Sample records for message-based anonymity systems

  1. Can anonymous posters on medical forums be reidentified?

    PubMed

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being determined.

  2. Can Anonymous Posters on Medical Forums be Reidentified?

    PubMed Central

    Bobicev, Victoria; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-01-01

    Background Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. Objective The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. Methods The messages were labeled by nicknames of the forum participants. We evaluated the system’s performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Results Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Conclusions Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being determined. PMID:24091380

  3. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  4. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  5. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    PubMed

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  6. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  7. Security Analysis of Accountable Anonymous Group Communication in Dissent

    DTIC Science & Technology

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  8. Taxonomy for and Analysis of Anonymous Communications Networks

    DTIC Science & Technology

    2009-03-01

    Privacy QI Quasi-Identifier QoS Quality -of- Service RA Receiver Anonymity RFC Request For Comments RREQ Route Request RREP Route Reply...particular message as a measure. This amounts to the sender specifying a Quality -of- Service (QoS) threshold for anonymity services depending on...Location-Based Services Through Spatial and Temporal Cloaking," Proceedings of the Proceedings of MobiSys 2003: The 1st International Conference on

  9. PASTE: patient-centered SMS text tagging in a medication management system.

    PubMed

    Stenner, Shane P; Johnson, Kevin B; Denny, Joshua C

    2012-01-01

    To evaluate the performance of a system that extracts medication information and administration-related actions from patient short message service (SMS) messages. Mobile technologies provide a platform for electronic patient-centered medication management. MyMediHealth (MMH) is a medication management system that includes a medication scheduler, a medication administration record, and a reminder engine that sends text messages to cell phones. The object of this work was to extend MMH to allow two-way interaction using mobile phone-based SMS technology. Unprompted text-message communication with patients using natural language could engage patients in their healthcare, but presents unique natural language processing challenges. The authors developed a new functional component of MMH, the Patient-centered Automated SMS Tagging Engine (PASTE). The PASTE web service uses natural language processing methods, custom lexicons, and existing knowledge sources to extract and tag medication information from patient text messages. A pilot evaluation of PASTE was completed using 130 medication messages anonymously submitted by 16 volunteers via a website. System output was compared with manually tagged messages. Verified medication names, medication terms, and action terms reached high F-measures of 91.3%, 94.7%, and 90.4%, respectively. The overall medication name F-measure was 79.8%, and the medication action term F-measure was 90%. Other studies have demonstrated systems that successfully extract medication information from clinical documents using semantic tagging, regular expression-based approaches, or a combination of both approaches. This evaluation demonstrates the feasibility of extracting medication information from patient-generated medication messages.

  10. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  11. PASTE: patient-centered SMS text tagging in a medication management system

    PubMed Central

    Johnson, Kevin B; Denny, Joshua C

    2011-01-01

    Objective To evaluate the performance of a system that extracts medication information and administration-related actions from patient short message service (SMS) messages. Design Mobile technologies provide a platform for electronic patient-centered medication management. MyMediHealth (MMH) is a medication management system that includes a medication scheduler, a medication administration record, and a reminder engine that sends text messages to cell phones. The object of this work was to extend MMH to allow two-way interaction using mobile phone-based SMS technology. Unprompted text-message communication with patients using natural language could engage patients in their healthcare, but presents unique natural language processing challenges. The authors developed a new functional component of MMH, the Patient-centered Automated SMS Tagging Engine (PASTE). The PASTE web service uses natural language processing methods, custom lexicons, and existing knowledge sources to extract and tag medication information from patient text messages. Measurements A pilot evaluation of PASTE was completed using 130 medication messages anonymously submitted by 16 volunteers via a website. System output was compared with manually tagged messages. Results Verified medication names, medication terms, and action terms reached high F-measures of 91.3%, 94.7%, and 90.4%, respectively. The overall medication name F-measure was 79.8%, and the medication action term F-measure was 90%. Conclusion Other studies have demonstrated systems that successfully extract medication information from clinical documents using semantic tagging, regular expression-based approaches, or a combination of both approaches. This evaluation demonstrates the feasibility of extracting medication information from patient-generated medication messages. PMID:21984605

  12. Extracting Association Patterns in Network Communications

    PubMed Central

    Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon

    2015-01-01

    In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense. PMID:25679311

  13. Extracting association patterns in network communications.

    PubMed

    Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon

    2015-02-11

    In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense.

  14. WindTalker: A P2P-Based Low-Latency Anonymous Communication Network

    NASA Astrophysics Data System (ADS)

    Zhang, Jia; Duan, Haixin; Liu, Wu; Wu, Jianping

    Compared with traditional static anonymous communication networks, the P2P architecture can provide higher anonymity in communication. However, the P2P architecture also leads to more challenges, such as route, stability, trust and so on. In this paper, we present WindTalker, a P2P-based low-latency anonymous communication network. It is a pure decentralized mix network and can provide low-latency services which help users hide their real identity in communication. In order to ensure stability and reliability, WindTalker imports “seed nodes” to help a peer join in the P2P network and the peer nodes can use gossip-based protocol to exchange active information. Moreover, WindTalker uses layer encryption to ensure the information of relayed messages cannot be leaked. In addition, malicious nodes in the network are the major threat to anonymity of P2P anonymous communication, so WindTalker imports a trust mechanism which can help the P2P network exclude malicious nodes and optimize the strategy of peer discovery, tunnel construction, and relaying etc. in anonymous communications. We deploy peer nodes of WindTalker in our campus network to test reliability and analyze anonymity in theory. The network measurement and simulation analysis shows that WindTalker can provide low-latency and reliable anonymous communication services.

  15. Attack and improvements of fair quantum blind signature schemes

    NASA Astrophysics Data System (ADS)

    Zou, Xiangfu; Qiu, Daowen

    2013-06-01

    Blind signature schemes allow users to obtain the signature of a message while the signer learns neither the message nor the resulting signature. Therefore, blind signatures have been used to realize cryptographic protocols providing the anonymity of some participants, such as: secure electronic payment systems and electronic voting systems. A fair blind signature is a form of blind signature which the anonymity could be removed with the help of a trusted entity, when this is required for legal reasons. Recently, a fair quantum blind signature scheme was proposed and thought to be safe. In this paper, we first point out that there exists a new attack on fair quantum blind signature schemes. The attack shows that, if any sender has intercepted any valid signature, he (she) can counterfeit a valid signature for any message and can not be traced by the counterfeited blind signature. Then, we construct a fair quantum blind signature scheme by improved the existed one. The proposed fair quantum blind signature scheme can resist the preceding attack. Furthermore, we demonstrate the security of the proposed fair quantum blind signature scheme and compare it with the other one.

  16. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    ERIC Educational Resources Information Center

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  17. Patient privacy protection using anonymous access control techniques.

    PubMed

    Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V

    2008-01-01

    The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

  18. A Novel Quantum Blind Signature Scheme with Four-Particle Cluster States

    NASA Astrophysics Data System (ADS)

    Fan, Ling

    2016-03-01

    In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by measuring four-particle cluster states and coding. By using the special relationship of four-particle cluster states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.

  19. LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network

    NASA Astrophysics Data System (ADS)

    Lu, Xiaofeng; Hui, Pan; Towsley, Don; Pu, Juhua; Xiong, Zhang

    In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.

  20. Efficacy and causal mechanism of an online social media intervention to increase physical activity: Results of a randomized controlled trial.

    PubMed

    Zhang, Jingwen; Brackbill, Devon; Yang, Sijia; Centola, Damon

    2015-01-01

    To identify what features of social media - promotional messaging or peer networks - can increase physical activity. A 13-week social media-based exercise program was conducted at a large Northeastern university in Philadelphia, PA. In a randomized controlled trial, 217 graduate students from the University were randomized to three conditions: a control condition with a basic online program for enrolling in weekly exercise classes led by instructors of the University for 13 weeks, a media condition that supplemented the basic program with weekly online promotional media messages that encourage physical activity, and a social condition that replaced the media content with an online network of four to six anonymous peers composed of other participants of the program, in which each participant was able to see their peers' progress in enrolling in classes. The primary outcome was the number of enrollments in exercise classes, and the secondary outcomes were self-reported physical activities. Data were collected in 2014. Participants enrolled in 5.5 classes on average. Compared with enrollment in the control condition (mean = 4.5), promotional messages moderately increased enrollment (mean = 5.7, p = 0.08), while anonymous social networks significantly increased enrollment (mean = 6.3, p = 0.02). By the end of the program, participants in the social condition reported exercising moderately for an additional 1.6 days each week compared with the baseline, which was significantly more than an additional 0.8 days in the control condition. Social influence from anonymous online peers was more successful than promotional messages for improving physical activity. ClinicalTrials.gov: NCT02267369.

  1. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  2. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  3. A Novel Quantum Blind Signature Scheme with Four-particle GHZ States

    NASA Astrophysics Data System (ADS)

    Fan, Ling; Zhang, Ke-Jia; Qin, Su-Juan; Guo, Fen-Zhuo

    2016-02-01

    In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by using four-particle entangled Greenberger-Horne-Zeilinger (GHZ) states. By using the special relationship of four-particle GHZ states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.

  4. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    PubMed Central

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  5. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.

    PubMed

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-11-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users' network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders' or receivers' identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  6. Using Sphinx to Improve Onion Routing Circuit Construction

    NASA Astrophysics Data System (ADS)

    Kate, Aniket; Goldberg, Ian

    This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing, and certificateless onion routing. Our new circuit constructions are also secure in the universal composability framework, a property that was missing from the original constructions. Further, we compare the performance of our schemes with their older counterparts as well as with each other.

  7. Toward the Tailoring of Sexual Health Education Messages for Young Women: A Focus on Tourist Experiences.

    PubMed

    Berdychevsky, Liza

    2017-01-01

    Perceived anonymity and decreased influence of sexual double standards in tourism provide female travelers with opportunities for sexual experimentation and risk taking. The purpose of this study was (a) to identify the clusters of risk takers among young women based on their perceptions of and motivations for sexual risk taking in tourism and (b) to profile the clusters with respect to the psychological, sexual, demographic, and tourist characteristics. The data were collected through an online survey of 853 women (age in years: M = 23.5, SD = 6.67). Five clusters of sexual risk takers emerged based on their factor-analyzed risk perceptions and motivations. These clusters were interpreted as (a) diversely motivated broad risk perceivers; (b) fun-seeking broad risk perceivers; (c) diversely motivated physical risk perceivers; (d) anonymity- and empowerment-seeking risk disregarders; and (e) unmotivated broad risk perceivers. Women in these clusters differed in their intentions to engage in sexual risk taking in tourism, sensation-seeking propensities, perceptions of tourist characteristics, levels of sexual experience, and demographic backgrounds. Results suggest tailoring sexual health promotion messages based on cluster affiliation, leveraging cluster-specific risk perceptions, motivations, and personal characteristics. This study provides recommendations for individually tailored, context-specific, age-appropriate, and gender-sensitive sexual health education programs.

  8. A Quantum Proxy Signature Scheme Based on Genuine Five-qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Huang, Jun; Yu, Yao-Feng; Jiang, Xiu-Li

    2014-09-01

    In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  9. TXT@WORK: pediatric hospitalists and text messaging.

    PubMed

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice <10 years (67%). Ninety-one percent of responders used a smartphone. More than half sent (60%) and received (61%) work-related text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  10. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  11. Quantum Proxy Multi-Signature Scheme Using Genuinely Entangled Six Qubits State

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Wang, Huai-Sheng; Li, Peng-Fei

    2013-04-01

    A quantum proxy multi-signature scheme is presented based on controlled teleportation. Genuinely entangled six qubits quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  12. Effects of Instant Messaging on School Performance in Adolescents.

    PubMed

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  13. Internet message boards for pregnancy loss: who's on-line and why?

    PubMed

    Gold, Katherine J; Boggs, Martha E; Mugisha, Emeline; Palladino, Christie Lancaster

    2012-01-01

    Pregnancy loss is common, but its significance is often minimized by family, friends, and the community, leaving bereaved parents with unmet need for support. This study sought to describe demographics, usage patterns, and perceived benefits for women participating in Internet pregnancy loss support groups. We requested permission to post an anonymous Internet survey on large and active United States Internet message boards for women with miscarriages and stillbirths. The study purposefully oversampled stillbirth sites and included both closed- and open-ended questions. The University of Michigan Institutional Review Board approved the study. Closed-ended questions were summarized and evaluated with bivariate analysis. We performed a qualitative analysis of open-ended data using an iterative coding process to identify key themes. Of 62 sites queried, 15 granted permission to post the survey on 18 different message boards. We collected 1,039 surveys, of which 1,006 were complete and eligible for analysis. Women were typically white, well educated, and frequent users. They noted message boards helped them to feel less isolated in their loss and grief and they appreciated unique aspects of Internet communication such as convenience, access, anonymity, and privacy. Pregnancy loss message boards are an important aspect of support for many bereaved mothers. African-American women seem to be substantially underrepresented on-line despite being at higher risk for stillbirth. Internet message boards serve a unique function in providing support for women with miscarriage and stillbirth. The benefits are often significantly different from those encountered in traditional face-to-face bereavement support. Copyright © 2012 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  14. Patients’ Engagement With “Sweet Talk” – A Text Messaging Support System for Young People With Diabetes

    PubMed Central

    Franklin, Victoria Louise; Greene, Alexandra; Waller, Annalu; Greene, Stephen Alan

    2008-01-01

    Background Guidelines for optimizing type 1 diabetes in young people advocate intensive insulin therapy coupled with personal support from the health care team. “Sweet Talk” is a novel intervention designed to support patients between clinic visits using text messages sent to a mobile phone. Scheduled messages are tailored to patient profiles and diabetes self-management goals, and generic messages include topical “newsletters” and anonymized tips from other participants. The system also allows patients to submit data and questions to the diabetes care team. Objectives The aim was to explore how patients with type 1 diabetes interact with the Sweet Talk system in order to understand its utility to this user group. Methods Subjects were 64 young people with diabetes who were participating in the intervention arms of a randomized controlled trial. All text messages submitted to Sweet Talk during a 12-month period were recorded. Messaging patterns and content were analyzed using mixed quantitative and qualitative methods. Results Patients submitted 1180 messages during the observation period (mean 18.4, median 6). Messaging frequency ranged widely between participants (0-240) with a subset of 5 high users contributing 52% of the total. Patients’ clinical and sociodemographic characteristics were not associated with total messaging frequency, although girls sent significantly more messages unrelated to diabetes than did boys (P = .002). The content of patients’ messages fell into 8 main categories: blood glucose readings, diabetes questions, diabetes information, personal health administration, social messages, technical messages, message errors, and message responses. Unprompted submission of blood glucose values was the most frequent incoming message type (35% of total). Responses to requests for personal experiences and tips generated 40% of all the incoming messages, while topical news items also generated good responses. Patients also used the service to ask questions, submit information about their self-management, and order supplies. No patients nominated supporters to receive text messages about their self-management goals. Another option that was not used was the birthday reminder service. Conclusions Automated, scheduled text messaging successfully engaged young people with diabetes. While the system was primarily designed to provide “push” support to patients, submission of clinical data and queries illustrates that it was seen as a trusted medium for communicating with care providers. Responses to the newsletters and submission of personal experiences and tips for circulation to other participants also illustrate the potential value of such interventions for establishing a sense of community. Although participants submitted relatively few messages, positive responses to the system suggest that most derived passive support from reading the messages. The Sweet Talk system could be readily adapted to suit other chronic disease models and age groups, and the results of this study may help to inform the design of future text message support interventions. PMID:18653444

  15. Anonymous HIV testing: what does it mean in policy and practice? A case study in Newfoundland and Labrador, Canada.

    PubMed

    Hancock, Amanda; Gustafson, Diana L

    2014-01-01

    HIV infection is not a legally notifiable disease at the national level in Canada; however, provincial and territorial officials voluntarily undertake notification to the Public Health Agency of Canada. A case study involving four community-based sites in Newfoundland and Labrador found that the absence of clear legislation concerning HIV testing presented challenges for nurses who had to interpret and comply with provincial legislation and agency policy while meeting the needs of test-seekers. This ambiguous messaging is part of other conflicting information about the availability of anonymous HIV testing that, along with other factors, may contribute to under-testing and under-diagnosis in the province. From a social justice perspective, developing a national HIV strategy and amending legislation to facilitate anonymous HIV testing might provide clearer direction to nurses and agencies, and promote public health by improving service delivery and increasing testing in under-tested, higher-risk-taking populations. Copyright © 2014 Association of Nurses in AIDS Care. Published by Elsevier Inc. All rights reserved.

  16. Secure Hierarchical Multicast Routing and Multicast Internet Anonymity

    DTIC Science & Technology

    1998-06-01

    Multimedia, Summer 94, pages 76{79, 94. [15] David Chaum . Blind signatures for untraceable payments. In Proc. Crypto󈨖, pages 199{203, 1982. [16] David L...use of digital signatures , which consist of a cryptographic hash of the message encrypted with the private key of the signer. Digitally-signed messages... signature on the request and on the certi cate it contains. Notice that the location service need not retrieve the initiator’s public key as it is contained

  17. A multimedia mobile phone-based youth smoking cessation intervention: findings from content development and piloting studies.

    PubMed

    Whittaker, Robyn; Maddison, Ralph; McRobbie, Hayden; Bullen, Chris; Denny, Simon; Dorey, Enid; Ellis-Pegler, Mary; van Rooyen, Jaco; Rodgers, Anthony

    2008-11-25

    While most young people who smoke want to quit, few access cessation support services. Mobile phone-based cessation programs are ideal for young people: mobile phones are the most common means of peer communication, and messages can be delivered in an anonymous manner, anywhere, anytime. Following the success of our text messaging smoking cessation program, we developed an innovative multimedia mobile phone smoking cessation intervention. The aim of the study was to develop and pilot test a youth-oriented multimedia smoking cessation intervention delivered solely by mobile phone. Development included creating content and building the technology platform. Content development was overseen by an expert group who advised on youth development principles, observational learning (from social cognitive theory), effective smoking cessation interventions, and social marketing. Young people participated in three content development phases (consultation via focus groups and an online survey, content pre-testing, and selection of role models). Video and text messages were then developed, incorporating the findings from this research. Information technology systems were established to support the delivery of the multimedia messages by mobile phone. A pilot study using an abbreviated 4-week program of video and text content tested the reliability of the systems and the acceptability of the intervention. Approximately 180 young people participated in the consultation phase. There was a high priority placed on music for relaxation (75%) and an interest in interacting with others in the program (40% would read messages, 36% would read a blog). Findings from the pre-testing phase (n = 41) included the importance of selecting "real" and "honest" role models with believable stories, and an interest in animations (37%). Of the 15 participants who took part in the pilot study, 13 (87%) were available for follow-up interviews at 4 weeks: 12 participants liked the program or liked it most of the time and found the role model to be believable; 7 liked the role model video messages (5 were unsure); 8 used the extra assistance for cravings; and 9 were happy with two messages per day. Nine participants (60%) stopped smoking during the program. Some technical challenges were encountered during the pilot study. A multimedia mobile phone smoking cessation program is technically feasible, and the content developed is appropriate for this medium and is acceptable to our target population. These results have informed the design of a 6-month intervention currently being evaluated for its effectiveness in increasing smoking cessation rates in young people.

