats of the constellation, which act as store and forward satellites to ground stations for uploading to the internet. Current ground stations have been established at the University of Vigo (Spain) and California Polytechnic State University (Cal Poly). Users of the system may deploy their own environmental sensors to meet local requirements. The sensors will be linked to a low-cost satellite data transceiver using a standard HUMSAT protocol. The transceiver is capable of receiving data from the HUMSAT constellation to remotely reconfigure sensors without the need of physically going to the sensor location. This transceiver uses a UHF channel around 437 MHz to exchange short data messages with the sensors. These data messages can contain up to 32 bytes of useful information and are transmitted at a speed around 300 bps. The protocol designed for this system handles the access to the channel by all these elements and guarantees a correct transmission of the information in such an scenario. The University of Vigo has launched the first satellite of the constellation, the HUMSAT-D CubeSat in November 2013 and has deployed sensors in Spain and Brazil. Sensors will be also deployed by Cal Poly in the near future. In the following months, the SERPENS CubeSAT Mission, a joint project of the University of Brasilia and the University of Vigo will launch the second CubeSat of the constellation.

  15. Computer-supported feedback message tailoring: theory-informed adaptation of clinical audit and feedback for learning and behavior change.

    PubMed

    Landis-Lewis, Zach; Brehaut, Jamie C; Hochheiser, Harry; Douglas, Gerald P; Jacobson, Rebecca S

    2015-01-21

    Evidence shows that clinical audit and feedback can significantly improve compliance with desired practice, but it is unclear when and how it is effective. Audit and feedback is likely to be more effective when feedback messages can influence barriers to behavior change, but barriers to change differ across individual health-care providers, stemming from differences in providers' individual characteristics. The purpose of this article is to invite debate and direct research attention towards a novel audit and feedback component that could enable interventions to adapt to barriers to behavior change for individual health-care providers: computer-supported tailoring of feedback messages. We argue that, by leveraging available clinical data, theory-informed knowledge about behavior change, and the knowledge of clinical supervisors or peers who deliver feedback messages, a software application that supports feedback message tailoring could improve feedback message relevance for barriers to behavior change, thereby increasing the effectiveness of audit and feedback interventions. We describe a prototype system that supports the provision of tailored feedback messages by generating a menu of graphical and textual messages with associated descriptions of targeted barriers to behavior change. Supervisors could use the menu to select messages based on their awareness of each feedback recipient's specific barriers to behavior change. We anticipate that such a system, if designed appropriately, could guide supervisors towards giving more effective feedback for health-care providers. A foundation of evidence and knowledge in related health research domains supports the development of feedback message tailoring systems for clinical audit and feedback. Creating and evaluating computer-supported feedback tailoring tools is a promising approach to improving the effectiveness of clinical audit and feedback.

  16. NCC Simulation Model: Simulating the operations of the network control center, phase 2

    NASA Technical Reports Server (NTRS)

    Benjamin, Norman M.; Paul, Arthur S.; Gill, Tepper L.

    1992-01-01

    The simulation of the network control center (NCC) is in the second phase of development. This phase seeks to further develop the work performed in phase one. Phase one concentrated on the computer systems and interconnecting network. The focus of phase two will be the implementation of the network message dialogues and the resources controlled by the NCC. These resources are requested, initiated, monitored and analyzed via network messages. In the NCC network messages are presented in the form of packets that are routed across the network. These packets are generated, encoded, decoded and processed by the network host processors that generate and service the message traffic on the network that connects these hosts. As a result, the message traffic is used to characterize the work done by the NCC and the connected network. Phase one of the model development represented the NCC as a network of bi-directional single server queues and message generating sources. The generators represented the external segment processors. The served based queues represented the host processors. The NCC model consists of the internal and external processors which generate message traffic on the network that links these hosts. To fully realize the objective of phase two it is necessary to identify and model the processes in each internal processor. These processes live in the operating system of the internal host computers and handle tasks such as high speed message exchanging, ISN and NFE interface, event monitoring, network monitoring, and message logging. Inter process communication is achieved through the operating system facilities. The overall performance of the host is determined by its ability to service messages generated by both internal and external processors.

  17. A hazard-independent approach for the standardised multi-channel dissemination of warning messages

    NASA Astrophysics Data System (ADS)

    Esbri Palomares, M. A.; Hammitzsch, M.; Lendholt, M.

    2012-04-01

    The tsunami disaster affecting the Indian Ocean region on Christmas 2004 demonstrated very clearly the shortcomings in tsunami detection, public warning processes as well as intergovernmental warning message exchange in the Indian Ocean region. In that regard, early warning systems require that the dissemination of early warning messages has to be executed in way that ensures that the message delivery is timely; the message content is understandable, usable and accurate. To that end, diverse and multiple dissemination channels must be used to increase the chance of the messages reaching all affected persons in a hazard scenario. In addition to this, usage of internationally accepted standards for the warning dissemination such as the Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) Distribution Element specified by the Organization for the Advancement of Structured Information Standards (OASIS) increase the interoperability among different warning systems enabling thus the concept of system-of-systems proposed by GEOSS. The project Distant Early Warning System (DEWS), co-funded by the European Commission under the 6th Framework Programme, aims at strengthening the early warning capacities by building an innovative generation of interoperable tsunami early warning systems based on the above mentioned concepts following a Service-oriented Architecture (SOA) approach. The project focuses on the downstream part of the hazard information processing where customized, user-tailored warning messages and alerts flow from the warning centre to the responsible authorities and/or the public with their different needs and responsibilities. The information logistics services within DEWS generate tailored EDXL-DE/CAP warning messages for each user that must receive the message according to their preferences, e.g., settings for language, interested areas, dissemination channels, etc.. However, the significant difference in the implementation and capabilities of different dissemination channels such as SMS, email and television, have bearing on the information processing required for delivery and consumption of a DEWS EDXL-DE/CAP message over each dissemination channel. These messages may include additional information in the form of maps, graphs, documents, sensor observations, etc. Therefore, the generated messages are pre-processed by channel adaptors in the information dissemination services converting it into a format that is suitable for end-to-end delivery over the dissemination channels without any semantic distortion. The approach followed by DEWS for disseminating warnings not only relies on traditional communication ways used by the already established early warnings such as the delivery of faxes and phone calls but takes into consideration the use of other broadly used communication channels such as SMS, email, narrowcast and broadcast television, instant messaging, Voice over IP, and radio. It also takes advantage of social media channels like RSS feeds, Facebook, Twitter, etc., enabling a multiplier effect, like in the case of radio and television, and thus allowing to create mash-ups by aggregating other sources of information to the original message. Finally, status information is also important in order to assess and understand whether the process of disseminating the warning to the message consumers has been successfully completed or the process failed at some point of the dissemination chain. To that end, CAP-based messages generated within the information dissemination services provide the semantics for those fields that are of interest within the context of reporting the warning dissemination status in DEWS.

  18. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOEpatents

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  19. Communicating with the workforce during emergencies: developing an employee text messaging program in a local public health setting.

    PubMed

    Karasz, Hilary N; Bogan, Sharon; Bosslet, Lindsay

    2014-01-01

    Short message service (SMS) text messaging can be useful for communicating information to public health employees and improving workforce situational awareness during emergencies. We sought to understand how the 1,500 employees at Public Health--Seattle & King County, Washington, perceived barriers to and benefits of participation in a voluntary, employer-based SMS program. Based on employee feedback, we developed the system, marketed it, and invited employees to opt in. The system was tested during an ice storm in January 2012. Employee concerns about opting into an SMS program included possible work encroachment during non-work time and receiving excessive irrelevant messages. Employees who received messages during the weather event reported high levels of satisfaction and perceived utility from the program. We conclude that text messaging is a feasible form of communication with employees during emergencies. Care should be taken to design and deploy a program that maximizes employee satisfaction.

  20. A Proposed Operational Concept for the Defense Communications Operations Support System.

    DTIC Science & Technology

    1986-01-01

    Artificial Intelligence AMA Automatic Message Accounting AMIE AUTODIN Management Index System AMPE Automated Message Processing Exchange ANCS AUTOVON Network...Support IMPRESS Inpact/Restoral System INFORM Information Retrieval System 1OC Initial Operational Capability IRU Intellegent Remote Unit I-S/A AMPE

  1. An Envelope Based Feedback Control System for Earthquake Early Warning: Reality Check Algorithm

    NASA Astrophysics Data System (ADS)

    Heaton, T. H.; Karakus, G.; Beck, J. L.

    2016-12-01

    Earthquake early warning systems are, in general, designed to be open loop control systems in such a way that the output, i.e., the warning messages, only depend on the input, i.e., recorded ground motions, up to the moment when the message is issued in real-time. We propose an algorithm, which is called Reality Check Algorithm (RCA), which would assess the accuracy of issued warning messages, and then feed the outcome of the assessment back into the system. Then, the system would modify its messages if necessary. That is, we are proposing to convert earthquake early warning systems into feedback control systems by integrating them with RCA. RCA works by continuously monitoring and comparing the observed ground motions' envelopes to the predicted envelopes of Virtual Seismologist (Cua 2005). Accuracy of magnitude and location (both spatial and temporal) estimations of the system are assessed separately by probabilistic classification models, which are trained by a Sparse Bayesian Learning technique called Automatic Relevance Determination prior.

  2. Reference Architecture for MNE 5 Technical System

    DTIC Science & Technology

    2007-05-30

    of being available in most experiments. Core Services A core set of applications whi directories, web portal and collaboration applications etc. A...classifications Messages (xml, JMS, content level…) Meta data filtering, who can initiate services Web browsing Collaboration & messaging Border...Exchange Ref Architecture for MNE5 Tech System.doc 9 of 21 audit logging Person and machine Data lev objects, web services, messages rification el

  3. Assessing the Use of School Public Address Systems to Deliver Nutrition Messages to Children: Shape Up Somerville--Audio Adventures

    ERIC Educational Resources Information Center

    Folta, Sara C.; Goldberg, Jeanne P.; Economos, Christina; Bell, Rick; Landers, Stewart; Hyatt, Raymond

    2006-01-01

    Given the current childhood obesity epidemic, it is especially important to find effective ways to promote healthful foods to children. School public address (PA) systems represent an inexpensive and a replicable way of reaching children with health messages. To test the effectiveness of this channel, messages were created to promote 2 dried bean…

  4. A Content Analysis of E-mail Communication between Patients and Their Providers: Patients Get the Message

    PubMed Central

    White, Casey B.; Moyer, Cheryl A.; Stern, David T.; Katz, Steven J.

    2004-01-01

    Objective: E-mail use in the clinical setting has been slow to diffuse for several reasons, including providers' concerns about patients' inappropriate and inefficient use of the technology. This study examined the content of a random sample of patient–physician e-mail messages to determine the validity of those concerns. Design: A qualitative analysis of patient–physician e-mail messages was performed. Measurements: A total of 3,007 patient–physician e-mail messages were collected over 11 months as part of a randomized, controlled trial of a triage-based e-mail system in two primary care centers (including 98 physicians); 10% of messages were randomly selected for review. Messages were coded across such domains as message type, number of requests per e-mail, inclusion of sensitive content, necessity of a physician response, and message tone. Results: The majority (82.8%) of messages addressed a single issue. The most common message types included information updates to the physicians (41.4%), prescription renewals (24.2%), health questions (13.2%), questions about test results (10.9%), referrals (8.8%), “other” (including thank yous, apologies) (8.8%), appointments (5.4%), requests for non-health-related information (4.8%), and billing questions (0.3%). Overall, messages were concise, formal, and medically relevant. Very few (5.1%) included sensitive content, and none included urgent messages. Less than half (43.2%) required a physician response. Conclusion: A triage-based e-mail system promoted e-mail exchanges appropriate for primary care. Most patients adhered to guidelines aimed at focusing content, limiting the number of requests per message, and avoiding urgent requests or highly sensitive content. Thus, physicians' concerns about the content of patients' e-mails may be unwarranted. PMID:15064295

  5. [Design and realization of the communication system for the mobile medical terminal].

    PubMed

    Ji, Lei; Guo, Xu; Shi, Huayu

    2013-01-01

    Realizing wireless communication based on handset devices for medical staff; providing an instant messaging method. Constructing a set of communication protocols and standards; developing software both on server and client. Building an instant messaging system which follows the customized specification; based on Android the client provides functions like address book, message, voice service etc. As an independent module of the mobile medical terminal, the system can provide convenient communication for medical service with other mobile business.

  6. A Proposed Information Architecture for Telehealth System Interoperability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, S.; Craft, R.L.; Parks, R.C.

    1999-04-07

    Telemedicine technology is rapidly evolving. Whereas early telemedicine consultations relied primarily on video conferencing, consultations today may utilize video conferencing, medical peripherals, store-and-forward capabilities, electronic patient record management software, and/or a host of other emerging technologies. These remote care systems rely increasingly on distributed, collaborative information technology during the care delivery process, in its many forms. While these leading-edge systems are bellwethers for highly advanced telemedicine, the remote care market today is still immature. Most telemedicine systems are custom-designed and do not interoperate with other commercial offerings. Users are limited to a set of functionality that a single vendor providesmore » and must often pay high prices to obtain this functionality, since vendors in this marketplace must deliver entire systems in order to compete. Besides increasing corporate research and development costs, this inhibits the ability of the user to make intelligent purchasing decisions regarding best-of-breed technologies. We propose a secure, object-oriented information architecture for telemedicine systems that promotes plug-and-play interaction between system components through standardized interfaces, communication protocols, messaging formats, and data definitions. In this architecture, each component functions as a black box, and components plug together in a lego-like fashion to achieve the desired device or system functionality. The architecture will support various ongoing standards work in the medical device arena.« less

  7. Summary Report: Uniform Traffic Control And Warning Messages For Portable Changeable Message Signs

    DOT National Transportation Integrated Search

    2000-03-01

    The California database incorporated in the Highway Safety Information System (HSIS) is derived from the California TASAS (Traffic Accident Surveillance and Analysis System). The system, maintained by the Traffic Operations Office of Caltrans, is a m...

  8. Users manual for the Chameleon parallel programming tools

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gropp, W.; Smith, B.

    1993-06-01

    Message passing is a common method for writing programs for distributed-memory parallel computers. Unfortunately, the lack of a standard for message passing has hampered the construction of portable and efficient parallel programs. In an attempt to remedy this problem, a number of groups have developed their own message-passing systems, each with its own strengths and weaknesses. Chameleon is a second-generation system of this type. Rather than replacing these existing systems, Chameleon is meant to supplement them by providing a uniform way to access many of these systems. Chameleon`s goals are to (a) be very lightweight (low over-head), (b) be highlymore » portable, and (c) help standardize program startup and the use of emerging message-passing operations such as collective operations on subsets of processors. Chameleon also provides a way to port programs written using PICL or Intel NX message passing to other systems, including collections of workstations. Chameleon is tracking the Message-Passing Interface (MPI) draft standard and will provide both an MPI implementation and an MPI transport layer. Chameleon provides support for heterogeneous computing by using p4 and PVM. Chameleon`s support for homogeneous computing includes the portable libraries p4, PICL, and PVM and vendor-specific implementation for Intel NX, IBM EUI (SP-1), and Thinking Machines CMMD (CM-5). Support for Ncube and PVM 3.x is also under development.« less

  9. Action languages: Dimensions, effects

    NASA Technical Reports Server (NTRS)

    Hayes, Daniel G.; Streeter, Gordon

    1989-01-01

    Dimensions of action languages are discussed for communication between humans and machines, and the message handling capabilities of object oriented programming systems are examined. Design of action languages is seen to be very contextual. Economical and effective design will depend on features of situations, the tasks intended to be accomplished, and the nature of the devices themselves. Current object oriented systems turn out to have fairly simple and straightforward message handling facilities, which in themselves do little to buffer action or even in some cases to handle competing messages. Even so, it is possible to program a certain amount of discretion about how they react to messages. Such thoughtfulness and perhaps relative autonomy of program modules seems prerequisite to future systems to handle complex interactions in changing situations.

  10. Homosexuality: representing the devil or a spiritual gift? Two opposing views in the same Marian devotion.

    PubMed

    Samson, Judith; Notermans, Catrien; Jansen, Willy

    2013-01-01

    This article analyzes opposing discourses on homosexuality forwarded by two different Catholic social actors. These are linked to the messages of the Lady of All Nations, a Marian apparition site in Amsterdam. These different actors are understood as competing moral communities ( Hunt, 2009 ), especially about the issue of what constitute European values. Both discourses can be seen as examples of the minoritizing yet universalizing view on homosexuality ( Kosofsky Sedgwick, 1990 , p. 85). The devotion to the Lady of All Nations serves as a site for promoting competing discourses ( Hermkens, Jansen, & Notermans, 2009 ).

  11. Italy flags scientific shortcomings

    NASA Astrophysics Data System (ADS)

    Cartlidge, Edwin

    2008-04-01

    The land that gave us Leonardo da Vinci, Galileo Galilei and Enrico Fermi does not regard science as part of culture, but it must do so if it is to avoid being left behind economically and intellectually. That is the message from a working group of 18 academics, sponsored by the Italian government, to find ways of improving the quantity, quality and public perception of science in the country. The group has now put forward a range of measures to combat what the group's chair, left-wing politician and Siena University law professor Luigi Berlinguer, describes as a "national emergency".

  12. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care

    PubMed Central

    Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    Objectives To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. Methods This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Results Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. Conclusions This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies. PMID:26893947

  13. Roadside-based communication system and method

    NASA Technical Reports Server (NTRS)

    Bachelder, Aaron D. (Inventor)

    2007-01-01

    A roadside-based communication system providing backup communication between emergency mobile units and emergency command centers. In the event of failure of a primary communication, the mobile units transmit wireless messages to nearby roadside controllers that may take the form of intersection controllers. The intersection controllers receive the wireless messages, convert the messages into standard digital streams, and transmit the digital streams along a citywide network to a destination intersection or command center.

  14. The IOM report on the future of nursing: what perioperative nurses need to know.

    PubMed

    Battié, Renae N

    2013-09-01

    The 2010 Institute of Medicine (IOM) report, The Future of Nursing: Leading Change, Advancing Health, continues to be the most-viewed report in IOM history. Nearly three years after its publication, there are action coalitions of nursing and non-nursing agencies in 50 states and the District of Columbia collaborating to move the eight recommendations for action forward. There is much work to do to reshape health care delivery in the United States, and the IOM has identified nurses as key leaders in driving the reform. Every nurse must be educated on the key messages of the IOM report and become involved in moving these recommendations forward as well as in educating others on what needs to be done. AORN and perioperative nurses have a key role in voicing the unique needs of perioperative patients and in ensuring that perioperative patient care is represented in reform activities. Copyright © 2013 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  15. Multidimensional human dynamics in mobile phone communications.

    PubMed

    Quadri, Christian; Zignani, Matteo; Capra, Lorenzo; Gaito, Sabrina; Rossi, Gian Paolo

    2014-01-01

    In today's technology-assisted society, social interactions may be expressed through a variety of techno-communication channels, including online social networks, email and mobile phones (calls, text messages). Consequently, a clear grasp of human behavior through the diverse communication media is considered a key factor in understanding the formation of the today's information society. So far, all previous research on user communication behavior has focused on a sole communication activity. In this paper we move forward another step on this research path by performing a multidimensional study of human sociality as an expression of the use of mobile phones. The paper focuses on user temporal communication behavior in the interplay between the two complementary communication media, text messages and phone calls, that represent the bi-dimensional scenario of analysis. Our study provides a theoretical framework for analyzing multidimensional bursts as the most general burst category, that includes one-dimensional bursts as the simplest case, and offers empirical evidence of their nature by following the combined phone call/text message communication patterns of approximately one million people over three-month period. This quantitative approach enables the design of a generative model rooted in the three most significant features of the multidimensional burst - the number of dimensions, prevalence and interleaving degree - able to reproduce the main media usage attitude. The other findings of the paper include a novel multidimensional burst detection algorithm and an insight analysis of the human media selection process.

  16. An expert system shell for inferring vegetation characteristics: Prototype help system (Task 1)

    NASA Technical Reports Server (NTRS)

    1993-01-01

    The NASA Vegetation Workbench (VEG) is a knowledge based system that infers vegetation characteristics from reflectance data. A prototype of the VEG subgoal HELP.SYSTEM has been completed and the Help System has been added to the VEG system. It is loaded when the user first clicks on the HELP.SYSTEM option in the Tool Box Menu. The Help System provides a user tool to support needed user information. It also provides interactive tools the scientist may use to develop new help messages and to modify existing help messages that are attached to VEG screens. The system automatically manages system and file operations needed to preserve new or modified help messages. The Help System was tested both as a help system development and a help system user tool.

  17. A smartphone-enabled communication system to improve hospital communication: usage and perceptions of medical trainees and nurses on general internal medicine wards.

    PubMed

    Wu, Robert; Lo, Vivian; Morra, Dante; Appel, Eva; Arany, Teri; Curiale, Beth; Ryan, Joanne; Quan, Sherman

    2015-02-01

    There is increasing interest in the use of information and communication technologies to improve how clinicians communicate in hospital settings. We implemented a communication system with support for physician handover and secure messaging on 2 general internal medicine wards. We measured usage and surveyed physicians and nurses on perceptions of the system's effects on communication. Between May 2011 and August 2012, a clinical teaching team received, on average, 14.8 messages per day through the system. Messages were typically sent as urgent (69.1%) and requested a text reply (76.5%). For messages requesting a text reply, 8.6% did not receive a reply. For those messages that did receive a reply, the median response time was 2.3 minutes, and 84.5% of messages received a reply within 15 minutes. Of those who completed the survey, 95.3% were medical residents (82 of 86) and 81.7% were nurses (83 of 116). Medical trainees (82.8%) and nursing staff (78.3%) agreed or strongly agreed that the system helped to speed up their daily work tasks. Overall, 67.1% of the trainees and 73.2% of nurses agreed or strongly agreed that the system made them more accountable in their clinical roles. Only 35.8% of physicians and 26.3% of nurses agreed or strongly agreed that the system was useful for communicating complex issues. In summary, with a system designed to improve communication, we found that there was high uptake and that users perceived that the system improved efficiency and accountability but was not appropriate for communicating complex issues. © 2014 Society of Hospital Medicine.

  18. Field Test of Slow Moving Traffic Alerting System on Freeways in Las Vegas, Nevada : Assessment of the Effectiveness of the Dynamic Message Signs on the Freeways in Las Vegas, Nevada.

    DOT National Transportation Integrated Search

    2015-10-17

    It has been perceived that the travelers do not respond to the incident messages on the dynamic message signs in the Las Vegas area in Nevada. The objective of the study is to evaluate whether dynamic message signs (DMS) in the Las Vegas freeway syst...

  19. 47 CFR 10.10 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Definitions. 10.10 Section 10.10 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM General Information § 10.10 Definitions. (a) Alert Message. An Alert Message is a message that is intended to provide the...

  20. Voice Messaging.

    ERIC Educational Resources Information Center

    Davis, Barbara D.; Tisdale, Judy Jones; Krapels, Roberta H.

    2001-01-01

    Surveys corporate use of voice message systems by interviewing employees in four different companies. Finds that all four companies viewed their voicemail systems as a supplement to personal contact (not a replacement) and provided training, but had no formal method to assess customer satisfaction with their system. Suggests business communication…

  1. Message frames interact with motivational systems to determine depth of message processing.

    PubMed

    Shen, Lijiang; Dillard, James Price

    2009-09-01

    Although several theoretical perspectives predict that negatively framed messages will be processed more deeply than positively framed messages, a recent meta-analysis found no such difference. In this article, the authors explore 2 explanations for this inconsistency. One possibility is methodological: the statistics used in the primary studies underestimated framing effects on depth of message processing because the data were maldistributed. The other is theoretical: the absence of a main effect is veridical, but framing interacts with individual differences that predispose individuals to greater or lesser depth of processing. Data from 2 experiments (Ns = 286 and 252) were analyzed via tobit regression, a technique designed to overcome the limitations of maldistributed data. One study showed the predicted main effect for framing, but the other did not. Both studies showed the anticipated interaction: Depth of processing correlated positively with a measure of the behavioral activation system in the advantage framing condition, whereas depth of processing correlated positively with the behavioral inhibition system in the disadvantage framing condition.

  2. Communicating with the Workforce During Emergencies: Developing an Employee Text Messaging Program in a Local Public Health Setting

    PubMed Central

    Bogan, Sharon; Bosslet, Lindsay

    2014-01-01

    Short message service (SMS) text messaging can be useful for communicating information to public health employees and improving workforce situational awareness during emergencies. We sought to understand how the 1,500 employees at Public Health – Seattle & King County, Washington, perceived barriers to and benefits of participation in a voluntary, employer-based SMS program. Based on employee feedback, we developed the system, marketed it, and invited employees to opt in. The system was tested during an ice storm in January 2012. Employee concerns about opting into an SMS program included possible work encroachment during non-work time and receiving excessive irrelevant messages. Employees who received messages during the weather event reported high levels of satisfaction and perceived utility from the program. We conclude that text messaging is a feasible form of communication with employees during emergencies. Care should be taken to design and deploy a program that maximizes employee satisfaction. PMID:25355976

  3. Cooperative Data Sharing: Simple Support for Clusters of SMP Nodes

    NASA Technical Reports Server (NTRS)

    DiNucci, David C.; Balley, David H. (Technical Monitor)

    1997-01-01

    Libraries like PVM and MPI send typed messages to allow for heterogeneous cluster computing. Lower-level libraries, such as GAM, provide more efficient access to communication by removing the need to copy messages between the interface and user space in some cases. still lower-level interfaces, such as UNET, get right down to the hardware level to provide maximum performance. However, these are all still interfaces for passing messages from one process to another, and have limited utility in a shared-memory environment, due primarily to the fact that message passing is just another term for copying. This drawback is made more pertinent by today's hybrid architectures (e.g. clusters of SMPs), where it is difficult to know beforehand whether two communicating processes will share memory. As a result, even portable language tools (like HPF compilers) must either map all interprocess communication, into message passing with the accompanying performance degradation in shared memory environments, or they must check each communication at run-time and implement the shared-memory case separately for efficiency. Cooperative Data Sharing (CDS) is a single user-level API which abstracts all communication between processes into the sharing and access coordination of memory regions, in a model which might be described as "distributed shared messages" or "large-grain distributed shared memory". As a result, the user programs to a simple latency-tolerant abstract communication specification which can be mapped efficiently to either a shared-memory or message-passing based run-time system, depending upon the available architecture. Unlike some distributed shared memory interfaces, the user still has complete control over the assignment of data to processors, the forwarding of data to its next likely destination, and the queuing of data until it is needed, so even the relatively high latency present in clusters can be accomodated. CDS does not require special use of an MMU, which can add overhead to some DSM systems, and does not require an SPMD programming model. unlike some message-passing interfaces, CDS allows the user to implement efficient demand-driven applications where processes must "fight" over data, and does not perform copying if processes share memory and do not attempt concurrent writes. CDS also supports heterogeneous computing, dynamic process creation, handlers, and a very simple thread-arbitration mechanism. Additional support for array subsections is currently being considered. The CDS1 API, which forms the kernel of CDS, is built primarily upon only 2 communication primitives, one process initiation primitive, and some data translation (and marshalling) routines, memory allocation routines, and priority control routines. The entire current collection of 28 routines provides enough functionality to implement most (or all) of MPI 1 and 2, which has a much larger interface consisting of hundreds of routines. still, the API is small enough to consider integrating into standard os interfaces for handling inter-process communication in a network-independent way. This approach would also help to solve many of the problems plaguing other higher-level standards such as MPI and PVM which must, in some cases, "play OS" to adequately address progress and process control issues. The CDS2 API, a higher level of interface roughly equivalent in functionality to MPI and to be built entirely upon CDS1, is still being designed. It is intended to add support for the equivalent of communicators, reduction and other collective operations, process topologies, additional support for process creation, and some automatic memory management. CDS2 will not exactly match MPI, because the copy-free semantics of communication from CDS1 will be supported. CDS2 application programs will be free to carefully also use CDS1. CDS1 has been implemented on networks of workstations running unmodified Unix-based operating systems, using UDP/IP and vendor-supplied high- performance locks. Although its inter-node performance is currently unimpressive due to rudimentary implementation technique, it even now outperforms highly-optimized MPI implementation on intra-node communication due to its support for non-copy communication. The similarity of the CDS1 architecture to that of other projects such as UNET and TRAP suggests that the inter-node performance can be increased significantly to surpass MPI or PVM, and it may be possible to migrate some of its functionality to communication controllers.