  18. A Multimedia Mobile Phone–Based Youth Smoking Cessation Intervention: Findings From Content Development and Piloting Studies

    PubMed Central

    Maddison, Ralph; McRobbie, Hayden; Bullen, Chris; Denny, Simon; Dorey, Enid; Ellis-Pegler, Mary; van Rooyen, Jaco; Rodgers, Anthony

    2008-01-01

    Background While most young people who smoke want to quit, few access cessation support services. Mobile phone–based cessation programs are ideal for young people: mobile phones are the most common means of peer communication, and messages can be delivered in an anonymous manner, anywhere, anytime. Following the success of our text messaging smoking cessation program, we developed an innovative multimedia mobile phone smoking cessation intervention. Objective The aim of the study was to develop and pilot test a youth-oriented multimedia smoking cessation intervention delivered solely by mobile phone. Methods Development included creating content and building the technology platform. Content development was overseen by an expert group who advised on youth development principles, observational learning (from social cognitive theory), effective smoking cessation interventions, and social marketing. Young people participated in three content development phases (consultation via focus groups and an online survey, content pre-testing, and selection of role models). Video and text messages were then developed, incorporating the findings from this research. Information technology systems were established to support the delivery of the multimedia messages by mobile phone. A pilot study using an abbreviated 4-week program of video and text content tested the reliability of the systems and the acceptability of the intervention. Results Approximately 180 young people participated in the consultation phase. There was a high priority placed on music for relaxation (75%) and an interest in interacting with others in the program (40% would read messages, 36% would read a blog). Findings from the pre-testing phase (n = 41) included the importance of selecting “real” and “honest” role models with believable stories, and an interest in animations (37%). Of the 15 participants who took part in the pilot study, 13 (87%) were available for follow-up interviews at 4 weeks: 12 participants liked the program or liked it most of the time and found the role model to be believable; 7 liked the role model video messages (5 were unsure); 8 used the extra assistance for cravings; and 9 were happy with two messages per day. Nine participants (60%) stopped smoking during the program. Some technical challenges were encountered during the pilot study. Conclusions A multimedia mobile phone smoking cessation program is technically feasible, and the content developed is appropriate for this medium and is acceptable to our target population. These results have informed the design of a 6-month intervention currently being evaluated for its effectiveness in increasing smoking cessation rates in young people. PMID:19033148

  19. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    PubMed

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  20. Sleep health, messaging, headaches, and academic performance in high school students.

    PubMed

    Pecor, Keith; Kang, Lilia; Henderson, Matthew; Yin, Sunny; Radhakrishnan, Varsha; Ming, Xue

    2016-06-01

    We tested for associations of bedtime, sleep duration, instant messaging, and chronic headaches with hypersomnolence and academic performance in a sample of high school students in New Jersey, USA. Students were surveyed anonymously and asked to report their sleep and messaging habits, headache status, and overall grades. We found that greater hypersomnolence was associated with later bedtimes, shorter sleep durations, and the presence of chronic headaches, but not with messaging after lights out. Also, we found that academic performance was lower in students who messaged after lights out, but it was not affected by headache status, bedtime, or sleep duration. These results are consistent with other studies that have demonstrated associations between headaches and hypersomnolence and between instant messaging habits and academic performance. They also add to a growing literature on the relationships among use of electronic devices, sleep health, and academic performance by adolescents. Copyright © 2015 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.

  1. Anonymous authenticated communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Cheryl L; Schroeppel, Richard C; Snyder, Lillian A

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  2. In their own words: a qualitative content analysis of women’s and men’s preferences for women’s genitals

    PubMed Central

    Mullinax, Margo; Herbenick, Debby; Schick, Vanessa; Sanders, Stephanie A.; Reece, Michael

    2015-01-01

    Research increasingly shows genital attitudes have an impact on sexual well-being and health seeking behaviours. This study explored what women and men like and dislike about women’s genitals. Data are from open-ended items, part of a cross-sectional Internet-based survey anonymously completed by 496 women and 198 men. Overall, both women and men had positive attitudes towards women’s genitals, although there was overlap between likes and dislikes. Some of the most common likes for women related to aesthetics and for men related to tactile and sexual aspects. Men listed more likes than dislikes. The emphasis on both positive and negative messages provides a more complete image of the complex ways people interact with their own and other’s bodies and can help tailor clinical and educational messages. PMID:27004044

  3. Using Publish-Subscribe Messaging for System Status and Automation

    NASA Technical Reports Server (NTRS)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  4. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.

    PubMed

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

  5. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

    PubMed Central

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615

  6. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  7. Evaluating Health Advice in a Web 2.0 Environment: The Impact of Multiple User-Generated Factors on HIV Advice Perceptions.

    PubMed

    Walther, Joseph B; Jang, Jeong-Woo; Hanna Edwards, Ashley A

    2018-01-01

    Unlike traditional media, social media systems often present information of different types from different kinds of contributors within a single message pane, a juxtaposition of potential influences that challenges traditional health communication processing. One type of social media system, question-and-answer advice systems, provides peers' answers to health-related questions, which yet other peers read and rate. Responses may appear good or bad, responders may claim expertise, and others' aggregated evaluations of an answer's usefulness may affect readers' judgments. An experiment explored how answer feasibility, expertise claims, and user-generated ratings affected readers' assessments of advice about anonymous HIV testing. Results extend the heuristic-systematic model of persuasion (Chaiken, 1980) and warranting theory (Walther & Parks, 2002). Information that is generally associated with both systematic and heuristic processes influenced readers' evaluations. Moreover, content-level cues affected judgments about message sources unexpectedly. When conflicting cues were present, cues with greater warranting value (consensus user-generated ratings) had greater influence on outcomes than less warranted cues (self-promoted expertise). Findings present a challenge to health professionals' concerns about the reliability of online health information systems.

  8. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  9. Hierarchy of conversational rule violations involving utterance-based augmentative and alternative communication systems.

    PubMed

    Hoag, Linda A; Bedrosian, Jan L; McCoy, Kathleen F; Johnson, Dallas E

    2008-01-01

    This study examined the effects of using messages with conversational rule violations on attitudes toward people who used utterance-based augmentative and alternative communication (AAC) systems in transactional interactions. Specifically, the ratings were compared across messages with relevance, informativeness, and brevity violations, when latency remained constant (i.e., short). The 96 participating sales clerks viewed scripted, videotaped bookstore conversations and completed an attitude questionnaire. Results indicated that the prestored message with repeated words/phrases was rated the highest, followed by the message with excessive information; next was the message with inadequate information, followed by the message with partly relevant information. The findings may be useful to those using utterance-based systems when making message choices during interactions with service providers. Technological implications point to the development of schema/script-based systems and intelligent editing.

  10. Securing the anonymity of content providers in the World Wide Web

    NASA Astrophysics Data System (ADS)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  11. An Introduction to Message-Bus Architectures for Space Systems

    NASA Technical Reports Server (NTRS)

    Smith, Danford; Gregory, Brian

    2005-01-01

    This course presents technical and programmatic information on the development of message-based architectures for space mission ground and flight software systems. Message-based architecture approaches provide many significant advantages over the more traditional socket-based one-of-a-kind integrated system development approaches. The course provides an overview of publish/subscribe concepts, the use of common isolation layer API's, approaches to message standardization, and other technical topics. Several examples of currently operational systems are discussed and possible changes to the system discussed and time for questions and answers will be provided.

  12. How to Combat a Campus-Gossip Web Site (And Why You Shouldn't)

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    The author discusses the gossip Web site Juicy Campus. Although many students express concern that potential employers who see the cite may decline to hire individuals after reading gossip-filled allegations, or that their social lives are in tatters over the mean-spirited, anonymous messages posted about them, because the site has no affiliation…

  13. An E-payment system based on quantum group signature

    NASA Astrophysics Data System (ADS)

    Xiaojun, Wen

    2010-12-01

    Security and anonymity are essential to E-payment systems. However, existing E-payment systems will easily be broken into soon with the emergence of quantum computers. In this paper, we propose an E-payment system based on quantum group signature. In contrast to classical E-payment systems, our quantum E-payment system can protect not only the users' anonymity but also the inner structure of customer groups. Because of adopting the two techniques of quantum key distribution, a one-time pad and quantum group signature, unconditional security of our E-payment system is guaranteed.

  14. Towards collaborative filtering recommender systems for tailored health communications.

    PubMed

    Marlin, Benjamin M; Adams, Roy J; Sadasivam, Rajani; Houston, Thomas K

    2013-01-01

    The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient "profiles" and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user's past ratings contributes the most to predictive accuracy.

  15. Towards Collaborative Filtering Recommender Systems for Tailored Health Communications

    PubMed Central

    Marlin, Benjamin M.; Adams, Roy J.; Sadasivam, Rajani; Houston, Thomas K.

    2013-01-01

    The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient “profiles” and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user’s past ratings contributes the most to predictive accuracy. PMID:24551430

  16. The clinical usefulness of a web-based messaging system between patients with Crohn disease and their physicians.

    PubMed

    Jeong, Da Eun; Kim, Kyeong Ok; Jang, Byung Ik; Kim, Eun Young; Jung, Jin Tae; Jeon, Seong Woo; Lee, Hyun Seok; Kim, Eun Soo; Park, Kyung Sik; Cho, Kwang Bum

    2016-06-01

    To avoid missing events associated with clinical activity, the authors previously developed a novel, web-based, self-reporting Crohn disease (CD) symptom diary. However, although this diary provided a means of self-checking based on responses to set questions based on Harvey-Bradshaw index scores, it was limited in terms of describing other specific symptoms. Thus, the authors added a space to the questionnaire, which allows patients to send clinicians questions or a description of unpredictable events. The aim of the present study was to assess the clinical usefulness of this messaging system by analyzing patients' messages.The messaging system between patients and their doctors was included in a webpage created for recording patients' symptom diaries (www.cdsd.or.kr). Using this system, patients can send messages easily at any time and doctors can read and respond to these messages immediately using a smart phone or computer. In the present study, the authors retrospectively reviewed 686 messages sent by 152 patients from July 2012 to July 2014 and patient medical records.Mean patient age was 29.0 ± 11.6 years and the male-to-female ratio was 99:53. Most messages regarded symptoms (381 messages, 55.5%), which was followed by self-reports about general condition (195 messages, 28.4%) and questions about treatment (71 messages, 10.3%). With respect to symptoms, abdominal pain was most common (145 cases, 21.1%) followed by hematochezia (36 cases, 5.2%). Problems about medication were the most frequently associated with treatment (65, 91.5%). Patients above 40 years showed a greater tendency to focus on symptoms and treatment (P = 0.025). The doctor answer rate was 56.3% (n = 386), and based on these responses, an early visit was needed in 28 cases (7.3%).Using this web-based messaging system, patients were able to obtain proper advice from their physicians without visiting clinics or searching the Internet, and in addition, 7.3% of messages prompted an early visit. Although longer follow-up is required, this study shows that the devised messaging system provides a clinically relevant communication tool for patients and physicians.

  17. Introduction to Message-Bus Architectures for Space Systems

    NASA Technical Reports Server (NTRS)

    Smith, Dan; Gregory, Brian

    2005-01-01

    This course presents technical and programmatic information on the development of message-based architectures for space mission ground and flight software systems. Message-based architecture approaches provide many significant advantages over the more traditional socket-based one-of-a-kind integrated system development approaches. The course provides an overview of publish/subscribe concepts, the use of common isolation layer API's, approaches to message standardization, and other technical topics. Several examples of currently operational systems are discussed and possible changes to the system development process are presented. Benefits and lessons learned will be discussed and time for questions and answers will be provided.

  18. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  19. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  20. Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies.

    PubMed

    Kushida, Clete A; Nichols, Deborah A; Jadrnicek, Rik; Miller, Ric; Walsh, James K; Griffin, Kara

    2012-07-01

    De-identification and anonymization are strategies that are used to remove patient identifiers in electronic health record data. The use of these strategies in multicenter research studies is paramount in importance, given the need to share electronic health record data across multiple environments and institutions while safeguarding patient privacy. Systematic literature search using keywords of de-identify, deidentify, de-identification, deidentification, anonymize, anonymization, data scrubbing, and text scrubbing. Search was conducted up to June 30, 2011 and involved 6 different common literature databases. A total of 1798 prospective citations were identified, and 94 full-text articles met the criteria for review and the corresponding articles were obtained. Search results were supplemented by review of 26 additional full-text articles; a total of 120 full-text articles were reviewed. A final sample of 45 articles met inclusion criteria for review and discussion. Articles were grouped into text, images, and biological sample categories. For text-based strategies, the approaches were segregated into heuristic, lexical, and pattern-based systems versus statistical learning-based systems. For images, approaches that de-identified photographic facial images and magnetic resonance image data were described. For biological samples, approaches that managed the identifiers linked with these samples were discussed, particularly with respect to meeting the anonymization requirements needed for Institutional Review Board exemption under the Common Rule. Current de-identification strategies have their limitations, and statistical learning-based systems have distinct advantages over other approaches for the de-identification of free text. True anonymization is challenging, and further work is needed in the areas of de-identification of datasets and protection of genetic information.

  1. The Virtue of Taking Responsibility

    ERIC Educational Resources Information Center

    de Ruyter, Doret

    2002-01-01

    The importance of taking responsibility for the well-being of others or responding to the needs of others, be it concrete persons nearby, anonymous persons or (in)animus objects, is beyond dispute. However, people seem to live in an age where it is not common to look after the well-being of others, at least that is the message one gets from the…

  2. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  3. Unified messaging solution for biosurveillance and disease surveillance.

    PubMed

    Abellera, John P; Srinivasan, Arunkumar; Danos, C Scott; McNabb, Scott; Rhodes, Barry

    2007-10-11

    Biosurveillance and disease surveillance systems serve different purposes. However, the richness and quality of an existing data stream and infrastructure used in biosurveillance may prove beneficial for any state-based electronic disease surveillance system, especially if an electronic laboratory data feed does not exist between a hospital and state-based system. The use of an Enterprise Application Integration(EAI) engine, such as the BioSense Integrator,will be necessary to map heterogeneous messages into standard representations, then validate and route them [1] to a disparate system. This poster illustrates the use of an existing BioSense Integrator in order to create a unified message to support the exchange of electronic lab messages necessary for reportable disease notification. An evaluation of the infrastructure for data messaging will be examined and presented, along with a cost and benefit analysis between hospital and state-based system.

  4. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  5. HIV-Related Risk Behaviors, Perceptions of Risk, HIV Testing, and Exposure to Prevention Messages and Methods among Urban American Indians and Alaska Natives

    ERIC Educational Resources Information Center

    Lapidus, Jodi A.; Bertolli, Jeanne; McGowan, Karen; Sullivan, Patrick

    2006-01-01

    The goal of this study was to describe HIV risk behaviors, perceptions, testing, and prevention exposure among urban American Indians and Alaska Natives (AI/AN). Interviewers administered a questionnaire to participants recruited through anonymous peer-referral sampling. Chi-square tests and multiple logistic regression were used to compare HIV…

  6. Design of Instant Messaging System of Multi-language E-commerce Platform

    NASA Astrophysics Data System (ADS)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  7. Privacy-Aware Location Database Service for Granular Queries

    NASA Astrophysics Data System (ADS)

    Kiyomoto, Shinsaku; Martin, Keith M.; Fukushima, Kazuhide

    Future mobile markets are expected to increasingly embrace location-based services. This paper presents a new system architecture for location-based services, which consists of a location database and distributed location anonymizers. The service is privacy-aware in the sense that the location database always maintains a degree of anonymity. The location database service permits three different levels of query and can thus be used to implement a wide range of location-based services. Furthermore, the architecture is scalable and employs simple functions that are similar to those found in general database systems.

  8. Mobile Delivery of Treatment for Alcohol Use Disorders

    PubMed Central

    Quanbeck, Andrew; Chih, Ming-Yuan; Isham, Andrew; Johnson, Roberta; Gustafson, David

    2014-01-01

    Several systems for treating alcohol-use disorders (AUDs) exist that operate on mobile phones. These systems are categorized into four groups: text-messaging monitoring and reminder systems, text-messaging intervention systems, comprehensive recovery management systems, and game-based systems. Text-messaging monitoring and reminder systems deliver reminders and prompt reporting of alcohol consumption, enabling continuous monitoring of alcohol use. Text-messaging intervention systems additionally deliver text messages designed to promote abstinence and recovery. Comprehensive recovery management systems use the capabilities of smart-phones to provide a variety of tools and services that can be tailored to individuals, including in-the-moment assessments and access to peer discussion groups. Game-based systems engage the user using video games. Although many commercial applications for treatment of AUDs exist, few (if any) have empirical evidence of effectiveness. The available evidence suggests that although texting-based applications may have beneficial effects, they are probably insufficient as interventions for AUDs. Comprehensive recovery management systems have the strongest theoretical base and have yielded the strongest and longest-lasting effects, but challenges remain, including cost, understanding which features account for effects, and keeping up with technological advances. PMID:26259005

  9. Unlinkable Serial Transactions

    DTIC Science & Technology

    1997-01-01

    the result of blinding X, for use with the appropriate signature key. 3.3 Registration Message 1 C ! V : fPayment ;Kaudit;CreditAuth;KCV gV ; [Request...anonymous e-cash as presented by Chaum et al. [6], is characterized by several requirements [13]: independent of physical requirements, unforgeable and...penalties can then be applied that make double spending not cost e ective. Chaum’s notion of blinding [5] is a fundamental technique used in

  10. Text Messaging for Enhancement of Testing and Treatment for Tuberculosis, Human Immunodeficiency Virus, and Syphilis: A Survey of Attitudes Toward Cellular Phones and Healthcare

    PubMed Central

    Person, Anna K.; Blain, Michela L.M.; Jiang, Helen; Rasmussen, Petra W.