  4. Realization of Real-Time Clinical Data Integration Using Advanced Database Technology

    PubMed Central

    Yoo, Sooyoung; Kim, Boyoung; Park, Heekyong; Choi, Jinwook; Chun, Jonghoon

    2003-01-01

    As information & communication technologies have advanced, interest in mobile health care systems has grown. In order to obtain information seamlessly from distributed and fragmented clinical data from heterogeneous institutions, we need solutions that integrate data. In this article, we introduce a method for information integration based on real-time message communication using trigger and advanced database technologies. Messages were devised to conform to HL7, a standard for electronic data exchange in healthcare environments. The HL7 based system provides us with an integrated environment in which we are able to manage the complexities of medical data. We developed this message communication interface to generate and parse HL7 messages automatically from the database point of view. We discuss how easily real time data exchange is performed in the clinical information system, given the requirement for minimum loading of the database system. PMID:14728271

  5. Timely response to secure messages from primary care patients.

    PubMed

    Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R

    2013-01-01

    To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.

  6. Simplifying HL7 Version 3 messages.

    PubMed

    Worden, Robert; Scott, Philip

    2011-01-01

    HL7 Version 3 offers a semantically robust method for healthcare interoperability but has been criticized as overly complex to implement. This paper reviews initiatives to simplify HL7 Version 3 messaging and presents a novel approach based on semantic mapping. Based on user-defined definitions, precise transforms between simple and full messages are automatically generated. Systems can be interfaced with the simple messages and achieve interoperability with full Version 3 messages through the transforms. This reduces the costs of HL7 interfacing and will encourage better uptake of HL7 Version 3 and CDA.

  7. Collaborative Scheduling Using JMS in a Mixed Java and .NET Environment

    NASA Technical Reports Server (NTRS)

    Wang, Yeou-Fang; Wax, Allan; Lam, Ray; Baldwin, John; Borden, Chet

    2006-01-01

    A collaborative framework/environment was proto-typed to prove the feasibility of scheduling space flight missions on NASA's Deep Space Network (DSN) in a distributed fashion. In this environment, effective collaboration relies on efficient communications among all flight mission and DSN scheduling users. There-fore, messaging becomes critical to timely event notification and data synchronization. In the prototype, a rapid messaging system using Java Message Service (JMS) in a mixed Java and .NET environment is established. This scheme allows both Java and .NET applications to communicate with each other for data synchronization and schedule negotiation. The JMS approach we used is based on a centralized messaging scheme. With proper use of a high speed messaging system, all users in this collaborative framework can communicate with each other to generate a schedule collaboratively to meet DSN and projects tracking needs.

  8. Some methods of computing platform transmitter terminal location estimates. [ARGOS system; whale tracking

    NASA Technical Reports Server (NTRS)

    Hoisington, C. M.

    1984-01-01

    A position estimation algorithm was developed to track a humpback whale tagged with an ARGOS platform after a transmitter deployment failure and the whale's diving behavior precluded standard methods. The algorithm is especially useful where a transmitter location program exists; it determines the classical keplarian elements from the ARGOS spacecraft position vectors included with the probationary file messages. A minimum of three distinct messages are required. Once the spacecraft orbit is determined, the whale is located using standard least squares regression techniques. Experience suggests that in instances where circumstances inherent in the experiment yield message data unsuitable for the standard ARGOS reduction, (message data may be too sparse, span an insufficient period, or include variable-length messages). System ARGOS can still provide much valuable location information if the user is willing to accept the increased location uncertainties.

  9. AAPSilver System Performance Validation

    DTIC Science & Technology

    2012-12-01

    10 APPENDIX A. NATIONAL GEODETIC SURVEY FORWARD OUTPUT FOR BPP ALPHA ... A-1...APPENDIX B. NATIONAL GEODETIC SURVEY FORWARD OUTPUT FOR BPP BRAVO ...B-1 APPENDIX C. NATIONAL GEODETIC SURVEY FORWARD OUTPUT FOR BPP CHARLIE...SURVEY FORWARD OUTPUT FOR BPP DELTA ... D-1 APPENDIX E. NATIONAL GEODETIC SURVEY FORWARD OUTPUT FOR BPP ECHO ......E-1 AAPSilver System Performance

  10. 46 CFR 307.17 - Distress messages and hostile action reports.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 8 2012-10-01 2012-10-01 false Distress messages and hostile action reports. 307.17 Section 307.17 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION POSITION REPORTING SYSTEM... reports. (a) AWVER reports shall not replace distress messages and hostile action reports prescribed by...

  11. New Technology Implementation and Use: Workers' Attitudes and Behaviors.

    ERIC Educational Resources Information Center

    Licata, Betty Jo

    Automated office technologies, such as office automation systems, management information systems, teleconferencing, message systems, and robotics, are providing momentum for the trend towards the "paperless office" by allowing new means of carrying out office tasks and aiding in the management of time, data, and messages. The success of these…

  12. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  13. 36 CFR 1192.61 - Public information system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR TRANSPORTATION VEHICLES... or digitized human speech messages, to announce stations and provide other passenger information... transportation system personnel, or recorded or digitized human speech messages, to announce train, route, or...

  14. The research and realization of multi-platform real-time message-oriented middleware in large-scale air traffic control system

    NASA Astrophysics Data System (ADS)

    Liang, Haijun; Ren, Jialong; Song, Tao

    2017-05-01

    Operating requirement of air traffic control system, the multi-platform real-time message-oriented middleware was studied and realized, which is composed of CDCC and CDCS. The former provides application process interface, while the latter realizes data synchronism of CDCC and data exchange. MQM, as one important part of it, provides message queue management and, encrypt and compress data during transmitting procedure. The practical system application verifies that the middleware can simplify the development of air traffic control system, enhance its stability, improve its systematic function and make it convenient for maintenance and reuse.

  15. An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks.

    PubMed

    Hosen, A S M Sanwar; Cho, Gi Hwan

    2018-05-11

    Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head's role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks' information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime.

  16. An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks

    PubMed Central

    Hosen, A. S. M. Sanwar; Cho, Gi Hwan

    2018-01-01

    Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head’s role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks’ information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime. PMID:29751663

  17. Randomized trial of a smartphone mobile application compared to text messaging to support smoking cessation.

    PubMed

    Buller, David B; Borland, Ron; Bettinghaus, Erwin P; Shane, James H; Zimmerman, Donald E

    2014-03-01

    Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Young adult smokers 18-30 years old (n = 102) participated in a randomized pretest-posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and quitting behavior (quit attempts, point-prevalence, 30-day point-prevalence, and continued abstinence) were assessed in posttests. Overall, 60% of smokers used mobile services (REQ-Mobile, 61%, mean of 128.5 messages received; onQ, 59%, mean of 107.8 messages), and 75% evaluated REQ-Mobile as user-friendly. A majority of smokers reported being abstinent at posttest (6 weeks, 53% of completers; 12 weeks, 66% of completers [44% of all cases]). Also, 37% (25%of all cases) reported 30-day point-prevalence abstinence, and 32% (22% of all cases) reported continuous abstinence at 12 weeks. OnQ produced more abstinence (p<0.05) than REQ-Mobile. Use of both services predicted increased 30-day abstinence at 12 weeks (used, 47%; not used, 20%; p = 0.03). REQ-Mobile was feasible for delivering cessation support but appeared to not move smokers to quit as quickly as text messaging. Text messaging may work better because it is simple, well known, and delivered to a primary inbox. These advantages may disappear as smokers become more experienced with new handsets. Mobile phones may be promising delivery platforms for cessation services using either smartphone applications or text messaging.

  18. A cryptographic hash function based on chaotic network automata

    NASA Astrophysics Data System (ADS)

    Machicao, Jeaneth; Bruno, Odemir M.

    2017-12-01

    Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). Cryptographic hash functions (CHF) are commonly used to check data integrity. CHF “compress” arbitrary long messages (input) into much smaller representations called hash values or message digest (output), designed to prevent the ability to reverse the hash values into the original message. This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. Here, we propose an hybrid model that combines CA and networks, called network automata (CNA), whose chaotic spatio-temporal outputs are used to compute a hash value. Following the Merkle and Damgård model of construction, a portion of the message is entered as the initial condition of the network automata, so that the rest parts of messages are iteratively entered to perturb the system. The chaotic network automata shuffles the message using flexible control parameters, so that the generated hash value is highly sensitive to the message. As demonstrated in our experiments, the proposed model has excellent pseudo-randomness and sensitivity properties with acceptable performance when compared to conventional hash functions.

  19. SAHAYOG: A Testbed for Load Sharing under Failure,

    DTIC Science & Technology

    1987-07-01

    messages, shared memory and semaphores . To communicate using messages, processes create message queues using system-provided prim- itives. The message...The size of the memory that is to be shared is decided by the process when it makes a request for memory allocation. The semaphore option of IPC can be...used to prevent two or more concurrent processes from executing their critical sections at the same time. Semaphores must be used when the processes

  20. Ramifications of the recent FAA rule for windshear systems on the development of forward-looking systems

    NASA Technical Reports Server (NTRS)

    Adamson, H. Patrick

    1990-01-01

    The recent Federal Aviation Administration (FAA) rule requiring windshear systems with flight guidance may have severe ramifications for the development of infrared and other forward-looking systems. The industry needs to have and can have a more cost effective option through the use of a forward-looking system with a reactive backup instead of a reactive system with flight guidance. However, because of the short time for compliance with the new FAA rule, it is possible that existing transport aircraft will be in full compliance before a comprehensive investigation of all forward-looking systems can be completed. If this occurs, it is possible that the market for forward-looking systems will be severely reduced, thereby eliminating the economic incentive to develop these much needed systems. Thus, to assure that this option is available for the airlines, it beehoves the industry to immediately support an in-service evaluation of all available forward-looking systems.

  1. [Interview Questions

    NASA Technical Reports Server (NTRS)

    Smith, Dan

    2007-01-01

    The Goddard Mission Services Evolution Center, or GMSEC, was started in 2001 to create a new standard approach for managing GSFC missions. Standardized approaches in the past involved selecting and then integrating the most appropriate set of functional tools. Assumptions were made that "one size fits all" and that tool changes would not be necessary for many years. GMSEC took a very different approach and has proven to be very successful. The core of the GMSEC architecture consists of a publish/subscribe message bus, standardized message formats, and an Applications Programming Interface (API). The API supports multiple operating systems, programming languages and messaging middleware products. We use a GMSEC-developed free middleware for low-cost development. A high capacity, robust middleware is used for operations and a messaging system with a very small memory footprint is used for on-board flight software. Software components can use the standard message formats or develop adapters to convert from their native formats to the GMSEC formats. We do not want vendors to modify their core products. Over 50 software components are now available for use with the GMSEC architecture. Most available commercial telemetry and command systems, including the GMV hifly Satellite Control System, have been adapted to run in the GMSEC labs.

  2. X.400: The Standard for Message Handling Systems.

    ERIC Educational Resources Information Center

    Swain, Leigh; Tallim, Paula

    1990-01-01

    Profiles X.400, the Open Systems Interconnection (OSI) Application layer standard that supports interpersonal electronic mail services, facsimile transfer, electronic data interchange, electronic funds transfer, electronic publishing, and electronic invoicing. Also discussed are an electronic directory to support message handling, compatibility…

  3. A distributed Clips implementation: dClips

    NASA Technical Reports Server (NTRS)

    Li, Y. Philip

    1993-01-01

    A distributed version of the Clips language, dClips, was implemented on top of two existing generic distributed messaging systems to show that: (1) it is easy to create a coarse-grained parallel programming environment out of an existing language if a high level messaging system is used; and (2) the computing model of a parallel programming environment can be changed easily if we change the underlying messaging system. dClips processes were first connected with a simple master-slave model. A client-server model with intercommunicating agents was later implemented. The concept of service broker is being investigated.

  4. Suitcase Communicator

    NASA Technical Reports Server (NTRS)

    1984-01-01

    A joint development of Ames Research Center and General Electric Company, Schenectady, NY has produced a portable communications system designed to relay messages over long distances by satellite. It consists of a collapsible antenna and computerized transceiver, and a terminal for sending and receiving messages. The whole system fits into two Pullman size suit cases, and is powered from a conventional outlet or a vehicle's battery. Principal use is communications in disasters and other emergencies where it is necessary to get short but vital messages out of the emergency area.

  5. Is Provider Secure Messaging Associated With Patient Messaging Behavior? Evidence From the US Army.

    PubMed

    Wolcott, Vickee; Agarwal, Ritu; Nelson, D Alan

    2017-04-06

    Secure messaging with health care providers offers the promise of improved patient-provider relationships, potentially facilitating outcome improvements. But, will patients use messaging technology in the manner envisioned by policy-makers if their providers do not actively use it? We hypothesized that the level and type of secure messaging usage by providers might be associated with messaging initiation by their patients. The study employed a dataset of health care and secure messaging records of more than 81,000 US Army soldiers and nearly 3000 clinicians with access to a patient portal system. We used a negative binomial regression model on over 25 million observations to determine the adjusted association between provider-initiated and provider-response messaging and subsequent messaging by their patients in this population over a 4-year period. Prior provider-initiated and response messaging levels were associated with new patient messaging when controlling for the patient's health care utilization and diagnoses, with the strongest association for high provider-response messaging level. Patients whose providers were highly responsive to the messages of other patients initiated 334% more secure messages (P<.001) than patients with providers who did not personally respond to other patients' messages. Our results indicate that provider messaging usage levels and types thereof predict their patients' subsequent communication behavior. The findings suggest the need for more study into the factors associated with provider messaging to fully understand the mechanisms of this relationship. ©Vickee Wolcott, Ritu Agarwal, D. Alan Nelson. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.

  6. NASA electronic message experiment and study: Detailed test plans

    NASA Technical Reports Server (NTRS)

    1979-01-01

    A methodology for evaluating the utility of high speed digital facsimile as a component of the projected NASA-wide electronic message network is presented. Equipment checkout, operator familiarization, pretest calibration, and the development of procedures are addressed. An experimental test program of the facsimile message service which will carry duplicates of the actual messages sent by other means is highlighted. Also, an operational test program during which messages will be sent on a regular basis in order to accumulate the information that will be used to evaluate system performance and project future growth is described.

  7. Use of text messaging in general practice: a mixed methods investigation on GPs' and patients' views.

    PubMed

    Leahy, Dorothy; Lyons, Aoife; Dahm, Matthias; Quinlan, Diarmuid; Bradley, Colin

    2017-11-01

    Text messaging has become more prevalent in general practice as a tool with which to communicate with patients. The main objectives were to assess the extent, growth, and perceived risks and benefits of text messaging by GPs to communicate with patients, and assess patients' attitudes towards receiving text messages from their GP. A mixed methods study, using surveys, a review, and a focus group, was conducted in both urban and rural practices in the south-west of Ireland. A telephone survey of 389 GPs was conducted to ascertain the prevalence of text messaging. Subsequently, the following were also carried out: additional telephone surveys with 25 GPs who use text messaging and 26 GPs who do not, a written satisfaction survey given to 78 patients, a review of the electronic information systems of five practices, and a focus group with six GPs to ascertain attitudes towards text messaging. In total, 38% ( n = 148) of the surveyed GPs used text messaging to communicate with patients and 62% ( n = 241) did not. Time management was identified as the key advantage of text messaging among GPs who used it (80%; n = 20) and those who did not (50%; n = 13). Confidentiality was reported as the principal concern among both groups, at 32% ( n = 8) and 69% ( n = 18) respectively. Most patients (99%; n = 77) were happy to receive text messages from their GP. The GP focus group identified similar issues and benefits in terms of confidentiality and time management. Data were extracted from the IT systems of five consenting practices and the number of text messages sent during the period from January 2013 to March 2016 was generated. This increased by 40% per annum. Collaborative efforts are required from relevant policymakers to address data protection and text messaging issues so that GPs can be provided with clear guidelines to protect patient confidentiality. © British Journal of General Practice 2017.

  8. Engine monitoring display study

    NASA Technical Reports Server (NTRS)

    Hornsby, Mary E.

    1992-01-01

    The current study is part of a larger NASA effort to develop displays for an engine-monitoring system to enable the crew to monitor engine parameter trends more effectively. The objective was to evaluate the operational utility of adding three types of information to the basic Boeing Engine Indicating and Crew Alerting System (EICAS) display formats: alphanumeric alerting messages for engine parameters whose values exceed caution or warning limits; alphanumeric messages to monitor engine parameters that deviate from expected values; and a graphic depiction of the range of expected values for current conditions. Ten training and line pilots each flew 15 simulated flight scenarios with five variants of the basic EICAS format; these variants included different combinations of the added information. The pilots detected engine problems more quickly when engine alerting messages were included in the display; adding a graphic depiction of the range of expected values did not affect detection speed. The pilots rated both types of alphanumeric messages (alert and monitor parameter) as more useful and easier to interpret than the graphic depiction. Integrating engine parameter messages into the EICAS alerting system appears to be both useful and preferred.

  9. Grant management procedure for energy saving TDM-PONs

    NASA Astrophysics Data System (ADS)

    Alaelddin, Fuad Yousif Mohammed; Newaz, S. H. Shah; AL-Hazemi, Fawaz; Choi, Jun Kyun

    2018-01-01

    In order to minimize energy consumption in Time Division Multiplexing-Passive Optical Network (TDM-PON), IEEE and ITU-T have mandated sleep mode mechanism for Optical Network Units (ONUs) in the latest TDM-PON standards (e.g. IEEE P1904.1 SIEPON, ITU-T G.sup45). The sleep mode mechanism is a promising mean for maximizing energy saving in an ONU. An ONU in sleep mode flips between sleep and active state depending on the presence or absent of upstream and downstream frames. To ensure Quality of Service (QoS) of upstream frames, the recent TDM-PON standards introduced an early wake-up mechanism, in which an ONU is forced to leave the sleep state on upstream frame arrival. When the Optical Line Terminal (OLT) of a TDM-PON allows early wake-up of its connected ONUs, it allocates gratuitous grants for the sleeping ONUs along with allocating upstream grants for the ONUs in active state. Note that, the gratuitous grants control message sent periodically by the OLT on Inter-Gratuitous grant Interval (IGI) time. After leaving sleep state due to the arrival of upstream frame, the ONU uses its allocated gratuitous grant to send a control message mentioning the amount of upstream bandwidth (upstream grant) required in order to forward the remaining frames in its buffer. However, the existing early wake-up process of ONU can lead to increase the energy consumption of an ONU. It is because of the ONU wakes-up immediately from the sleep state on arrival of the upstream frame, but even so, it needs to wait for forwarding the frame until its allocated gratuitous grant period, resulting in spending energy unnecessarily. In addition, current energy saving solution for TDM-PONs do not provide a clear solution on how to manage different types of grants (e.g. listening grant, upstream transmission grant) within a Dynamic Bandwidth Allocation (DBA) polling cycle. To address this problem, we propose a state-of-art Grant Management Procedure (GMP) in order to maximize energy saving in a TDM-PON with sleep mode enabled ONUs. GMP contributes in defining the location of the different types of grants during a DBA polling cycle. Furthermore, GMP devises a mechanism so as to allow an ONU to predict its assigned gratuitous grant control message arrival time, thereby allowing an ONU to remain its transceiver unit powered off until the arrival period of the next gratuitous grant control message, increasing the energy saving of the ONU. Results show that, with the increment of IGI, the energy saving performance of an ONU with GMP increases noticeably in compare to a conventional ONU (an ONU that does not use GMP) without imposing any additional upstream frame delay.

  10. Physician impressions of using text message technology to increase vaccination compliance.

    PubMed

    Hart, Traci; Ahlers-Schmidt, Carolyn R; Chesser, Amy; Jones, Jordan; Williams, Katherine S; Wittler, Robert R

    2011-01-01

    Immunization schedules are complicated and difficult for parents to remember. Parents are willing to receive text message reminders. However, it is unknown whether physicians are willing to implement such a system. The purpose of this study was to evaluate the feasibility of a text messaging reminder system from the physician's perspective. Surveys were distributed in the winter of 2009-2010 by e-mail, facsimile, and telephone interview to 149 family physicians and pediatricians who provide immunizations in Sedgwick County, Kansas. A 69% response rate was achieved. Nearly all (92%) respondents reported that they currently communicate information about immunization schedules to parents using traditional methods such as verbal reminders or appointment cards; however, none (0%) currently use text or email to generate reminders to parents. Even when asked to assume they had all of the necessary resources, almost one-third (31%) reported that they were "very unwilling" or "unwilling" to use a general text-messaging program, 43% were "neutral" or "undecided," and only 27% were "willing" or "very willing." Physician willingness to use a text-messaging program was not related to their reported gender (χ²(2)=0.224, p=0.894), specialization (χ² (2)=4.363, p=0.113), years in practice (F(2, 91)=0.435, p=0.149), or comfort level with technology (χ²(4)=1.861, p=0.761). There is a hesitancy to implement a text message reminder system for childhood vaccine schedules. This may be due to the lack of empirical evidence supporting the use of this technology for health reminders or the lack of willingness to implement another system. Further investigation is needed to determine why few physicians are willing to implement text messaging for immunization reminders.

  11. Simulation of Controller Pilot Data Link Communications over VHF Digital Link Mode 3

    NASA Technical Reports Server (NTRS)

    Bretmersky, Steven C.; Murawski, Robert; Nguyen, Thanh C.; Raghavan, Rajesh S.

    2004-01-01

    The Federal Aviation Administration (FAA) has established an operational plan for the future Air Traffic Management (ATM) system, in which the Controller Pilot Data Link Communications (CPDLC) is envisioned to evolve into digital messaging that will take on an ever increasing role in controller to pilot communications, significantly changing the way the National Airspace System (NAS) is operating. According to FAA, CPDLC represents the first phase of the transition from the current analog voice system to an International Civil Aviation Organization (ICAO) compliant system in which digital communication becomes the alternate and perhaps primary method of routine communication. The CPDLC application is an Air Traffic Service (ATS) application in which pilots and controllers exchange messages via an addressed data link. CPDLC includes a set of clearance, information, and request message elements that correspond to existing phraseology employed by current Air Traffic Control (ATC) procedures. These message elements encompass altitude assignments, crossing constraints, lateral deviations, route changes and clearances, speed assignments, radio frequency assignments, and various requests for information. The pilot is provided with the capability to respond to messages, to request clearances and information, to report information, and to declare/rescind an emergency. A 'free text' capability is also provided to exchange information not conforming to defined formats. This paper presents simulated results of the aeronautical telecommunication application Controller Pilot Data Link Communications over VHF Digital Link Mode 3 (VDL Mode 3). The objective of this simulation study was to determine the impact of CPDLC traffic loads, in terms of timely message delivery and capacity of the VDL Mode 3 subnetwork. The traffic model is based on and is used for generating air/ground messages with different priorities. Communication is modeled for the en route domain of the Cleveland Center air traffic (ZOB ARTCC).

  12. Live Virtual Constructive Distributed Test Environment Characterization Report

    NASA Technical Reports Server (NTRS)

    Murphy, Jim; Kim, Sam K.

    2013-01-01

    This report documents message latencies observed over various Live, Virtual, Constructive, (LVC) simulation environment configurations designed to emulate possible system architectures for the Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project integrated tests. For each configuration, four scenarios with progressively increasing air traffic loads were used to determine system throughput and bandwidth impacts on message latency.

  13. Computerized Automated Reminder Diabetes System (CARDS): E-Mail and SMS Cell Phone Text Messaging Reminders to Support Diabetes Management

    PubMed Central

    Hanauer, David A.; Wentzell, Katherine; Laffel, Nikki

    2009-01-01

    Abstract Background: Cell phone text messaging, via the Short Messaging Service (SMS), offers the promise of a highly portable, well-accepted, and inexpensive modality for engaging youth and young adults in the management of their diabetes. This pilot and feasibility study compared two-way SMS cell phone messaging with e-mail reminders that were directed at encouraging blood glucose (BG) monitoring. Methods: Forty insulin-treated adolescents and young adults with diabetes were randomized to receive electronic reminders to check their BG levels via cell phone text messaging or e-mail reminders for a 3-month pilot study. Electronic messages were automatically generated, and participant replies with BG results were processed by the locally developed Computerized Automated Reminder Diabetes System (CARDS). Participants set their schedule for reminders on the secure CARDS website where they could also enter and review BG data. Results: Of the 40 participants, 22 were randomized to receive cell phone text message reminders and 18 to receive e-mail reminders; 18 in the cell phone group and 11 in the e-mail group used the system. Compared to the e-mail group, users in the cell phone group received more reminders (180.4 vs. 106.6 per user) and responded with BG results significantly more often (30.0 vs. 6.9 per user, P=0.04). During the first month cell phone users submitted twice as many BGs as e-mail users (27.2 vs. 13.8 per user); by month 3, usage waned. Conclusions: Cell phone text messaging to promote BG monitoring is a viable and acceptable option in adolescents and young adults with diabetes. However, maintaining interest levels for prolonged intervals remains a challenge. PMID:19848576

  14. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices

    PubMed Central

    Do, Hyoungho

    2018-01-01

    Objectives Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. Methods We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. Results ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. Conclusions ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01. PMID:29503752

  15. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices.

    PubMed

    Lee, Sungkee; Do, Hyoungho

    2018-01-01

    Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01.

  16. Computerized Automated Reminder Diabetes System (CARDS): e-mail and SMS cell phone text messaging reminders to support diabetes management.

    PubMed

    Hanauer, David A; Wentzell, Katherine; Laffel, Nikki; Laffel, Lori M

    2009-02-01

    Cell phone text messaging, via the Short Messaging Service (SMS), offers the promise of a highly portable, well-accepted, and inexpensive modality for engaging youth and young adults in the management of their diabetes. This pilot and feasibility study compared two-way SMS cell phone messaging with e-mail reminders that were directed at encouraging blood glucose (BG) monitoring. Forty insulin-treated adolescents and young adults with diabetes were randomized to receive electronic reminders to check their BG levels via cell phone text messaging or e-mail reminders for a 3-month pilot study. Electronic messages were automatically generated, and participant replies with BG results were processed by the locally developed Computerized Automated Reminder Diabetes System (CARDS). Participants set their schedule for reminders on the secure CARDS website where they could also enter and review BG data. Of the 40 participants, 22 were randomized to receive cell phone text message reminders and 18 to receive e-mail reminders; 18 in the cell phone group and 11 in the e-mail group used the system. Compared to the e-mail group, users in the cell phone group received more reminders (180.4 vs. 106.6 per user) and responded with BG results significantly more often (30.0 vs. 6.9 per user, P = 0.04). During the first month cell phone users submitted twice as many BGs as e-mail users (27.2 vs. 13.8 per user); by month 3, usage waned. Cell phone text messaging to promote BG monitoring is a viable and acceptable option in adolescents and young adults with diabetes. However, maintaining interest levels for prolonged intervals remains a challenge.

  17. Social marketing: a tool not a solution.

    PubMed

    Montazeri, A

    1997-04-01

    There is a longstanding debate on the contribution of social marketing to public health in general, and to health education and health promotion in particular. This paper presents further discussion from a public health point of view and concludes that priority should be given to health-oriented approaches rather than market-oriented strategies. It is argued that, at best, social marketing is a tool not a solution for health education's and health promotion's problems. To communicate health education messages effectively and efficiently, health needs assessment is recommended as a way forward. It is a public health approach and contains a range of flexible methods in the implementation of health education/promotion programmes.

  18. Media and Its Influence on Obesity.

    PubMed

    Stanford, Fatima Cody; Tauqeer, Zujaja; Kyle, Theodore K

    2018-06-01

    To review how the media frames obesity and the effect it has upon on public perceptions. The scientific and public health understanding of obesity increasingly points away from individual behaviors and toward medical and community factors, but diffusion of this knowledge is slow. Growing awareness of the importance of body positivity is driving attention to the harms of weight bias and fat shaming. Health science reporting related to obesity, nutrition, and physical activity tends to perpetuate myths and misunderstandings. Moving forward, greater attention to accurate messages about obesity and evidence-based interventions will be essential for progress to reduce suffering and the impact on public health from this chronic disease.

  19. Development of structural health monitoring and early warning system for reinforced concrete system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Iranata, Data, E-mail: iranata-data@yahoo.com, E-mail: data@ce.its.ac.id; Wahyuni, Endah; Murtiadi, Suryawan

    Many buildings have been damaged due to earthquakes that occurred recently in Indonesia. The main cause of the damage is the large deformation of the building structural component cannot accommodate properly. Therefore, it is necessary to develop the Structural Health Monitoring System (SHMS) to measure precisely the deformation of the building structural component in the real time conditions. This paper presents the development of SHMS for reinforced concrete structural system. This monitoring system is based on deformation component such as strain of reinforcement bar, concrete strain, and displacement of reinforced concrete component. Since the deformation component has exceeded the limitmore » value, the warning message can be sent to the building occupies. This warning message has also can be performed as early warning system of the reinforced concrete structural system. The warning message can also be sent via Short Message Service (SMS) through the Global System for Mobile Communications (GSM) network. Hence, the SHMS should be integrated with internet modem to connect with GSM network. Additionally, the SHMS program is verified with experimental study of simply supported reinforced concrete beam. Verification results show that the SHMS has good agreement with experimental results.« less

  20. Factors Affecting Use of Instant Messaging Software by Information Technology Professionals

    ERIC Educational Resources Information Center

    Pratt, Robert C.

    2010-01-01

    Instant messaging systems--a type of social networking technology that connects people who are physically separated but working together--have seen a dramatic rise in use in globally dispersed organizations, yet there is an absence of academic research in predictive factors of instant messaging adoption. This study examined the factors influencing…

  1. The Use of WhatsApp Smartphone Messaging Improves Communication Efficiency within an Orthopaedic Surgery Team.

    PubMed

    Ellanti, Prasad; Moriarty, Andrew; Coughlan, Fionn; McCarthy, Thomas

    2017-02-18

    Effective and timely communication is important for any surgical specialty to function. The use of smartphones is prevalent amongst doctors. Numerous smartphone applications offer the potential for fast and cost-effective communication. WhatsApp is a commonly used application that is free, easy to use, and capable of text and multimedia messaging. We report on the use of WhatsApp over a six month period in our unit. WhatsApp communication between non-consultant members of an orthopaedic team over a six-month period was analysed. Both the phones and the WhatsApp application were password-protected, and patient details were anonymised. A series of 20 communications using the hospital pager system and the telephone system were also analysed. A total of 5,492 messages were sent during the six-month period and were part of 1,916 separate communication events. The vast majority of messages, 5,090, were related to patient care. A total of 195 multimedia messages were sent and these included images of radiographs and wounds. When using the hospital telephones, the length of time spent on a communication averaged 5.78 minutes and using the hospital pager system averaged 7.45 minutes. Using the WhatsApp messaging system has potentially saved up to 7,664 minutes over the study period. All participants found WhatsApp easy to use and found it to be more efficient than the traditional pager system Conclusion: Compared to the traditional pager systems, the use of WhatsApp is easy, inexpensive, and reliable and can help improve the efficiency of communication within a surgical team.

  2. The Use of WhatsApp Smartphone Messaging Improves Communication Efficiency within an Orthopaedic Surgery Team

    PubMed Central

    Moriarty, Andrew; Coughlan, Fionn; McCarthy, Thomas

    2017-01-01

    Introduction: Effective and timely communication is important for any surgical specialty to function. The use of smartphones is prevalent amongst doctors. Numerous smartphone applications offer the potential for fast and cost-effective communication. WhatsApp is a commonly used application that is free, easy to use, and capable of text and multimedia messaging. We report on the use of WhatsApp over a six month period in our unit. Materials and Methods: WhatsApp communication between non-consultant members of an orthopaedic team over a six-month period was analysed. Both the phones and the WhatsApp application were password-protected, and patient details were anonymised. A series of 20 communications using the hospital pager system and the telephone system were also analysed. Results: A total of 5,492 messages were sent during the six-month period and were part of 1,916 separate communication events. The vast majority of messages, 5,090, were related to patient care. A total of 195 multimedia messages were sent and these included images of radiographs and wounds. When using the hospital telephones, the length of time spent on a communication averaged 5.78 minutes and using the hospital pager system averaged 7.45 minutes. Using the WhatsApp messaging system has potentially saved up to 7,664 minutes over the study period. All participants found WhatsApp easy to use and found it to be more efficient than the traditional pager system Conclusion: Compared to the traditional pager systems, the use of WhatsApp is easy, inexpensive, and reliable and can help improve the efficiency of communication within a surgical team.  PMID:28357172

  3. Randomized Trial of a Smartphone Mobile Application Compared to Text Messaging to Support Smoking Cessation

    PubMed Central

    Borland, Ron; Bettinghaus, Erwin P.; Shane, James H.; Zimmerman, Donald E.

    2014-01-01

    Abstract Background: Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Materials and Methods: Young adult smokers 18–30 years old (n=102) participated in a randomized pretest–posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and quitting behavior (quit attempts, point-prevalence, 30-day point-prevalence, and continued abstinence) were assessed in posttests. Results: Overall, 60% of smokers used mobile services (REQ-Mobile, 61%, mean of 128.5 messages received; onQ, 59%, mean of 107.8 messages), and 75% evaluated REQ-Mobile as user-friendly. A majority of smokers reported being abstinent at posttest (6 weeks, 53% of completers; 12 weeks, 66% of completers [44% of all cases]). Also, 37% (25%of all cases) reported 30-day point-prevalence abstinence, and 32% (22% of all cases) reported continuous abstinence at 12 weeks. OnQ produced more abstinence (p<0.05) than REQ-Mobile. Use of both services predicted increased 30-day abstinence at 12 weeks (used, 47%; not used, 20%; p=0.03). Conclusions: REQ-Mobile was feasible for delivering cessation support but appeared to not move smokers to quit as quickly as text messaging. Text messaging may work better because it is simple, well known, and delivered to a primary inbox. These advantages may disappear as smokers become more experienced with new handsets. Mobile phones may be promising delivery platforms for cessation services using either smartphone applications or text messaging. PMID:24350804

  4. The impact of text message reminders on adherence to antimalarial treatment in northern Ghana: a randomized trial.

    PubMed

    Raifman, Julia R G; Lanthorn, Heather E; Rokicki, Slawa; Fink, Günther

    2014-01-01

    Low rates of adherence to artemisinin-based combination therapy (ACT) regimens increase the risk of treatment failure and may lead to drug resistance, threatening the sustainability of current anti-malarial efforts. We assessed the impact of text message reminders on adherence to ACT regimens. Health workers at hospitals, clinics, pharmacies, and other stationary ACT distributors in Tamale, Ghana provided flyers advertising free mobile health information to individuals receiving malaria treatment. The messaging system automatically randomized self-enrolled individuals to the control group or the treatment group with equal probability; those in the treatment group were further randomly assigned to receive a simple text message reminder or the simple reminder plus an additional statement about adherence in 12-hour intervals. The main outcome was self-reported adherence based on follow-up interviews occurring three days after treatment initiation. We estimated the impact of the messages on treatment completion using logistic regression. 1140 individuals enrolled in both the study and the text reminder system. Among individuals in the control group, 61.5% took the full course of treatment. The simple text message reminders increased the odds of adherence (adjusted OR 1.45, 95% CI [1.03 to 2.04], p-value 0.028). Receiving an additional message did not result in a significant change in adherence (adjusted OR 0.77, 95% CI [0.50 to 1.20], p-value 0.252). The results of this study suggest that a simple text message reminder can increase adherence to antimalarial treatment and that additional information included in messages does not have a significant impact on completion of ACT treatment. Further research is needed to develop the most effective text message content and frequency. ClinicalTrials.gov NCT01722734.

  5. Increasing Perioperative Communication With Automated Mobile Phone Messaging in Total Joint Arthroplasty.

    PubMed

    Day, Molly A; Anthony, Christopher A; Bedard, Nicholas A; Glass, Natalie A; Clark, Charles R; Callaghan, John J; Noiseux, Nicolas O

    2018-01-01

    Automated mobile phone messaging has not been reported in total joint arthroplasty (TJA). Our purpose was to compare Press Ganey (PG) and Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) scores between TJA patients who did and did not receive perioperative automated mobile phone messages. Patients were prospectively enrolled and received messages for 1 week prior until 2 weeks after TJA. Message content included reminders, activity, and pain control. Patients answered select PG/HCAHPS and questions regarding their experience with the automated communication platform. Average PG/HCAHPS scores were compared to historical TJA patients in the 3-year window prior (control group) with significance P < .05. Thirty-seven consecutive patients were approached and 92% (n = 34) were enrolled. The experimental group was 47% male, with 80% patients between 51 and 75 years. The experimental (n = 30) and control groups (n = 26) were similar. Patients receiving messages were more likely to have a good understanding of health responsibilities (P = .024) and feel that the care team demonstrated shared decision-making (P = .024). Of patients enrolled, 87% felt messages helped them be more prepared for surgery, 100% felt messages kept them better informed, and 97% would participate again. TJA patients who received perioperative communication via automated mobile phone messaging had improved patient satisfaction scores postoperatively. Patients perceived this form of communication was useful and kept them better informed. Automated mobile phone messaging can be an easily integrated, helpful adjunct to surgeons, healthcare systems, and case managers to more effectively communicate with patients undergoing TJA in this era of value-based care. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Long-Range Emergency Preemption of Traffic Lights

    NASA Technical Reports Server (NTRS)

    Bachelder, Aaron

    2005-01-01

    A forwarding system could prove beneficial as an addition to an electronic communication-and-control system that automatically modifies the switching of traffic lights to give priority to emergency vehicles. A system to which the forwarding system could be added could be any of a variety of emergency traffic-signal-preemption systems: these include systems now used in some municipalities as well as advanced developmental systems described in several NASA Tech Briefs articles in recent years. Because of a variety of physical and design limitations, emergency traffic-signal- preemption systems now in use are often limited in range to only one intersection at a time: in a typical system, only the next, closest intersection is preempted for an emergency vehicle. Simulations of gridlock have shown that such systems offer minimal advantages and can even cause additional delays. In analogy to what happens in fluid dynamics, the forwarding system insures that flow at a given location is sustained by guaranteeing downstream flow along the predicted route (typically a main artery) and intersecting routes (typically, side streets). In simplest terms, the forwarding system starts by taking note of any preemption issued by the preemption system to which it has been added. The forwarding system predicts which other intersections could be encountered by the emergency vehicle downstream of the newly preempted intersection. The system then forwards preemption triggers to those intersections. Beyond affording a right of way for the emergency vehicle at every intersection that lies ahead along any likely route from the current position of the vehicle, the forwarding system also affords the benefit of clearing congested roads far ahead of the vehicle. In a metropolitan environment with heavy road traffic, forwarding of preemption triggers could greatly enhance the performance of a pre-existing preemption system.

  7. A QoS Management Technique of Urgent Information Provision in ITS Services Using DSRC for Autonomous Base Stations

    NASA Astrophysics Data System (ADS)

    Shimura, Akitoshi; Aizono, Takeiki; Hiraiwa, Masashi; Sugano, Shigeki

    A QoS management technique based on an autonomous decentralized mobility system, which is an autonomous decentralized system enhanced to provide mobile stations with information about urgent roadway situations, is proposed in this paper. This technique enables urgent messages to be flexibly and quickly transmitted to mobile stations by multiple decentralized base stations using dedicated short range communication. It also supports the easy addition of additional base stations. Each station autonomously creates information-delivery communities based on the urgency of the messages it receives through the roadside network and the distances between the senders and receivers. Each station dynamically determines the urgency of messages according to the message content and the speed of the mobile stations. Evaluation of this technique applied to the Smart Gateway system, which provides driving-assistance services to mobile stations through dedicated short-range communication, demonstrated its effectiveness and that it is suitable for actual systems.

  8. Lost in the city: revisiting Milgram's experiment in the age of social networks.

    PubMed

    Szüle, János; Kondor, Dániel; Dobos, László; Csabai, István; Vattay, Gábor

    2014-01-01

    As more and more users access social network services from smart devices with GPS receivers, the available amount of geo-tagged information makes repeating classical experiments possible on global scales and with unprecedented precision. Inspired by the original experiments of Milgram, we simulated message routing within a representative sub-graph of the network of Twitter users with about 6 million geo-located nodes and 122 million edges. We picked pairs of users from two distant metropolitan areas and tried to find a route between them using local geographic information only; our method was to forward messages to a friend living closest to the target. We found that the examined network is navigable on large scales, but navigability breaks down at the city scale and the network becomes unnavigable on intra-city distances. This means that messages usually arrived to the close proximity of the target in only 3-6 steps, but only in about 20% of the cases was it possible to find a route all the way to the recipient, in spite of the network being connected. This phenomenon is supported by the distribution of link lengths; on larger scales the distribution behaves approximately as P(d) ≈ 1/d, which was found earlier by Kleinberg to allow efficient navigation, while on smaller scales, a fractal structure becomes apparent. The intra-city correlation dimension of the network was found to be D2 = 1.25, less than the dimension D2 = 1.78 of the distribution of the population.

  9. STARSYS: A view after WARC-92

    NASA Astrophysics Data System (ADS)

    Kaveeshwar, Ashok; Rodriguez, Raul

    1993-01-01

    The STARSYS system is aimed at providing low cost global positioning and messaging by satellite. STARSYS is a data only system using very brief message transmission times. Code Division Multiple Access (CDMA) is used for frequency sharing; it enables transmitted data to be coded for unique user identification and also to employ Doppler and radio ranging to determine the geographical location of a transmitting terminal. The STARSYS system is composed of the field receiver/transmitter, the Low Earth Orbit (LEO) satellite constellation and the ground station elements. Each message transmission is able to contain up to thirty two digital characters. Market applications are numerous: theft control, vehicle and logistic tracking and messaging, personal communications, utility and environmental data acquisition and transfer. Co-primary frequency allocation at WARC-92 accelerated interest for potential customers and investors, although the amount of frequency allocation (less than 1 GHz) is small.

  10. Message passing with a limited number of DMA byte counters

    DOEpatents

    Blocksome, Michael [Rochester, MN; Chen, Dong [Croton on Hudson, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  11. Patient-clinician mobile communication: analyzing text messaging between adolescents with asthma and nurse case managers.

    PubMed

    Yoo, Woohyun; Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V; Gustafson, David H

    2015-01-01

    With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient-clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Mobile texting messaging has the potential to play an important role in patient-clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication.

  12. On the delay analysis of a TDMA channel with finite buffer capacity

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.

    1982-01-01

    The throughput performance of a TDMA channel with finite buffer capacity for transmitting data messages is considered. Each station has limited message buffer capacity and has Poisson message arrivals. Message arrivals will be blocked if the buffers are congested. Using the embedded Markov chain model, the solution procedure for the limiting system-size probabilities is presented in a recursive fashion. Numerical examples are given to demonstrate the tradeoffs between the blocking probabilities and the buffer sizing strategy.

  13. Controlling data transfers from an origin compute node to a target compute node

    DOEpatents

    Archer, Charles J [Rochester, MN; Blocksome, Michael A [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian E [Rochester, MN

    2011-06-21

    Methods, apparatus, and products are disclosed for controlling data transfers from an origin compute node to a target compute node that include: receiving, by an application messaging module on the target compute node, an indication of a data transfer from an origin compute node to the target compute node; and administering, by the application messaging module on the target compute node, the data transfer using one or more messaging primitives of a system messaging module in dependence upon the indication.

  14. Learning Messages Notification System to Mobile Devices

    ERIC Educational Resources Information Center

    Jimenez, M. Lourdes

    2005-01-01

    The work presents a new method to send educational messages in e-learning systems. The communication tools are one of the main characteristics of the virtual formative actions, in addition of the contents and the evaluation. The system must help to motivate the students, mainly those who do not leave the formative action and continue it until the…

  15. 48 CFR 215.407-3 - Forward pricing rate agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Forward pricing rate agreements. 215.407-3 Section 215.407-3 Federal Acquisition Regulations System DEFENSE ACQUISITION... Contract Pricing 215.407-3 Forward pricing rate agreements. (b)(i) Use forward pricing rate agreement (FPRA...

  16. 48 CFR 215.407-3 - Forward pricing rate agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Forward pricing rate agreements. 215.407-3 Section 215.407-3 Federal Acquisition Regulations System DEFENSE ACQUISITION... Contract Pricing 215.407-3 Forward pricing rate agreements. (b)(i) Use forward pricing rate agreement (FPRA...

  17. Layered virus protection for the operations and administrative messaging system

    NASA Technical Reports Server (NTRS)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  18. Optimal message log reclamation for independent checkpointing

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Fuchs, W. Kent

    1993-01-01

    Independent (uncoordinated) check pointing for parallel and distributed systems allows maximum process autonomy but suffers from possible domino effects and the associated storage space overhead for maintaining multiple checkpoints and message logs. In most research on check pointing and recovery, it was assumed that only the checkpoints and message logs older than the global recovery line can be discarded. It is shown how recovery line transformation and decomposition can be applied to the problem of efficiently identifying all discardable message logs, thereby achieving optimal garbage collection. Communication trace-driven simulation for several parallel programs is used to show the benefits of the proposed algorithm for message log reclamation.

  19. A Customized Workflow-Driven Instant Messaging System Support Team Communication in the Hospital.

    PubMed

    Lee, Ying-Li; Chien, Tsai-Feng; Chen, Hsiu-Chin

    2016-01-01

    Effective communication among the healthcare team is a very important skill to support team resource management (TRM). However, we take too much effort to connect with other team members by using traditional telephone communication. In this study, we developed an instant messaging system embedded in the original hospital information system and evaluated the preliminary outcome and the usage of the system.

  20. Does SMS Text Messaging Help or Harm Adults' Knowledge of Standard Spelling?

    ERIC Educational Resources Information Center

    Powell, D.; Dixon, M.

    2011-01-01

    The recent increase in short messaging system (SMS) text messaging, often using abbreviated, non-conventional "textisms" (e.g. "2nite"), in school-aged children has raised fears of negative consequences of such technology for literacy. The current research used a paradigm developed by Dixon and Kaminska, who showed that exposure to phonetically…

  1. Event Driven Messaging with Role-Based Subscriptions

    NASA Technical Reports Server (NTRS)

    Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed

    2009-01-01

    Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).

  2. Diabetes education via mobile text messaging.

    PubMed

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  3. Facebook for Health Promotion: Female College Students' Perspectives on Sharing HPV Vaccine Information Through Facebook

    PubMed Central

    Tsark, JoAnn; Campo, Shelly; Teti, Michelle

    2015-01-01

    Facebook, a social network site, has been widely used among young adults. However, its potential to be used as a health promotion medium has not been fully examined. This study explored Facebook's potential for sharing human papillomavirus (HPV) vaccine information among female college students in Hawai‘i. Culturally tailored flyers and handouts were developed and distributed at one large university in Hawai‘i to recruit female college students between the age of 18 and 26 having an active Facebook account. Three focus group meetings were conducted to gather student perspectives about how information about HPV vaccine may be best shared via Facebook. We found that students believed Facebook is a good awareness tool but they needed more knowledge about the HPV vaccine to feel comfortable sharing the information. Participants preferred forwarding information to chatting about HPV. Some participants expressed concern that their Facebook friends would think the HPV vaccine information they forwarded on Facebook is spam. Participants suggested prefacing the posted HPV vaccine information with a personal note in their own words to make the message more interesting and relevant to their Facebook friends. Future interventions using Facebook to promote HPV vaccine could provide students with HPV vaccine information from credible sources and ask students to attach personal testimonials or endorsements while forwarding the information on Facebook. PMID:25954600

  4. Facebook for Health Promotion: Female College Students' Perspectives on Sharing HPV Vaccine Information Through Facebook.

    PubMed

    Zhang, Ni; Tsark, JoAnn; Campo, Shelly; Teti, Michelle

    2015-04-01

    Facebook, a social network site, has been widely used among young adults. However, its potential to be used as a health promotion medium has not been fully examined. This study explored Facebook's potential for sharing human papillomavirus (HPV) vaccine information among female college students in Hawai'i. Culturally tailored flyers and handouts were developed and distributed at one large university in Hawai'i to recruit female college students between the age of 18 and 26 having an active Facebook account. Three focus group meetings were conducted to gather student perspectives about how information about HPV vaccine may be best shared via Facebook. We found that students believed Facebook is a good awareness tool but they needed more knowledge about the HPV vaccine to feel comfortable sharing the information. Participants preferred forwarding information to chatting about HPV. Some participants expressed concern that their Facebook friends would think the HPV vaccine information they forwarded on Facebook is spam. Participants suggested prefacing the posted HPV vaccine information with a personal note in their own words to make the message more interesting and relevant to their Facebook friends. Future interventions using Facebook to promote HPV vaccine could provide students with HPV vaccine information from credible sources and ask students to attach personal testimonials or endorsements while forwarding the information on Facebook.

  5. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs.

    PubMed

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-12-09

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes' ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  6. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  7. Patient mobile telephone 'text' reminder: a novel way to reduce non-attendance at the ENT out-patient clinic.

    PubMed

    Geraghty, M; Glynn, F; Amin, M; Kinsella, J

    2008-03-01

    Non-attendance at out-patient clinics is a seemingly intractable problem, estimated to cost 65 pounds sterling (97 euros) per incident. This results in under-utilisation of resources and prolonged waiting lists. In an effort to reduce out-patient clinic non-attendance, our ENT department, in conjunction with the information and communication technology department, instigated the use of a mobile telephone short message service ('text') reminder, to be sent out to each patient three days prior to their out-patient clinic appointment. To audit non-attendance rates at ENT out-patient clinics following the introduction of a text reminder system. Retrospective review. Non-attendance at our institution's ENT out-patient clinics was audited, following introduction of a text message reminder system in August 2003. Rates of non-attendance were compared for the text message reminder group and a historical control group. Before the introduction of the text message reminder system, the mean rate of non-attendance was 33.6 per cent. Following the introduction of the system, the mean rate of non-attendance reduced to 22 per cent. Sending text message reminders is a simple and cost-effective way to improve non-attendance at ENT out-patient clinics.

  8. Intelligent Traffic Quantification System

    NASA Astrophysics Data System (ADS)

    Mohanty, Anita; Bhanja, Urmila; Mahapatra, Sudipta

    2017-08-01

    Currently, city traffic monitoring and controlling is a big issue in almost all cities worldwide. Vehicular ad-hoc Network (VANET) technique is an efficient tool to minimize this problem. Usually, different types of on board sensors are installed in vehicles to generate messages characterized by different vehicle parameters. In this work, an intelligent system based on fuzzy clustering technique is developed to reduce the number of individual messages by extracting important features from the messages of a vehicle. Therefore, the proposed fuzzy clustering technique reduces the traffic load of the network. The technique also reduces congestion and quantifies congestion.

  9. System on chip module configured for event-driven architecture

    DOEpatents

    Robbins, Kevin; Brady, Charles E.; Ashlock, Tad A.

    2017-10-17

    A system on chip (SoC) module is described herein, wherein the SoC modules comprise a processor subsystem and a hardware logic subsystem. The processor subsystem and hardware logic subsystem are in communication with one another, and transmit event messages between one another. The processor subsystem executes software actors, while the hardware logic subsystem includes hardware actors, the software actors and hardware actors conform to an event-driven architecture, such that the software actors receive and generate event messages and the hardware actors receive and generate event messages.

  10. For Emergency Alerts, Some Colleges Try Sirens

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    Colleges and universities, ever more mindful of campus safety, are installing outdoor sirens. The systems can blast spoken messages or tone alerts of danger--and one of the preset messages on many of the public-address systems warns: "There is a shooter on campus. Seek shelter immediately." As college officials reviewed their…

  11. Requirements for the Military Message System (MMS) Family: Data Types and User Commands.

    DTIC Science & Technology

    1986-04-11

    AD-A167 126 REQUIREMENTS FOR THE MILITARY MESSASE SYSTEM (NHS) i FRILY: DATA TYPES AND USER CONNNDS(U) NAVAL RESEARCH LAB WASHINGTON DC C L HEITHEVER... System (MMS) Family: Data Types and User Commands CONSTANCE L. HEITMEYER Computer Science and Systems Branch I Information Technology Division April 11...Security Classification) Requirements for the Military Message System (MMS) Family: Data Types and User Commands 12. PERSONAL AUTHOR(S) Heitmeer, Constance

  12. Mobile Learning Environment with Short Messaging Service: Application to a Campus Environment in a Developing Country

    ERIC Educational Resources Information Center

    Premadasa, H. K. Salinda; Meegama, R. Gayan N.