    2011-01-01

    Abstract Objectives: The objective of this study was to assess knowledge, attitudes, and behaviors surrounding healthcare-related mobile phone use and text messaging among persons at risk for or infected with tuberculosis (TB) or the human immunodeficiency virus (HIV). Methods: An anonymous survey was conducted in three groups of subjects: (1) HIV-infected persons attending an HIV clinic; (2) persons with latent TB infection at a public health clinic; and (3) persons presenting for TB, HIV, and syphilis screening at a community screening site. Results: Three hundred fifteen (n  = 315) persons responded to the survey, of whom 241 (76.5%) owned a cell phone. Cell phone owners were younger and more educated than nonowners. Transportation difficulty and forgetting appointments were cited as significant barriers by 34.2% and 39.5% of respondents, respectively. Fifty-six percent of subjects felt it would be acceptable to receive text message appointment reminders, and 33% felt that text message reminders to take medications would be acceptable. Younger age and cell phone ownership were significantly associated with acceptance of text message reminders. Black and Hispanic subjects were more likely to feel that text message reminders for appointments or medications were helpful than White subjects. Further, Black and Hispanic subjects, as well as subjects with lower educational attainment, were more receptive to healthcare-related educational text messages. Conclusions: Cell phones and text messaging were prevalent among our subjects attending HIV and TB clinics, and subjects were generally receptive to text messaging for healthcare-related communication. Interventions that explore the potential for text messaging to improve clinic attendance, medication adherence, and health knowledge should be explored. PMID:21457085

  11. System and Method for Providing a Real Time Audible Message to a Pilot

    NASA Technical Reports Server (NTRS)

    Johnson, Walter W. (Inventor); Lachter, Joel B. (Inventor); Koteskey, Robert W. (Inventor); Battiste, Vernol (Inventor)

    2016-01-01

    A system and method for providing information to a crew of the aircraft while in-flight. The system includes a module having: a receiver for receiving a message while in-flight; a filter having a set of screening parameters and operative to filter the message based on the set of screening parameters; and a converter for converting the message into an audible message. The message includes a pilot report having at least one of weather information, separation information, congestion information, flight deviation information and destination information. The message is sent to the aircraft by another aircraft or an air traffic controller.

  12. A Messaging Infrastructure for WLCG

    NASA Astrophysics Data System (ADS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-12-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  13. SMSaúde: Design, Development, and Implementation of a Remote/Mobile Patient Management System to Improve Retention in Care for HIV/AIDS and Tuberculosis Patients.

    PubMed

    Nhavoto, José António; Grönlund, Åke; Chaquilla, Walter Ponce

    2015-03-09

    The widespread and low cost of mobile phones and the convenience of short message service (SMS) text messaging suggest potential suitability for use with alternative strategies for supporting retention in care and adherence to the treatment of various chronic diseases, such as HIV and tuberculosis (TB). Despite the growing body of literature reporting positive outcomes of SMS text message-based communication with patients, there is yet very little research about the integration of communication technologies and electronic medical records or electronic patient tracking systems. To design, develop, and implement an integrated mobile phone text messaging system used to follow up with patients with HIV and TB in treatment in Mozambique. Following the design science research methodology, we developed a Web-based system that provides support to patients. A case study involving three health care sites in Mozambique was a basis for discussing design issues for this kind of system. We used brainstorming techniques to solicit usability requirements, focus group meetings to discuss and define system architecture, and prototyping to test in real environments and to improve the system. We found six sets of system requirements that need to be addressed for success: data collection, telecommunication costs, privacy and data security, text message content, connectivity, and system scalability. A text messaging system was designed and implemented in three health facilities. These sites feed data into a central data repository, which can be used for analysis of operations and decision support. Based on the treatment schedule, the system automatically sent SMS text message appointment reminders, medication reminders, as well as motivational and educational messages to patients enrolled in antiretroviral therapy and TB treatment programs. We successfully defined the requirements for, designed, and implemented a mobile phone text messaging system to support HIV and TB treatments. Implementation of this system could improve patients' self-management skills and strengthen communication between patients and health care providers.

  14. Secure message authentication system for node to node network

    NASA Astrophysics Data System (ADS)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  15. Database Design to Ensure Anonymous Study of Medical Errors: A Report from the ASIPS collaborative

    PubMed Central

    Pace, Wilson D.; Staton, Elizabeth W.; Higgins, Gregory S.; Main, Deborah S.; West, David R.; Harris, Daniel M.

    2003-01-01

    Medical error reporting systems are important information sources for designing strategies to improve the safety of health care. Applied Strategies for Improving Patient Safety (ASIPS) is a multi-institutional, practice-based research project that collects and analyzes data on primary care medical errors and develops interventions to reduce error. The voluntary ASIPS Patient Safety Reporting System captures anonymous and confidential reports of medical errors. Confidential reports, which are quickly de-identified, provide better detail than do anonymous reports; however, concerns exist about the confidentiality of those reports should the database be subject to legal discovery or other security breaches. Standard database elements, for example, serial ID numbers, date/time stamps, and backups, could enable an outsider to link an ASIPS report to a specific medical error. The authors present the design and implementation of a database and administrative system that reduce this risk, facilitate research, and maintain near anonymity of the events, practices, and clinicians. PMID:12925548

  16. Towards ontology personalization to enrich social conversations on AAC systems

    NASA Astrophysics Data System (ADS)

    Mancilla V., Daniela; Sastoque H., Sebastian; Iregui G., Marcela

    2015-01-01

    Communication is one of the essential needs of human beings. Augmentative and Alternative Communication Systems (AAC) seek to help in the generation of oral and written language to people with physical disorders that limit their natural communication. These systems present significant challenges such as: the composition of consistent messages according to syntactic and semantic rules, the improvement of message production times, the application to social contexts and, consequently, the incorporation of user-specific information. This work presents an original ontology personalization approach for an AAC instant messaging system incorporating personalized information to improve the efficacy and efficiency of the message production. This proposal is based on a projection of a general ontology into a more specific one, avoiding storage redundancy and data coupling, representing a big opportunity to enrich communication capabilities of current AAC systems. The evaluation was performed for a study case based on an AAC system for assistance in composing messages. The results show that adding user-specific information allows generation of enriched phrases, so improving the accuracy of the message, facilitating the communication process.

  17. Increasing the Automation and Autonomy for Spacecraft Operations with Criteria Action Table

    NASA Technical Reports Server (NTRS)

    Li, Zhen-Ping; Savki, Cetin

    2005-01-01

    The Criteria Action Table (CAT) is an automation tool developed for monitoring real time system messages for specific events and processes in order to take user defined actions based on a set of user-defined rules. CAT was developed by Lockheed Martin Space Operations as a part of a larger NASA effort at the Goddard Space Flight Center (GSFC) to create a component-based, middleware-based, and standard-based general purpose ground system architecture referred as GMSEC - the GSFC Mission Services Evolution Center. CAT has been integrated into the upgraded ground systems for Tropical Rainfall Measuring Mission (TRMM) and Small Explorer (SMEX) satellites and it plays the central role in their automation effort to reduce the cost and increase the reliability for spacecraft operations. The GMSEC architecture provides a standard communication interface and protocol for components to publish/describe messages to an information bus. It also provides a standard message definition so components can send and receive messages to the bus interface rather than each other, thus reducing the component-to-component coupling, interface, protocols, and link (socket) management. With the GMSEC architecture, components can publish standard event messages to the bus for all nominal, significant, and surprising events in regard to satellite, celestial, ground system, or any other activity. In addition to sending standard event messages, each GMSEC compliant component is required to accept and process GMSEC directive request messages.

  18. Launch Control System Master Console Event Message Reduction

    NASA Technical Reports Server (NTRS)

    Nguyen, Uyen

    2014-01-01

    System monitoring and control (SMC) message browsers receive so many messages daily that operators do not need to see. Important messages are often mixed up among the less important ones. My job is to reduce the messages displayed in the message browser so that warning and emergency messages can be seen easily and therefore, responded promptly. There are multiple methods to achieve this. Firstly, duplicate messages should not appear many times in the message browser. Instead, the message should appear only once but with a number that counts the times that it appears. This method is called duplicate message suppression. Secondly, messages that update the most recent state (e.g. up/down) of a component should replace the old-state messages. This method is called state based message correlation. Thirdly, messages that display "normal" alarm level should be suppressed unless it's a response to an operator action. In addition to message reduction, I also work on correcting the severity level and text formats on messages.

  19. Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.

  20. Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words.

    PubMed

    Chiu, Ming Ming; Seigfried-Spellar, Kathryn C; Ringenberg, Tatiana R

    2018-07-01

    This exploratory study is the first to identify content differences between youths' online chats with contact child sex offenders (CCSOs; seek to meet with youths) and those with fantasy child sex offenders (FCSOs; do not meet with youths) using statistical discourse analysis (SDA). Past studies suggest that CCSOs share their experiences and emotions with targeted youths (self-disclosure grooming tactic) and encourage them to reciprocate, to build trust and closer relationships through a cycle of self-disclosures. In this study, we examined 36,029 words in 4,353 messages within 107 anonymized online chat sessions by 21 people, specifically 12 youths and 9 arrested sex offenders (5 CCSOs and 4 FCSOs), using SDA. Results showed that CCSOs were more likely than FCSOs to write online messages with specific words (first person pronouns, negative emotions and positive emotions), suggesting the use of self-disclosure grooming tactics. CCSO's self-disclosure messages elicited corresponding self-disclosure messages from their targeted youths. These results suggest that CCSOs use grooming tactics that help engender youths' trust to meet in the physical world, but FCSOs do not. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Mission Services Evolution Center Message Bus

    NASA Technical Reports Server (NTRS)

    Mayorga, Arturo; Bristow, John O.; Butschky, Mike

    2011-01-01

    The Goddard Mission Services Evolution Center (GMSEC) Message Bus is a robust, lightweight, fault-tolerant middleware implementation that supports all messaging capabilities of the GMSEC API. This architecture is a distributed software system that routes messages based on message subject names and knowledge of the locations in the network of the interested software components.

  2. [Design and realization of the communication system for the mobile medical terminal].

    PubMed

    Ji, Lei; Guo, Xu; Shi, Huayu

    2013-01-01

    Realizing wireless communication based on handset devices for medical staff; providing an instant messaging method. Constructing a set of communication protocols and standards; developing software both on server and client. Building an instant messaging system which follows the customized specification; based on Android the client provides functions like address book, message, voice service etc. As an independent module of the mobile medical terminal, the system can provide convenient communication for medical service with other mobile business.

  3. Roadside-based communication system and method

    NASA Technical Reports Server (NTRS)

    Bachelder, Aaron D. (Inventor)

    2007-01-01

    A roadside-based communication system providing backup communication between emergency mobile units and emergency command centers. In the event of failure of a primary communication, the mobile units transmit wireless messages to nearby roadside controllers that may take the form of intersection controllers. The intersection controllers receive the wireless messages, convert the messages into standard digital streams, and transmit the digital streams along a citywide network to a destination intersection or command center.

  4. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  5. A pilot test of a tailored mobile and web-based diabetes messaging system for adolescents.

    PubMed

    Mulvaney, Shelagh A; Anders, Shilo; Smith, Annie K; Pittel, Eric J; Johnson, Kevin B

    2012-03-01

    We conducted a pilot trial of a new mobile and web-based intervention to improve diabetes adherence. The text messaging system was designed to motivate and remind adolescents about diabetes self-care tasks. Text messages were tailored according to individually-reported barriers to diabetes self-care. A total of 23 adolescents with type 1 diabetes used the system for a period of three months. On average, they received 10 text messages per week (range 8-12). A matched historical control group from the same clinic was used for comparison. After three months, system users rated the content, usability and experiences with the system, which were very favourable. Comparison of the intervention and control groups indicated a significant interaction between group and time. Both groups had similar HbA(1c) levels at baseline. After three months, the mean HbA(1c) level in the intervention group was unchanged (8.8%), but the mean level in the control group was significantly higher (9.9%), P = 0.006. The results demonstrate the feasibility of the messaging system, user acceptance and a promising effect on glycaemic control. Integrating this type of messaging system with online educational programming could prove to be beneficial.

  6. A QoS Management Technique of Urgent Information Provision in ITS Services Using DSRC for Autonomous Base Stations

    NASA Astrophysics Data System (ADS)

    Shimura, Akitoshi; Aizono, Takeiki; Hiraiwa, Masashi; Sugano, Shigeki

    A QoS management technique based on an autonomous decentralized mobility system, which is an autonomous decentralized system enhanced to provide mobile stations with information about urgent roadway situations, is proposed in this paper. This technique enables urgent messages to be flexibly and quickly transmitted to mobile stations by multiple decentralized base stations using dedicated short range communication. It also supports the easy addition of additional base stations. Each station autonomously creates information-delivery communities based on the urgency of the messages it receives through the roadside network and the distances between the senders and receivers. Each station dynamically determines the urgency of messages according to the message content and the speed of the mobile stations. Evaluation of this technique applied to the Smart Gateway system, which provides driving-assistance services to mobile stations through dedicated short-range communication, demonstrated its effectiveness and that it is suitable for actual systems.

  7. Perceptions of the Feasibility and Practicalities of Text Messaging-Based Infectious Disease Surveillance: A Questionnaire Survey.

    PubMed

    Dang, Linh Thuy; Vu, Nguyen Cong; Vu, Thiem Dinh; James, Spencer L; Katona, Peter; Katona, Lindsay; Rosen, Joseph M; Nguyen, Cuong Kieu

    2016-05-25

    In Vietnam, infectious disease surveillance data are collected via a paper-based system through four government tiers leading to a large delay. Meanwhile, mobile phones are abundant and very popular in the country, and known to be a useful tool in health care worldwide. Therefore, there is a great potential for the development of a timely disease surveillance system through the use of mobile phone short message service (SMS) text messages. This study aims to explore insights about the feasibility and practicalities of the utilization of SMS text messaging-based interventions in disease-reporting systems by identifying potential challenges and barriers in the text messaging process and looking at lessons learned. An SMS text messaging-based disease tracking system was set up in Vietnam with patient reports texted by clinic staff. Two 6-month trials utilizing this disease tracking system were designed and implemented in two northern provinces of Vietnam to report two infectious diseases: diarrhea and influenza-like illness. A structured self-reported questionnaire was developed to measure the feasibility and practicalities of the system from the participants. On the completion of the second trial in 2013, participating health staff from 40 commune health centers in the two pilot provinces were asked to complete the survey (N=80). Most participants were female (61%, 49/80) and nearly half (44%, 35/80) were heads of a commune health center. Approximately two-thirds (63%, 50/80) of participants retained the basic structure of the SMS text message report and there was a strong influence (OR 28.2, 95% CI 5.3-151.2) of those people on the time they spent texting the information. The majority (88%, 70/80) felt the information conveyed in the SMS text message report was not difficult to understand. Most (86%, 69/80) believed that they could report all 28 infectious diseases asked for by the Ministry of Health by using SMS text messaging. From a health center staff perspective, a disease-reporting system utilizing text messaging technology is easy to use and has great potential to be implemented and expanded nationwide. The survey showed positive perceptions and feedback from the participants and contributed to a promising practical solution to improve the surveillance system of infectious disease in Vietnam.

  8. MessageSpace: a messaging system for health research

    NASA Astrophysics Data System (ADS)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  9. LCS Master Console Event Message Reduction

    NASA Technical Reports Server (NTRS)

    Nguyen, Uyen

    2014-01-01

    System monitoring and control (SMC) message browsers receive so many messages daily that operators are unable to keep track all of them. Important messages are often mixed up among the less important ones. My job is to reduce the messages so that warning and emergency messages can be seen easily and therefore, responded promptly. There are multiple methods to achieve this. Firstly, messages that look the same should not appear many times in the message browser. Instead, the message should appear only once but with a number that counts the times that it appears. This method is called duplicate message suppression. Messages that display "normal" or "advisory" alarm level should be suppressed. Secondly, messages that update the most recent status of a system should replace the old-status messages. This method is called state based message correlation. Thirdly, some unnecessary messages should be sent straight to history after being displayed or not displayed at all. For an example, normal messages that are not a response to an operator's action should not be displayed. I also work on fixing messages that are not color-coded and formatted properly.

  10. Neural correlates of behavioral preference for culturally familiar drinks.

    PubMed

    McClure, Samuel M; Li, Jian; Tomlin, Damon; Cypert, Kim S; Montague, Latané M; Montague, P Read

    2004-10-14

    Coca-Cola (Coke) and Pepsi are nearly identical in chemical composition, yet humans routinely display strong subjective preferences for one or the other. This simple observation raises the important question of how cultural messages combine with content to shape our perceptions; even to the point of modifying behavioral preferences for a primary reward like a sugared drink. We delivered Coke and Pepsi to human subjects in behavioral taste tests and also in passive experiments carried out during functional magnetic resonance imaging (fMRI). Two conditions were examined: (1) anonymous delivery of Coke and Pepsi and (2) brand-cued delivery of Coke and Pepsi. For the anonymous task, we report a consistent neural response in the ventromedial prefrontal cortex that correlated with subjects' behavioral preferences for these beverages. In the brand-cued experiment, brand knowledge for one of the drinks had a dramatic influence on expressed behavioral preferences and on the measured brain responses.