    2013-01-01

    Purpose: The purpose of this paper is to discuss how to integrate secure, open-source and mobile-based system with the Moodle learning management system (MLMS) then describe the implementation of a campus-wide mobile learning environment with short messaging system (SMS) and how this platform is incorporated with the student's learning…

  13. Effectiveness of a Mobile Short-Message-Service–Based Disease Outbreak Alert System in Kenya

    PubMed Central

    Njeru, Ian; Zurovac, Dejan; Tipo, Shikanga O; Kareko, David; Mwau, Matilu; Morita, Kouichi

    2016-01-01

    We conducted a randomized, controlled trial to test the effectiveness of a text-messaging system used for notification of disease outbreaks in Kenya. Health facilities that used the system had more timely notifications than those that did not (19.2% vs. 2.6%), indicating that technology can enhance disease surveillance in resource-limited settings. PMID:26981628

  14. Asynchronous broadcast for ordered delivery between compute nodes in a parallel computing system where packet header space is limited

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumar, Sameer

    Disclosed is a mechanism on receiving processors in a parallel computing system for providing order to data packets received from a broadcast call and to distinguish data packets received at nodes from several incoming asynchronous broadcast messages where header space is limited. In the present invention, processors at lower leafs of a tree do not need to obtain a broadcast message by directly accessing the data in a root processor's buffer. Instead, each subsequent intermediate node's rank id information is squeezed into the software header of packet headers. In turn, the entire broadcast message is not transferred from the rootmore » processor to each processor in a communicator but instead is replicated on several intermediate nodes which then replicated the message to nodes in lower leafs. Hence, the intermediate compute nodes become "virtual root compute nodes" for the purpose of replicating the broadcast message to lower levels of a tree.« less

  15. Message Brokering Evaluation for Live Spacecraft Telemetry Monitoring, Recorded Playback, and Analysis

    NASA Technical Reports Server (NTRS)

    Lee, Daren; Pomerantz, Marc

    2015-01-01

    Live monitoring and post-flight analysis of telemetry data play a vital role in the development, diagnosis, and deployment of components of a space flight mission. Requirements for such a system include low end-to-end latency between data producers and visualizers, preserved ordering of messages, data stream archiving with random access playback, and real-time creation of derived data streams. We evaluate the RabbitMQ and Kafka message brokering systems, on how well they can enable a real-time, scalable, and robust telemetry framework that delivers telemetry data to multiple clients across heterogeneous platforms and flight projects. In our experiments using an actively developed robotic arm testbed, Kafka yielded a much higher message throughput rate and a consistent publishing rate across the number of topics and consumers. Consumer message rates were consistent across the number of topics but can exhibit bursty behavior with an increase in the contention for a single topic partition with increasing number of consumers.

  16. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  17. Designing and Implementing a Distributed System Architecture for the Mars Rover Mission Planning Software (Maestro)

    NASA Technical Reports Server (NTRS)

    Goldgof, Gregory M.

    2005-01-01

    Distributed systems allow scientists from around the world to plan missions concurrently, while being updated on the revisions of their colleagues in real time. However, permitting multiple clients to simultaneously modify a single data repository can quickly lead to data corruption or inconsistent states between users. Since our message broker, the Java Message Service, does not ensure that messages will be received in the order they were published, we must implement our own numbering scheme to guarantee that changes to mission plans are performed in the correct sequence. Furthermore, distributed architectures must ensure that as new users connect to the system, they synchronize with the database without missing any messages or falling into an inconsistent state. Robust systems must also guarantee that all clients will remain synchronized with the database even in the case of multiple client failure, which can occur at any time due to lost network connections or a user's own system instability. The final design for the distributed system behind the Mars rover mission planning software fulfills all of these requirements and upon completion will be deployed to MER at the end of 2005 as well as Phoenix (2007) and MSL (2009).

  18. Assessing the use of school public address systems to deliver nutrition messages to children: Shape up Somerville--audio adventures.

    PubMed

    Folta, Sara C; Goldberg, Jeanne P; Economos, Christina; Bell, Rick; Landers, Stewart; Hyatt, Raymond

    2006-11-01

    Given the current childhood obesity epidemic, it is especially important to find effective ways to promote healthful foods to children. School public address (PA) systems represent an inexpensive and a replicable way of reaching children with health messages. To test the effectiveness of this channel, messages were created to promote 2 dried bean (legume) dishes that had been added to the school lunch menu. Six elementary schools were pair matched, and 1 school from each pair was randomly chosen to play the messages. The impact of the intervention on choice of the 2 new entrees was assessed. Results indicate that for all schools combined, choice was not significantly affected. However, compared to their matched control schools, choice was significantly higher in the school that received the highest dose of the intervention and was significantly lower in the school that received the lowest dose. Choice was not changed in the school that received an intermediate dose. These results suggest that PA systems show promise as an effective and appropriate communications channel but only in schools that are able to play messages frequently.

  19. Patient–Clinician Mobile Communication: Analyzing Text Messaging Between Adolescents with Asthma and Nurse Case Managers

    PubMed Central

    Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V.; Gustafson, David H.

    2015-01-01

    Abstract Background: With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient–clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. Materials and Methods: We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Results: Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Conclusions: Mobile texting messaging has the potential to play an important role in patient–clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication. PMID:25401324

  20. Network support for system initiated checkpoints

    DOEpatents

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  1. The Possible Contribution of Social Grammar of Language Analysis to Inter-Cultural Communication and the Avoidance of Misunderstanding.

    ERIC Educational Resources Information Center

    Grayshon, Matthew C.

    Different languages code messages in different ways and use different channels for sending messages; thus there are many places for misinterpreting and mishearing messages in an intercultural context. To move from one language to another requires a description of the total language communication system, one that has its universals in social and…

  2. An Investigation of the Impact of an Intervention to Reduce Academic Procrastination Using Short Message Service (SMS) Technology

    ERIC Educational Resources Information Center

    Davis, Darrel R.; Abbitt, Jason T.

    2013-01-01

    This mixed-method pilot study investigated the impact of a custom Short Message Service (SMS) reminder system developed to help students reduce procrastination and increase performance on weekly content-related quizzes in a high-enrollment hybrid online course. Text message reminders were sent to three students with high procrastination and low…

  3. Unpacking the performance of a mobile health information messaging program for mothers (MomConnect) in South Africa: evidence on program reach and messaging exposure

    PubMed Central

    Dane, Pierre; Copley, Charles J; Pienaar, Cara; Parsons, Annie Neo; Engelhard, Matt; Woods, David; Bekker, Marcha; Benjamin, Peter; Pillay, Yogan; Barron, Peter; Mohan, Diwakar

    2018-01-01

    Despite calls to address broader evidence gaps in linking digital technologies to outcome and impact level health indicators, limited attention has been paid to measuring processes pertaining to the performance of programs. In this paper, we assess the program reach and message exposure of a mobile health information messaging program for mothers (MomConnect) in South Africa. In this descriptive study, we draw from system generated data to measure exposure to the program through registration attempts and conversions, message delivery, opt-outs and drop-outs. Using a logit model, we additionally explore determinants for early registration, opt-outs and drop-outs. From August 2014 to April 2017, 1 159 431 women were registered to MomConnect; corresponding to half of women attending antenatal care 1 (ANC1) and nearly 60% of those attending ANC1 estimated to own a mobile phone. In 2016, 26% of registrations started to get women onto MomConnect did not succeed. If registration attempts were converted to successful registrations, coverage of ANC1 attendees would have been 74% in 2016 and 86% in 2017. When considered as percentage of ANC1 attendees with access to a mobile phone, addressing conversion challenges bring registration coverage to an estimated 83%–89% in 2016 and 97%–100% in 2017. Among women registered, nearly 80% of expected short messaging service messages were received. While registration coverage and message delivery success rates exceed those observed for mobile messaging programs elsewhere, study findings highlight opportunities for program improvement and reinforce the need for rigorous and continuous monitoring of delivery systems. PMID:29713510

  4. Unpacking the performance of a mobile health information messaging program for mothers (MomConnect) in South Africa: evidence on program reach and messaging exposure.

    PubMed

    LeFevre, Amnesty E; Dane, Pierre; Copley, Charles J; Pienaar, Cara; Parsons, Annie Neo; Engelhard, Matt; Woods, David; Bekker, Marcha; Benjamin, Peter; Pillay, Yogan; Barron, Peter; Seebregts, Christopher John; Mohan, Diwakar

    2018-01-01

    Despite calls to address broader evidence gaps in linking digital technologies to outcome and impact level health indicators, limited attention has been paid to measuring processes pertaining to the performance of programs. In this paper, we assess the program reach and message exposure of a mobile health information messaging program for mothers (MomConnect) in South Africa. In this descriptive study, we draw from system generated data to measure exposure to the program through registration attempts and conversions, message delivery, opt-outs and drop-outs. Using a logit model, we additionally explore determinants for early registration, opt-outs and drop-outs. From August 2014 to April 2017, 1 159 431 women were registered to MomConnect; corresponding to half of women attending antenatal care 1 (ANC1) and nearly 60% of those attending ANC1 estimated to own a mobile phone. In 2016, 26% of registrations started to get women onto MomConnect did not succeed. If registration attempts were converted to successful registrations, coverage of ANC1 attendees would have been 74% in 2016 and 86% in 2017. When considered as percentage of ANC1 attendees with access to a mobile phone, addressing conversion challenges bring registration coverage to an estimated 83%-89% in 2016 and 97%-100% in 2017. Among women registered, nearly 80% of expected short messaging service messages were received. While registration coverage and message delivery success rates exceed those observed for mobile messaging programs elsewhere, study findings highlight opportunities for program improvement and reinforce the need for rigorous and continuous monitoring of delivery systems.

  5. A system for analysis and classification of voice communications

    NASA Technical Reports Server (NTRS)

    Older, H. J.; Jenney, L. L.; Garland, L.

    1973-01-01

    A method for analysis and classification of verbal communications typically associated with manned space missions or simulations was developed. The study was carried out in two phases. Phase 1 was devoted to identification of crew tasks and activities which require voice communication for accomplishment or reporting. Phase 2 entailed development of a message classification system and a preliminary test of its feasibility. The classification system permits voice communications to be analyzed to three progressively more specific levels of detail and to be described in terms of message content, purpose, and the participants in the information exchange. A coding technique was devised to allow messages to be recorded by an eight-digit number.

  6. New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.

    PubMed

    Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe

    2004-01-01

    After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare.

  7. Promoting healthy dietary behaviour through personalised nutrition: technology push or technology pull?

    PubMed

    Stewart-Knox, Barbara; Rankin, Audrey; Kuznesof, Sharron; Poínhos, Rui; Vaz de Almeida, Maria Daniel; Fischer, Arnout; Frewer, Lynn J

    2015-05-01

    The notion of educating the public through generic healthy eating messages has pervaded dietary health promotion efforts over the years and continues to do so through various media, despite little evidence for any enduring impact upon eating behaviour. There is growing evidence, however, that tailored interventions such as those that could be delivered online can be effective in bringing about healthy dietary behaviour change. The present paper brings together evidence from qualitative and quantitative studies that have considered the public perspective of genomics, nutrigenomics and personalised nutrition, including those conducted as part of the EU-funded Food4Me project. Such studies have consistently indicated that although the public hold positive views about nutrigenomics and personalised nutrition, they have reservations about the service providers' ability to ensure the secure handling of health data. Technological innovation has driven the concept of personalised nutrition forward and now a further technological leap is required to ensure the privacy of online service delivery systems and to protect data gathered in the process of designing personalised nutrition therapies.

  8. FAST: a framework for simulation and analysis of large-scale protein-silicon biosensor circuits.

    PubMed

    Gu, Ming; Chakrabartty, Shantanu

    2013-08-01

    This paper presents a computer aided design (CAD) framework for verification and reliability analysis of protein-silicon hybrid circuits used in biosensors. It is envisioned that similar to integrated circuit (IC) CAD design tools, the proposed framework will be useful for system level optimization of biosensors and for discovery of new sensing modalities without resorting to laborious fabrication and experimental procedures. The framework referred to as FAST analyzes protein-based circuits by solving inverse problems involving stochastic functional elements that admit non-linear relationships between different circuit variables. In this regard, FAST uses a factor-graph netlist as a user interface and solving the inverse problem entails passing messages/signals between the internal nodes of the netlist. Stochastic analysis techniques like density evolution are used to understand the dynamics of the circuit and estimate the reliability of the solution. As an example, we present a complete design flow using FAST for synthesis, analysis and verification of our previously reported conductometric immunoassay that uses antibody-based circuits to implement forward error-correction (FEC).

  9. "Please Don't Send Us Spam!" A Participative, Theory-Based Methodology for Developing an mHealth Intervention.

    PubMed

    Toefy, Yoesrie; Skinner, Donald; Thomsen, Sarah

    2016-08-17

    Mobile health solutions have the potential of reducing burdens on health systems and empowering patients with important information. However, there is a lack of theory-based mHealth interventions. The purpose of our study was to develop a participative, theory-based, mobile phone, audio messaging intervention attractive to recently circumcised men at voluntary medical male circumcision (VMMC) clinics in the Cape Town area in South Africa. We aimed to shift some of the tasks related to postoperative counselling on wound management and goal setting on safe sex. We place an emphasis on describing the full method of message generation to allow for replication. We developed an mHealth intervention using a staggered qualitative methodology: (1) focus group discussions with 52 recently circumcised men and their partners to develop initial voice messages they felt were relevant and appropriate, (2) thematic analysis and expert consultation to select the final messages for pilot testing, and (3) cognitive interviews with 12 recent VMMC patients to judge message comprehension and rank the messages. Message content and phasing were guided by the theory of planned behavior and the health action process approach. Patients and their partners came up with 245 messages they thought would help men during the wound-healing period. Thematic analysis revealed 42 different themes. Expert review and cognitive interviews with more patients resulted in 42 messages with a clear division in terms of needs and expectations between the initial wound-healing recovery phase (weeks 1-3) and the adjustment phase (weeks 4-6). Discussions with patients also revealed potential barriers to voice messaging, such as lack of technical knowledge of mobile phones and concerns about the invasive nature of the intervention. Patients' own suggested messages confirmed Ajzen's theory of planned behavior that if a health promotion intervention can build trust and be relevant to the recipient's needs in the first contacts, then the same recipients will perceive subsequent motivational messages more favorably. The health action process approach was also a useful tool for guiding the phasing of the messages. Participants were more positive and salutogenic than public health experts. The system showed how a process of consultation can work with a set of potential recipients of an mHealth service to ensure that their needs are included. Classic behavioral theories can and should be used to design modern mHealth interventions. We also believe that patients are the best source of messaging, ensuring that messages are culturally relevant and interesting to the recipient.

  10. High performance interconnection between high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Zhang, L.; Sun, W.

    1992-01-01

    The bridge/gateway system needed to interconnect a wide range of computer networks to support a wide range of user quality-of-service requirements is discussed. The bridge/gateway must handle a wide range of message types including synchronous and asynchronous traffic, large, bursty messages, short, self-contained messages, time critical messages, etc. It is shown that messages can be classified into three basic classes, synchronous and large and small asynchronous messages. The first two require call setup so that packet identification, buffer handling, etc. can be supported in the bridge/gateway. Identification enables resequences in packet size. The third class is for messages which do not require call setup. Resequencing hardware based to handle two types of resequencing problems is presented. The first is for a virtual parallel circuit which can scramble channel bytes. The second system is effective in handling both synchronous and asynchronous traffic between networks with highly differing packet sizes and data rates. The two other major needs for the bridge/gateway are congestion and error control. A dynamic, lossless congestion control scheme which can easily support effective error correction is presented. Results indicate that the congestion control scheme provides close to optimal capacity under congested conditions. Under conditions where error may develop due to intervening networks which are not lossless, intermediate error recovery and correction takes 1/3 less time than equivalent end-to-end error correction under similar conditions.

  11. An Investigation of Flight Deck Data Link in the Terminal Area

    NASA Technical Reports Server (NTRS)

    Martin, Lynne; Lozito, Sandra; Kaneshige, John; Dulchinos, Vicki; Sharma, Shivanjli

    2013-01-01

    The Next Generation Air Transportation System (NextGen) and Europe's Single European Sky ATM Research (SESAR) concepts require an increased use of trajectory-based operations, including extensive strategic air traffic control clearances. The clearances are lengthy and complex, which necessitate data link communications to allow for message permanence and integration into the autoflight systems (i.e., autoload capability). This paper examines the use of flight deck data link communications for strategic and tactical clearance usage in the terminal area. A human-in-the-loop simulation was conducted using a high-fidelity flight deck simulator, with ten commercial flight crews as participants. Data were collected from six flight scenarios in the San Francisco terminal airspace. The variables of interest were ATC message modality (voice v. data link), temporal quality of the message (tactical v. strategic) and message length. Dependent variables were message response times, communication clarifications, communication-related errors, and pilot workload. Response time results were longer in data link compared to voice, a finding that has been consistently revealed in a number of other simulations [1]. In addition, strategic clearances and longer messages resulted in a greater number of clarifications and errors, suggesting an increase in uncertainty of message interpretation for the flight crews when compared to tactical clearances. The implications for strategic and compound clearance usage in NextGen and SESAR are discussed

  12. A Biopsychological Model of Anti-drug PSA Processing: Developing Effective Persuasive Messages.

    PubMed

    Hohman, Zachary P; Keene, Justin Robert; Harris, Breanna N; Niedbala, Elizabeth M; Berke, Collin K

    2017-11-01

    For the current study, we developed and tested a biopsychological model to combine research on psychological tension, the Limited Capacity Model of Motivated Mediated Message Processing, and the endocrine system to predict and understand how people process anti-drug PSAs. We predicted that co-presentation of pleasant and unpleasant information, vs. solely pleasant or unpleasant, will trigger evaluative tension about the target behavior in persuasive messages and result in a biological response (increase in cortisol, alpha amylase, and heart rate). In experiment 1, we assessed the impact of co-presentation of pleasant and unpleasant information in persuasive messages on evaluative tension (conceptualized as attitude ambivalence), in experiment 2, we explored the impact of co-presentation on endocrine system responses (salivary cortisol and alpha amylase), and in experiment 3, we assessed the impact of co-presentation on heart rate. Across all experiments, we demonstrated that co-presentation of pleasant and unpleasant information, vs. solely pleasant or unpleasant, in persuasive communications leads to increases in attitude ambivalence, salivary cortisol, salivary alpha amylase, and heart rate. Taken together, the results support the initial paths of our biopsychological model of persuasive message processing and indicate that including both pleasant and unpleasant information in a message impacts the viewer. We predict that increases in evaluative tension and biological responses will aid in memory and cognitive processing of the message. However, future research is needed to test that hypothesis.

  13. Learning from Marketing: Rapid Development of Medication Messages that Engage Patients

    PubMed Central

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-01-01

    Objective To adapt marketing approaches in a health services environment. Methods Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. Results The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. Conclusion We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Practice Implications Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. PMID:25913245

  14. Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data.

    PubMed

    Um, Ki Sung; Kwak, Yun Sik; Cho, Hune; Kim, Il Kon

    2005-11-01

    A basic assumption of Health Level Seven (HL7) protocol is 'No limitation of message length'. However, most existing commercial HL7 interface engines do limit message length because they use the string array method, which is run in the main memory for the HL7 message parsing process. Specifically, messages with image and multi-media data create a long string array and thus cause the computer system to raise critical and fatal problem. Consequently, HL7 messages cannot handle the image and multi-media data necessary in modern medical records. This study aims to solve this problem with the 'streaming algorithm' method. This new method for HL7 message parsing applies the character-stream object which process character by character between the main memory and hard disk device with the consequence that the processing load on main memory could be alleviated. The main functions of this new engine are generating, parsing, validating, browsing, sending, and receiving HL7 messages. Also, the engine can parse and generate XML-formatted HL7 messages. This new HL7 engine successfully exchanged HL7 messages with 10 megabyte size images and discharge summary information between two university hospitals.

  15. Learning from marketing: Rapid development of medication messages that engage patients.

    PubMed

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-08-01

    To adapt marketing approaches in a health services environment. Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. Copyright © 2015. Published by Elsevier Ireland Ltd.

  16. Influence of active reminders on oral hygiene compliance in orthodontic patients.

    PubMed

    Eppright, Matthew; Shroff, Bhavna; Best, Al M; Barcoma, Elvi; Lindauer, Steven J

    2014-03-01

    To determine if text message reminders regarding oral hygiene compliance have an influence on the level of compliance within an orthodontic population. In this prospective, randomized, controlled clinical trial, 42 orthodontic patients were assigned to a text message or control group. Parents of patients assigned to the text message group received a reminder text message one weekday each week. Oral hygiene compliance was measured using bleeding index (BI), modified gingival index (MGI), and plaque index (PI), and visual examination of white spot lesion (WSL) development at baseline (T0), two appointments after baseline (T1), and four appointments after baseline (T2). BI, MGI, and PI scores were significantly lower in the text message group than in the control group at T2. A text message reminder system is effective for improving oral hygiene compliance in orthodontic patients.

  17. Patient-Physician Web Messaging

    PubMed Central

    Liederman, Eric M; Lee, Jerry C; Baquero, Victor H; Seites, Paul G

    2005-01-01

    BACKGROUND Patients want electronic access to providers. Providers fear being overwhelmed by unreimbursed messages. OBJECTIVE Measure the effects of patient-physician web messaging on primary care practices. DESIGN/SETTING Retrospective analysis of 6 case and 9 control internal medicine (IM) and family practice (FP) physicians' message volume, and a survey of 5,971 patients' web messaging with 267 providers and staff in 16 community primary care clinics in the Sacramento, CA region. MEASUREMENTS AND MAIN RESULTS Case telephone volume was 18.2% lower (P =.002) and fell 6.50 times faster than control. Case total telephone plus web message volume was 13.7% lower (P =.025) and fell 5.84 times faster than control. Surveys were responded to by 40.3% (1,743/4,320) of patients and 61.4% (164/267) of providers and staff. Patients were overwhelmingly satisfied and providers and staff were generally satisfied; both found the system easy to use. Patient satisfaction correlated strongly with provider response time (Γ=0.557), and provider/staff satisfaction with computer skills (Γ=0.626) (Goodman-Kruskal Gamma [Γ] measure of ordinal association). CONCLUSIONS Secure web messaging improves on e-mail with encryption, access controls, message templates, customized message and prescription routing, knowledge content, and reimbursement. Further study is needed to determine whether reducing telephone traffic through the use of web messaging decreases provider interruptions and increases clinical efficiency during the workday. Satisfaction with web messaging may increase patient retention. PMID:15693928

  18. Promoting Quality of Program Delivery via an Internet Message Delivery System

    ERIC Educational Resources Information Center

    Bishop, Dana C.; Dusenbury, Linda; Pankratz, Melinda M.; Hansen, William B.

    2013-01-01

    This article presents results from a study that evaluated an online message system designed to improve the delivery of prevention programs. We conducted a quasi-experimental study with 32 agencies and schools that implemented substance use prevention programs and examined differences between the comparison and intervention groups. We also examined…

  19. Lecture Rule No. 1: Cell Phones ON, Please! A Low-Cost Personal Response System for Learning and Teaching

    ERIC Educational Resources Information Center

    Lee, Albert W. M.; Ng, Joseph K. Y.; Wong, Eva Y. W.; Tan, Alfred; Lau, April K. Y.; Lai, Stephen F. Y.

    2013-01-01

    phone, that can be used to replace the "clicker" as a personal response device. Our mobile phone-based response system (iQlickers) collects and analyzes the answers or opinions sent in by the students as SMS (short message service) messages. The statistic of the…

  20. Extracting the Textual and Temporal Structure of Supercomputing Logs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jain, S; Singh, I; Chandra, A

    2009-05-26

    Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource of information about their operational status and health. However, their massive size, complexity, and lack of standard format makes it difficult to automatically extract information that can be used to improve system management. In this work we propose a novel method to succinctly represent the contents of supercomputing logs, by using textual clustering to automatically find the syntactic structures of log messages. This information is used to automatically classify messages into semantic groups via an onlinemore » clustering algorithm. Further, we describe a methodology for using the temporal proximity between groups of log messages to identify correlated events in the system. We apply our proposed methods to two large, publicly available supercomputing logs and show that our technique features nearly perfect accuracy for online log-classification and extracts meaningful structural and temporal message patterns that can be used to improve the accuracy of other log analysis techniques.« less

  1. TXT@WORK: pediatric hospitalists and text messaging.

    PubMed

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice <10 years (67%). Ninety-one percent of responders used a smartphone. More than half sent (60%) and received (61%) work-related text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  2. Long-range AIS message analysis based on the TianTuo-3 micro satellite

    NASA Astrophysics Data System (ADS)

    Li, Shiyou; Chen, Lihu; Chen, Xiaoqian; Zhao, Yong; Bai, Yuzhu

    2017-07-01

    The "Type-27 AIS message" is the long-range AIS broadcast message, which is primarily intended for the long-range detection of AIS typically by satellite. The TT3-AIS uses a four-frequency receiver scheme which includes two frequency channels conventionally applied by the AIS system and two new frequency channels allocated to the long-range AIS broadcast message. To the end of April 2016, the TT3-AIS has already received more than 11,400 packets of Type-27 AIS messages. In this paper, a detailed analysis of the Type-27 AIS messages is performed. Firstly, an eavesdropper diagram of the space-borne AIS received from the worldwide vessels is obtained. Secondly, the analysis to the trend of the number and the ratio of the new-type vessels is performed based on the Type-27 AIS message. The detection probability of the new-type vessels is also discussed. The result would be helpful on the usage of the long-range AIS message both for data application and for the improvement in designing the next space-based AIS receiver.

  3. Development and Testing of an Automated 4-Day Text Messaging Guidance as an Aid for Improving Colonoscopy Preparation.