  11. Tailored motivational message generation: A model and practical framework for real-time physical activity coaching.

    PubMed

    Op den Akker, Harm; Cabrita, Miriam; Op den Akker, Rieks; Jones, Valerie M; Hermens, Hermie J

    2015-06-01

    This paper presents a comprehensive and practical framework for automatic generation of real-time tailored messages in behavior change applications. Basic aspects of motivational messages are time, intention, content and presentation. Tailoring of messages to the individual user may involve all aspects of communication. A linear modular system is presented for generating such messages. It is explained how properties of user and context are taken into account in each of the modules of the system and how they affect the linguistic presentation of the generated messages. The model of motivational messages presented is based on an analysis of existing literature as well as the analysis of a corpus of motivational messages used in previous studies. The model extends existing 'ontology-based' approaches to message generation for real-time coaching systems found in the literature. Practical examples are given on how simple tailoring rules can be implemented throughout the various stages of the framework. Such examples can guide further research by clarifying what it means to use e.g. user targeting to tailor a message. As primary example we look at the issue of promoting daily physical activity. Future work is pointed out in applying the present model and framework, defining efficient ways of evaluating individual tailoring components, and improving effectiveness through the creation of accurate and complete user- and context models. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Event Driven Messaging with Role-Based Subscriptions

    NASA Technical Reports Server (NTRS)

    Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed

    2009-01-01

    Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).

  13. Simplifying HL7 Version 3 messages.

    PubMed

    Worden, Robert; Scott, Philip

    2011-01-01

    HL7 Version 3 offers a semantically robust method for healthcare interoperability but has been criticized as overly complex to implement. This paper reviews initiatives to simplify HL7 Version 3 messaging and presents a novel approach based on semantic mapping. Based on user-defined definitions, precise transforms between simple and full messages are automatically generated. Systems can be interfaced with the simple messages and achieve interoperability with full Version 3 messages through the transforms. This reduces the costs of HL7 interfacing and will encourage better uptake of HL7 Version 3 and CDA.

  14. Engineered cell-cell communication via DNA messaging

    PubMed Central

    2012-01-01

    Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia. PMID:22958599

  15. Improvement of a Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-02-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  16. Improvement of a Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  17. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    PubMed

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  18. Communicating with the workforce during emergencies: developing an employee text messaging program in a local public health setting.

    PubMed

    Karasz, Hilary N; Bogan, Sharon; Bosslet, Lindsay

    2014-01-01

    Short message service (SMS) text messaging can be useful for communicating information to public health employees and improving workforce situational awareness during emergencies. We sought to understand how the 1,500 employees at Public Health--Seattle & King County, Washington, perceived barriers to and benefits of participation in a voluntary, employer-based SMS program. Based on employee feedback, we developed the system, marketed it, and invited employees to opt in. The system was tested during an ice storm in January 2012. Employee concerns about opting into an SMS program included possible work encroachment during non-work time and receiving excessive irrelevant messages. Employees who received messages during the weather event reported high levels of satisfaction and perceived utility from the program. We conclude that text messaging is a feasible form of communication with employees during emergencies. Care should be taken to design and deploy a program that maximizes employee satisfaction.

  19. Getting Your Message Across: Mobile Phone Text Messaging

    ERIC Educational Resources Information Center

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  20. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  1. PRAIS: Distributed, real-time knowledge-based systems made easy

    NASA Technical Reports Server (NTRS)

    Goldstein, David G.

    1990-01-01

    This paper discusses an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS). PRAIS strives for transparently parallelizing production (rule-based) systems, even when under real-time constraints. PRAIS accomplishes these goals by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors.

  2. Study on Privacy Protection Algorithm Based on K-Anonymity

    NASA Astrophysics Data System (ADS)

    FeiFei, Zhao; LiFeng, Dong; Kun, Wang; Yang, Li

    Basing on the study of K-Anonymity algorithm in privacy protection issue, this paper proposed a "Degree Priority" method of visiting Lattice nodes on the generalization tree to improve the performance of K-Anonymity algorithm. This paper also proposed a "Two Times K-anonymity" methods to reduce the information loss in the process of K-Anonymity. Finally, we used experimental results to demonstrate the effectiveness of these methods.

  3. Murmer, a message generator and reporter for Unix, VMS, and VxWorks

    NASA Astrophysics Data System (ADS)

    Oleynik, G.; Appleton, B.; Moore, C.; Sergey, G.; Udumula, L.

    1994-02-01

    Murmer is a Unix based message generation, reporting, display, and logging system that we have developed for use in data acquisition systems at Fermilab. Murmer is a tool for the production and management of message reporting. Its usefulness ranges from software product development and maintenance to system level shakedown and diagnostics. Murmer provides a VMS MESSAGE-like function code generation utility, a client routine package for sending these codes over the network to a central server, and a server which translates the codes into meaningful visual information, writes the information to a logfile, and display it on B&W or color X windows. Because Murmer stores message information in keyed access files, it can provide advanced features such as popping up help when a displayed message is clicked on by the mouse and executing 'action' shell scripts when selected messages are received by the server.

  4. MESA: Message-Based System Analysis Using Runtime Verification

    NASA Technical Reports Server (NTRS)

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  5. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  6. A cryptographic hash function based on chaotic network automata

    NASA Astrophysics Data System (ADS)

    Machicao, Jeaneth; Bruno, Odemir M.

    2017-12-01

    Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). Cryptographic hash functions (CHF) are commonly used to check data integrity. CHF “compress” arbitrary long messages (input) into much smaller representations called hash values or message digest (output), designed to prevent the ability to reverse the hash values into the original message. This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. Here, we propose an hybrid model that combines CA and networks, called network automata (CNA), whose chaotic spatio-temporal outputs are used to compute a hash value. Following the Merkle and Damgård model of construction, a portion of the message is entered as the initial condition of the network automata, so that the rest parts of messages are iteratively entered to perturb the system. The chaotic network automata shuffles the message using flexible control parameters, so that the generated hash value is highly sensitive to the message. As demonstrated in our experiments, the proposed model has excellent pseudo-randomness and sensitivity properties with acceptable performance when compared to conventional hash functions.

  7. De-identification of health records using Anonym: effectiveness and robustness across datasets.

    PubMed

    Zuccon, Guido; Kotzur, Daniel; Nguyen, Anthony; Bergheim, Anton

    2014-07-01

    Evaluate the effectiveness and robustness of Anonym, a tool for de-identifying free-text health records based on conditional random fields classifiers informed by linguistic and lexical features, as well as features extracted by pattern matching techniques. De-identification of personal health information in electronic health records is essential for the sharing and secondary usage of clinical data. De-identification tools that adapt to different sources of clinical data are attractive as they would require minimal intervention to guarantee high effectiveness. The effectiveness and robustness of Anonym are evaluated across multiple datasets, including the widely adopted Integrating Biology and the Bedside (i2b2) dataset, used for evaluation in a de-identification challenge. The datasets used here vary in type of health records, source of data, and their quality, with one of the datasets containing optical character recognition errors. Anonym identifies and removes up to 96.6% of personal health identifiers (recall) with a precision of up to 98.2% on the i2b2 dataset, outperforming the best system proposed in the i2b2 challenge. The effectiveness of Anonym across datasets is found to depend on the amount of information available for training. Findings show that Anonym compares to the best approach from the 2006 i2b2 shared task. It is easy to retrain Anonym with new datasets; if retrained, the system is robust to variations of training size, data type and quality in presence of sufficient training data. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  8. Assisted entry mitigates text messaging-based driving detriment.

    PubMed

    Sawyer, Benjamin D; Hancock, Peter A

    2012-01-01

    Previous research using cell phones indicates that manual manipulation is not a principal component of text messaging relating driving detriment. This paper suggests that manipulation of a phone in conjunction with the cognitive need to compose the message itself co-act to contribute to driving degradation. This being so, drivers sending text messages might experience reduced interference to the driving task if the text messaging itself were assisted through the predictive T9 system. We evaluated undergraduate drivers in a simulator who drove and texted using either Assisted Text entry, via Nokia's T9 system, or unassisted entry via the multitap interface. Results supported the superiority of the T9 system over the multitap system implying that specific assistive technologies can modulate the degradation of capacity which texting tragically induces.

  9. From a Trickle to a Flood: Active Attacks on Several Mix Types

    DTIC Science & Technology

    2002-01-01

    out potential weaknesses in existing designs, and suggest improvements. 1 Introduction Many modern anonymity systems are based on mixes. Chaum first...Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pages 10–29, July 2000. 2. David ... Chaum . Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. 3. L. Cottrell. Mixmaster

  10. Time Triggered Ethernet System Testing Means and Method

    NASA Technical Reports Server (NTRS)

    Smithgall, William Todd (Inventor); Hall, Brendan (Inventor); Varadarajan, Srivatsan (Inventor)

    2014-01-01

    Methods and apparatus are provided for evaluating the performance of a Time Triggered Ethernet (TTE) system employing Time Triggered (TT) communication. A real TTE system under test (SUT) having real input elements communicating using TT messages with output elements via one or more first TTE switches during a first time interval schedule established for the SUT. A simulation system is also provided having input simulators that communicate using TT messages via one or more second TTE switches with the same output elements during a second time interval schedule established for the simulation system. The first and second time interval schedules are off-set slightly so that messages from the input simulators, when present, arrive at the output elements prior to messages from the analogous real inputs, thereby having priority over messages from the real inputs and causing the system to operate based on the simulated inputs when present.

  11. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  12. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  13. Realization of Real-Time Clinical Data Integration Using Advanced Database Technology

    PubMed Central

    Yoo, Sooyoung; Kim, Boyoung; Park, Heekyong; Choi, Jinwook; Chun, Jonghoon

    2003-01-01

    As information & communication technologies have advanced, interest in mobile health care systems has grown. In order to obtain information seamlessly from distributed and fragmented clinical data from heterogeneous institutions, we need solutions that integrate data. In this article, we introduce a method for information integration based on real-time message communication using trigger and advanced database technologies. Messages were devised to conform to HL7, a standard for electronic data exchange in healthcare environments. The HL7 based system provides us with an integrated environment in which we are able to manage the complexities of medical data. We developed this message communication interface to generate and parse HL7 messages automatically from the database point of view. We discuss how easily real time data exchange is performed in the clinical information system, given the requirement for minimum loading of the database system. PMID:14728271

  14. Communicating with the Workforce During Emergencies: Developing an Employee Text Messaging Program in a Local Public Health Setting

    PubMed Central

    Bogan, Sharon; Bosslet, Lindsay

    2014-01-01

    Short message service (SMS) text messaging can be useful for communicating information to public health employees and improving workforce situational awareness during emergencies. We sought to understand how the 1,500 employees at Public Health – Seattle & King County, Washington, perceived barriers to and benefits of participation in a voluntary, employer-based SMS program. Based on employee feedback, we developed the system, marketed it, and invited employees to opt in. The system was tested during an ice storm in January 2012. Employee concerns about opting into an SMS program included possible work encroachment during non-work time and receiving excessive irrelevant messages. Employees who received messages during the weather event reported high levels of satisfaction and perceived utility from the program. We conclude that text messaging is a feasible form of communication with employees during emergencies. Care should be taken to design and deploy a program that maximizes employee satisfaction. PMID:25355976

  15. Homophobic and sexist yet uncontested: examining football fan postings on Internet message boards.

    PubMed

    Kian, Edward M; Clavio, Galen; Vincent, John; Shaw, Stephanie D

    2011-01-01

    Although a homophobic and sexist archetype of heterosexual masculinity has been thought to permeate competitive teamsport, matters have been rapidly changing. This is evident in research on openly gay athletes, attitudes among heterosexual athletes, and recent studies on decreasing homophobia among sport media content. In this research, however, we examine how some men still adhere to a homophobic and sexist masculine deposition when discussing sport on the Internet. A textual analysis was used to analyze hegemonic masculinity from a popular American football message board. Although posts related to hegemonic masculinity did not permeate the data, we found that this traditional form of masculinity was upheld through misogyny, homophobia, and the objectification of women. Thus, whereas mainstream sport media is increasingly policed for homophobia and sexism, this research shows that the anonymity of the Internet permits hegemonic masculinity to flourish in specific locations, without contestation.

  16. Using a Computer-based Messaging System at a High School To Increase School/Home Communication.

    ERIC Educational Resources Information Center

    Burden, Mitzi K.

    Minimal communication between school and home was found to contribute to low performance by students at McDuffie High School (South Carolina). This report describes the experience of establishing a computer-based telephone messaging system in the high school and involving parents, teachers, and students in its use. Additional strategies employed…

  17. An AI-based communication system for motor and speech disabled persons: design methodology and prototype testing.

    PubMed

    Sy, B K; Deller, J R

    1989-05-01

    An intelligent communication device is developed to assist the nonverbal, motor disabled in the generation of written and spoken messages. The device is centered on a knowledge base of the grammatical rules and message elements. A "belief" reasoning scheme based on both the information from external sources and the embedded knowledge is used to optimize the process of message search. The search for the message elements is conceptualized as a path search in the language graph, and a special frame architecture is used to construct and to partition the graph. Bayesian "belief" reasoning from the Dempster-Shafer theory of evidence is augmented to cope with time-varying evidence. An "information fusion" strategy is also introduced to integrate various forms of external information. Experimental testing of the prototype system is discussed.

  18. An enhanced mobile-healthcare emergency system based on extended chaotic maps.

    PubMed

    Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios

    2013-10-01

    Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.

  19. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    PubMed

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three different threshold settings for sensitive value, our method can successively prevent the disclosure of sensitive values (nearly all observed DRs are zeros) without sacrificing too much of data utility. With non-uniform threshold setting, level-wise or frequency-based, our MS(k, θ (*))-bounding exhibits the best data utility and the least privacy risk among all the models. The experiments conducted on selected ADR signals from MedWatch show that only very small difference on signal strength (PRR or ROR) were observed. The results show that our method can effectively prevent the disclosure of patient sensitive information without sacrificing data utility for ADR signal detection. We propose a new privacy model for protecting SRS data that possess some characteristics overlooked by contemporary models and an anonymization algorithm to sanitize SRS data in accordance with the proposed model. Empirical evaluation on the real SRS dataset, i.e., FAERS, shows that our method can effectively solve the privacy problem in SRS data without influencing the ADR signal strength.

  20. Development of a text messaging system to improve receipt of survivorship care in adolescent and young adult survivors of childhood cancer.

    PubMed

    Casillas, Jacqueline; Goyal, Anju; Bryman, Jason; Alquaddoomi, Faisal; Ganz, Patricia A; Lidington, Emma; Macadangdang, Joshua; Estrin, Deborah

    2017-08-01

    This study aimed to develop and examine the acceptability, feasibility, and usability of a text messaging, or Short Message Service (SMS), system for improving the receipt of survivorship care for adolescent and young adult (AYA) survivors of childhood cancer. Researchers developed and refined the text messaging system based on qualitative data from AYA survivors in an iterative three-stage process. In stage 1, a focus group (n = 4) addressed acceptability; in stage 2, key informant interviews (n = 10) following a 6-week trial addressed feasibility; and in stage 3, key informant interviews (n = 23) following a 6-week trial addressed usability. Qualitative data were analyzed using a constant comparative analytic approach exploring in-depth themes. The final system includes programmed reminders to schedule and attend late effect screening appointments, tailored suggestions for community resources for cancer survivors, and messages prompting participant feedback regarding the appointments and resources. Participants found the text messaging system an acceptable form of communication, the screening reminders and feedback prompts feasible for improving the receipt of survivorship care, and the tailored suggestions for community resources usable for connecting survivors to relevant services. Participants suggested supplementing survivorship care visits and forming AYA survivor social networks as future implementations for the text messaging system. The text messaging system may assist AYA survivors by coordinating late effect screening appointments, facilitating a partnership with the survivorship care team, and connecting survivors with relevant community resources. The text messaging system has the potential to improve the receipt of survivorship care.

  1. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  2. Long-range AIS message analysis based on the TianTuo-3 micro satellite

    NASA Astrophysics Data System (ADS)

    Li, Shiyou; Chen, Lihu; Chen, Xiaoqian; Zhao, Yong; Bai, Yuzhu

    2017-07-01

    The "Type-27 AIS message" is the long-range AIS broadcast message, which is primarily intended for the long-range detection of AIS typically by satellite. The TT3-AIS uses a four-frequency receiver scheme which includes two frequency channels conventionally applied by the AIS system and two new frequency channels allocated to the long-range AIS broadcast message. To the end of April 2016, the TT3-AIS has already received more than 11,400 packets of Type-27 AIS messages. In this paper, a detailed analysis of the Type-27 AIS messages is performed. Firstly, an eavesdropper diagram of the space-borne AIS received from the worldwide vessels is obtained. Secondly, the analysis to the trend of the number and the ratio of the new-type vessels is performed based on the Type-27 AIS message. The detection probability of the new-type vessels is also discussed. The result would be helpful on the usage of the long-range AIS message both for data application and for the improvement in designing the next space-based AIS receiver.

  3. Correctness Proof of a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a deductive proof of a self-stabilizing distributed clock synchronization protocol. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present a deductive proof of the correctness of the protocol as it applies to the networks with unidirectional and bidirectional links. We also confirm the claims of determinism and linear convergence.

  4. Anon-Pass: Practical Anonymous Subscriptions.

    PubMed

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  5. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  6. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  7. Scrambling for anonymous visual communications

    NASA Astrophysics Data System (ADS)

    Dufaux, Frederic; Ebrahimi, Touradj

    2005-08-01

    In this paper, we present a system for anonymous visual communications. Target application is an anonymous video chat. The system is identifying faces in the video sequence by means of face detection or skin detection. The corresponding regions are subsequently scrambled. We investigate several approaches for scrambling, either in the image-domain or in the transform-domain. Experiment results show the effectiveness of the proposed system.

  8. A Content Analysis of E-mail Communication between Patients and Their Providers: Patients Get the Message

    PubMed Central

    White, Casey B.; Moyer, Cheryl A.; Stern, David T.; Katz, Steven J.

    2004-01-01

    Objective: E-mail use in the clinical setting has been slow to diffuse for several reasons, including providers' concerns about patients' inappropriate and inefficient use of the technology. This study examined the content of a random sample of patient–physician e-mail messages to determine the validity of those concerns. Design: A qualitative analysis of patient–physician e-mail messages was performed. Measurements: A total of 3,007 patient–physician e-mail messages were collected over 11 months as part of a randomized, controlled trial of a triage-based e-mail system in two primary care centers (including 98 physicians); 10% of messages were randomly selected for review. Messages were coded across such domains as message type, number of requests per e-mail, inclusion of sensitive content, necessity of a physician response, and message tone. Results: The majority (82.8%) of messages addressed a single issue. The most common message types included information updates to the physicians (41.4%), prescription renewals (24.2%), health questions (13.2%), questions about test results (10.9%), referrals (8.8%), “other” (including thank yous, apologies) (8.8%), appointments (5.4%), requests for non-health-related information (4.8%), and billing questions (0.3%). Overall, messages were concise, formal, and medically relevant. Very few (5.1%) included sensitive content, and none included urgent messages. Less than half (43.2%) required a physician response. Conclusion: A triage-based e-mail system promoted e-mail exchanges appropriate for primary care. Most patients adhered to guidelines aimed at focusing content, limiting the number of requests per message, and avoiding urgent requests or highly sensitive content. Thus, physicians' concerns about the content of patients' e-mails may be unwarranted. PMID:15064295

  9. How anonymous is 'anonymous'? Some suggestions towards a coherent universal coding system for genetic samples.

    PubMed

    Schmidt, Harald; Callier, Shawneequa

    2012-05-01

    So-called 'anonymous' tissue samples are widely used in research. Because they lack externally identifying information, they are viewed as useful in reconciling conflicts between the control, privacy and confidentiality interests of those from whom the samples originated and the public (or commercial) interest in carrying out research, as reflected in 'consent or anonymise' policies. High level guidance documents suggest that withdrawal of consent and samples and the provision of feedback are impossible in the case of anonymous samples. In view of recent developments in science and consumer-driven genomics the authors argue that such statements are misleading and only muddle complex ethical questions about possible entitlements to control over samples. The authors therefore propose that terms such as 'anonymised', 'anonymous' or 'non-identifiable' be removed entirely from documents describing research samples, especially from those aimed at the public. This is necessary as a matter of conceptual clarity and because failure to do so may jeopardise public trust in the governance of large scale databases. As there is wide variation in the taxonomy for tissue samples and no uniform national or international standards, the authors propose that a numeral-based universal coding system be implemented that focuses on specifying incremental levels of identifiability, rather than use terms that imply that the reidentification of research samples and associated actions are categorically impossible.

  10. Low Power LDPC Code Decoder Architecture Based on Intermediate Message Compression Technique

    NASA Astrophysics Data System (ADS)

    Shimizu, Kazunori; Togawa, Nozomu; Ikenaga, Takeshi; Goto, Satoshi

    Reducing the power dissipation for LDPC code decoder is a major challenging task to apply it to the practical digital communication systems. In this paper, we propose a low power LDPC code decoder architecture based on an intermediate message-compression technique which features as follows: (i) An intermediate message compression technique enables the decoder to reduce the required memory capacity and write power dissipation. (ii) A clock gated shift register based intermediate message memory architecture enables the decoder to decompress the compressed messages in a single clock cycle while reducing the read power dissipation. The combination of the above two techniques enables the decoder to reduce the power dissipation while keeping the decoding throughput. The simulation results show that the proposed architecture improves the power efficiency up to 52% and 18% compared to that of the decoder based on the overlapped schedule and the rapid convergence schedule without the proposed techniques respectively.

  11. CERN alerter—RSS based system for information broadcast to all CERN offices

    NASA Astrophysics Data System (ADS)

    Otto, R.

    2008-07-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM_quotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system.

  12. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  13. Swarm autonomic agents with self-destruct capability

    NASA Technical Reports Server (NTRS)

    Hinchey, Michael G. (Inventor); Sterritt, Roy (Inventor)

    2009-01-01

    Systems, methods and apparatus are provided through which in some embodiments an autonomic entity manages a system by generating one or more stay alive signals based on the functioning status and operating state of the system. In some embodiments, an evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy. The evolvable neural interface receives and generates heartbeat monitor signals and pulse monitor signals that are used to generate a stay alive signal that is used to manage the operations of the synthetic neural system. In another embodiment an asynchronous Alice signal (Autonomic license) requiring valid credentials of an anonymous autonomous agent is initiated. An unsatisfactory Alice exchange may lead to self-destruction of the anonymous autonomous agent for self-protection.

  14. Swarm autonomic agents with self-destruct capability

    NASA Technical Reports Server (NTRS)

    Hinchey, Michael G. (Inventor); Sterritt, Roy (Inventor)

    2011-01-01

    Systems, methods and apparatus are provided through which in some embodiments an autonomic entity manages a system by generating one or more stay alive signals based on the functioning status and operating state of the system. In some embodiments, an evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy. The evolvable neural interface receives and generates heartbeat monitor signals and pulse monitor signals that are used to generate a stay alive signal that is used to manage the operations of the synthetic neural system. In another embodiment an asynchronous Alice signal (Autonomic license) requiring valid credentials of an anonymous autonomous agent is initiated. An unsatisfactory Alice exchange may lead to self-destruction of the anonymous autonomous agent for self-protection.

  15. New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm

    NASA Astrophysics Data System (ADS)

    Hoomod, Haider K.; Radi, A. M.

    2018-05-01

    The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.

  16. Subtlenoise: sonification of distributed computing operations

    NASA Astrophysics Data System (ADS)

    Love, P. A.

    2015-12-01

    The operation of distributed computing systems requires comprehensive monitoring to ensure reliability and robustness. There are two components found in most monitoring systems: one being visually rich time-series graphs and another being notification systems for alerting operators under certain pre-defined conditions. In this paper the sonification of monitoring messages is explored using an architecture that fits easily within existing infrastructures based on mature opensource technologies such as ZeroMQ, Logstash, and Supercollider (a synth engine). Message attributes are mapped onto audio attributes based on broad classification of the message (continuous or discrete metrics) but keeping the audio stream subtle in nature. The benefits of audio rendering are described in the context of distributed computing operations and may provide a less intrusive way to understand the operational health of these systems.

  17. Anonymity and Historical-Anonymity in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  18. Development of an online morbidity, mortality, and near-miss reporting system to identify patterns of adverse events in surgical patients.

    PubMed

    Bilimoria, Karl Y; Kmiecik, Thomas E; DaRosa, Debra A; Halverson, Amy; Eskandari, Mark K; Bell, Richard H; Soper, Nathaniel J; Wayne, Jeffrey D

    2009-04-01

    To design a Web-based system to track adverse and near-miss events, to establish an automated method to identify patterns of events, and to assess the adverse event reporting behavior of physicians. A Web-based system was designed to collect physician-reported adverse events including weekly Morbidity and Mortality (M&M) entries and anonymous adverse/near-miss events. An automated system was set up to help identify event patterns. Adverse event frequency was compared with hospital databases to assess reporting completeness. A metropolitan tertiary care center. Identification of adverse event patterns and completeness of reporting. From September 2005 to August 2007, 15,524 surgical patients were reported including 957 (6.2%) adverse events and 34 (0.2%) anonymous reports. The automated pattern recognition system helped identify 4 event patterns from M&M reports and 3 patterns from anonymous/near-miss reporting. After multidisciplinary meetings and expert reviews, the patterns were addressed with educational initiatives, correction of systems issues, and/or intensive quality monitoring. Only 25% of complications and 42% of inpatient deaths were reported. A total of 75.2% of adverse events resulting in permanent disability or death were attributed to the nature of the disease. Interventions to improve reporting were largely unsuccessful. We have developed a user-friendly Web-based system to track complications and identify patterns of adverse events. Underreporting of adverse events and attributing the complication to the nature of the disease represent a problem in reporting culture among surgeons at our institution. Similar systems should be used by surgery departments, particularly those affiliated with teaching hospitals, to identify quality improvement opportunities.

  19. Preference for Anonymous Classroom Participation: Linking Student Characteristics and Reactions to Electronic Response Systems

    ERIC Educational Resources Information Center

    Latham, Alyson; Hill, N. Sharon

    2014-01-01

    Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…

  20. A data recipient centered de-identification method to retain statistical attributes.

    PubMed

    Gal, Tamas S; Tucker, Thomas C; Gangopadhyay, Aryya; Chen, Zhiyuan

    2014-08-01

    Privacy has always been a great concern of patients and medical service providers. As a result of the recent advances in information technology and the government's push for the use of Electronic Health Record (EHR) systems, a large amount of medical data is collected and stored electronically. This data needs to be made available for analysis but at the same time patient privacy has to be protected through de-identification. Although biomedical researchers often describe their research plans when they request anonymized data, most existing anonymization methods do not use this information when de-identifying the data. As a result, the anonymized data may not be useful for the planned research project. This paper proposes a data recipient centered approach to tailor the de-identification method based on input from the recipient of the data. We demonstrate our approach through an anonymization project for biomedical researchers with specific goals to improve the utility of the anonymized data for statistical models used for their research project. The selected algorithm improves a privacy protection method called Condensation by Aggarwal et al. Our methods were tested and validated on real cancer surveillance data provided by the Kentucky Cancer Registry. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. An expert system shell for inferring vegetation characteristics: Prototype help system (Task 1)

    NASA Technical Reports Server (NTRS)

    1993-01-01

    The NASA Vegetation Workbench (VEG) is a knowledge based system that infers vegetation characteristics from reflectance data. A prototype of the VEG subgoal HELP.SYSTEM has been completed and the Help System has been added to the VEG system. It is loaded when the user first clicks on the HELP.SYSTEM option in the Tool Box Menu. The Help System provides a user tool to support needed user information. It also provides interactive tools the scientist may use to develop new help messages and to modify existing help messages that are attached to VEG screens. The system automatically manages system and file operations needed to preserve new or modified help messages. The Help System was tested both as a help system development and a help system user tool.

  2. Mobile Learning Environment with Short Messaging Service: Application to a Campus Environment in a Developing Country

    ERIC Educational Resources Information Center

    Premadasa, H. K. Salinda; Meegama, R. Gayan N.

    2013-01-01

    Purpose: The purpose of this paper is to discuss how to integrate secure, open-source and mobile-based system with the Moodle learning management system (MLMS) then describe the implementation of a campus-wide mobile learning environment with short messaging system (SMS) and how this platform is incorporated with the student's learning…

  3. Effectiveness of a Mobile Short-Message-Service–Based Disease Outbreak Alert System in Kenya

    PubMed Central

    Njeru, Ian; Zurovac, Dejan; Tipo, Shikanga O; Kareko, David; Mwau, Matilu; Morita, Kouichi

    2016-01-01

    We conducted a randomized, controlled trial to test the effectiveness of a text-messaging system used for notification of disease outbreaks in Kenya. Health facilities that used the system had more timely notifications than those that did not (19.2% vs. 2.6%), indicating that technology can enhance disease surveillance in resource-limited settings. PMID:26981628

  4. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  5. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  6. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  7. A quality improvement project to tackle under-reporting of hazards by doctors by using an anonymous telephone hotline.

    PubMed

    Johnson, Sarah

    2016-01-01

    An anonymous hazard reporting hotline was established for doctors to use on two general medical wards at Weston General Hospital (WGH) in North Somerset in England during an eight day period in July/August 2014. Doctors were encouraged to report hazards and near misses or just start a conversation about a concern. The existing computer based significant event system remained alongside the hotline and was to be used where actual harm had come to a patient. A team of consultants and quality improvement administrators monitored the hotline on a daily basis, categorized the level of risk being reported and ensured, where possible, that action was taken to address the doctors' concerns. The hotline increased reporting rates from two per month to 25 in eight days. The system identified 13 amber (medium risk) and five red (high risk) hazards which would otherwise not have been known about. This author believes these five high risk reports alone make the case for a new, quicker, easier, and anonymous reporting system for doctors at WGH urgent and irrefutable.

  8. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women

    PubMed Central

    Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-01-01

    Background Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. Objective This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). Methods This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled “Fat Girl Tinder Date” and “Fat Guy Tinder Date.” The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. Results First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Conclusions Our data elucidate a worrying situation of frequent disinhibited aggressive messages against overweight individuals online. Importantly, the patterns of verbal aggression differ depending on the gender of the targeted overweight individuals. Thus, gender-tailored intervention strategies that specifically tackle Internet users’ verbal aggression against overweight individuals need to be developed. PMID:29559426

  9. Lecture Rule No. 1: Cell Phones ON, Please! A Low-Cost Personal Response System for Learning and Teaching

    ERIC Educational Resources Information Center

    Lee, Albert W. M.; Ng, Joseph K. Y.; Wong, Eva Y. W.; Tan, Alfred; Lau, April K. Y.; Lai, Stephen F. Y.

    2013-01-01

    phone, that can be used to replace the "clicker" as a personal response device. Our mobile phone-based response system (iQlickers) collects and analyzes the answers or opinions sent in by the students as SMS (short message service) messages. The statistic of the…

  10. Increasing the Operational Value of Event Messages

    NASA Technical Reports Server (NTRS)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  11. A Novel Free Flap Monitoring System Using Tissue Oximetry with Text Message Alerts.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Lin, Samuel J; Tobias, Adam M; Taghinia, Amir H; Lee, Bernard T

    2016-06-01

    Background The time to detection of vascular compromise is a significant predictor of free flap salvage outcomes as early reexploration improves salvage rates. Continuous transcutaneous near-infrared tissue oximetry is an objective, quantitative method of detecting flap vascular compromise and has been shown to allow earlier reexploration and higher salvage rates than clinical assessment alone. We designed a novel text messaging system to improve communication using tissue oximetry monitoring. Methods A retrospective review was performed of a prospectively collected database of all microsurgical breast reconstructions from 2008 to 2015. A novel text messaging system was introduced in 2013 and programmed to send text messages alert when the tissue oximetry readings suggested potential flap compromise based on established thresholds. Patient demographics and complications, including rate of reexploration and flap loss were assessed. Results There were 900 autologous microsurgical breast free flaps during the study period: 614 were monitored with standard clinical monitoring and tissue oximetry compared with 286 flaps with the additional text messaging system. There were 27 unplanned returns to the operating room in the tissue oximetry group and 5 in the text messaging group with 1 complete flap loss in each group. Reexploration occurred sooner as a result of these text message alerts (17.5 vs. 26.6 hours postoperatively), however, it did not achieve statistical significance. Conclusions We were able to demonstrate the use of a novel text messaging system for tissue oximetry. This alert system shows promise in identifying impending flap loss with rapid notification of the surgical team. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  12. An Envelope Based Feedback Control System for Earthquake Early Warning: Reality Check Algorithm

    NASA Astrophysics Data System (ADS)

    Heaton, T. H.; Karakus, G.; Beck, J. L.

    2016-12-01

    Earthquake early warning systems are, in general, designed to be open loop control systems in such a way that the output, i.e., the warning messages, only depend on the input, i.e., recorded ground motions, up to the moment when the message is issued in real-time. We propose an algorithm, which is called Reality Check Algorithm (RCA), which would assess the accuracy of issued warning messages, and then feed the outcome of the assessment back into the system. Then, the system would modify its messages if necessary. That is, we are proposing to convert earthquake early warning systems into feedback control systems by integrating them with RCA. RCA works by continuously monitoring and comparing the observed ground motions' envelopes to the predicted envelopes of Virtual Seismologist (Cua 2005). Accuracy of magnitude and location (both spatial and temporal) estimations of the system are assessed separately by probabilistic classification models, which are trained by a Sparse Bayesian Learning technique called Automatic Relevance Determination prior.

  13. Anon-Pass: Practical Anonymous Subscriptions

    PubMed Central

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  14. Development and Testing of an Automated 4-Day Text Messaging Guidance as an Aid for Improving Colonoscopy Preparation.

    PubMed

    Walter, Benjamin Michael; Klare, Peter; Neu, Bruno; Schmid, Roland M; von Delius, Stefan

    2016-06-21

    In gastroenterology a sufficient colon cleansing improves adenoma detection rate and prevents the need for preterm repeat colonoscopies due to invalid preparation. It has been shown that patient education is of major importance for improvement of colon cleansing. Objective of this study was to assess the function of an automated text messaging (short message service, SMS)-supported colonoscopy preparation starting 4 days before colonoscopy appointment. After preevaluation to assess mobile phone usage in the patient population for relevance of this approach, a Web-based, automated SMS text messaging system was developed, following which a single-center feasibility study at a tertiary care center was performed. Patients scheduled for outpatient colonoscopy were invited to participate. Patients enrolled in the study group received automated information about dietary recommendations and bowel cleansing during colonoscopy preparation. Data of outpatient colonoscopies with regular preparation procedure were used for pair matching and served as control. Primary end point was feasibility of SMS text messaging support in colonoscopy preparation assessed as stable and satisfactory function of the system. Secondary end points were quality of bowel preparation according to the Boston Bowel Preparation Scale (BBPS) and patient satisfaction with SMS text messaging-provided information assessed by a questionnaire. Web-based SMS text messaging-supported colonoscopy preparation was successful and feasible in 19 of 20 patients. Mean (standard error of the mean, SEM) total BBPS score was slightly higher in the SMS group than in the control group (7.3, SEM 0.3 vs 6.4, SEM 0.2) and for each colonic region (left, transverse, and right colon). Patient satisfaction regarding SMS text messaging-based information was high. Using SMS for colonoscopy preparation with 4 days' guidance including dietary recommendation is a new approach to improve colonoscopy preparation. Quality of colonoscopy preparation was sufficient and patients were highly satisfied with the system during colonoscopy preparation.

  15. A close look at why one social norms campaign did not reduce student drinking.

    PubMed

    Thombs, Dennis L; Dotterer, Scott; Olds, R Scott; Sharp, Katherine E; Raub, Carrie Giovannone

    2004-01-01

    The authors examined 3 possible explanations for the failure of a social norms campaign at a large public university. They administered an anonymous survey to 2 random samples of undergraduate classes: a baseline assessment of 616 students before the campaign's implementation and a follow-up survey of 723 students 4 academic years later. At follow-up, 66.5% of the students were aware of the campaign, yet the survey revealed no reduction in perceived drinking norms or alcohol use in this group. An analysis of the postcampaign sample revealed that (1) a majority of the students did not find the statistics used in the campaign messages credible, (2) higher levels of alcohol use predicted lower levels of perceived campaign credibility, and (3) only 38.5% of the students understood the campaign's intended purpose. If they are to influence personally relevant drinking norms, these campaigns must undergo further development to enhance message credibility and participants' understanding.