    PubMed

    Walter, Benjamin Michael; Klare, Peter; Neu, Bruno; Schmid, Roland M; von Delius, Stefan

    2016-06-21

    In gastroenterology a sufficient colon cleansing improves adenoma detection rate and prevents the need for preterm repeat colonoscopies due to invalid preparation. It has been shown that patient education is of major importance for improvement of colon cleansing. Objective of this study was to assess the function of an automated text messaging (short message service, SMS)-supported colonoscopy preparation starting 4 days before colonoscopy appointment. After preevaluation to assess mobile phone usage in the patient population for relevance of this approach, a Web-based, automated SMS text messaging system was developed, following which a single-center feasibility study at a tertiary care center was performed. Patients scheduled for outpatient colonoscopy were invited to participate. Patients enrolled in the study group received automated information about dietary recommendations and bowel cleansing during colonoscopy preparation. Data of outpatient colonoscopies with regular preparation procedure were used for pair matching and served as control. Primary end point was feasibility of SMS text messaging support in colonoscopy preparation assessed as stable and satisfactory function of the system. Secondary end points were quality of bowel preparation according to the Boston Bowel Preparation Scale (BBPS) and patient satisfaction with SMS text messaging-provided information assessed by a questionnaire. Web-based SMS text messaging-supported colonoscopy preparation was successful and feasible in 19 of 20 patients. Mean (standard error of the mean, SEM) total BBPS score was slightly higher in the SMS group than in the control group (7.3, SEM 0.3 vs 6.4, SEM 0.2) and for each colonic region (left, transverse, and right colon). Patient satisfaction regarding SMS text messaging-based information was high. Using SMS for colonoscopy preparation with 4 days' guidance including dietary recommendation is a new approach to improve colonoscopy preparation. Quality of colonoscopy preparation was sufficient and patients were highly satisfied with the system during colonoscopy preparation.

  4. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  5. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  6. Time and frequency for digital telecommunications

    NASA Technical Reports Server (NTRS)

    Folts, H. C.

    1972-01-01

    Time and frequency (T and F) are fundamental and pervasive parameters of telecommunication technology. Advancing development of digital communications using data modulation rates above 2400 baud and time-division multiplex in complex network configurations is now requiring more accurate and precise T and F reference information for efficient operation of telecommunication systems. A schematic diagram of a general communication system is shown. This diagram is very general and can depict any type of communication. The information source selects a specific message which is encoded and sent through a communication channel. Enroute, the signal is subjected to perturbations from environmental noise. The received signal is then decoded and delivered to its destination. Through the process, the message may undergo many spurious changes, resulting in a loss of information content in the delivered message as compared to the original selected message. In digital telecommunication systems, loss of information content of the signals can be attributed to noise, distortion of waveshape, and loss of synchronization.

  7. Can anonymous posters on medical forums be reidentified?

    PubMed

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being determined.

  8. Design Considerations in Development of a Mobile Health Intervention Program: The TEXT ME and TEXTMEDS Experience

    PubMed Central

    Thakkar, Jay; Barry, Tony; Thiagalingam, Aravinda; Redfern, Julie; McEwan, Alistair L; Rodgers, Anthony

    2016-01-01

    Background Mobile health (mHealth) has huge potential to deliver preventative health services. However, there is paucity of literature on theoretical constructs, technical, practical, and regulatory considerations that enable delivery of such services. Objectives The objective of this study was to outline the key considerations in the development of a text message-based mHealth program; thus providing broad recommendations and guidance to future researchers designing similar programs. Methods We describe the key considerations in designing the intervention with respect to functionality, technical infrastructure, data management, software components, regulatory requirements, and operationalization. We also illustrate some of the potential issues and decision points utilizing our experience of developing text message (short message service, SMS) management systems to support 2 large randomized controlled trials: TEXT messages to improve MEDication adherence & Secondary prevention (TEXTMEDS) and Tobacco, EXercise and dieT MEssages (TEXT ME). Results The steps identified in the development process were: (1) background research and development of the text message bank based on scientific evidence and disease-specific guidelines, (2) pilot testing with target audience and incorporating feedback, (3) software-hardware customization to enable delivery of complex personalized programs using prespecified algorithms, and (4) legal and regulatory considerations. Additional considerations in developing text message management systems include: balancing the use of customized versus preexisting software systems, the level of automation versus need for human inputs, monitoring, ensuring data security, interface flexibility, and the ability for upscaling. Conclusions A merging of expertise in clinical and behavioral sciences, health and research data management systems, software engineering, and mobile phone regulatory requirements is essential to develop a platform to deliver and manage support programs to hundreds of participants simultaneously as in TEXT ME and TEXTMEDS trials. This research provides broad principles that may assist other researchers in developing mHealth programs. PMID:27847350

  9. Design Considerations in Development of a Mobile Health Intervention Program: The TEXT ME and TEXTMEDS Experience.

    PubMed

    Thakkar, Jay; Barry, Tony; Thiagalingam, Aravinda; Redfern, Julie; McEwan, Alistair L; Rodgers, Anthony; Chow, Clara K

    2016-11-15

    Mobile health (mHealth) has huge potential to deliver preventative health services. However, there is paucity of literature on theoretical constructs, technical, practical, and regulatory considerations that enable delivery of such services. The objective of this study was to outline the key considerations in the development of a text message-based mHealth program; thus providing broad recommendations and guidance to future researchers designing similar programs. We describe the key considerations in designing the intervention with respect to functionality, technical infrastructure, data management, software components, regulatory requirements, and operationalization. We also illustrate some of the potential issues and decision points utilizing our experience of developing text message (short message service, SMS) management systems to support 2 large randomized controlled trials: TEXT messages to improve MEDication adherence & Secondary prevention (TEXTMEDS) and Tobacco, EXercise and dieT MEssages (TEXT ME). The steps identified in the development process were: (1) background research and development of the text message bank based on scientific evidence and disease-specific guidelines, (2) pilot testing with target audience and incorporating feedback, (3) software-hardware customization to enable delivery of complex personalized programs using prespecified algorithms, and (4) legal and regulatory considerations. Additional considerations in developing text message management systems include: balancing the use of customized versus preexisting software systems, the level of automation versus need for human inputs, monitoring, ensuring data security, interface flexibility, and the ability for upscaling. A merging of expertise in clinical and behavioral sciences, health and research data management systems, software engineering, and mobile phone regulatory requirements is essential to develop a platform to deliver and manage support programs to hundreds of participants simultaneously as in TEXT ME and TEXTMEDS trials. This research provides broad principles that may assist other researchers in developing mHealth programs. ©Jay Thakkar, Tony Barry, Aravinda Thiagalingam, Julie Redfern, Alistair L McEwan, Anthony Rodgers, Clara K Chow. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 15.11.2016.

  10. Subtlenoise: sonification of distributed computing operations

    NASA Astrophysics Data System (ADS)

    Love, P. A.

    2015-12-01

    The operation of distributed computing systems requires comprehensive monitoring to ensure reliability and robustness. There are two components found in most monitoring systems: one being visually rich time-series graphs and another being notification systems for alerting operators under certain pre-defined conditions. In this paper the sonification of monitoring messages is explored using an architecture that fits easily within existing infrastructures based on mature opensource technologies such as ZeroMQ, Logstash, and Supercollider (a synth engine). Message attributes are mapped onto audio attributes based on broad classification of the message (continuous or discrete metrics) but keeping the audio stream subtle in nature. The benefits of audio rendering are described in the context of distributed computing operations and may provide a less intrusive way to understand the operational health of these systems.

  11. Semantic message oriented middleware for publish/subscribe networks

    NASA Astrophysics Data System (ADS)

    Li, Han; Jiang, Guofei

    2004-09-01

    The publish/subscribe paradigm of Message Oriented Middleware provides a loosely coupled communication model between distributed applications. Traditional publish/subscribe middleware uses keywords to match advertisements and subscriptions and does not support deep semantic matching. To this end, we designed and implemented a Semantic Message Oriented Middleware system to provide such capabilities for semantic description and matching. We adopted the DARPA Agent Markup Language and Ontology Inference Layer, a formal knowledge representation language for expressing sophisticated classifications and enabling automated inference, as the topic description language in our middleware system. A simple description logic inference system was implemented to handle the matching process between the subscriptions of subscribers and the advertisements of publishers. Moreover our middleware system also has a security architecture to support secure communication and user privilege control.

  12. "This Is a Message for …": Third Graders' Use of Written Text Functions to Facilitate Interpersonal Relationships

    ERIC Educational Resources Information Center

    Jaeger, Elizabeth L.

    2016-01-01

    This article describes the ways in which a class of 7- and 8-year-old children used writing to communicate. Using Halliday's Systemic Functional Linguistics as a theoretical frame, I examine what functions these messages served, how functions varied from child to child and how the practice of message-sending evolved over time. Analysis of data…

  13. Military Message Experiment. Volume II.

    DTIC Science & Technology

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  14. Asynchronous Message Service Reference Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.

  15. Toward personal eHealth in cardiology. Results from the EPI-MEDICS telemedicine project.

    PubMed

    Rubel, Paul; Fayn, Jocelyne; Nollo, Giandomenico; Assanelli, Deodato; Li, Bo; Restier, Lioara; Adami, Stefano; Arod, Sébastien; Atoui, Hussein; Ohlsson, Mattias; Simon-Chautemps, Lucas; Télisson, David; Malossi, Cesare; Ziliani, Gian-Luca; Galassi, Alfredo; Edenbrandt, Lars; Chevalier, Philippe

    2005-10-01

    Despite many attempts to improve the management of acute myocardial infarction, only small trends to shorter time intervals before treatment have been reported. The self-care solution developed by the European EPI-MEDICS project (2001-2004) is a novel, very affordable, easy-to-use, portable, and intelligent Personal ECG Monitor (PEM) for the early detection of cardiac ischemia and arrhythmia that is able to record a professional-quality, 3-lead electrocardiogram (ECG) based on leads I, II, and V2; derive the missing leads of the standard 12-lead ECG (thanks to either a generic or a patient-specific transform), compare each ECG with a reference ECG by means of advanced neural network-based decision-making methods taking into account the serial ECG measurements and the patient risk factors and clinical data; and generate different levels of alarms and forward the alarm messages with the recorded ECGs and the patient's Personal electronic Health Record (PHR) to the relevant health care providers by means of a standard Bluetooth-enabled, GSM/GPRS-compatible mobile phone. The ECG records are SCP-ECG encoded and stored with the PHR on a secure personal SD Card embedded in the PEM device. The alarm messages and the PHR are XML encoded. Major alarm messages are automatically transmitted to the nearest emergency call center. Medium or minor alarms are sent on demand to a central PEM Alarm Web Server. Health professionals are informed by a Short Message Service. The PEM embeds itself a Web server to facilitate the reviewing and/or update of the PHR during a routine visit at the office of the general physician or cardiologist. Eighty PEM prototypes have been finalized and tested for several weeks on 697 citizens/patients in different clinical and self-care situations involving end users (188 patients), general physicians (10), and cardiologists (9). The clinical evaluation indicates that the EPI-MEDICS concept may save lives and is very valuable for prehospitalization triage.

  16. Robust design of feedback feed-forward iterative learning control based on 2D system theory for linear uncertain systems

    NASA Astrophysics Data System (ADS)

    Li, Zhifu; Hu, Yueming; Li, Di

    2016-08-01

    For a class of linear discrete-time uncertain systems, a feedback feed-forward iterative learning control (ILC) scheme is proposed, which is comprised of an iterative learning controller and two current iteration feedback controllers. The iterative learning controller is used to improve the performance along the iteration direction and the feedback controllers are used to improve the performance along the time direction. First of all, the uncertain feedback feed-forward ILC system is presented by an uncertain two-dimensional Roesser model system. Then, two robust control schemes are proposed. One can ensure that the feedback feed-forward ILC system is bounded-input bounded-output stable along time direction, and the other can ensure that the feedback feed-forward ILC system is asymptotically stable along time direction. Both schemes can guarantee the system is robust monotonically convergent along the iteration direction. Third, the robust convergent sufficient conditions are given, which contains a linear matrix inequality (LMI). Moreover, the LMI can be used to determine the gain matrix of the feedback feed-forward iterative learning controller. Finally, the simulation results are presented to demonstrate the effectiveness of the proposed schemes.

  17. On-demand information retrieval in sensor networks with localised query and energy-balanced data collection.

    PubMed

    Teng, Rui; Zhang, Bing

    2011-01-01

    On-demand information retrieval enables users to query and collect up-to-date sensing information from sensor nodes. Since high energy efficiency is required in a sensor network, it is desirable to disseminate query messages with small traffic overhead and to collect sensing data with low energy consumption. However, on-demand query messages are generally forwarded to sensor nodes in network-wide broadcasts, which create large traffic overhead. In addition, since on-demand information retrieval may introduce intermittent and spatial data collections, the construction and maintenance of conventional aggregation structures such as clusters and chains will be at high cost. In this paper, we propose an on-demand information retrieval approach that exploits the name resolution of data queries according to the attribute and location of each sensor node. The proposed approach localises each query dissemination and enable localised data collection with maximised aggregation. To illustrate the effectiveness of the proposed approach, an analytical model that describes the criteria of sink proxy selection is provided. The evaluation results reveal that the proposed scheme significantly reduces energy consumption and improves the balance of energy consumption among sensor nodes by alleviating heavy traffic near the sink.

  18. Social media targeting of health messages. A promising approach for research and practice.

    PubMed

    Betsch, Cornelia

    2014-01-01

    In their contribution, Remschmidt and colleagues (1) put forward an innovative approach for recruiting female, German study participants from diverse social and ethnical backgrounds to assess their knowledge, attitudes, and behaviors regarding HPV vaccination. The approach involves placing advertisements on the social media platform Facebook that specify tags for not only the sought after socio-demographic characteristics (age, gender) but also self-relevant aspects of the target group. These tags determine which Facebook users will see the ad. By sequentially adjusting the tags, the researchers were able to recruit different sub-populations, resulting in a final sample similar to a representative German sample for a particular age group.

  19. Mass media and marketing communication promoting primary and secondary cancer prevention.

    PubMed

    Hannon, Peggy; Lloyd, Gareth P; Viswanath, K; Smith, Tenbroeck; Basen-Engquist, Karen; Vernon, Sally W; Turner, Gina; Hesse, Bradford W; Crammer, Corinne; von Wagner, Christian; Backinger, Cathy L

    2009-01-01

    People often seek and receive cancer information from mass media (including television, radio, print media, and the Internet), and marketing strategies often inform cancer information needs assessment, message development, and channel selection. In this article, we present the discussion of a 2-hour working group convened for a cancer communications workshop held at the 2008 Society of Behavioral Medicine meeting in San Diego, CA. During the session, an interdisciplinary group of investigators discussed the current state of the science for mass media and marketing communication promoting primary and secondary cancer prevention. We discussed current research, new research areas, methodologies and theories needed to move the field forward, and critical areas and disciplines for future research.

  20. Determining a bisection bandwidth for a multi-node data communications network

    DOEpatents

    Faraj, Ahmad A.

    2010-01-26

    Methods, systems, and products are disclosed for determining a bisection bandwidth for a multi-node data communications network that include: partitioning nodes in the network into a first sub-network and a second sub-network in dependence upon a topology of the network; sending, by each node in the first sub-network to a destination node in the second sub-network, a first message having a predetermined message size; receiving, by each node in the first sub-network from a source node in the second sub-network, a second message; measuring, by each node in the first sub-network, the elapsed communications time between the sending of the first message and the receiving of the second message; selecting the longest elapsed communications time; and calculating the bisection bandwidth for the network in dependence upon the number of the nodes in the first sub-network, the predetermined message size of the first test message, and the longest elapsed communications time.

  1. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    PubMed

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  2. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  3. Understanding Messaging Preferences to Inform Development of Mobile Goal-Directed Behavioral Interventions

    PubMed Central

    van Stolk-Cooke, Katherine; Morgenstern, Jon; Kuerbis, Alexis N; Markle, Kendra

    2014-01-01

    Background Mobile messaging interventions have been shown to improve outcomes across a number of mental health and health-related conditions, but there are still significant gaps in our knowledge of how to construct and deliver the most effective brief messaging interventions. Little is known about the ways in which subtle linguistic variations in message content can affect user receptivity and preferences. Objective The aim of this study was to determine whether any global messaging preferences existed for different types of language content, and how certain characteristics moderate those preferences, in an effort to inform the development of mobile messaging interventions. Methods This study examined user preferences for messages within 22 content groupings. Groupings were presented online in dyads of short messages that were identical in their subject matter, but structurally or linguistically varied. Participants were 277 individuals residing in the United States who were recruited and compensated through Amazon’s Mechanical Turk (MTurk) system. Participants were instructed to select the message in each dyad that they would prefer to receive to help them achieve a personal goal of their choosing. Results Results indicate global preferences of more than 75% of subjects for certain types of messages, such as those that were grammatically correct, free of textese, benefit-oriented, polite, nonaggressive, and directive as opposed to passive, among others. For several classes of messages, few or no clear global preferences were found. There were few personality- and trait-based moderators of message preferences, but subtle manipulations of message structure, such as changing “Try to…” to “You might want to try to…” affected message choice. Conclusions The results indicate that individuals are sensitive to variations in the linguistic content of text messages designed to help them achieve a personal goal and, in some cases, have clear preferences for one type of message over another. Global preferences were indicated for messages that contained accurate spelling and grammar, as well as messages that emphasize the positive over the negative. Research implications and a guide for developing short messages for goal-directed behaviors are presented in this paper. PMID:24500775

  4. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?

    PubMed

    Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex

    2018-04-01

    During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.

  5. An AI-based communication system for motor and speech disabled persons: design methodology and prototype testing.

    PubMed

    Sy, B K; Deller, J R

    1989-05-01

    An intelligent communication device is developed to assist the nonverbal, motor disabled in the generation of written and spoken messages. The device is centered on a knowledge base of the grammatical rules and message elements. A "belief" reasoning scheme based on both the information from external sources and the embedded knowledge is used to optimize the process of message search. The search for the message elements is conceptualized as a path search in the language graph, and a special frame architecture is used to construct and to partition the graph. Bayesian "belief" reasoning from the Dempster-Shafer theory of evidence is augmented to cope with time-varying evidence. An "information fusion" strategy is also introduced to integrate various forms of external information. Experimental testing of the prototype system is discussed.

  6. Creative Analytics of Mission Ops Event Messages

    NASA Technical Reports Server (NTRS)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non-telemetry mission operations information into a common log format and then providing display and analytics tools to provide in-depth assessment of the log contents. The work includes: Common interface formats for acquiring time-tagged text messages Conversion of common files for schedules, orbital events, and stored commands to the common log format Innovative displays to depict thousands of messages on a single display Structured English text queries against the log message data store, extensible to a more mature natural language query capability Goal of speech-to-text and text-to-speech additions to create a personal mission operations assistant to aid on-console operations. A wide variety of planned uses identified by the mission operations teams will be discussed.

  7. Alerting prefixes for speech warning messages. [in helicopters

    NASA Technical Reports Server (NTRS)

    Bucher, N. M.; Voorhees, J. W.; Karl, R. L.; Werner, E.

    1984-01-01

    A major question posed by the design of an integrated voice information display/warning system for next-generation helicopter cockpits is whether an alerting prefix should precede voice warning messages; if so, the characteristics desirable in such a cue must also be addressed. Attention is presently given to the results of a study which ascertained pilot response time and response accuracy to messages preceded by either neutral cues or the cognitively appropriate semantic cues. Both verbal cues and messages were spoken in direct, phoneme-synthesized speech, and a training manipulation was included to determine the extent to which previous exposure to speech thus produced facilitates these messages' comprehension. Results are discussed in terms of the importance of human factors research in cockpit display design.

  8. DMA engine for repeating communication patterns

    DOEpatents

    Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-09-21

    A parallel computer system is constructed as a network of interconnected compute nodes to operate a global message-passing application for performing communications across the network. Each of the compute nodes includes one or more individual processors with memories which run local instances of the global message-passing application operating at each compute node to carry out local processing operations independent of processing operations carried out at other compute nodes. Each compute node also includes a DMA engine constructed to interact with the application via Injection FIFO Metadata describing multiple Injection FIFOs where each Injection FIFO may containing an arbitrary number of message descriptors in order to process messages with a fixed processing overhead irrespective of the number of message descriptors included in the Injection FIFO.

  9. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    PubMed

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  10. The Critical Periphery in the Growth of Social Protests.

    PubMed

    Barberá, Pablo; Wang, Ning; Bonneau, Richard; Jost, John T; Nagler, Jonathan; Tucker, Joshua; González-Bailón, Sandra

    2015-01-01

    Social media have provided instrumental means of communication in many recent political protests. The efficiency of online networks in disseminating timely information has been praised by many commentators; at the same time, users are often derided as "slacktivists" because of the shallow commitment involved in clicking a forwarding button. Here we consider the role of these peripheral online participants, the immense majority of users who surround the small epicenter of protests, representing layers of diminishing online activity around the committed minority. We analyze three datasets tracking protest communication in different languages and political contexts through the social media platform Twitter and employ a network decomposition technique to examine their hierarchical structure. We provide consistent evidence that peripheral participants are critical in increasing the reach of protest messages and generating online content at levels that are comparable to core participants. Although committed minorities may constitute the heart of protest movements, our results suggest that their success in maximizing the number of online citizens exposed to protest messages depends, at least in part, on activating the critical periphery. Peripheral users are less active on a per capita basis, but their power lies in their numbers: their aggregate contribution to the spread of protest messages is comparable in magnitude to that of core participants. An analysis of two other datasets unrelated to mass protests strengthens our interpretation that core-periphery dynamics are characteristically important in the context of collective action events. Theoretical models of diffusion in social networks would benefit from increased attention to the role of peripheral nodes in the propagation of information and behavior.

  11. Using a Computer-based Messaging System at a High School To Increase School/Home Communication.

    ERIC Educational Resources Information Center

    Burden, Mitzi K.

    Minimal communication between school and home was found to contribute to low performance by students at McDuffie High School (South Carolina). This report describes the experience of establishing a computer-based telephone messaging system in the high school and involving parents, teachers, and students in its use. Additional strategies employed…

  12. Words with Friends: Effects of Associative and Semantic Relationships on Subject-Verb Agreement Errors during Sentence Production

    ERIC Educational Resources Information Center

    Penta, Darrell J.

    2017-01-01

    The sentence production system transforms preverbal messages in the mind of a speaker into coherent grammatical utterances. During this process, which unfolds rapidly, the system has to link meaning information from the speaker's message to appropriate lexical and grammatical information from the speaker's memory. It usually does so with fluency…

  13. Messages from Space: The Solar System and Beyond. Grades 508. Teacher's Guide. Great Explorations in Science (GEMS).

    ERIC Educational Resources Information Center

    Beals, Kevin; Erickson, John; Sneider, Cary

    Building on collaborative work between the Search for Extraterrestrial Intelligence (SETI) Institute and the Lawrence Hall of Science, this curriculum takes advantage of humans' fascination with extraterrestrials to catalyze the study of the solar system and beyond. The unit begins when students attempt to decode a fictitious message from outer…

  14. 76 FR 26777 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ...) System Event Messages (e.g., start of messages, start of system hours, start of quoting, start of opening... assignments, to take advantage of the proposed $500 cap and thereby limit costs. \\11\\ Typically, a smaller... of the Exchange that is typically a small proprietary market maker doing business on the Exchange's...

  15. 75 FR 62441 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-08

    ... SQF 6.0 for convenience purposes so that market participants utilizing SQF 6.0 have an additional... provided on SQF 5.0); (3) System Event Messages (e.g., start of messages, start of system hours, start of quoting, start of opening); (4) Complex Order Strategy Auction Notifications (COLA); (5) Complex Order...

  16. Developing an Early-Alert System to Promote Student Visits to Tutor Center

    ERIC Educational Resources Information Center

    Cai, Qijie; Lewis, Carrie L.; Higdon, Jude

    2015-01-01

    An early-alert system (MavCLASS) was developed and piloted in a large gateway math class with 611 freshman students to identify academically at-risk students and provide alert messages. It was found that there was significant association between the alert messages students received and their visits to the university's tutor center. Further, the…

  17. Advanced Numerical Techniques of Performance Evaluation. Volume 2

    DTIC Science & Technology

    1990-06-01

    multiprocessor environment. This factor is determined by the overhead of the primitives available in the system ( semaphore , monitor , or message... semaphore , monitor , or message passing primitives ) and U the programming ability of the user who implements the simulation. " t,: the sequential...Warp Operating System . i Pro" lftevcnth ACM Symposum on Operating Systems Princlplcs, pages 77 9:3, Auslin, TX, Nov wicr 1987. ACM. [121 D.R. Jefferson

  18. Signaling communication events in a computer network

    DOEpatents

    Bender, Carl A.; DiNicola, Paul D.; Gildea, Kevin J.; Govindaraju, Rama K.; Kim, Chulho; Mirza, Jamshed H.; Shah, Gautam H.; Nieplocha, Jaroslaw

    2000-01-01

    A method, apparatus and program product for detecting a communication event in a distributed parallel data processing system in which a message is sent from an origin to a target. A low-level application programming interface (LAPI) is provided which has an operation for associating a counter with a communication event to be detected. The LAPI increments the counter upon the occurrence of the communication event. The number in the counter is monitored, and when the number increases, the event is detected. A completion counter in the origin is associated with the completion of a message being sent from the origin to the target. When the message is completed, LAPI increments the completion counter such that monitoring the completion counter detects the completion of the message. The completion counter may be used to insure that a first message has been sent from the origin to the target and completed before a second message is sent.

  19. Administering an epoch initiated for remote memory access

    DOEpatents

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  20. Administering an epoch initiated for remote memory access

    DOEpatents

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  1. Administering an epoch initiated for remote memory access

    DOEpatents

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  2. Satellite and Missile Data Generation for AIS.

    DTIC Science & Technology

    1979-12-01

    8217..lI SATELLITE AND MISSILE DATA SGENERATION FOR AIS Operating Systems, Inc. S Dr. Georgette M4. T. Silva Dr. Christine A. Montgomery APPROVED FOR PUBLIC...Same " UNCLASSIFIEDSame S .. DECLASSIFI CATION DOWNGRADING N/ASCH E D ULE 16. DISTRIBUTION STATEMENT (of this Report) Approved for public release...provislon.of adequate system control. 1-6 1.2.2 Current Capabilities of 031’ s Message Text Processing System. The OSI message text analysis system has the

  3. Preliminary Study Using Forward Reaction Control System Jets During Space Shuttle Entry

    NASA Technical Reports Server (NTRS)

    Restrepo, Carolina; Valasek, John

    2006-01-01

    Failure or degradation of the flight control system, or hull damage, can lead to loss of vehicle control during entry. Possible failure scenarios are debris impact and wing damage that could result in a large aerodynamic asymmetry which cannot be trimmed out without additional yaw control. Currently the space shuttle uses aerodynamic control surfaces and Reaction Control System jets to control attitude. The forward jets are used for orbital maneuvering only, while the aft jets are used for yaw control during entry. This paper develops a controller for using the forward reaction control system jets as an additional control during entry, and assesses its value and feasibility during failure situations. Forward-aft jet blending logic is created, and implemented on a simplified model of the space shuttle entry flight control system. The model is validated and verified on the nonlinear, six degree-of-freedom Shuttle Engineering Simulator. A rudimentary human factors study was undertaken using the forward cockpit simulator at Johnson Space Center, to assess flying qualities of the new system and pilot workload. Results presented in the paper show that the combination of forward and aft jets provides useful additional yaw control, in addition to potential fuel savings and the ability to balance the use of the fuel in the forward and aft tanks to meet availability constraints of both forward and aft fuel tanks. Piloted simulation studies indicated that using both sets of jets while flying a damaged space shuttle reduces pilot workload, and makes the vehicle more responsive.