  16. Experiences of recovery in binge-eating disorder: a qualitative approach using online message boards.

    PubMed

    Lord, Vanessa M; Reiboldt, Wendy; Gonitzke, Dariella; Parker, Emily; Peterson, Caitlin

    2018-02-01

    In this study, qualitative methods were employed to analyze secondary data from the anonymous postings of a pro-recovery website in an effort to investigate the changes in thinking of binge-eating disorder (BED) sufferers who were able to recover from the disorder, understand more fully how guilt and self-blame affect recovery, and explore the perceived motivators and challenges to recovery. 681 messages from 65 participants pertaining to BED were analyzed from January 1, 2014-January 1, 2015 through thematic analysis. Coding strategies were employed to reveal patterns within the experiences of the participants. The researchers identified three themes surrounding "changes in thinking" from analysis of the message board postings: admitting the disorder, recognizing unhealthy coping behaviors, and seeing recovery. Further analysis of postings suggested that guilt and self-blame hinder recovery by promoting a feedback cycle of binging, which leads to further guilt and self-blame. The data ultimately identified experiences that resulted in or hindered recovery. The experience of validation appeared to result in recovery; those who experienced validation were less inclined to engage in disordered eating behaviors. Conversely, weight loss or attempts at weight loss hindered recovery by ultimately promoting more disordered eating behaviors. This qualitative analysis of message board postings offers authentic, credible data with a unique perspective. Practitioners working in the field of eating disorders such as registered dietitian nutritionists or therapists might use evidence from the data to guide their practice.

  17. PRIVACYGRID: Supporting Anonymous Location Queries in Mobile Environments

    DTIC Science & Technology

    2007-01-01

    continued price reduction of location tracking de- vices, location - based services (LBSs) are widely recognized as an important feature of the future computing... location - based services can operate completely anonymously, such as “when I pass a gas station, alert me with the unit price of the gas”. Others can...Anonymous Usage of Location - Based Services Through Spatial and Tempo- ral Cloaking. In Proceedings of the International Con- ference on Mobile

  18. Message development for surface markers at the Hanford Radwaste Disposal sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kaplan, M.F.

    1984-12-31

    At the Hanford Reservation in Washington, there are sites which received liquid and solid transuranic wastes from the late 1940`s until 1970. Rockwell Hanford Operations (Rockwell) is investigating the feasibility of several options for the permanent disposal of these wastes. One option is to stabilize the wastes in their present locations and to add barriers to minimize water infiltration and root penetration into the wastes. This report forms part of the project to develop a marking system for transuranic wastes on the Hanford Reservation. The focus of this report is the development of the message system to appear on themore » surface markers. A logical framework is developed to deduce what is required by the message system. Alternatives for each message component are evaluated and justification is provided for the choice of each component. The components are then laid out on the surface marker to provide a legible, comprehensible message system. The surface markers are tall, standing monoliths which ring the perimeter of each disposal area. Based on the logical framework, it is recommended that three domains of representation -- symbols, pictures, and language -- be used in the message system. The warning symbol chosen for the message system is the radiation trefoil. Two other options were considered, including the warning symbol developed by the Human Interference Task Force for a high-level waste repository. The trefoil was preferred because of the widespread usage and international acceptance which is already enjoys.« less

  19. Evaluating user experiences of the secure messaging tool on the Veterans Affairs' patient portal system.

    PubMed

    Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-03-06

    The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users' experiences in a representative sample to validate qualitative findings.

  20. Anxiety in voluntary HIV-antibody testing in pregnancy and its implications for preventive strategies.

    PubMed

    Foldspang, A; Hedegaard, M

    1991-06-01

    During a three-month period in 1989, 820 pregnant women attending the antenatal clinic of the Aarhus University Hospital, Denmark, were offered a HIV-antibody test and asked to fill out an anonymous questionnaire about attitudes to HIV-antibody testing; 779 (95.0%) agreed to do so. One hundred and fifty-six women (20.0% of the participants) had been tested on a previous occasion, and 629 (80.7%) accepted the present offer to be tested. The most prevalent reasons to decline testing were indifference to the epidemic (45.3% of those declining), refusal of (further) blood testing (34.7%) and fear of being infected (16.7%). Women who consented to be tested most often expressed fear of being infected (21.8%). Fear of registration worried less than 5% of study group members; only 1% declined to be tested because of such worry. The pattern of worries expressed by the pregnant women is interpreted as one of anxiety and, in part at least, perplexity as concerns how to take rational consequences of public messages about the HIV epidemic. It is suggested that future surveillance be based primarily on voluntary testing and, whenever needed and possible, supplied with anonymous unlinked testing of existing blood samples from groups and persons declining to be tested. Such surveillance strategies should be supported in individual patient contacts and public health educational campaigns underscoring the risk of heterosexual transmission of HIV and the need for repeated HIV-antibody testing of selected groups and individuals.

  1. The impact of text message reminders on adherence to antimalarial treatment in northern Ghana: a randomized trial.

    PubMed

    Raifman, Julia R G; Lanthorn, Heather E; Rokicki, Slawa; Fink, Günther

    2014-01-01

    Low rates of adherence to artemisinin-based combination therapy (ACT) regimens increase the risk of treatment failure and may lead to drug resistance, threatening the sustainability of current anti-malarial efforts. We assessed the impact of text message reminders on adherence to ACT regimens. Health workers at hospitals, clinics, pharmacies, and other stationary ACT distributors in Tamale, Ghana provided flyers advertising free mobile health information to individuals receiving malaria treatment. The messaging system automatically randomized self-enrolled individuals to the control group or the treatment group with equal probability; those in the treatment group were further randomly assigned to receive a simple text message reminder or the simple reminder plus an additional statement about adherence in 12-hour intervals. The main outcome was self-reported adherence based on follow-up interviews occurring three days after treatment initiation. We estimated the impact of the messages on treatment completion using logistic regression. 1140 individuals enrolled in both the study and the text reminder system. Among individuals in the control group, 61.5% took the full course of treatment. The simple text message reminders increased the odds of adherence (adjusted OR 1.45, 95% CI [1.03 to 2.04], p-value 0.028). Receiving an additional message did not result in a significant change in adherence (adjusted OR 0.77, 95% CI [0.50 to 1.20], p-value 0.252). The results of this study suggest that a simple text message reminder can increase adherence to antimalarial treatment and that additional information included in messages does not have a significant impact on completion of ACT treatment. Further research is needed to develop the most effective text message content and frequency. ClinicalTrials.gov NCT01722734.

  2. Intelligent Traffic Quantification System

    NASA Astrophysics Data System (ADS)

    Mohanty, Anita; Bhanja, Urmila; Mahapatra, Sudipta

    2017-08-01

    Currently, city traffic monitoring and controlling is a big issue in almost all cities worldwide. Vehicular ad-hoc Network (VANET) technique is an efficient tool to minimize this problem. Usually, different types of on board sensors are installed in vehicles to generate messages characterized by different vehicle parameters. In this work, an intelligent system based on fuzzy clustering technique is developed to reduce the number of individual messages by extracting important features from the messages of a vehicle. Therefore, the proposed fuzzy clustering technique reduces the traffic load of the network. The technique also reduces congestion and quantifies congestion.

  3. Collaborative Scheduling Using JMS in a Mixed Java and .NET Environment

    NASA Technical Reports Server (NTRS)

    Wang, Yeou-Fang; Wax, Allan; Lam, Ray; Baldwin, John; Borden, Chet

    2006-01-01

    A collaborative framework/environment was proto-typed to prove the feasibility of scheduling space flight missions on NASA's Deep Space Network (DSN) in a distributed fashion. In this environment, effective collaboration relies on efficient communications among all flight mission and DSN scheduling users. There-fore, messaging becomes critical to timely event notification and data synchronization. In the prototype, a rapid messaging system using Java Message Service (JMS) in a mixed Java and .NET environment is established. This scheme allows both Java and .NET applications to communicate with each other for data synchronization and schedule negotiation. The JMS approach we used is based on a centralized messaging scheme. With proper use of a high speed messaging system, all users in this collaborative framework can communicate with each other to generate a schedule collaboratively to meet DSN and projects tracking needs.

  4. Reducing errors through a web-based self-management support system.

    PubMed

    Ekstedt, Mirjam; Børøsund, Elin; Svenningsen, Ina K; Ruland, Cornelia M

    2014-01-01

    Web-based self-management support systems SMSS, can successfully assist a wide range of patients with information and self-management support. O or as a stand-alone service, are e-messages. This study describes how one component of a multi component SMSS, an e-message service, in which patients with breast cancer could direct questions to nurses, physicians or social workers at the hospital where they were being treated, had an influence on safety and continuity of care. Ninety-one dialogues consisting of 284 messages were analysed. The communications between patients and the healthcare team revealed that the e-messages service served as a means for quality assurance of information, for double-checking and for coordination of care. We give examples of how an e-mail service may improve patients' knowledge in a process of taking control over their own care - increasingly important in a time of growing complexity and specialization in healthcare. It remains to be tested whether an e-message service can improve continuity of care and prevent or mitigate medical mishaps.

  5. Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System

    PubMed Central

    Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-01-01

    Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Conclusions Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users’ experiences in a representative sample to validate qualitative findings. PMID:24610454

  6. Predictors for assessing electronic messaging between nurses and general practitioners as a useful tool for communication in home health care services: a cross-sectional study.

    PubMed

    Lyngstad, Merete; Hofoss, Dag; Grimsmo, Anders; Hellesø, Ragnhild

    2015-02-17

    Nurses providing home health care services are dependent on access to patient information and communicating with general practitioners (GPs) to deliver safe and effective health care to patients. Information and communication technology (ICT) systems are viewed as powerful tools for this purpose. In Norway, a standardized electronic messaging (e-messaging) system is currently being established in health care. The aim of this study was to explore home health care nurses' assessments of the utility of the e-messaging system for communicating with GPs and identify elements that influence the assessment of e-messaging as a useful communication tool. The data were collected using a self-developed questionnaire based on variables identified by focus group interviews with home health care nurses (n=425) who used e-messaging and existing research. Data were analyzed using logistic regression analyses. Over two-thirds (425/632, 67.2%) of the home health care nurses returned the questionnaire. A high proportion (388/399, 97.2%) of the home health care nurses who returned the questionnaire found the e-messaging system to be a useful tool for communication with GPs. The odds of reporting that e-messaging was a useful tool were over five times higher (OR 5.1, CI 2.489-10.631, P<.001) if the nurses agreed or strongly agreed that e-messaging was easy to use. The odds of finding e-messaging easy to use were nearly seven times higher (OR 6.9, CI 1.713-27.899, P=.007) if the nurses did not consider the system functionality poor. If the nurses had received training in the use of e-messaging, the odds were over six times higher (OR 6.6, CI 2.515-17.437, P<.001) that they would consider e-messaging easy to use. The odds that a home health care nurse would experience e-messaging as easy to use increased as the full-time equivalent percentage of the nurses increased (OR 1.032, CI 1.001-1.064, P=.045). This study has shown that technical (ease of use and system functionality), organizational (training), and individual (full-time equivalent percentage) elements had an impact on home health care nurses' assessments of using e-messaging to communicate with GPs. By identifying these elements, it is easier to determine which interventions are the most important for the development and implementation of ICT systems in home health care services.

  7. Predictors for Assessing Electronic Messaging Between Nurses and General Practitioners as a Useful Tool for Communication in Home Health Care Services: A Cross-Sectional Study

    PubMed Central

    Hofoss, Dag; Grimsmo, Anders; Hellesø, Ragnhild

    2015-01-01

    Background Nurses providing home health care services are dependent on access to patient information and communicating with general practitioners (GPs) to deliver safe and effective health care to patients. Information and communication technology (ICT) systems are viewed as powerful tools for this purpose. In Norway, a standardized electronic messaging (e-messaging) system is currently being established in health care. Objective The aim of this study was to explore home health care nurses’ assessments of the utility of the e-messaging system for communicating with GPs and identify elements that influence the assessment of e-messaging as a useful communication tool. Methods The data were collected using a self-developed questionnaire based on variables identified by focus group interviews with home health care nurses (n=425) who used e-messaging and existing research. Data were analyzed using logistic regression analyses. Results Over two-thirds (425/632, 67.2%) of the home health care nurses returned the questionnaire. A high proportion (388/399, 97.2%) of the home health care nurses who returned the questionnaire found the e-messaging system to be a useful tool for communication with GPs. The odds of reporting that e-messaging was a useful tool were over five times higher (OR 5.1, CI 2.489-10.631, P<.001) if the nurses agreed or strongly agreed that e-messaging was easy to use. The odds of finding e-messaging easy to use were nearly seven times higher (OR 6.9, CI 1.713-27.899, P=.007) if the nurses did not consider the system functionality poor. If the nurses had received training in the use of e-messaging, the odds were over six times higher (OR 6.6, CI 2.515-17.437, P<.001) that they would consider e-messaging easy to use. The odds that a home health care nurse would experience e-messaging as easy to use increased as the full-time equivalent percentage of the nurses increased (OR 1.032, CI 1.001-1.064, P=.045). Conclusions This study has shown that technical (ease of use and system functionality), organizational (training), and individual (full-time equivalent percentage) elements had an impact on home health care nurses’ assessments of using e-messaging to communicate with GPs. By identifying these elements, it is easier to determine which interventions are the most important for the development and implementation of ICT systems in home health care services. PMID:25691234

  8. Layered virus protection for the operations and administrative messaging system

    NASA Technical Reports Server (NTRS)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  9. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care.

    PubMed

    Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.

  10. "Please Don't Send Us Spam!" A Participative, Theory-Based Methodology for Developing an mHealth Intervention.

    PubMed

    Toefy, Yoesrie; Skinner, Donald; Thomsen, Sarah

    2016-08-17

    Mobile health solutions have the potential of reducing burdens on health systems and empowering patients with important information. However, there is a lack of theory-based mHealth interventions. The purpose of our study was to develop a participative, theory-based, mobile phone, audio messaging intervention attractive to recently circumcised men at voluntary medical male circumcision (VMMC) clinics in the Cape Town area in South Africa. We aimed to shift some of the tasks related to postoperative counselling on wound management and goal setting on safe sex. We place an emphasis on describing the full method of message generation to allow for replication. We developed an mHealth intervention using a staggered qualitative methodology: (1) focus group discussions with 52 recently circumcised men and their partners to develop initial voice messages they felt were relevant and appropriate, (2) thematic analysis and expert consultation to select the final messages for pilot testing, and (3) cognitive interviews with 12 recent VMMC patients to judge message comprehension and rank the messages. Message content and phasing were guided by the theory of planned behavior and the health action process approach. Patients and their partners came up with 245 messages they thought would help men during the wound-healing period. Thematic analysis revealed 42 different themes. Expert review and cognitive interviews with more patients resulted in 42 messages with a clear division in terms of needs and expectations between the initial wound-healing recovery phase (weeks 1-3) and the adjustment phase (weeks 4-6). Discussions with patients also revealed potential barriers to voice messaging, such as lack of technical knowledge of mobile phones and concerns about the invasive nature of the intervention. Patients' own suggested messages confirmed Ajzen's theory of planned behavior that if a health promotion intervention can build trust and be relevant to the recipient's needs in the first contacts, then the same recipients will perceive subsequent motivational messages more favorably. The health action process approach was also a useful tool for guiding the phasing of the messages. Participants were more positive and salutogenic than public health experts. The system showed how a process of consultation can work with a set of potential recipients of an mHealth service to ensure that their needs are included. Classic behavioral theories can and should be used to design modern mHealth interventions. We also believe that patients are the best source of messaging, ensuring that messages are culturally relevant and interesting to the recipient.

  11. Preliminary data suggest rates of male military sexual trauma may be higher than previously reported.

    PubMed

    Sheppard, Sean C; Hickling, Edward J; Earleywine, Mitch; Hoyt, Tim; Russo, Amanda R; Donati, Matthew R; Kip, Kevin E

    2015-11-01

    Stigma associated with disclosing military sexual trauma (MST) makes estimating an accurate base rate difficult. Anonymous assessment may help alleviate stigma. Although anonymous research has found higher rates of male MST, no study has evaluated whether providing anonymity sufficiently mitigates the impact of stigma on accurate reporting. This study used the unmatched count technique (UCT), a form of randomized response techniques, to gain information about the accuracy of base rate estimates of male MST derived via anonymous assessment of Operation Enduring Freedom (OEF)/Operation Iraqi Freedom (OIF) combat veterans. A cross-sectional convenience sample of 180 OEF/OIF male combat veterans, recruited via online websites for military populations, provided data about history of MST via traditional anonymous self-report and the UCT. The UCT revealed a rate of male MST more than 15 times higher than the rate derived via traditional anonymous assessment (1.1% vs. 17.2%). These data suggest that anonymity does not adequately mitigate the impact of stigma on disclosure of male MST. Results, though preliminary, suggest that published rates of male MST may substantially underestimate the true rate of this problem. The UCT has significant potential to improve base rate estimation of sensitive behaviors in the military. (c) 2015 APA, all rights reserved).

  12. Scalable and Resilient Middleware to Handle Information Exchange during Environment Crisis

    NASA Astrophysics Data System (ADS)

    Tao, R.; Poslad, S.; Moßgraber, J.; Middleton, S.; Hammitzsch, M.

    2012-04-01

    The EU FP7 TRIDEC project focuses on enabling real-time, intelligent, information management of collaborative, complex, critical decision processes for earth management. A key challenge is to promote a communication infrastructure to facilitate interoperable environment information services during environment events and crises such as tsunamis and drilling, during which increasing volumes and dimensionality of disparate information sources, including sensor-based and human-based ones, can result, and need to be managed. Such a system needs to support: scalable, distributed messaging; asynchronous messaging; open messaging to handling changing clients such as new and retired automated system and human information sources becoming online or offline; flexible data filtering, and heterogeneous access networks (e.g., GSM, WLAN and LAN). In addition, the system needs to be resilient to handle the ICT system failures, e.g. failure, degradation and overloads, during environment events. There are several system middleware choices for TRIDEC based upon a Service-oriented-architecture (SOA), Event-driven-Architecture (EDA), Cloud Computing, and Enterprise Service Bus (ESB). In an SOA, everything is a service (e.g. data access, processing and exchange); clients can request on demand or subscribe to services registered by providers; more often interaction is synchronous. In an EDA system, events that represent significant changes in state can be processed simply, or as streams or more complexly. Cloud computing is a virtualization, interoperable and elastic resource allocation model. An ESB, a fundamental component for enterprise messaging, supports synchronous and asynchronous message exchange models and has inbuilt resilience against ICT failure. Our middleware proposal is an ESB based hybrid architecture model: an SOA extension supports more synchronous workflows; EDA assists the ESB to handle more complex event processing; Cloud computing can be used to increase and decrease the ESB resources on demand. To reify this hybrid ESB centric architecture, we will adopt two complementary approaches: an open source one for scalability and resilience improvement while a commercial one can be used for ultra-speed messaging, whilst we can bridge between these two to support interoperability. In TRIDEC, to manage such a hybrid messaging system, overlay and underlay management techniques will be adopted. The managers (both global and local) will collect, store and update status information (e.g. CPU utilization, free space, number of clients) and balance the usage, throughput, and delays to improve resilience and scalability. The expected resilience improvement includes dynamic failover, self-healing, pre-emptive load balancing, and bottleneck prediction while the expected improvement for scalability includes capacity estimation, Http Bridge, and automatic configuration and reconfiguration (e.g. add or delete clients and servers).