  4. Design of a network for concurrent message passing systems

    NASA Astrophysics Data System (ADS)

    Song, Paul Y.

    1988-08-01

    We describe the design of the network design frame (NDF), a self-timed routing chip for a message-passing concurrent computer. The NDF uses a partitioned data path, low-voltage output drivers, and a distributed token-passing arbiter to provide a bandwidth of 450 Mbits/sec into the network. Wormhole routing and bidirectional virtual channels are used to provide low latency communications, less than 2us latency to deliver a 216 bit message across the diameter of a 1K node mess-connected machine. To support concurrent software systems, the NDF provides two logical networks, one for user messages and one for system messages. The two networks share the same set of physical wires. To facilitate the development of network nodes, the NDF is a design frame. The NDF circuitry is integrated into the pad frame of a chip leaving the center of the chip uncommitted. We define an analytic framework in which to study the effects of network size, network buffering capacity, bidirectional channels, and traffic on this class of networks. The response of the network to various combinations of these parameters are obtained through extensive simulation of the network model. Through simulation, we are able to observe the macro behavior of the network as opposed to the micro behavior of the NDF routing controller.

  5. How much importance do we give to target audiences in article writing?

    PubMed

    Nedjat, Sima; Nedjat, Saharnaz; Gholami, Jaleh; Ashoorkhani, Mahnaz; Maleki, Katayoun; Hejrie, Soroush Mortaz; Majdzadeh, Reza

    2010-01-01

    Writing papers can be used as a means to convey a message. Knowledge transfer is also about conveying the right message to the right target audience. The aim of this study was to determine the proportion of articles that had mentioned a clear message and the target audience in the abstract and the article as a whole, and also to examine their association with different determinant factors. Articles published from 2001 to 2006 that were based on clinical and health system research conducted on Iranian populations and on maternal care, diabetes and tuberculosis were searched systematically in domestic and international databases. Eventually checklists (Additional file 1) were completed for 795 articles. Overall, 98.5% of articles had a clear message, whereas 12.5% had addressed the direct target audience. Presence of a clear message in formatted abstracts were seen 3.6 times more (CI95%: 1.5-8.7) than in articles without formatted abstracts (p = 0.005). Addressing of the direct target audience was seen twice as much in health system research articles as compared to clinical studies, odds ratio was 2.3 (CI95%: 1.47-3.48, p<0.001). Creating a format for journal abstracts seems to be an effective intervention for presenting the message in articles.

  6. The Relationship between Emotional and Esteem Social Support Messages and Health.

    PubMed

    Robinson, James D; Turner, Jeanine W; Tian, Yan; Neustadtl, Alan; Mun, Seong Ki; Levine, Betty

    2017-11-28

    The purpose of this investigation is to determine the relative contribution of five types of social support to improved patient health. This analysis suggests that emotional and esteem social support messages are associated with improved patient health as measured by a decrease in average blood glucose levels among diabetic patients. In addition, when two system feature variables, two system use variables, two measures of learning, one measure of self-efficacy, and one measure of affect toward their HCP were added to the baseline model, a third significant factor emerged. Perceptions about learning about diabetes from reading the digital messages sent by their HCP also predicted improved patient health. Cognitive-Emotional Theory of Esteem Support Messages suggests a combination of esteem social support and emotional social support messages enhanced our ability to predict improved patient health by change in patient hemoglobin A1c (HbA1c) scores. While a nonrandomized prospective study, this investigation provides support for the notion that provider-patient interaction is related to improved patient health and that both emotional and esteem social support messages play a role in that process. Finally, the study suggests some types of social support are and other types are not associated with improved patient health; this is consistent with the optimal matching hypothesis.

  7. Smart communication with LabView

    NASA Astrophysics Data System (ADS)

    Iov, Cǎtǎlin J.; Diaconu, Bogdan; Hnatiuc, Mihaela

    2016-12-01

    The population alarm systems do not represent a new concept. Since hundreds of years ago the man used either smoke signals generated from certain upper locations, visible from long distance, getting through acoustic systems placed on high buildings, until now when mass-media channels extended the possibilities by the television and radio. However, either one of those mentioned above requested the individual to be located at the alarming moment in the area of action of the alarm. Otherwise, the message has no efficiency. This limitation is currently solved by additional communication channels such as the internet and the mobile networks. Messages are now able to be sent to the mobile screen, and the user can reply to messages either by using the short message service (SMS) or by emailing to someone, to a server, to a center. From the general pattern of alarming the population on certain events, the medical applications represent a very important field. Messages are sent from the patient to a central medical center and back to the patient. This paper focuses on the value that virtual tools developed with LabVIEW brings to us.

  8. Reducing errors through a web-based self-management support system.

    PubMed

    Ekstedt, Mirjam; Børøsund, Elin; Svenningsen, Ina K; Ruland, Cornelia M

    2014-01-01

    Web-based self-management support systems SMSS, can successfully assist a wide range of patients with information and self-management support. O or as a stand-alone service, are e-messages. This study describes how one component of a multi component SMSS, an e-message service, in which patients with breast cancer could direct questions to nurses, physicians or social workers at the hospital where they were being treated, had an influence on safety and continuity of care. Ninety-one dialogues consisting of 284 messages were analysed. The communications between patients and the healthcare team revealed that the e-messages service served as a means for quality assurance of information, for double-checking and for coordination of care. We give examples of how an e-mail service may improve patients' knowledge in a process of taking control over their own care - increasingly important in a time of growing complexity and specialization in healthcare. It remains to be tested whether an e-message service can improve continuity of care and prevent or mitigate medical mishaps.

  9. A Randomized Controlled Trial of the Effectiveness of Traditional and Mobile Public Health Communications With Health Care Providers.

    PubMed

    Baseman, Janet; Revere, Debra; Painter, Ian; Oberle, Mark; Duchin, Jeffrey; Thiede, Hanne; Nett, Randall; MacEachern, Dorothy; Stergachis, Andy

    2016-02-01

    Health care providers play an essential role in public health emergency preparedness and response. We conducted a 4-year randomized controlled trial to systematically compare the effectiveness of traditional and mobile communication strategies for sending time-sensitive public health messages to providers. Subjects (N=848) included providers who might be leveraged to assist with emergency preparedness and response activities, such as physicians, pharmacists, nurse practitioners, physician's assistants, and veterinarians. Providers were randomly assigned to a group that received time-sensitive quarterly messages via e-mail, fax, or cell phone text messaging (SMS) or to a no-message control group. Follow-up phone interviews elicited information about message receipt, topic recall, and perceived credibility and trustworthiness of message and source. Our main outcome measures were awareness and recall of message content, which was compared across delivery methods. Per-protocol analysis revealed that e-mail messages were recalled at a higher rate than were messaged delivered by fax or SMS, whereas the as-treated analysis found that e-mail and fax groups had similar recall rates and both had higher recall rates than the SMS group. This is the first study to systematically evaluate the relative effectiveness of public health message delivery systems. Our findings provide guidance to improve public health agency communications with providers before, during, and after a public health emergency.

  10. PRAIS: Distributed, real-time knowledge-based systems made easy

    NASA Technical Reports Server (NTRS)

    Goldstein, David G.

    1990-01-01

    This paper discusses an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS). PRAIS strives for transparently parallelizing production (rule-based) systems, even when under real-time constraints. PRAIS accomplishes these goals by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors.

  11. Message handling system concepts and services in a land mobile satellite system

    NASA Technical Reports Server (NTRS)

    Barberis, S.; Settimo, F.; Giralda, A.; Mistretta, I.; Loisy, C.; Parmentier, J. L.

    1990-01-01

    A network architecture containing the capabilities offered by the Message Handling System (MHS) to the PRODAT Land Mobile Satellite System (LMSS) is described taking into account the constraints of a preexisting satellite system which is going to become operational. The mapping between MHS services and PRODAT requirements is also reported and shows that the supplied performance can be significantly enhanced to both fixed and mobile users. The impact of the insertion of additional features on the system structure, especially on the centralized control unit, are also addressed.

  12. Virtual file system on NoSQL for processing high volumes of HL7 messages.

    PubMed

    Kimura, Eizen; Ishihara, Ken

    2015-01-01

    The Standardized Structured Medical Information Exchange (SS-MIX) is intended to be the standard repository for HL7 messages that depend on a local file system. However, its scalability is limited. We implemented a virtual file system using NoSQL to incorporate modern computing technology into SS-MIX and allow the system to integrate local patient IDs from different healthcare systems into a universal system. We discuss its implementation using the database MongoDB and describe its performance in a case study.

  13. “Please Don’t Send Us Spam!” A Participative, Theory-Based Methodology for Developing an mHealth Intervention

    PubMed Central

    2016-01-01

    Background Mobile health solutions have the potential of reducing burdens on health systems and empowering patients with important information. However, there is a lack of theory-based mHealth interventions. Objective The purpose of our study was to develop a participative, theory-based, mobile phone, audio messaging intervention attractive to recently circumcised men at voluntary medical male circumcision (VMMC) clinics in the Cape Town area in South Africa. We aimed to shift some of the tasks related to postoperative counselling on wound management and goal setting on safe sex. We place an emphasis on describing the full method of message generation to allow for replication. Methods We developed an mHealth intervention using a staggered qualitative methodology: (1) focus group discussions with 52 recently circumcised men and their partners to develop initial voice messages they felt were relevant and appropriate, (2) thematic analysis and expert consultation to select the final messages for pilot testing, and (3) cognitive interviews with 12 recent VMMC patients to judge message comprehension and rank the messages. Message content and phasing were guided by the theory of planned behavior and the health action process approach. Results Patients and their partners came up with 245 messages they thought would help men during the wound-healing period. Thematic analysis revealed 42 different themes. Expert review and cognitive interviews with more patients resulted in 42 messages with a clear division in terms of needs and expectations between the initial wound-healing recovery phase (weeks 1–3) and the adjustment phase (weeks 4–6). Discussions with patients also revealed potential barriers to voice messaging, such as lack of technical knowledge of mobile phones and concerns about the invasive nature of the intervention. Patients’ own suggested messages confirmed Ajzen’s theory of planned behavior that if a health promotion intervention can build trust and be relevant to the recipient’s needs in the first contacts, then the same recipients will perceive subsequent motivational messages more favorably. The health action process approach was also a useful tool for guiding the phasing of the messages. Participants were more positive and salutogenic than public health experts. Conclusions The system showed how a process of consultation can work with a set of potential recipients of an mHealth service to ensure that their needs are included. Classic behavioral theories can and should be used to design modern mHealth interventions. We also believe that patients are the best source of messaging, ensuring that messages are culturally relevant and interesting to the recipient. PMID:27535589

  14. Localization and cooperative communication methods for cognitive radio

    NASA Astrophysics Data System (ADS)

    Duval, Olivier

    We study localization of nearby nodes and cooperative communication for cognitive radios. Cognitive radios sensing their environment to estimate the channel gain between nodes can cooperate and adapt their transmission power to maximize the capacity of the communication between two nodes. We study the end-to-end capacity of a cooperative relaying scheme using orthogonal frequency-division modulation (OFDM) modulation, under power constraints for both the base station and the relay station. The relay uses amplify-and-forward and decode-and-forward cooperative relaying techniques to retransmit messages on a subset of the available subcarriers. The power used in the base station and the relay station transmitters is allocated to maximize the overall system capacity. The subcarrier selection and power allocation are obtained based on convex optimization formulations and an iterative algorithm. Additionally, decode-and-forward relaying schemes are allowed to pair source and relayed subcarriers to increase further the capacity of the system. The proposed techniques outperforms non-selective relaying schemes over a range of relay power budgets. Cognitive radios can be used for opportunistic access of the radio spectrum by detecting spectrum holes left unused by licensed primary users. We introduce a spectrum holes detection approach, which combines blind modulation classification, angle of arrival estimation and number of sources detection. We perform eigenspace analysis to determine the number of sources, and estimate their angles of arrival (AOA). In addition, we classify detected sources as primary or secondary users with their distinct second-orde one-conjugate cyclostationarity features. Extensive simulations carried out indicate that the proposed system identifies and locates individual sources correctly, even at -4 dB signal-to-noise ratios (SNR). In environments with a high density of scatterers, several wireless channels experience nonline-of-sight (NLOS) condition, increasing the localization error, even when the AOA estimate is accurate. We present a real-time localization solver (RTLS) for time-of-arrival (TOA) estimates using ray-tracing methods on the map of the geometry of walls and compare its performance with classical TOA trilateration localization methods. Extensive simulations and field trials for indoor environments show that our method increases the coverage area from 1.9% of the floor to 82.3 % and the accuracy by a 10-fold factor when compared with trilateration. We implemented our ray tracing model in C++ using the CGAL computational geometry algorithm library. We illustrate the real-time property of our RTLS that performs most ray tracing tasks in a preprocessing phase with time and space complexity analyses and profiling of our software.

  15. Teenagers and Texting: Use of a Youth Ecological Momentary Assessment System in Trajectory Health Research With Latina Adolescents

    PubMed Central

    Hardeman, Rachel R; Kwon, Gyu; Lando-King, Elizabeth; Zhang, Lei; Genis, Therese; Brady, Sonya S; Kinder, Elizabeth

    2014-01-01

    Background Adolescent females send and receive more text messages than any others, with an average of 4050 texts a month. Despite this technological inroad among adolescents, few researchers are utilizing text messaging technology to collect real time, contextualized data. Temporal variables (ie, mood) collected regularly over a period of time could yield useful insights, particularly for evaluating health intervention outcomes. Use of text messaging technology has multiple benefits, including capacity of researchers to immediately act in response to texted information. Objective The objective of our study was to custom build a short messaging service (SMS) or text messaging assessment delivery system for use with adolescents. The Youth Ecological Momentary Assessment System (YEMAS) was developed to collect automated texted reports of daily activities, behaviors, and attitudes among adolescents, and to examine the feasibility of YEMAS. This system was created to collect and transfer real time data about individual- and social-level factors that influence physical, mental, emotional, and social well-being. Methods YEMAS is a custom designed system that interfaces with a cloud-based communication system to automate scheduled delivery of survey questions via text messaging; we designed this university-based system to meet data security and management standards. This was a two-phase study that included development of YEMAS and a feasibility pilot with Latino adolescent females. Relative homogeneity of participants was desired for the feasibility pilot study; adolescent Latina youth were sought because they represent the largest and fastest growing ethnic minority group in the United States. Females were targeted because they demonstrate the highest rate of text messaging and were expected to be interested in participating. Phase I involved development of YEMAS and Phase II involved piloting of the system with Latina adolescents. Girls were eligible to participate if they were attending one of the participating high schools and self-identified as Latina. We contacted 96 adolescents; of these, 24 returned written parental consent forms, completed assent processes, and enrolled in the study. Results YEMAS was collaboratively developed and implemented. Feasibility was established with Latina adolescents (N=24), who responded to four surveys daily for two two-week periods (four weeks total). Each survey had between 12 and 17 questions, with responses including yes/no, Likert scale, and open-ended options. Retention and compliance rates were high, with nearly 18,000 texts provided by the girls over the course of the pilot period. Conclusions Pilot results support the feasibility and value of YEMAS, an automated SMS-based text messaging data collection system positioned within a secure university environment. This approach capitalizes on immediate data transfer protocols and enables the documentation of participants’ thoughts, feelings, and behaviors in real time. Data are collected using mobile devices that are familiar to participants and nearly ubiquitous in developed countries. PMID:25098355

  16. Controlling multisupplier operations by intelligent EDI

    NASA Astrophysics Data System (ADS)

    Eskelinen, Juha; Kovanen, Jyrki; Linna, Miika; Mononen, Tero; Sulonen, Reijo

    In modern CIM (Computer Integrated Manufacturing) environment, problems that can affect production should be discovered as soon as possible. This can be very difficult in multisupplier operations where problems outside one organization can remain undetected until they already have effects inside that organization. If Electronic Data Interchange (EDI) is used to control intercompany operations there is a better possibility to detect problems on logistic chain. Because these problems usually have some effects in the flow of EDI messages, they can be detected by controlling this flow. A Forget-Me-Not (FMN) system, which is a programmable message management system that can control the flow of EDI messages and detect exceptional situations is discussed.

  17. Intelligent Gateway design and development : final report

    DOT National Transportation Integrated Search

    1996-10-01

    The U.S. Coast Guard (USCG) had communications requirements uncommon to other services. Currently, there were no Defense Message System (DMS) products that could be used to send messages to underway vessels with multiple modes of communications. The ...

  18. Recursivity in Lingua Cosmica

    NASA Astrophysics Data System (ADS)

    Ollongren, Alexander

    2011-02-01

    In a sequence of papers on the topic of message construction for interstellar communication by means of a cosmic language, the present author has discussed various significant requirements such a lingua should satisfy. The author's Lingua Cosmica is a (meta) system for annotating contents of possibly large-scale messages for ETI. LINCOS, based on formal constructive logic, was primarily designed for dealing with logic contents of messages but is also applicable for denoting structural properties of more general abstractions embedded in such messages. The present paper explains ways and means for achieving this for a special case: recursive entities. As usual two stages are involved: first the domain of discourse is enriched with suitable representations of the entities concerned, after which properties over them can be dealt with within the system itself. As a representative example the case of Russian dolls (Matrjoshka's) is discussed in some detail and relations with linguistic structures in natural languages are briefly exploited.

  19. Communication Measures to Bridge Ten Millennia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sebeok, Thomas A.

    1984-04-01

    The Department of Energy created the Human Interference Task Force (HITF) in 1980 to investigate the problems connected with the postclosure, final marking of a filled nuclear waste repository. The task of the HITF is to devise a method of warning future generations not to mine or drill at that site unless they are aware of the consequences of their actions. Since the likelihood of human interference should be minimized for 10,000 years, an effective and long-lasting warning system must be designed. This report is a semiotic analysis of the problem, examining it in terms of the science or theorymore » of messages and symbols. Because of the long period of time involved, the report recommends that a relay system of recoding messages be initiated; that the messages contain a mixture of iconic, indexical, and symbolic elements; and that a high degree of redundancy of messages be employed.« less

  20. A forward model-based validation of cardiovascular system identification

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Cohen, R. J.

    2001-01-01

    We present a theoretical evaluation of a cardiovascular system identification method that we previously developed for the analysis of beat-to-beat fluctuations in noninvasively measured heart rate, arterial blood pressure, and instantaneous lung volume. The method provides a dynamical characterization of the important autonomic and mechanical mechanisms responsible for coupling the fluctuations (inverse modeling). To carry out the evaluation, we developed a computational model of the cardiovascular system capable of generating realistic beat-to-beat variability (forward modeling). We applied the method to data generated from the forward model and compared the resulting estimated dynamics with the actual dynamics of the forward model, which were either precisely known or easily determined. We found that the estimated dynamics corresponded to the actual dynamics and that this correspondence was robust to forward model uncertainty. We also demonstrated the sensitivity of the method in detecting small changes in parameters characterizing autonomic function in the forward model. These results provide confidence in the performance of the cardiovascular system identification method when applied to experimental data.

  1. Exploring bi-directional and SMS messaging for communications between Public Health Agencies and their stakeholders: a qualitative study.

    PubMed

    Revere, Debra; Calhoun, Rebecca; Baseman, Janet; Oberle, Mark

    2015-07-08

    Communication technologies that enable bi-directional/two-way communications and cell phone texting (SMS) between public health agencies and their stakeholders may improve public health surveillance, ensure targeted distribution of alerts to hard-to-reach populations, reduce mortality and morbidity in an emergency, and enable a crucial feedback loop between public health agencies and the communities they serve. Building on prior work regarding health care provider preferences for receiving one-way public health communications by email, fax or SMS, we conducted a formative, exploratory study to understand how a bi-directional system and the incorporation of SMS in that system might be used as a strategy to send and receive messages between public health agencies and community-based organizations which serve vulnerable populations, health care providers, and public health workers. Our research question: Under what conditions and/or situations might public health agencies utilize bi-directional and/or SMS messaging for disseminating time-sensitive public health information (alerts, advisories, updates, etc.) to their stakeholders? A mixed methods (qualitative and quantitative) study was conducted between April and July 2014. Data collection included a survey distributed to health care providers and semi-structured interviews with providers, community- and government-based organization leaders and directors, and public health agency internal workforce staff. Survey respondents and interviewees were asked about their exposure to public health messages, how these messages are received and how the information in these messages are handled, and in what situations (for example, a local vs. a national event, a pandemic or emergency vs. a health update) a bi-directional and/or SMS messaging system might improve communications between public health agencies and their stakeholder group. Interview and survey data were qualitatively analyzed. Thematic codes were quantitized into dichotomous variables of 0 or 1 on a per respondent basis to enumerate the presence or absence of each thematic code, enable quantitative analysis, and inform interpretation of findings. Five major themes emerged from synthesizing survey and interview results: 1) Regardless of situational context (emergency vs. non-urgent) and message recipient (stakeholder group), e-mail is a favored modality for receiving public health messages; 2) The decision to use bi-directional, SMS or multiple communication strategies is complex and public health agencies' need to manage messaging concerns/barriers and benefits for all parties; 3) Both public health agencies and their stakeholders share similar values/uses and concerns regarding two-way public health messaging and SMS; 4) Public health is highly trusted, thus thoughtful, effective messaging will ensure continuation of this goodwill; and 5) Information reciprocity between public health agencies and stakeholders who share their information is essential. Multiple communication strategies might be utilized but the choice of a specific strategy needs to balance message content (emergency vs. routine communications), delivery (one- vs. two-way), channel (SMS, email, etc.), and public health agency burden with stakeholder preferences and technical capabilities, all while mitigating the risk of message overload and disregard of important communications by recipients.

  2. Implementing Diffie-Hellman key exchange using quantum EPR pairs

    NASA Astrophysics Data System (ADS)

    Mandal, Sayonnha; Parakh, Abhishek

    2015-05-01

    This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.

  3. Patients in transition--improving hospital-home care collaboration through electronic messaging: providers' perspectives.

    PubMed

    Melby, Line; Brattheim, Berit J; Hellesø, Ragnhild

    2015-12-01

    To explore how the use of electronic messages support hospital and community care nurses' collaboration and communication concerning patients' admittance to and discharges from hospitals. Nurses in hospitals and in community care play a crucial role in the transfer of patients between the home and the hospital. Several studies have shown that transition situations are challenging due to a lack of communication and information exchange. Information and communication technologies may support nurses' work in these transition situations. An electronic message system was introduced in Norway to support patient transitions across the health care sector. A descriptive, qualitative interview study was conducted. One hospital and three adjacent communities were included in the study. We conducted semi-structured interviews with hospital nurses and community care nurses. In total, 41 persons were included in the study. The analysis stemmed from three main topics related to the aims of e-messaging: efficiency, quality and safety. These were further divided into sub-themes. All informants agreed that electronic messaging is more efficient, i.e. less time-consuming than previous means of communication. The shift from predominantly oral communication to writing electronic messages has brought attention to the content of the information exchanged, thereby leading to more conscious communication. Electronic messaging enables improved information security, thereby enhancing patient safety, but this depends on nurses using the system as intended. Nurses consider electronic messaging to be a useful tool for communication and collaboration in patient transitions. Patient transitions are demanding situations both for patients and for the nurses who facilitate the transitions. The introduction of information and communication technologies can support nurses' work in the transition situations, and this is likely to benefit the patients. © 2015 John Wiley & Sons Ltd.

  4. [Email in a dedicated headache clinic: experience gained over a five-year period].

    PubMed

    Pedraza, M Isabel; Herrero-Velázquez, Sonia; López-Mesonero, Luis; Ruiz-Piñero, Marina; Posadas, Javier; Guerrero-Peral, Ángel L

    2015-06-16

    The use of email can facilitate communication between the different levels of an organisation. Our primary care physicians have had an email service in the dedicated headache clinic (DHC) since November 2009, and our aim is therefore to analyse the use of email over that five-year period. Data concerning the emails sent up until October 2014 were collected prospectively. The questions were classified as need for referral to the DHC (group 1), progress made by the cases seen in the DHC (group 2), training in headaches (group 3) or the treatment of the headaches suffered by primary care physicians themselves as patients (group 4). A total of 274 email messages were analysed. Monthly consultations have increased (from 1.5 per month during the first year to 7.5 per month during the fifth). Findings showed that 10.2% of the email messages came from rural health centres and 89.8% were sent from urban health centres. Replies were sent within 2 ± 2.8 days (range: 0-24 days). Altogether 130 consultations were classified as belonging to group 1 (47.4%), in which referral through the normal channel was recommended in 60 cases (46.2%), via the preferential channel in 47 (36.2%) and non-referral was suggested in 23 cases (17.6%). Group 2 included 125 emails (45.7%) and in 80 cases there was no need to make a new appointment or to bring forward the existing one (64%). Thirteen visits (4.7%) were classified into group 3 and six (2.2%) in group 4. Our primary care physicians are using the email of the DHC on an increasingly more frequent basis. Its use makes it possible to detect patients whose appointment -whether the first or a follow-up- needs to be brought forward, as well as allowing issues to be solved without the need for referral. It is effective for the treatment of physicians who themselves have headaches and as a tool for continuing education.

  5. Global issues and challenges beyond Ottawa: the way forward.

    PubMed

    Scriven, Angela; Speller, Viv

    2007-01-01

    This article links 10 regional field reports to the statement Shaping the future of health promotion: Priorities for action, which are both outcomes of the global IUHPE and CCHPR project, Renewing our Commitment to the Ottawa Charter: The Way Forward. The Shaping the future statement has emerged from the regional field reports and will act as the driving force behind the future articulation of health promotion policy at an international level. Connections are made between the key areas of the regional field reports, which include health promotion policy, health-promoting services, health promotion funding and availability of resources, community participation in health, research and information, and the recommendations made in the Shaping the future of health promotion: Priorities for action statement. The coverage includes putting healthy policies in to practice; strengthening structures and processes for health promotion; moving towards knowledge based practice; building a competent health promotion workforce and empowering communities. There are a number of significant issues arising across all the regional field reports that have been drawn on to make the recommendations in the statement. For example, the political environment has strongly influenced the evolution of health promotion. There is a clear message from the reports that political will is essential and that political advocacy needs to continue to ensure that policy goals represent the principles of Ottawa in an appropriate manner. Examples drawn from the reports demonstrate the many and varied challenges for health promotion in addressing 21st century global health determinants. There is also a clear indication that the principles established in Ottawa, and developed in subsequent WHO declarations and charters, have been embedded in the framework of health promotion practice. Shaping the future articulates the key message from the regional field reports, and therefore ensures that the lessons learnt from implementing Ottawa over the past two decades are harnessed and will shape health promotion in the future.

  6. Interface For Fault-Tolerant Control System

    NASA Technical Reports Server (NTRS)

    Shaver, Charles; Williamson, Michael

    1989-01-01

    Interface unit and controller emulator developed for research on electronic helicopter-flight-control systems equipped with artificial intelligence. Interface unit interrupt-driven system designed to link microprocessor-based, quadruply-redundant, asynchronous, ultra-reliable, fault-tolerant control system (controller) with electronic servocontrol unit that controls set of hydraulic actuators. Receives digital feedforward messages from, and transmits digital feedback messages to, controller through differential signal lines or fiber-optic cables (thus far only differential signal lines have been used). Analog signals transmitted to and from servocontrol unit via coaxial cables.

  7. New Uses for a Familiar Technology: Introducing Mobile Phone Polling in Large Classes

    ERIC Educational Resources Information Center

    Voelkel, Susanne; Bennett, Daimark

    2014-01-01

    We have introduced a real-time polling system to support student engagement and feedback in four large Level 1 and 2 modules in Biological Sciences. The audience response system makes use of a technology that is ubiquitous and familiar to the students. To participate, students send text messages using their mobile phones or send a message via…

  8. Graphic Communications Systems. Grade 11-12. Course #8135 (Semester). Technology Education Course Guide. Industrial Arts/Technology Education.

    ERIC Educational Resources Information Center

    North Carolina State Dept. of Public Instruction, Raleigh. Div. of Vocational Education.

    This guide is intended for use in teaching a graphic communications systems. The course has been designed to provide students with an opportunity to assess audiences; design, produce, and deliver printed and photographic messages; and analyze the impacts of these messages. The first two sections discuss the guide's development within the framework…

  9. Using Kintsch's Discourse Comprehension Theory To Model the User's Coding of an Informative Message from an Enabling Information Retrieval System.

    ERIC Educational Resources Information Center

    Cole, Charles; Mandelblatt, Bertie

    2000-01-01

    Uses Kintsch's proposition-based construction-integration theory of discourse comprehension to detail the user coding operations that occur in each of the three subsystems (Perception, Comprehension, Application) in which users process an information retrieval systems (IRS) message. Describes an IRS device made up of two separate parts that enable…

  10. Documentation of Source Code.

    DTIC Science & Technology

    1988-05-12

    the "load IC" menu option. A prompt will appear in the typescript window requesting the name of the knowledge base to be loaded. Enter...highlighted and then a prompt will appear in the typescript window. The prompt will be requesting the name of the file containing the message to be read in...the file name, the system will begin reading in the message. The listified message is echoed back in the typescript window. After that, the screen

  11. 48 CFR 23.1101 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... WORKPLACE Encouraging Contractor Policies to Ban Text Messaging While Driving 23.1101 Purpose. This subpart... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Purpose. 23.1101 Section... 6, 2009), Federal Leadership on Reducing Text Messaging while Driving. ...

  12. 48 CFR 23.1101 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... WORKPLACE Encouraging Contractor Policies to Ban Text Messaging While Driving 23.1101 Purpose. This subpart... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Purpose. 23.1101 Section... 6, 2009), Federal Leadership on Reducing Text Messaging while Driving. ...

  13. 48 CFR 23.1101 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... WORKPLACE Encouraging Contractor Policies to Ban Text Messaging While Driving 23.1101 Purpose. This subpart... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Purpose. 23.1101 Section... 6, 2009), Federal Leadership on Reducing Text Messaging while Driving. ...

  14. Using Technology to Affect Influenza Vaccine Coverage Among Children With Chronic Respiratory Conditions.

    PubMed

    Bay, Sarah L; Crawford, Daniel J

    Influenza presents additional burdens for children with chronic respiratory conditions. Influenza vaccinations may reduce complications, yet approximately half of children remain unprotected. Evidence supports integration of text and e-mail into multicomponent strategies to increase influenza vaccination rates among children with chronic respiratory conditions. A single text and e-mail message was sent to those with enabled preferences in the patient portal. A follow-up survey assessed aspects of message receipt. Surveys were completed without collection of demographics. A total of 3,206 messages were successfully delivered. Surveys were initiated by 107 recipients. Frequency analysis showed that text and e-mail messages were preferred forms of communication. A statistically significant relationship was found between receiving a message and receiving an influenza vaccination (p = .027). Text and e-mail messaging are cost effective and well received, and they can be easily integrated into existing systems. These methods are translatable across populations and can convey various types of messages. Copyright © 2016 National Association of Pediatric Nurse Practitioners. Published by Elsevier Inc. All rights reserved.

  15. The effects of iPod and text-messaging use on driver distraction: a bio-behavioral analysis.

    PubMed

    Mouloua, M; Ahern, A; Quevedo, A; Jaramillo, D; Rinalducci, E; Smither, J; Alberti, P; Brill, C

    2012-01-01

    This study was designed to empirically examine the effects of iPod device and text-messaging activities on driver distraction. Sixty participants were asked to perform a driving simulation task while searching for songs using an iPod device or text messaging. Driving errors as measured by lane deviations were recorded and analyzed as a function of the distracters. Physiological measures (EEG) were also recorded during the driving phases in order to measure participant levels of cortical arousal. It was hypothesized that iPod use and text messaging would result in a profound effect on driving ability. The results showed a significant effect of iPod use and text-messaging on driving performance. Increased numbers of driving errors were recorded during the iPod and text-messaging phases than the pre- and post-allocation phases. Higher levels of Theta activity were also observed during the iPod and Text-messaging phase than the pre- and post-allocation phases. Implications for in-vehicle systems design, training, and safety are also discussed.

  16. One-Dimensional Forward–Forward Mean-Field Games

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gomes, Diogo A., E-mail: diogo.gomes@kaust.edu.sa; Nurbekyan, Levon; Sedjro, Marc

    While the general theory for the terminal-initial value problem for mean-field games (MFGs) has achieved a substantial progress, the corresponding forward–forward problem is still poorly understood—even in the one-dimensional setting. Here, we consider one-dimensional forward–forward MFGs, study the existence of solutions and their long-time convergence. First, we discuss the relation between these models and systems of conservation laws. In particular, we identify new conserved quantities and study some qualitative properties of these systems. Next, we introduce a class of wave-like equations that are equivalent to forward–forward MFGs, and we derive a novel formulation as a system of conservation laws. Formore » first-order logarithmic forward–forward MFG, we establish the existence of a global solution. Then, we consider a class of explicit solutions and show the existence of shocks. Finally, we examine parabolic forward–forward MFGs and establish the long-time convergence of the solutions.« less

  17. Final Evaluation Report American Telephone and Telegraph Company, System V/MLS Release 1.2.0 Running on UNIX System V, Release 3.1.1 Rating Maintenance Plan

    DTIC Science & Technology

    1990-09-28

    message queues semaphores processes This report also discusses 630 MTG buffers which are system objects (as are the process table, u- area, etc ). 630...mechanism is associated with a corresponding set of " operation " system calls: mqgend, rmgrcv for messages, semop for semaphores , shmat, shmdt for... Semaphores Semaphores are objects that are used to implement a process synchronisation mechanism. System V semaphores are a generalization of the P and V

  18. Usage of the hybrid encryption in a cloud instant messages exchange system

    NASA Astrophysics Data System (ADS)

    Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek

    2016-09-01

    A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.

  19. A Pilot Randomized Trial of Text-Messaging for Symptom Awareness and Diabetes Knowledge in Adolescents With Type 1 Diabetes

    PubMed Central

    Han, Yi; Faulkner, Melissa Spezia; Fritz, Heather; Fadoju, Doris; Muir, Andrew; Abowd, Gregory D.; Head, Lauren; Arriaga, Rosa I.

    2015-01-01

    Adolescents with type 1 diabetes typically receive clinical care every 3 months. Between visits, diabetes-related issues may not be frequently reflected, learned, and documented by the patients, limiting their self-awareness and knowledge about their condition. We designed a text-messaging system to help resolve this problem. In a pilot, randomized controlled trial with 30 adolescents, we examined the effect of text messages about symptom awareness and diabetes knowledge on glucose control and quality of life. The intervention group that received more text messages between visits had significant improvements in quality of life. PMID:25720675

  20. Forward Skirt Structural Testing on the Space Launch System (SLS) Program

    NASA Technical Reports Server (NTRS)

    Lohrer, Joe; Wright, R. D.

    2016-01-01

    Introduction: (a) Structural testing was performed to evaluate Space Shuttle heritage forward skirts for use on the Space Launch System (SLS) program, (b) Testing was required because SLS loads are approximately 35% greater than shuttle loads; and (c) Two forwards skirts were tested to failure.

  1. Performance analysis of distributed applications using automatic classification of communication inefficiencies

    DOEpatents

    Vetter, Jeffrey S.

    2005-02-01

    The method and system described herein presents a technique for performance analysis that helps users understand the communication behavior of their message passing applications. The method and system described herein may automatically classifies individual communication operations and reveal the cause of communication inefficiencies in the application. This classification allows the developer to quickly focus on the culprits of truly inefficient behavior, rather than manually foraging through massive amounts of performance data. Specifically, the method and system described herein trace the message operations of Message Passing Interface (MPI) applications and then classify each individual communication event using a supervised learning technique: decision tree classification. The decision tree may be trained using microbenchmarks that demonstrate both efficient and inefficient communication. Since the method and system described herein adapt to the target system's configuration through these microbenchmarks, they simultaneously automate the performance analysis process and improve classification accuracy. The method and system described herein may improve the accuracy of performance analysis and dramatically reduce the amount of data that users must encounter.

  2. Preliminary PANSAT ground station software design and use of an expert system to analyze telemetry

    NASA Astrophysics Data System (ADS)

    Lawrence, Gregory W.

    1994-03-01

    The Petite Amateur Navy Satellite (PANSAT) is a communications satellite designed to be used by civilian amateur radio operators. A master ground station is being built at the Naval Postgraduate School. This computer system performs satellite commands, displays telemetry, trouble-shoots problems, and passes messages. The system also controls an open loop tracking antenna. This paper concentrates on the telemetry display, decoding, and interpretation through artificial intelligence (AI). The telemetry is displayed in an easily interpretable format, so that any user can understand the current health of the satellite and be cued as to any problems and possible solutions. Only the master ground station has the ability to receive all telemetry and send commands to the spacecraft; civilian ham users do not have access to this information. The telemetry data is decommutated and analyzed before it is displayed to the user, so that the raw data will not have to be interpreted by ground users. The analysis will use CLIPS imbedded in the code, and derive its inputs from telemetry decommutation. The program is an expert system using a forward chaining set of rules based on the expected operation and parameters of the satellite. By building the rules during the construction and design of the satellite, the telemetry can be well understood and interpreted after the satellite is launched and the designers may no longer be available to provide input to the problem.

  3. Scalable and Resilient Middleware to Handle Information Exchange during Environment Crisis

    NASA Astrophysics Data System (ADS)

    Tao, R.; Poslad, S.; Moßgraber, J.; Middleton, S.; Hammitzsch, M.

    2012-04-01

    The EU FP7 TRIDEC project focuses on enabling real-time, intelligent, information management of collaborative, complex, critical decision processes for earth management. A key challenge is to promote a communication infrastructure to facilitate interoperable environment information services during environment events and crises such as tsunamis and drilling, during which increasing volumes and dimensionality of disparate information sources, including sensor-based and human-based ones, can result, and need to be managed. Such a system needs to support: scalable, distributed messaging; asynchronous messaging; open messaging to handling changing clients such as new and retired automated system and human information sources becoming online or offline; flexible data filtering, and heterogeneous access networks (e.g., GSM, WLAN and LAN). In addition, the system needs to be resilient to handle the ICT system failures, e.g. failure, degradation and overloads, during environment events. There are several system middleware choices for TRIDEC based upon a Service-oriented-architecture (SOA), Event-driven-Architecture (EDA), Cloud Computing, and Enterprise Service Bus (ESB). In an SOA, everything is a service (e.g. data access, processing and exchange); clients can request on demand or subscribe to services registered by providers; more often interaction is synchronous. In an EDA system, events that represent significant changes in state can be processed simply, or as streams or more complexly. Cloud computing is a virtualization, interoperable and elastic resource allocation model. An ESB, a fundamental component for enterprise messaging, supports synchronous and asynchronous message exchange models and has inbuilt resilience against ICT failure. Our middleware proposal is an ESB based hybrid architecture model: an SOA extension supports more synchronous workflows; EDA assists the ESB to handle more complex event processing; Cloud computing can be used to increase and decrease the ESB resources on demand. To reify this hybrid ESB centric architecture, we will adopt two complementary approaches: an open source one for scalability and resilience improvement while a commercial one can be used for ultra-speed messaging, whilst we can bridge between these two to support interoperability. In TRIDEC, to manage such a hybrid messaging system, overlay and underlay management techniques will be adopted. The managers (both global and local) will collect, store and update status information (e.g. CPU utilization, free space, number of clients) and balance the usage, throughput, and delays to improve resilience and scalability. The expected resilience improvement includes dynamic failover, self-healing, pre-emptive load balancing, and bottleneck prediction while the expected improvement for scalability includes capacity estimation, Http Bridge, and automatic configuration and reconfiguration (e.g. add or delete clients and servers).

  4. Risk assessment, identification, and notification (RAIN) system : a novel approach for traffic management.

    DOT National Transportation Integrated Search

    2009-08-31

    Primary research focused on the design and development of an energy-efficient Risk Notification Message Dissemination Protocol (RNMDP) for vehicular ad hoc networks (VANETs). RNMDP propagates Risk Notification Messages (RNMs) from a location of origi...

  5. 47 CFR 32.5100 - Long distance message revenue.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Long distance message revenue. 32.5100 Section 32.5100 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100...

  6. 47 CFR 32.5100 - Long distance message revenue.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Long distance message revenue. 32.5100 Section 32.5100 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100...

  7. Lightweight and scalable secure communication in VANET

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei

    2015-05-01

    To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.

  8. Perspective: examining communication as macrocognition in STS.

    PubMed

    Keyton, Joann; Beck, Stephenson J

    2010-04-01

    There are significant points of alignment between a macrocognitive frame of teamwork and a communication perspective. This commentary explores these touch points in regard to use of teams in sociotechnical systems (STS). The macrocognitive framework emphasizes a team's shared mental models whereas a communication frame emphasizes that shared meaning among team members is more frequently implicitly than explicitly recorded in their messages. Both acknowledge that communication (in macrocognition) or messages (in communication) serve as an index of team members' goal-directed behavior. The two approaches differ in the role of communication: as information exchange in macrocognition as compared with verbal and nonverbal symbols composing messages for which senders and receivers co-construct meaning. This commentary uses relevant literature to explicate the communication position. From a communication perspective, individuals are simultaneously sending and receiving messages, communication is continual and processual, and meaning construction is dependent on relationship awareness and development among communication partners as well as the context. The authors posit that meaning cannot be constructed solely from messages, nor can meaning be constructed by one person. Furthermore, sharing information is not the same as communicating. Architects and users of STS should be interested in designing systems that improve team communication-a goal that is interdependent with understanding how communication fails in the use of such systems. Drilling down to the fundamental properties of communication is essential to understanding how and why meaning is created among team members (and subsequent action).

  9. Prototype Military Message Form (P772) and Mail List Agent (MLA) for National MMHS

    DTIC Science & Technology

    2006-12-01

    Bakanliklar Ankara TURKEY murat.ucuncu@tr.net A. Betul SASIOGLU National Research Institute of Electronics and Cryptology ( TUBITAK – UEKAE) PK.74...Electronics and Cryptology ( TUBITAK – UEKAE) was used in the system. 3. THE PROTOTYPE NATIONAL MAMF ARCHITECTURE The new national military message...System” [2] ACP 123, "Common Messaging Strategy and Procedures” [3] MA3 ASYA, “PKI Software Developed by Turkish TUBITAK UEKAE” [4] ITU-T X.500

  10. Reducing the anxiety of surgical patient's families access short message service.

    PubMed

    Huang, Fanpin; Liu, Shuo-Chi; Shih, Su-Mei; Tao, Yao-Hua; Wu, Jeng-Yuan; Jeng, Shaw-Yeu; Chang, Polun

    2006-01-01

    This study was to build a web-based short messaging service (SMS) system in operating room. We approached the efficiency of SMS for patient's families during the time series (pre-, intra-, and post-operation). In this study, 322 participants received 685 text messages. The findings show the usability of SMS that applied to the clinical care, especially for reducing family anxiety, improved their satisfaction. Therefore, it is suggested to exploit the effectiveness of personal medical care.

  11. [Health promoting messages posted in Facebook by the health ministries of Brazil and Peru during an AIDS awareness campaign].

    PubMed

    Cadaxa, Aedê Gomes; Sousa, Maria Fátima de; Mendonça, Ana Valéria Machado

    2015-12-01

    To identify health promoting contents (information that can be transformed into decision-making resources to improve quality of life and the health of individuals or groups) in Facebook postings by the ministries of health in Brazil and Peru. This case study compared the messages published in Facebook by the ministries of health from Brazil and Peru during World AIDS Day. Content analysis was employed to identify health promoting contents in the messages posted between November 2013 and February 2014. A total of 105 messages were published on the topic of interest (37 from Peru and 68 from Brazil). In both cases, most messages focused on individuals, addressing the change or adoption of personal behaviors relating to the prevention and detection of HIV - 34 messages (50.0%) for Brazil and 17 (45.9%) for Peru. Twenty-one (30.9%) messages with a structural emphasis were published by Brazil and 14 (37.8%) by Peru, addressing the context of health care system organization, including HIV/ AIDS health policies, available services, access to HIV testing and initiatives to promote testing. Hybrid messages, including both emphases, were less frequent: 13 (19.1%) for Brazil and six (16.2%) for Peru. Health promoting contents were identified in hybrid messages, which provided resources to expand the understanding of individuals about the susceptibility to AIDS.

  12. Endlessly Circulating Messages in IEEE 1588-2008 Systems

    DTIC Science & Technology

    2014-05-13

    section 13.5 of the standard. Once the timing topology is established by the BMC algo- rithm, each clock synchronizes to its master by exchanging timing ...Endlessly Circulating Messages in IEEE 1588-2008 Systems David Broman Patricia Derler Ankush Desai John Eidson Sanjit A. Seshia Electrical...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the

  13. Defense Message System Way Ahead: Conclusions and Recommendations from the Industry Advisory Panel

    DTIC Science & Technology

    2000-03-01

    access terminals • Increasing requirement for authentication and data security for conducting business • Mergers and acquisitions in Internet space...market, used to carry PKI certificates for all types of security services including access control, confidentiality, integrity, and non-repudiation...Wireless access widespread § Unified messaging pervasive § Security /privacy dependent on service provider Long-term § Highly reliable systems

  14. Science From Beyond: NASA's Pioneer Plaque and the History of Interstellar Communication, 1957- 1972

    NASA Astrophysics Data System (ADS)

    Macauley, William

    2012-05-01

    In the late twentieth century, science and technology facilitated exploration beyond the Solar System and extended human knowledge through messages comprised of pictures and mathematical symbols, transmitted from radio telescopes and inscribed on material artifacts attached to spacecraft. ‘Interstellar communication' refers to collective efforts by scientists and co-workers to detect and transmit intelligible messages between humans and supposed extraterrestrial intelligence in remote star systems. Interstellar messages are designed to communicate universal knowledge without recourse to text, human linguistic systems or anthropomorphic content because it is assumed that recipients have no prior knowledge of humankind or the planet we inhabit. Scientists must therefore imagine how extraterrestrials will relate to human knowledge and culture. The production and transmission of interstellar messages became interdisciplinary design problems that involved collaboration and exchange of ideas between scientists, visual artists, and others. My proposed paper will review sociocultural aspects of interstellar communication since the late 1950s and focus on key issues regarding conception, design and production of a specific interstellar message launched into space during the early 1970s - NASA's Pioneer plaque. The paper will explore how research on the history of interstellar communication relates to previous historical and sociological studies on rhetorical aspects of visual representation and mathematics in scientific practice. In particular, I will explain how the notion of ‘inscription' is an appropriate conceptual tool for analyzing how scientists have used pictures to articulate and validate knowledge claims and scientific facts. I argue that scientific knowledge carried on interstellar messages such as the Pioneer plaque is constituted in material practices and inscription technologies that translate natural objects, agency and culture into legible forms. Graphical techniques for creating pictorial interstellar messages are enmeshed with contemporaneous methods for creating displays and images in routine scientific work, in fields such as radio astronomy and planetary science.

  15. Affective Antecedents of the Perceived Effectiveness of Antidrug Advertisements: An Analysis of Adolescents’ Momentary and Retrospective Evaluations

    PubMed Central

    Vohs, Kathleen D.; Luciana, Monica; Cuthbert, Bruce N.; MacDonald, Angus W.

    2013-01-01

    Perceived message effectiveness is often used as a diagnostic tool to determine whether a health message is likely to be successful or needs modification before use in an intervention. Yet, published research on the antecedents of perceived effectiveness is scarce and, consequently, little is known about why a message is perceived to be effective or ineffective. The present study’s aim was to identify and test the affective antecedents of perceived effectiveness of antidrug television messages in a sample of 190 adolescents in the 15–19 year age range. Factor-analytical tests of retrospective message evaluation items suggested two dimensions of perceived effectiveness, one that contained items such as convincingness whereas the other contained pleasantness items. Using retrospective data as well as real time valence and arousal ratings, we found that arousal underlies perceived convincingness and valence underlies perceived pleasantness. The results indicated activation of appetitive and defensive motivational systems, which suggests a clear motivational component to the concept of perceived message effectiveness. PMID:21499729

  16. PCCEServer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perry, Marcia; Agarwal, Deb

    2003-03-17

    The PCCEServer application is a server that should be used in conjunction with the LBNLSecureMessaging user interface to enable secure synchronous and asynchronous messaging. It provides authentication and authorization services for members of a collaboration group via PKI/SSL and maintains an access control list. Members of collaboration groups using the LBNLSecureMessaging client must register identifying information. including usemame and password and an optional X.509 certificate, with the PCCEServer. This registration not only restricts access to instant messaging, but augments the LBNLSecureMessaging's IRC-based chat facility with persistence. Users register permanent unique user ids by which they are knowTl to other usersmore » in the system and create permanent venues intended for group conversations on a tong-term or continuous basis. In addition, the PCCEServer enhances instant messaging with presence and awareness information such as user availability, and it allows users to leave notes asynchronously for other users who are online or offline. Written in Java, it is a standalone application that can run on any platform that supports a Java Virtual Machine.« less

  17. Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS

    NASA Astrophysics Data System (ADS)

    Onyisi, Peter

    2015-12-01

    During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.

  18. 65. FORWARD EMERGENCY DIESEL GENERATOR SET AFT LOOKING FORWARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    65. FORWARD EMERGENCY DIESEL GENERATOR SET - AFT LOOKING FORWARD SHOWING TOP HALF OF FAIRBANKS MORSE 36D81/8 TEN CYLINDER DIESEL ENGINE SERIAL #951230 AND EXHAUST SYSTEM. - U.S.S. HORNET, Puget Sound Naval Shipyard, Sinclair Inlet, Bremerton, Kitsap County, WA

  19. Increasing the Operational Value of Event Messages

    NASA Technical Reports Server (NTRS)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  20. Professional regulation. Part 8: government and NMC proposals.

    PubMed

    Fullbrook, Suzanne

    Two years ago, the Department of Health released a report entitled: Modernising Nursing Careers, Setting the Direction. The opening line in the forward of this report said: 'no one can doubt that healthcare services across the United Kingdom are going through a period of profound change. In her message, which set the tone of the report, Christine Beasley, Chief Nursing Officer of England, said: 'there have been medical advances that we could hardly imagined ... society is also changing ... people's health and recovery is affected by a complex array of factors that bring added challenges. This article discusses the remit of Nursing and Midwifery Council (NMC) and its basis of statutory authority over its registrants, and begin to explore NMC's position with regard to nurse education.

  1. The President's pleasant surprise: how LGBT advocates ended Don't Ask, Don't Tell.

    PubMed

    Frank, Nathaniel

    2013-01-01

    This study assesses the role of LGBT advocates in repealing the military's Don't Ask, Don't Tell policy in the U.S. Congress. It draws on the author's direct involvement with that effort as well as personal interviews and media evidence to consider the contributions of the Obama Administration, members of Congress, the media, and individuals and pressure groups in the repeal process. It argues that repeal succeeded not because of the effective implementation of a White House plan but because the pressure of LGBT advocates ultimately shattered several key obstacles including inadequate messaging and dysfunction and inertia among both politicians and interest groups in Washington. The article offers insight into the role of public pressure in forwarding social change.

  2. The future of the Large Hadron Collider and CERN.

    PubMed

    Heuer, Rolf-Dieter

    2012-02-28

    This paper presents the Large Hadron Collider (LHC) and its current scientific programme and outlines options for high-energy colliders at the energy frontier for the years to come. The immediate plans include the exploitation of the LHC at its design luminosity and energy, as well as upgrades to the LHC and its injectors. This may be followed by a linear electron-positron collider, based on the technology being developed by the Compact Linear Collider and the International Linear Collider collaborations, or by a high-energy electron-proton machine. This contribution describes the past, present and future directions, all of which have a unique value to add to experimental particle physics, and concludes by outlining key messages for the way forward.

  3. Processing deficits and the mediation of positive affect in persuasion.

    PubMed

    Mackie, D M; Worth, L T

    1989-07-01

    Motivational and cognitive mediators of the reduced processing of persuasive messages shown by recipients in a positive mood were tested. Ss in positive or neutral moods read strong or weak counterattitudinal advocadies for either a limited time or for as long as they wanted. Under limited exposure conditions, neutral mood Ss showed attitude change indicative of systemic processing, whereas positive mood Ss showed no differentiation of strong and weak versions of the message. When message exposure was unlimited, positive mood Ss viewed the message longer than did neutral mood Ss and systematically processed it rather than relying on persuasion heuristics. These findings replicated with 2 manipulations of mood and 2 different attitude issues. We interpret the results as providing evidence that reduced cognitive capacity to process the message contributes to the decrements shown by positive mood Ss.

  4. 47 CFR 10.440 - Embedded reference prohibition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Embedded reference prohibition. 10.440 Section 10.440 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message Requirements § 10.440 Embedded reference prohibition. A CMAS Alert Message processed by a...

  5. 47 CFR 10.440 - Embedded reference prohibition.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Embedded reference prohibition. 10.440 Section 10.440 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message Requirements § 10.440 Embedded reference prohibition. A CMAS Alert Message processed by a...