  13. Usability Assessment of Secure Messaging for Clinical Document Sharing between Health Care Providers and Patients.

    PubMed

    Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L

    2018-04-01

     Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing.  This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents.  We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction.  Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks.  This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.

  14. 78 FR 46005 - NPDES Electronic Reporting Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ... reports, and enforcement responses is provided (i.e., electronic rather than paper-based), it does not... is proposing a regulation that would require electronic reporting for current paper-based NPDES....regulations.gov Web site is an ``anonymous access'' system, which means EPA will not know your identity or...

  15. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.

    PubMed

    Zhang, Haitao; Wu, Chenxue; Chen, Zewei; Liu, Zhao; Zhu, Yunhong

    2017-01-01

    Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules.

  16. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks

    PubMed Central

    Wu, Chenxue; Liu, Zhao; Zhu, Yunhong

    2017-01-01

    Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules. PMID:28767687

  17. It's not about pager replacement: an in-depth look at the interprofessional nature of communication in healthcare.

    PubMed

    Quan, Sherman D; Wu, Robert C; Rossos, Peter G; Arany, Teri; Groe, Silvi; Morra, Dante; Wong, Brian M; Cavalcanti, Rodrigo; Coke, William; Lau, Francis Y

    2013-03-01

    Institutions have tried to replace the use of numeric pagers for clinical communication by implementing health information technology (HIT) solutions. However, failing to account for the sociotechnical aspects of HIT or the interplay of technology with existing clinical workflow, culture, and social interactions may create other unintended consequences. To evaluate a Web-based messaging system that allows asynchronous communication between health providers and identify the unintended consequences associated with implementing such technology. Intervention-a Web-based messaging system at the University Health Network to replace numeric paging practices in May 2010. The system facilitated clinical communication on the medical wards for coordinating patient care. Study design-pre-post mixed methods utilizing both quantitative and qualitative measures. Five residents, 8 nurses, 2 pharmacists, and 2 social workers were interviewed. Pre-post interruption-15 residents from 5 clinical teams in both periods. The study compared the type of messages sent to physicians before and after implementation of the Web-based messaging system; a constant comparative analysis of semistructured interviews was used to generate key themes related to unintended consequences. Interruptions increased 233%, from 3 pages received per resident per day pre-implementation to 10 messages received per resident per day post-implementation. Key themes relating to unintended consequences that emerged from the interviews included increase in interruptions, accountability, and tactics to improve personal productivity. Meaningful improvements in clinical communication can occur but require more than just replacing pagers. Introducing HIT without addressing the sociotechnical aspects of HIT that underlie clinical communication can lead to unintended consequences. Copyright © 2013 Society of Hospital Medicine.

  18. Characterizing MPI matching via trace-based simulation

    DOE PAGES

    Ferreira, Kurt Brian; Levy, Scott Larson Nicoll; Pedretti, Kevin; ...

    2017-01-01

    With the increased scale expected on future leadership-class systems, detailed information about the resource usage and performance of MPI message matching provides important insights into how to maintain application performance on next-generation systems. However, obtaining MPI message matching performance data is often not possible without significant effort. A common approach is to instrument an MPI implementation to collect relevant statistics. While this approach can provide important data, collecting matching data at runtime perturbs the application's execution, including its matching performance, and is highly dependent on the MPI library's matchlist implementation. In this paper, we introduce a trace-based simulation approach tomore » obtain detailed MPI message matching performance data for MPI applications without perturbing their execution. Using a number of key parallel workloads, we demonstrate that this simulator approach can rapidly and accurately characterize matching behavior. Specifically, we use our simulator to collect several important statistics about the operation of the MPI posted and unexpected queues. For example, we present data about search lengths and the duration that messages spend in the queues waiting to be matched. Here, data gathered using this simulation-based approach have significant potential to aid hardware designers in determining resource allocation for MPI matching functions and provide application and middleware developers with insight into the scalability issues associated with MPI message matching.« less

  19. Using Kintsch's Discourse Comprehension Theory To Model the User's Coding of an Informative Message from an Enabling Information Retrieval System.

    ERIC Educational Resources Information Center

    Cole, Charles; Mandelblatt, Bertie

    2000-01-01

    Uses Kintsch's proposition-based construction-integration theory of discourse comprehension to detail the user coding operations that occur in each of the three subsystems (Perception, Comprehension, Application) in which users process an information retrieval systems (IRS) message. Describes an IRS device made up of two separate parts that enable…

  20. A hazard-independent approach for the standardised multi-channel dissemination of warning messages

    NASA Astrophysics Data System (ADS)

    Esbri Palomares, M. A.; Hammitzsch, M.; Lendholt, M.

    2012-04-01

    The tsunami disaster affecting the Indian Ocean region on Christmas 2004 demonstrated very clearly the shortcomings in tsunami detection, public warning processes as well as intergovernmental warning message exchange in the Indian Ocean region. In that regard, early warning systems require that the dissemination of early warning messages has to be executed in way that ensures that the message delivery is timely; the message content is understandable, usable and accurate. To that end, diverse and multiple dissemination channels must be used to increase the chance of the messages reaching all affected persons in a hazard scenario. In addition to this, usage of internationally accepted standards for the warning dissemination such as the Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) Distribution Element specified by the Organization for the Advancement of Structured Information Standards (OASIS) increase the interoperability among different warning systems enabling thus the concept of system-of-systems proposed by GEOSS. The project Distant Early Warning System (DEWS), co-funded by the European Commission under the 6th Framework Programme, aims at strengthening the early warning capacities by building an innovative generation of interoperable tsunami early warning systems based on the above mentioned concepts following a Service-oriented Architecture (SOA) approach. The project focuses on the downstream part of the hazard information processing where customized, user-tailored warning messages and alerts flow from the warning centre to the responsible authorities and/or the public with their different needs and responsibilities. The information logistics services within DEWS generate tailored EDXL-DE/CAP warning messages for each user that must receive the message according to their preferences, e.g., settings for language, interested areas, dissemination channels, etc.. However, the significant difference in the implementation and capabilities of different dissemination channels such as SMS, email and television, have bearing on the information processing required for delivery and consumption of a DEWS EDXL-DE/CAP message over each dissemination channel. These messages may include additional information in the form of maps, graphs, documents, sensor observations, etc. Therefore, the generated messages are pre-processed by channel adaptors in the information dissemination services converting it into a format that is suitable for end-to-end delivery over the dissemination channels without any semantic distortion. The approach followed by DEWS for disseminating warnings not only relies on traditional communication ways used by the already established early warnings such as the delivery of faxes and phone calls but takes into consideration the use of other broadly used communication channels such as SMS, email, narrowcast and broadcast television, instant messaging, Voice over IP, and radio. It also takes advantage of social media channels like RSS feeds, Facebook, Twitter, etc., enabling a multiplier effect, like in the case of radio and television, and thus allowing to create mash-ups by aggregating other sources of information to the original message. Finally, status information is also important in order to assess and understand whether the process of disseminating the warning to the message consumers has been successfully completed or the process failed at some point of the dissemination chain. To that end, CAP-based messages generated within the information dissemination services provide the semantics for those fields that are of interest within the context of reporting the warning dissemination status in DEWS.

  1. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    PubMed

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  2. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    PubMed

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. Location Privacy for Mobile Crowd Sensing through Population Mapping †

    PubMed Central

    Shin, Minho; Cornelius, Cory; Kapadia, Apu; Triandopoulos, Nikos; Kotz, David

    2015-01-01

    Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street or users' mobile phones to locate (Bluetooth-enabled) objects in their vicinity. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk: even if identifying information has been removed from a report, the accompanying time and location can reveal sufficient information to de-anonymize the user whose device sent the report. We propose and evaluate a novel spatiotemporal blurring mechanism based on tessellation and clustering to protect users' privacy against the system while reporting context. Our technique employs a notion of probabilistic k-anonymity; it allows users to perform local blurring of reports efficiently without an online anonymization server before the data are sent to the system. The proposed scheme can control the degree of certainty in location privacy and the quality of reports through a system parameter. We outline the architecture and security properties of our approach and evaluate our tessellation and clustering algorithm against real mobility traces. PMID:26131676

  4. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?

    PubMed

    Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex

    2018-04-01

    During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.

  5. The data acquisition system for the Anglo-Australian Observatory 2-degree field project

    NASA Technical Reports Server (NTRS)

    Shortridge, K.; Farrell, T. J.; Bailey, J.

    1992-01-01

    The Anglo-Australian Observatory (AAO) is building a system that will provide a two-degree field of view at prime focus. A robot positioner will be used to locate up to 400 optical fibers at pre-determined positions in this field. While observations are being made using one set of 400 fibers, the robot will be positioning a second set of fibers in a background field that can be moved in to replace the first when the telescope is moved to a new position. The fibers feed two spectrographs each with a 1024 square CCD detector. The software system being produced to control this involves Vaxes for overall control and data recording, UNIX workstations for fiber configuration calculations and on-line data reduction, and VME systems running VxWorks for real-time control of critical parts such as the positioner robot. The system has to be able to interact with the observatory's present data acquisition systems, which use the ADAM system. As yet, the real-time parts of ADAM have not been ported to Unix, and so we are having to produce a smaller-scale system that is similar but inherently distributed (which ADAM is not). We are using this system as a testbed for ideas that we hope may eventually influence an ADAM II system. The system we are producing is based on a message system that is designed to be able to handle inter-process and inter-processor messages of any length, efficiently, and without ever requiring a task to block (i.e., be unresponsive to 'cancel' messages, enquiry messages), other than when deliberately waiting for external input - all of which will be through such messages. The essential requirement is that a message 'send' operation should never be able to block. The messages will be hierarchical, self-defining, machine-independent data structures. This allows us to provide very simple monitoring of messages for diagnostic purposes, and allows general purpose interface programs to be written without needing to share precise byte by byte message format definitions. Programs in this system have interfaces defined simply in terms of named actions and their parameters. Real-time control programs are required to be able to handle a number of such actions concurrently; data reduction programs will normally only need to handle one action at a time ('process an image', 'display a spectrum', etc).

  6. Social Media and HIV: A Systematic Review of Uses of Social Media in HIV Communication.

    PubMed

    Taggart, Tamara; Grewe, Mary Elisabeth; Conserve, Donaldson F; Gliwa, Catherine; Roman Isler, Malika

    2015-11-02

    Social media, including mobile technologies and social networking sites, are being used increasingly as part of human immunodeficiency virus (HIV) prevention and treatment efforts. As an important avenue for communication about HIV, social media use may continue to increase and become more widespread. The objective of this paper is to present a comprehensive systematic review of the current published literature on the design, users, benefits, and limitations of using social media to communicate about HIV prevention and treatment. This review paper used a systematic approach to survey all literature published before February 2014 using 7 electronic databases and a manual search. The inclusion criteria were (1) primary focus on communication/interaction about HIV/acquired immunodeficiency syndrome (AIDS), (2) discusses the use of social media to facilitate communication, (3) communication on the social media platform is between individuals or a group of individuals rather than the use of preset, automated responses from a platform, (4) published before February 19, 2014, and (5) all study designs. The search identified 35 original research studies. Thirty studies had low or unclear risk of at least one of the bias items in the methodological quality assessment. Among the 8 social media platform types described, short message service text messaging was most commonly used. Platforms served multiple purposes including disseminating health information, conducting health promotion, sharing experiences, providing social support, and promoting medication adherence. Social media users were diverse in geographic location and race/ethnicity; studies commonly reported users aged 18-40 years and users with lower income. Although most studies did not specify whether use was anonymous, studies reported the importance of anonymity in social media use to communicate about HIV largely due to the stigma associated with HIV. The ability to share and receive information about HIV was the most commonly reported benefit of social media use and the most common challenges were related to technology. Measures of frequency of use, satisfaction, and effects of use varied across studies. Using social media to bridge communication among a diverse range of users, in various geographic and social contexts, may be leveraged through pre-existing platforms and with attention to the roles of anonymity and confidentiality in communication about HIV prevention and treatment. More robust research is needed to determine the effects of social media use on various health and social outcomes related to HIV.

  7. Documentation of Source Code.

    DTIC Science & Technology

    1988-05-12

    the "load IC" menu option. A prompt will appear in the typescript window requesting the name of the knowledge base to be loaded. Enter...highlighted and then a prompt will appear in the typescript window. The prompt will be requesting the name of the file containing the message to be read in...the file name, the system will begin reading in the message. The listified message is echoed back in the typescript window. After that, the screen

  8. Information Interaction Study for DER and DMS Interoperability

    NASA Astrophysics Data System (ADS)

    Liu, Haitao; Lu, Yiming; Lv, Guangxian; Liu, Peng; Chen, Yu; Zhang, Xinhui

    The Common Information Model (CIM) is an abstract data model that can be used to represent the major objects in Distribution Management System (DMS) applications. Because the Common Information Model (CIM) doesn't modeling the Distributed Energy Resources (DERs), it can't meet the requirements of DER operation and management for Distribution Management System (DMS) advanced applications. Modeling of DER were studied based on a system point of view, the article initially proposed a CIM extended information model. By analysis the basic structure of the message interaction between DMS and DER, a bidirectional messaging mapping method based on data exchange was proposed.

  9. Expanding Suicide Crisis Services to Text and Chat.

    PubMed

    Predmore, Zachary; Ramchand, Rajeev; Ayer, Lynsay; Kotzias, Virginia; Engel, Charles; Ebener, Patricia; Kemp, Janet E; Karras, Elizabeth; Haas, Gretchen L

    2017-07-01

    Crisis support services have historically been offered by phone-based suicide prevention hotlines, but are increasingly becoming available through alternative modalities, including Internet chat and text messaging. To better understand differences in the use of phone and chat/text services. We conducted semistructured interviews with call responders at the Veterans Crisis Line who utilize multimodal methods to respond to veterans in crisis. Responders indicated that veterans may access the chat/text service primarily for reasons that included a desire for anonymity and possible inability to use the phone. Responders were divided on whether callers and chatters presented with different issues or risk of suicide; however, they suggested that veterans frequently use chat/text to make their first contact with mental health services. We spoke with call responders, not the veterans themselves. Additionally, as this is qualitative research, applicability to other settings may be limited. While new platforms offer promise, participants also indicated that chat services can supplement phone lines, but not replace them.

  10. Fast and secure encryption-decryption method based on chaotic dynamics

    DOEpatents

    Protopopescu, Vladimir A.; Santoro, Robert T.; Tolliver, Johnny S.

    1995-01-01

    A method and system for the secure encryption of information. The method comprises the steps of dividing a message of length L into its character components; generating m chaotic iterates from m independent chaotic maps; producing an "initial" value based upon the m chaotic iterates; transforming the "initial" value to create a pseudo-random integer; repeating the steps of generating, producing and transforming until a pseudo-random integer sequence of length L is created; and encrypting the message as ciphertext based upon the pseudo random integer sequence. A system for accomplishing the invention is also provided.

  11. An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems

    PubMed Central

    Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio

    2013-01-01

    Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828

  12. Computer-supported feedback message tailoring: theory-informed adaptation of clinical audit and feedback for learning and behavior change.

    PubMed

    Landis-Lewis, Zach; Brehaut, Jamie C; Hochheiser, Harry; Douglas, Gerald P; Jacobson, Rebecca S

    2015-01-21

    Evidence shows that clinical audit and feedback can significantly improve compliance with desired practice, but it is unclear when and how it is effective. Audit and feedback is likely to be more effective when feedback messages can influence barriers to behavior change, but barriers to change differ across individual health-care providers, stemming from differences in providers' individual characteristics. The purpose of this article is to invite debate and direct research attention towards a novel audit and feedback component that could enable interventions to adapt to barriers to behavior change for individual health-care providers: computer-supported tailoring of feedback messages. We argue that, by leveraging available clinical data, theory-informed knowledge about behavior change, and the knowledge of clinical supervisors or peers who deliver feedback messages, a software application that supports feedback message tailoring could improve feedback message relevance for barriers to behavior change, thereby increasing the effectiveness of audit and feedback interventions. We describe a prototype system that supports the provision of tailored feedback messages by generating a menu of graphical and textual messages with associated descriptions of targeted barriers to behavior change. Supervisors could use the menu to select messages based on their awareness of each feedback recipient's specific barriers to behavior change. We anticipate that such a system, if designed appropriately, could guide supervisors towards giving more effective feedback for health-care providers. A foundation of evidence and knowledge in related health research domains supports the development of feedback message tailoring systems for clinical audit and feedback. Creating and evaluating computer-supported feedback tailoring tools is a promising approach to improving the effectiveness of clinical audit and feedback.

  13. NCC Simulation Model: Simulating the operations of the network control center, phase 2

    NASA Technical Reports Server (NTRS)

    Benjamin, Norman M.; Paul, Arthur S.; Gill, Tepper L.

    1992-01-01

    The simulation of the network control center (NCC) is in the second phase of development. This phase seeks to further develop the work performed in phase one. Phase one concentrated on the computer systems and interconnecting network. The focus of phase two will be the implementation of the network message dialogues and the resources controlled by the NCC. These resources are requested, initiated, monitored and analyzed via network messages. In the NCC network messages are presented in the form of packets that are routed across the network. These packets are generated, encoded, decoded and processed by the network host processors that generate and service the message traffic on the network that connects these hosts. As a result, the message traffic is used to characterize the work done by the NCC and the connected network. Phase one of the model development represented the NCC as a network of bi-directional single server queues and message generating sources. The generators represented the external segment processors. The served based queues represented the host processors. The NCC model consists of the internal and external processors which generate message traffic on the network that links these hosts. To fully realize the objective of phase two it is necessary to identify and model the processes in each internal processor. These processes live in the operating system of the internal host computers and handle tasks such as high speed message exchanging, ISN and NFE interface, event monitoring, network monitoring, and message logging. Inter process communication is achieved through the operating system facilities. The overall performance of the host is determined by its ability to service messages generated by both internal and external processors.