  6. 47 CFR 10.440 - Embedded reference prohibition.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Embedded reference prohibition. 10.440 Section 10.440 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message Requirements § 10.440 Embedded reference prohibition. A CMAS Alert Message processed by a...

  7. Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?

    PubMed

    Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M

    2015-11-26

    Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.

  8. Control mechanism to prevent correlated message arrivals from degrading signaling no. 7 network performance

    NASA Astrophysics Data System (ADS)

    Kosal, Haluk; Skoog, Ronald A.

    1994-04-01

    Signaling System No. 7 (SS7) is designed to provide a connection-less transfer of signaling messages of reasonable length. Customers having access to user signaling bearer capabilities as specified in the ANSI T1.623 and CCITT Q.931 standards can send bursts of correlated messages (e.g., by doing a file transfer that results in the segmentation of a block of data into a number of consecutive signaling messages) through SS7 networks. These message bursts with short interarrival times could have an adverse impact on the delay performance of the SS7 networks. A control mechanism, Credit Manager, is investigated in this paper to regulate incoming traffic to the SS7 network by imposing appropriate time separation between messages when the incoming stream is too bursty. The credit manager has a credit bank where credits accrue at a fixed rate up to a prespecified credit bank capacity. When a message arrives, the number of octets in that message is compared to the number of credits in the bank. If the number of credits is greater than or equal to the number of octets, then the message is accepted for transmission and the number of credits in the bank is decremented by the number of octets. If the number of credits is less than the number of octets, then the message is delayed until enough credits are accumulated. This paper presents simulation results showing delay performance of the SS7 ISUP and TCAP message traffic with a range of correlated message traffic, and control parameters of the credit manager (i.e., credit generation rate and bank capacity) are determined that ensure the traffic entering the SS7 network is acceptable. The results show that control parameters can be set so that for any incoming traffic stream there is no detrimental impact on the SS7 ISUP and TCAP message delay, and the credit manager accepts a wide range of traffic patterns without causing significant delay.

  9. Results of a randomized controlled trial to assess the effects of a mobile SMS-based intervention on treatment adherence in HIV/AIDS-infected Brazilian women and impressions and satisfaction with respect to incoming messages

    PubMed Central

    da Costa, Thiago Martini; Barbosa, Bárbara Jaqueline Peres; e Costa, Durval Alex Gomes; Sigulem, Daniel; de Fátima Marin, Heimar; Filho, Adauto Castelo; Pisa, Ivan Torres

    2013-01-01

    Objective To assess whether a warning system based on mobile SMS messages increases the adherence of HIV-infected Brazilian women to antiretroviral drug-based treatment regimens and their impressions and satisfaction with respect to incoming messages. Design A randomized controlled trial was conducted from May 2009 to April 2010 with HIV-infected Brazilian women. All participants (n = 21) had a monthly multidisciplinary attendance; each participant was followed over a 4-month period, when adherence measures were obtained. Participants in the intervention group (n = 8) received SMS messages 30 min before their last scheduled time for a dose of medicine during the day. The messages were sent every Saturday and Sunday and on alternate days during the working week. Participants in the control group (n = 13) did not receive messages. Measurements Self-reported adherence, pill counting, microelectronic monitors (MEMS) and an interview about the impressions and satisfaction with respect to incoming messages. Results The HIV Alert System (HIVAS) was developed over 7 months during 2008 and 2009. After the study period, self-reported adherence indicated that 11 participants (84.62%) remained compliant in the control group (adherence exceeding 95%), whereas all 8 participants in the intervention group (100.00%) remained compliant. In contrast, the counting pills method indicated that the number of compliant participants was 5 (38.46%) for the control group and 4 (50.00%) for the intervention group. Microelectronic monitoring indicated that 6 participants in the control group (46.15%) were adherent during the entire 4-month period compared to 6 participants in the intervention group (75.00%). According to the feedback of the 8 participants who completed the research in the intervention group, along with the feedback of 3 patients who received SMS for less than 4 months, that is, did not complete the study, 9 (81.81%) believed that the SMS messages aided them in treatment adherence, and 10 (90.90%) responded that they would like to continue receiving SMS messages. SMS messaging can help Brazilian women living with HIV/AIDS to adhere to antiretroviral therapy for a period of at least 4 months. In general, the results are encouraging because the SMS messages stimulated more participants in the intervention group to be adherent to their treatment, and the patients were satisfied with the messages received, which were seen as reminders, incentives and signs of affection by the health clinic for a marginalized population. PMID:22296762

  10. Autonomous Cryogenics Loading Operations Simulation Software: Knowledgebase Autonomous Test Engineer

    NASA Technical Reports Server (NTRS)

    Wehner, Walter S.

    2012-01-01

    The Simulation Software, KATE (Knowledgebase Autonomous Test Engineer), is used to demonstrate the automatic identification of faults in a system. The ACLO (Autonomous Cryogenics Loading Operation) project uses KATE to monitor and find faults in the loading of the cryogenics int o a vehicle fuel tank. The KATE software interfaces with the IHM (Integrated Health Management) systems bus to communicate with other systems that are part of ACLO. One system that KATE uses the IHM bus to communicate with is AIS (Advanced Inspection System). KATE will send messages to AIS when there is a detected anomaly. These messages include visual inspection of specific valves, pressure gauges and control messages to have AIS open or close manual valves. My goals include implementing the connection to the IHM bus within KATE and for the AIS project. I will also be working on implementing changes to KATE's Ul and implementing the physics objects in KATE that will model portions of the cryogenics loading operation.

  11. Design of a clinical notification system.

    PubMed

    Wagner, M M; Tsui, F C; Pike, J; Pike, L

    1999-01-01

    We describe the requirements and design of an enterprise-wide notification system. From published descriptions of notification schemes, our own experience, and use cases provided by diverse users in our institution, we developed a set of functional requirements. The resulting design supports multiple communication channels, third party mappings (algorithms) from message to recipient and/or channel of delivery, and escalation algorithms. A requirement for multiple message formats is addressed by a document specification. We implemented this system in Java as a CORBA object. This paper describes the design and current implementation of our notification system.

  12. It's not about pager replacement: an in-depth look at the interprofessional nature of communication in healthcare.

    PubMed

    Quan, Sherman D; Wu, Robert C; Rossos, Peter G; Arany, Teri; Groe, Silvi; Morra, Dante; Wong, Brian M; Cavalcanti, Rodrigo; Coke, William; Lau, Francis Y

    2013-03-01

    Institutions have tried to replace the use of numeric pagers for clinical communication by implementing health information technology (HIT) solutions. However, failing to account for the sociotechnical aspects of HIT or the interplay of technology with existing clinical workflow, culture, and social interactions may create other unintended consequences. To evaluate a Web-based messaging system that allows asynchronous communication between health providers and identify the unintended consequences associated with implementing such technology. Intervention-a Web-based messaging system at the University Health Network to replace numeric paging practices in May 2010. The system facilitated clinical communication on the medical wards for coordinating patient care. Study design-pre-post mixed methods utilizing both quantitative and qualitative measures. Five residents, 8 nurses, 2 pharmacists, and 2 social workers were interviewed. Pre-post interruption-15 residents from 5 clinical teams in both periods. The study compared the type of messages sent to physicians before and after implementation of the Web-based messaging system; a constant comparative analysis of semistructured interviews was used to generate key themes related to unintended consequences. Interruptions increased 233%, from 3 pages received per resident per day pre-implementation to 10 messages received per resident per day post-implementation. Key themes relating to unintended consequences that emerged from the interviews included increase in interruptions, accountability, and tactics to improve personal productivity. Meaningful improvements in clinical communication can occur but require more than just replacing pagers. Introducing HIT without addressing the sociotechnical aspects of HIT that underlie clinical communication can lead to unintended consequences. Copyright © 2013 Society of Hospital Medicine.

  13. Performance issues in management of the Space Station Information System

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1988-01-01

    The onboard segment of the Space Station Information System (SSIS), called the Data Management System (DMS), will consist of a Fiber Distributed Data Interface (FDDI) token-ring network. The performance of the DMS in scenarios involving two kinds of network management is analyzed. In the first scenario, how the transmission of routine management messages impacts performance of the DMS is examined. In the second scenario, techniques for ensuring low latency of real-time control messages in an emergency are examined.

  14. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  15. EUTELTRACS: The European experience on mobile satellite services

    NASA Technical Reports Server (NTRS)

    Colcy, Jean-Noel; Steinhaeuser, Rafael

    1993-01-01

    EUTELTRACS is Europe's first commercially operated Mobile Satellite Service. Under the overall network operation of EUTELSAT, the European Telecommunications Satellite Organization, EUTELTRACS provides an integrated message exchange and position reporting service. This paper describes the EUTELTRACS system architecture, the message exchange and the position reporting services, including the result of recent analysis of message delivery time and positioning accuracy. It also provides an overview of the commercial deployment, the regulatory situation for its operation within Europe and new applications outside its target market, the international road transportation.

  16. FASTUS: A System for Extracting Information from Natural-Language Text

    DTIC Science & Technology

    1992-11-19

    sample terrorist report (TST2- MUC4 -0048), the full text of which is in Appendix I. Most of the examples in this paper come from this message; it was...1992. Distributed by Morgan Kaufmann Publishers, Inc., San Mateo, California. 25 Appendix I: Sample Text TST2- MUC4 -0048 SAN SALVADOR, 19 APR 89 (ACAN...Slashes (/) separate alternate answers. Question marks (?) indicate optional answers. 0. MESSAGE: ID TST2- MUC4 -0048 1. MESSAGE: TEMPLATE 1 2. INCIDENT

  17. Effect of audio in-vehicle red light-running warning message on driving behavior based on a driving simulator experiment.

    PubMed

    Yan, Xuedong; Liu, Yang; Xu, Yongcun

    2015-01-01

    Drivers' incorrect decisions of crossing signalized intersections at the onset of the yellow change may lead to red light running (RLR), and RLR crashes result in substantial numbers of severe injuries and property damage. In recent years, some Intelligent Transport System (ITS) concepts have focused on reducing RLR by alerting drivers that they are about to violate the signal. The objective of this study is to conduct an experimental investigation on the effectiveness of the red light violation warning system using a voice message. In this study, the prototype concept of the RLR audio warning system was modeled and tested in a high-fidelity driving simulator. According to the concept, when a vehicle is approaching an intersection at the onset of yellow and the time to the intersection is longer than the yellow interval, the in-vehicle warning system can activate the following audio message "The red light is impending. Please decelerate!" The intent of the warning design is to encourage drivers who cannot clear an intersection during the yellow change interval to stop at the intersection. The experimental results showed that the warning message could decrease red light running violations by 84.3 percent. Based on the logistic regression analyses, drivers without a warning were about 86 times more likely to make go decisions at the onset of yellow and about 15 times more likely to run red lights than those with a warning. Additionally, it was found that the audio warning message could significantly reduce RLR severity because the RLR drivers' red-entry times without a warning were longer than those with a warning. This driving simulator study showed a promising effect of the audio in-vehicle warning message on reducing RLR violations and crashes. It is worthwhile to further develop the proposed technology in field applications.

  18. Prevalence of Multiple Forms of Sexting Behavior Among Youth: A Systematic Review and Meta-analysis.

    PubMed

    Madigan, Sheri; Ly, Anh; Rash, Christina L; Van Ouytsel, Joris; Temple, Jeff R

    2018-04-01

    The existing literature on sexting among youth shows that sexting is a predictor of sexual behavior and may be associated with other health outcomes and risky behaviors. However, there remains a lack of consensus on the prevalence of sexting, which is needed to inform future research, intervention, and policy development. To provide a meta-analytic synthesis of studies examining the prevalence of multiple forms of sexting behavior, analyzed by age, sex, geography, and method of sexting. In an academic setting, electronic searches in MEDLINE, PsycINFO, EMBASE, and Web of Science were conducted for the period January 1990 to June 2016, yielding 1147 nonduplicate records. Studies were included if participants were younger than 18 years and the prevalence of sexting explicit images, videos, or messages was reported. Literature review and data extraction followed established PRISMA guidelines. Two independent reviewers extracted all relevant data. Random-effects meta-analyses were used to derive the mean prevalence rates. Thirty-nine studies met final inclusion criteria. Meta-analyses of the prevalence of sending, receiving, and forwarding without consent, as well as having one's sext forwarded without consent. Among 39 included studies, there were 110 380 participants; the mean age was 15.16 years (age range, 11.9-17.0 years), and on average 47.2% were male. Studies were available for sending (n = 34), receiving (n = 20), forwarding without consent (n = 5), and having a sext forwarded without consent (n = 4). The mean prevalences for sending and receiving sexts were 14.8% (95% CI, 12.8%-16.8%) and 27.4% (95% CI, 23.1%-31.7%), respectively. Moderator analyses revealed that effect sizes varied as a function of child age (prevalence increased with age), year of data collection (prevalence increased over time), and sexting method (higher prevalence on mobile devices compared with computers). The prevalence of forwarding a sext without consent was 12.0% (95% CI, 8.4%-15.6%), and the prevalence of having a sext forwarded without consent was 8.4% (95% CI, 4.7%-12.0%). The prevalence of sexting has increased in recent years and increases as youth age. Further research focusing on nonconsensual sexting is necessary to appropriately target and inform intervention, education, and policy efforts.

  19. MPF: A portable message passing facility for shared memory multiprocessors

    NASA Technical Reports Server (NTRS)

    Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.

    1987-01-01

    The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.

  20. Proposal: A Hybrid Dictionary Modelling Approach for Malay Tweet Normalization

    NASA Astrophysics Data System (ADS)

    Muhamad, Nor Azlizawati Binti; Idris, Norisma; Arshi Saloot, Mohammad

    2017-02-01

    Malay Twitter message presents a special deviation from the original language. Malay Tweet widely used currently by Twitter users, especially at Malaya archipelago. Thus, it is important to make a normalization system which can translated Malay Tweet language into the standard Malay language. Some researchers have conducted in natural language processing which mainly focuses on normalizing English Twitter messages, while few studies have been done for normalize Malay Tweets. This paper proposes an approach to normalize Malay Twitter messages based on hybrid dictionary modelling methods. This approach normalizes noisy Malay twitter messages such as colloquially language, novel words, and interjections into standard Malay language. This research will be used Language Model and N-grams model.

  1. Efficiently passing messages in distributed spiking neural network simulation.

    PubMed

    Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan

    2013-01-01

    Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.

  2. W-026, Waste Receiving and Processing Facility data management system validation and verification report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Palmer, M.E.

    1997-12-05

    This V and V Report includes analysis of two revisions of the DMS [data management system] System Requirements Specification (SRS) and the Preliminary System Design Document (PSDD); the source code for the DMS Communication Module (DMSCOM) messages; the source code for selected DMS Screens, and the code for the BWAS Simulator. BDM Federal analysts used a series of matrices to: compare the requirements in the System Requirements Specification (SRS) to the specifications found in the System Design Document (SDD), to ensure the design supports the business functions, compare the discreet parts of the SDD with each other, to ensure thatmore » the design is consistent and cohesive, compare the source code of the DMS Communication Module with the specifications, to ensure that the resultant messages will support the design, compare the source code of selected screens to the specifications to ensure that resultant system screens will support the design, compare the source code of the BWAS simulator with the requirements to interface with DMS messages and data transfers relating to the BWAS operations.« less

  3. Benchmarking hypercube hardware and software

    NASA Technical Reports Server (NTRS)

    Grunwald, Dirk C.; Reed, Daniel A.

    1986-01-01

    It was long a truism in computer systems design that balanced systems achieve the best performance. Message passing parallel processors are no different. To quantify the balance of a hypercube design, an experimental methodology was developed and the associated suite of benchmarks was applied to several existing hypercubes. The benchmark suite includes tests of both processor speed in the absence of internode communication and message transmission speed as a function of communication patterns.

  4. 47 CFR 10.430 - Character limit.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Character limit. 10.430 Section 10.430 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message Requirements § 10.430 Character limit. A CMAS Alert Message processed by a Participating CMS Provider must not...

  5. 48 CFR 23.1104 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Policy. 23.1104 Section 23... WORKPLACE Encouraging Contractor Policies to Ban Text Messaging While Driving 23.1104 Policy. Agencies shall encourage contractors and subcontractors to adopt and enforce policies that ban text messaging while driving...

  6. The medium and the message: a revisionist view of image quality

    NASA Astrophysics Data System (ADS)

    Ferwerda, James A.

    2010-02-01

    In his book "Understanding Media" social theorist Marshall McLuhan declared: "The medium is the message." The thesis of this paper is that with respect to image quality, imaging system developers have taken McLuhan's dictum too much to heart. Efforts focus on improving the technical specifications of the media (e.g. dynamic range, color gamut, resolution, temporal response) with little regard for the visual messages the media will be used to communicate. We present a series of psychophysical studies that investigate the visual system's ability to "see through" the limitations of imaging media to perceive the messages (object and scene properties) the images represent. The purpose of these studies is to understand the relationships between the signal characteristics of an image and the fidelity of the visual information the image conveys. The results of these studies provide a new perspective on image quality that shows that images that may be very different in "quality", can be visually equivalent as realistic representations of objects and scenes.

  7. Characteristics of the Unexpected Message Queue of MPI applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keller, Rainer; Graham, Richard L

    2010-01-01

    High Performance Computing systems are used on a regular basis to run a myriad of application codes, yet a surprising dearth of information exists with respect to communications characteristics. Even less information is available on the low-level communication libraries, such as the length of MPI Unexpected Message Queues (UMQs) and the length of time such messages spend in these queues. Such information is vital to developing appropriate strategies for handling such data at the library and system level. In this paper we present data on the communication characteristics of three applications GTC, LSMS, and S3D. We present data on themore » size of their UMQ, the time spend searching the UMQ and the length of time such messages spend in these queues. We find that for the particular inputs used, these applications have widely varying characteristics with regard to UMQ length and show patterns for specific applications which persist over various scales.« less

  8. Gauge-free cluster variational method by maximal messages and moment matching.

    PubMed

    Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico

    2017-04-01

    We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.

  9. Gauge-free cluster variational method by maximal messages and moment matching

    NASA Astrophysics Data System (ADS)

    Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico

    2017-04-01

    We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.

  10. Enhancing the effects of a narrative message through experiential information processing: An experimental study.

    PubMed

    Dillard, Amanda J; Hisler, Garrett

    2015-01-01

    First-person narratives are becoming a popular means to communicate health risk information. Although studies show they can increase risk perception and motivate health behaviours compared to statistical messages, more research on the conditions in which they are particularly likely to have effects is needed. In this study, we tested a moderator related to how information is processed. Specifically, we hypothesised that thinking in terms of emotions and personal experiences - known as experiential information processing - would increase people's responsiveness to a narrative. Female college students (N = 138) who reported indoor tanning were randomly assigned to read a first-person narrative message or a statistical message about the risks of skin cancer. Prior to reading the message, the women received instructions that would activate either experiential or rational information processing. Participants then reported their risk perceptions of skin cancer, worry about skin cancer and behaviour intentions related to skin cancer. Analyses showed that message type and information processing interacted to influence risk perceptions and worry. Consistent with hypotheses, participants reported the highest risk perception and worry when they used an experiential information system prior to reading the narrative message. There were no effects on behaviour intentions. Implications of these findings are discussed.

  11. Relevance and speed of message delivery trade-offs in augmentative and alternative communication.

    PubMed

    Bedrosian, Jan L; Hoag, Linda A; McCoy, Kathleen F

    2003-08-01

    This report is the first in a series of investigations designed to test a theory identifying the effects of conversational trade-offs between selected maxims on public attitudes toward augmentative and alternative communication (AAC) system users and their communication. In the current study, the trade-offs between the relevance of a prestored message and its speed of delivery were examined. Participating were 96 sales clerks. Twelve scripted videotaped conversational conditions, involving an AAC customer and a clerk at a checkout counter, were used to manipulate message relevance, speed of message delivery, and participant/AAC user gender. Following each assigned viewing, participants completed a questionnaire designed to assess their attitudes toward the AAC user and his or her communication. Significantly higher mean ratings were found for the conditions involving the slowly delivered relevant messages (both preceded by a conversational floorholder and without a floorholder) when compared to the quickly delivered partly relevant message condition. In addition, the condition involving the slowly delivered relevant message with a floorholder yielded significantly higher mean ratings than that without the floorholder. There was no effect for participant/user gender. Modifications of the theory and technological implications are discussed.

  12. Patient Perspectives on a Text Messaging Program to Support Asthma Management: A Qualitative Study.

    PubMed

    Doyle, Reina; Albright, Karen; Hurley, Laura P; Chávez, Catia; Stowell, Melanie; Dircksen, Suzanne; Havranek, Edward P; Anderson, Mark

    2018-05-01

    This study investigated participants' acceptance of a short messaging service (SMS) intervention designed to support asthma management, including suggestions regarding program delivery and message content. Individual and group interviews were conducted with patients from a safety-net health care system in Denver, Colorado. Eligible participants were English or Spanish speakers between the ages of 13 and 40 years, with diagnosed persistent asthma. All individual and group interviews were digitally recorded, transcribed, translated from Spanish to English (where applicable), and analyzed for thematic content by experienced analysts using established qualitative content techniques. The qualitative software package ATLAS.ti was used for data analysis and management. This study included a total of 43 participants. In general, participants were receptive toward the SMS program and supported the use of tailored and interactive messages. Adolescents supported the idea of enhancing care by sending messages to a support person, such as a parent or guardian. However, adults were less receptive toward this idea. Participants also preferred directive educational messages and cues to action, while general messages reminding them of their asthma diagnosis were viewed less favorably. The results from this study will inform a randomized control trial evaluating the efficacy of the SMS intervention.

  13. Minors and Sexting: Legal Implications.

    PubMed

    Lorang, Melissa R; McNiel, Dale E; Binder, Renée L

    2016-03-01

    Sexting is the sending or forwarding of sexually explicit photographs or videos of the sender or someone known to the sender via cell phone. It has become common practice among young people, as cell phones are being given to adolescents at ever younger ages. Youths often send messages without giving appropriate thought to the content of the images. In studies on the subject, rates of minors who have sent sexual images range from 4 to 25 percent, depending on the age of the youths surveyed, the content of the messages and other factors. Because transferring and viewing sexually explicit material when the subject is a minor can be considered child pornography, there can be serious legal consequences. Several states have enacted legislation to help differentiate between child pornography and sexting by minors. The trend reflected in statutes has been that minors involved in sexting without other exacerbating circumstances should be charged with a less serious offense. There is no clear national consensus on how sexting by minors is adjudicated, and therefore we compared several statutes. Case examples are used to illustrate the range of legal outcomes, from felony charges to no charges. Two sexting episodes that were followed by suicide are described. We also address the role of the forensic mental health professional. © 2016 American Academy of Psychiatry and the Law.

  14. Information spreading in Delay Tolerant Networks based on nodes' behaviors

    NASA Astrophysics Data System (ADS)

    Wu, Yahui; Deng, Su; Huang, Hongbin

    2014-07-01

    Information spreading in DTNs (Delay Tolerant Networks) adopts a store-carry-forward method, and nodes receive the message from others directly. However, it is hard to judge whether the information is safe in this communication mode. In this case, a node may observe other nodes' behaviors. At present, there is no theoretical model to describe the varying rule of the nodes' trusting level. In addition, due to the uncertainty of the connectivity in DTN, a node is hard to get the global state of the network. Therefore, a rational model about the node's trusting level should be a function of the node's own observing result. For example, if a node finds k nodes carrying a message, it may trust the information with probability p(k). This paper does not explore the real distribution of p(k), but instead presents a unifying theoretical framework to evaluate the performance of the information spreading in above case. This framework is an extension of the traditional SI (susceptible-infected) model, and is useful when p(k) conforms to any distribution. Simulations based on both synthetic and real motion traces show the accuracy of the framework. Finally, we explore the impact of the nodes' behaviors based on certain special distributions through numerical results.

  15. Low Power LDPC Code Decoder Architecture Based on Intermediate Message Compression Technique

    NASA Astrophysics Data System (ADS)

    Shimizu, Kazunori; Togawa, Nozomu; Ikenaga, Takeshi; Goto, Satoshi

    Reducing the power dissipation for LDPC code decoder is a major challenging task to apply it to the practical digital communication systems. In this paper, we propose a low power LDPC code decoder architecture based on an intermediate message-compression technique which features as follows: (i) An intermediate message compression technique enables the decoder to reduce the required memory capacity and write power dissipation. (ii) A clock gated shift register based intermediate message memory architecture enables the decoder to decompress the compressed messages in a single clock cycle while reducing the read power dissipation. The combination of the above two techniques enables the decoder to reduce the power dissipation while keeping the decoding throughput. The simulation results show that the proposed architecture improves the power efficiency up to 52% and 18% compared to that of the decoder based on the overlapped schedule and the rapid convergence schedule without the proposed techniques respectively.

  16. The Effects of Drug-Prevention Messages on the Accessibility of Identity-Related Constructs

    PubMed Central

    COMELLO, MARIA LEONORA G.; SLATER, MICHAEL D.

    2011-01-01

    Recent theoretical work has posited that the self-system guides behavior via currently activated self-concepts. We adopt this framework to the study of drug-prevention messages by examining the extent to which messages can alter the accessibility of views of self and of drugs that would support non-use. Participants were exposed to one of three print-ad conditions: autonomy-themed prevention messages (treatment), health-information themed prevention messages (comparison), and informational consumer ads (control). Outcomes were reaction times to make dichotomous judgments. Relative to comparison and control ads, treatment ads were more successful at activating a self-view as a nonuser, a view that marijuana use is inconsistent with autonomy, and unwillingness to use marijuana. Post-hoc analysis revealed that the effect of ad condition on unwillingness was partially mediated by the accessibility of self-view as a nonuser. PMID:21271426

  17. 48 CFR 47.404 - Air freight forwarders.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Air freight forwarders. 47... MANAGEMENT TRANSPORTATION Air Transportation by U.S.-Flag Carriers 47.404 Air freight forwarders. (a) Agencies may use air freight forwarders that are engaged in international air transportation (49 U.S.C...

  18. 48 CFR 47.404 - Air freight forwarders.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Air freight forwarders. 47... MANAGEMENT TRANSPORTATION Air Transportation by U.S.-Flag Carriers 47.404 Air freight forwarders. (a) Agencies may use air freight forwarders that are engaged in international air transportation (49 U.S.C...

  19. 48 CFR 47.404 - Air freight forwarders.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Air freight forwarders. 47... MANAGEMENT TRANSPORTATION Air Transportation by U.S.-Flag Carriers 47.404 Air freight forwarders. (a) Agencies may use air freight forwarders that are engaged in international air transportation (49 U.S.C...

  20. 48 CFR 47.404 - Air freight forwarders.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MANAGEMENT TRANSPORTATION Air Transportation by U.S.-Flag Carriers 47.404 Air freight forwarders. (a) Agencies may use air freight forwarders that are engaged in international air transportation (49 U.S.C... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Air freight forwarders. 47...

Top