  14. Individualized Communications

    NASA Technical Reports Server (NTRS)

    1997-01-01

    IntelliWeb and IntelliPrint, products from MicroMass Communications, utilize C Language Integrated Production System (CLIPS), a development and delivery expert systems tool developed at Johnson Space Center. IntelliWeb delivers personalized messages by dynamically creating single web pages or entire web sites based on information provided by each website visitor. IntelliPrint is a product designed to create tailored, individualized messages via printed media. The software uses proprietary technology to generate printed messages that are personally relevant and tailored to meet each individual's needs. Intelliprint is in use in many operations including Brystol-Myers Squibb's personalized newsletter, "Living at Your Best," geared to each recipient based on a health and lifestyle survey taken earlier; and SmithKline Beecham's "Nicorette Committed Quitters Program," in which customized motivational materials support participants in their attempt to quit smoking.

  15. Interface For Fault-Tolerant Control System

    NASA Technical Reports Server (NTRS)

    Shaver, Charles; Williamson, Michael

    1989-01-01

    Interface unit and controller emulator developed for research on electronic helicopter-flight-control systems equipped with artificial intelligence. Interface unit interrupt-driven system designed to link microprocessor-based, quadruply-redundant, asynchronous, ultra-reliable, fault-tolerant control system (controller) with electronic servocontrol unit that controls set of hydraulic actuators. Receives digital feedforward messages from, and transmits digital feedback messages to, controller through differential signal lines or fiber-optic cables (thus far only differential signal lines have been used). Analog signals transmitted to and from servocontrol unit via coaxial cables.

  16. Training and Assessing Interprofessional Virtual Teams Using a Web-Based Case System.

    PubMed

    Dow, Alan W; Boling, Peter A; Lockeman, Kelly S; Mazmanian, Paul E; Feldman, Moshe; DiazGranados, Deborah; Browning, Joel; Coe, Antoinette; Selby-Penczak, Rachel; Hobgood, Sarah; Abbey, Linda; Parsons, Pamela; Delafuente, Jeffrey; Taylor, Suzanne F

    2016-01-01

    Today, clinical care is often provided by interprofessional virtual teams-groups of practitioners who work asynchronously and use technology to communicate. Members of such teams must be competent in interprofessional practice and the use of information technology, two targets for health professions education reform. The authors created a Web-based case system to teach and assess these competencies in health professions students. They created a four-module, six-week geriatric learning experience using a Web-based case system. Health professions students were divided into interprofessional virtual teams. Team members received profession-specific information, entered a summary of this information into the case system's electronic health record, answered knowledge questions about the case individually, then collaborated asynchronously to answer the same questions as a team. Individual and team knowledge scores and case activity measures--number of logins, message board posts/replies, views of message board posts--were tracked. During academic year 2012-2013, 80 teams composed of 522 students from medicine, nursing, pharmacy, and social work participated. Knowledge scores varied by profession and within professions. Team scores were higher than individual scores (P < .001). Students and teams with higher knowledge scores had higher case activity measures. Team score was most highly correlated with number of message board posts/replies and was not correlated with number of views of message board posts. This Web-based case system provided a novel approach to teach and assess the competencies needed for virtual teams. This approach may be a valuable new tool for measuring competency in interprofessional practice.

  17. Anonymity in Classroom Voting and Debating

    ERIC Educational Resources Information Center

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  18. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care

    PubMed Central

    Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    Objectives To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. Methods This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Results Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. Conclusions This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies. PMID:26893947

  19. Software Architecture Evolution

    DTIC Science & Technology

    2013-12-01

    system’s major components occurring via a Java Message Service message bus [69]. This architecture was designed to promote loose coupling of soft- ware...play reconfiguration of the system. The components were Java -based and platform-independent; the interfaces by which they communicated were based on...The MPCS database, a MySQL database used for storing telemetry as well as some other information, such as logs and commanding data [68]. This

  20. Message-adjusted network (MAN) hypothesis in gastro-entero-pancreatic (GEP) endocrine system.

    PubMed

    Aykan, N Faruk

    2007-01-01

    Several types of communication coordinate body functions to maintain homeostasis. Clarifying intercellular communication systems is as important as intracellular signal mechanisms. In this study, we propose an intercellular network model to establish novel targets in GEP-endocrine system, based on up-to-date information from medical publications. As materials, two physiologic events which are Pavlov's sham-feeding assay and bicarbonate secretion into the duodenum from pancreas were explored by new biologic data from the literature. Major key words used in Pub-Med were modes of regulations (autocrine, paracrine, endocrine, neurocrine, juxtacrine, lumencrine), GEP cells, hormones, peptides and neuro-transmitters. In these two examples of physiologic events, we can design a model of network to clarify transmission of a message. When we take a simple, unique message, we can observe a complete intercellular network. In our examples, these messages are "food is coming" and "hydrogen ions are increasing" in human language (humanese). We need to find molecular counterparts of these unique messages in cell language (cellese). In this network (message-adjusted network; MAN), message is an input which can affect the physiologic equilibrium, mission is an output to improve the disequilibrium and aim is always maintenance of homeostasis. If we orientate to a transmission of a unique message we can distinguish that different cells use different chemical messengers in different modes of regulations to transmit the same message. This study also supports Shannon's information theory and cell language theories such as von Neumann-Patte principles. After human genome project (HU-GO) and protein organisations (HU-PO), finding true messages and the establishment of their networks (in our model HU-MAN project) can be a novel and exciting field in cell biology. We established an intercellular network model to understand intercellular communication in the physiology of GEP endocrine system. This model could help to explain complex physiologic events as well as to generate new treatment concepts.

  1. Securizing data linkage in french public statistics.

    PubMed

    Guesdon, Maxence; Benzenine, Eric; Gadouche, Kamel; Quantin, Catherine

    2016-10-06

    Administrative records in France, especially medical and social records, have huge potential for statistical studies. The NIR (a national identifier) is widely used in medico-social administrations, and this would theoretically provide considerable scope for data matching, on condition that the legislation on such matters was respected.The law, however, forbids the processing of non-anonymized medical data, thus making it difficult to carry out studies that require several sources of social and medical data.We would like to benefit from computer techniques introduced since the 70 s to provide safe linkage of anonymized files, to release the current constraints of such procedures.We propose an organization and a data workflow, based on hashing and cyrptographic techniques, to strongly compartmentalize identifying and not-identifying data.The proposed method offers a strong control over who is in possession of which information, using different hashing keys for each linkage. This allows to prevent unauthorized linkage of data, to protect anonymity, by preventing cumulation of not-identifying data which can become identifying data when linked.Our proposal would make it possible to conduct such studies more easily, more regularly and more precisely while preserving a high enough level of anonymity.The main obstacle to setting up such a system, in our opinion, is not technical, but rather organizational in that it is based on the existence of a Key-Management Authority.

  2. Design Considerations in Development of a Mobile Health Intervention Program: The TEXT ME and TEXTMEDS Experience

    PubMed Central

    Thakkar, Jay; Barry, Tony; Thiagalingam, Aravinda; Redfern, Julie; McEwan, Alistair L; Rodgers, Anthony

    2016-01-01

    Background Mobile health (mHealth) has huge potential to deliver preventative health services. However, there is paucity of literature on theoretical constructs, technical, practical, and regulatory considerations that enable delivery of such services. Objectives The objective of this study was to outline the key considerations in the development of a text message-based mHealth program; thus providing broad recommendations and guidance to future researchers designing similar programs. Methods We describe the key considerations in designing the intervention with respect to functionality, technical infrastructure, data management, software components, regulatory requirements, and operationalization. We also illustrate some of the potential issues and decision points utilizing our experience of developing text message (short message service, SMS) management systems to support 2 large randomized controlled trials: TEXT messages to improve MEDication adherence & Secondary prevention (TEXTMEDS) and Tobacco, EXercise and dieT MEssages (TEXT ME). Results The steps identified in the development process were: (1) background research and development of the text message bank based on scientific evidence and disease-specific guidelines, (2) pilot testing with target audience and incorporating feedback, (3) software-hardware customization to enable delivery of complex personalized programs using prespecified algorithms, and (4) legal and regulatory considerations. Additional considerations in developing text message management systems include: balancing the use of customized versus preexisting software systems, the level of automation versus need for human inputs, monitoring, ensuring data security, interface flexibility, and the ability for upscaling. Conclusions A merging of expertise in clinical and behavioral sciences, health and research data management systems, software engineering, and mobile phone regulatory requirements is essential to develop a platform to deliver and manage support programs to hundreds of participants simultaneously as in TEXT ME and TEXTMEDS trials. This research provides broad principles that may assist other researchers in developing mHealth programs. PMID:27847350

  3. Design Considerations in Development of a Mobile Health Intervention Program: The TEXT ME and TEXTMEDS Experience.

    PubMed

    Thakkar, Jay; Barry, Tony; Thiagalingam, Aravinda; Redfern, Julie; McEwan, Alistair L; Rodgers, Anthony; Chow, Clara K

    2016-11-15

    Mobile health (mHealth) has huge potential to deliver preventative health services. However, there is paucity of literature on theoretical constructs, technical, practical, and regulatory considerations that enable delivery of such services. The objective of this study was to outline the key considerations in the development of a text message-based mHealth program; thus providing broad recommendations and guidance to future researchers designing similar programs. We describe the key considerations in designing the intervention with respect to functionality, technical infrastructure, data management, software components, regulatory requirements, and operationalization. We also illustrate some of the potential issues and decision points utilizing our experience of developing text message (short message service, SMS) management systems to support 2 large randomized controlled trials: TEXT messages to improve MEDication adherence & Secondary prevention (TEXTMEDS) and Tobacco, EXercise and dieT MEssages (TEXT ME). The steps identified in the development process were: (1) background research and development of the text message bank based on scientific evidence and disease-specific guidelines, (2) pilot testing with target audience and incorporating feedback, (3) software-hardware customization to enable delivery of complex personalized programs using prespecified algorithms, and (4) legal and regulatory considerations. Additional considerations in developing text message management systems include: balancing the use of customized versus preexisting software systems, the level of automation versus need for human inputs, monitoring, ensuring data security, interface flexibility, and the ability for upscaling. A merging of expertise in clinical and behavioral sciences, health and research data management systems, software engineering, and mobile phone regulatory requirements is essential to develop a platform to deliver and manage support programs to hundreds of participants simultaneously as in TEXT ME and TEXTMEDS trials. This research provides broad principles that may assist other researchers in developing mHealth programs. ©Jay Thakkar, Tony Barry, Aravinda Thiagalingam, Julie Redfern, Alistair L McEwan, Anthony Rodgers, Clara K Chow. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 15.11.2016.

  4. Public-channel cryptography based on mutual chaos pass filters.

    PubMed

    Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido

    2006-10-01

    We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.

  5. “Please Don’t Send Us Spam!” A Participative, Theory-Based Methodology for Developing an mHealth Intervention

    PubMed Central

    2016-01-01

    Background Mobile health solutions have the potential of reducing burdens on health systems and empowering patients with important information. However, there is a lack of theory-based mHealth interventions. Objective The purpose of our study was to develop a participative, theory-based, mobile phone, audio messaging intervention attractive to recently circumcised men at voluntary medical male circumcision (VMMC) clinics in the Cape Town area in South Africa. We aimed to shift some of the tasks related to postoperative counselling on wound management and goal setting on safe sex. We place an emphasis on describing the full method of message generation to allow for replication. Methods We developed an mHealth intervention using a staggered qualitative methodology: (1) focus group discussions with 52 recently circumcised men and their partners to develop initial voice messages they felt were relevant and appropriate, (2) thematic analysis and expert consultation to select the final messages for pilot testing, and (3) cognitive interviews with 12 recent VMMC patients to judge message comprehension and rank the messages. Message content and phasing were guided by the theory of planned behavior and the health action process approach. Results Patients and their partners came up with 245 messages they thought would help men during the wound-healing period. Thematic analysis revealed 42 different themes. Expert review and cognitive interviews with more patients resulted in 42 messages with a clear division in terms of needs and expectations between the initial wound-healing recovery phase (weeks 1–3) and the adjustment phase (weeks 4–6). Discussions with patients also revealed potential barriers to voice messaging, such as lack of technical knowledge of mobile phones and concerns about the invasive nature of the intervention. Patients’ own suggested messages confirmed Ajzen’s theory of planned behavior that if a health promotion intervention can build trust and be relevant to the recipient’s needs in the first contacts, then the same recipients will perceive subsequent motivational messages more favorably. The health action process approach was also a useful tool for guiding the phasing of the messages. Participants were more positive and salutogenic than public health experts. Conclusions The system showed how a process of consultation can work with a set of potential recipients of an mHealth service to ensure that their needs are included. Classic behavioral theories can and should be used to design modern mHealth interventions. We also believe that patients are the best source of messaging, ensuring that messages are culturally relevant and interesting to the recipient. PMID:27535589

  6. Reducing the anxiety of surgical patient's families access short message service.

    PubMed

    Huang, Fanpin; Liu, Shuo-Chi; Shih, Su-Mei; Tao, Yao-Hua; Wu, Jeng-Yuan; Jeng, Shaw-Yeu; Chang, Polun

    2006-01-01

    This study was to build a web-based short messaging service (SMS) system in operating room. We approached the efficiency of SMS for patient's families during the time series (pre-, intra-, and post-operation). In this study, 322 participants received 685 text messages. The findings show the usability of SMS that applied to the clinical care, especially for reducing family anxiety, improved their satisfaction. Therefore, it is suggested to exploit the effectiveness of personal medical care.

  7. Classical noise, quantum noise and secure communication

    NASA Astrophysics Data System (ADS)

    Tannous, C.; Langlois, J.

    2016-01-01

    Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.

  8. The Use of an Audience Response System in an Elementary School-Based Health Education Program

    ERIC Educational Resources Information Center

    DeSorbo, Alexandra L.; Noble, James M.; Shaffer, Michele; Gerin, William; Williams, Olajide A.

    2013-01-01

    Background: The audience response system (ARS) allows students to respond and interact anonymously with teachers via small handheld wireless keypads. Despite increasing popularity in classroom settings, the application of these devices to health education programming has not been studied. We assessed feasibility, engagement, and learning among…

  9. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.

  10. Development of a database of health insurance claims: standardization of disease classifications and anonymous record linkage.

    PubMed

    Kimura, Shinya; Sato, Toshihiko; Ikeda, Shunya; Noda, Mitsuhiko; Nakayama, Takeo

    2010-01-01

    Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for the same patient would dramatically increase the utility of these receipts. However, technical problems, including standardization of disease names and classifications, and anonymous linkage of individual receipts, must be addressed. In collaboration with health insurance societies, all information from receipts (inpatient, outpatient, and pharmacy) was collected. To standardize disease names and classifications, we developed a computer-aided post-entry standardization method using a disease name dictionary based on International Classification of Diseases (ICD)-10 classifications. We also developed an anonymous linkage system by using an encryption code generated from a combination of hash values and stream ciphers. Using different sets of the original data (data set 1: insurance certificate number, name, and sex; data set 2: insurance certificate number, date of birth, and relationship status), we compared the percentage of successful record matches obtained by using data set 1 to generate key codes with the percentage obtained when both data sets were used. The dictionary's automatic conversion of disease names successfully standardized 98.1% of approximately 2 million new receipts entered into the database. The percentage of anonymous matches was higher for the combined data sets (98.0%) than for data set 1 (88.5%). The use of standardized disease classifications and anonymous record linkage substantially contributed to the construction of a large, chronologically organized database of receipts. This database is expected to aid in epidemiologic and health services research using receipt information.

  11. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    ERIC Educational Resources Information Center

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  12. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  13. An Interactive Website to Reduce Sexual Risk Behavior: Process Evaluation of TeensTalkHealth

    PubMed Central

    Sieving, Renee E; Terveen, Loren G; Rosser, BR Simon; Kodet, Amy J; Rothberg, Vienna D

    2015-01-01

    Background Different theoretical frameworks support the use of interactive websites to promote sexual health. Although several Web-based interventions have been developed to address sexual risk taking among young people, no evaluated interventions have attempted to foster behavior change through moderated interaction among a virtual network of adolescents (who remain anonymous to one another) and health professionals. Objective The objective was to conduct a summative process evaluation of TeensTalkHealth, an interactive sexual health website designed to promote condom use and other healthy decision making in the context of romantic and sexual relationships. Methods Evaluation data were obtained from 147 adolescents who participated in a feasibility and acceptability study. Video vignettes, teen-friendly articles, and other content served as conversation catalysts between adolescents and health educators on message boards. Results Adolescents’ perceptions that the website encouraged condom use across a variety of relationship situations were very high. Almost 60% (54/92, 59%) of intervention participants completed two-thirds or more of requested tasks across the 4-month intervention. Adolescents reported high levels of comfort, perceived privacy, ease of website access and use, and perceived credibility of health educators. Potential strategies to enhance engagement and completion of intervention tasks during future implementations of TeensTalkHealth are discussed, including tailoring of content, periodic website chats with health educators and anonymous peers, and greater incorporation of features from popular social networking websites. Conclusions TeensTalkHealth is a feasible, acceptable, and promising approach to complement and enhance existing services for youth. PMID:26336157

  14. Predictable and predictive emotions: explaining cheap signals and trust re-extension

    PubMed Central

    Schniter, Eric; Sheremeta, Roman M.

    2014-01-01

    Despite normative predictions from economics and biology, unrelated strangers will often develop the trust necessary to reap gains from one-shot economic exchange opportunities. This appears to be especially true when declared intentions and emotions can be cheaply communicated. Perhaps even more puzzling to economists and biologists is the observation that anonymous and unrelated individuals, known to have breached trust, often make effective use of cheap signals, such as promises and apologies, to encourage trust re-extension. We used a pair of trust games with one-way communication and an emotion survey to investigate the role of emotions in regulating the propensity to message, apologize, re-extend trust, and demonstrate trustworthiness. This design allowed us to observe the endogenous emergence and natural distribution of trust-relevant behaviors, remedial strategies used by promise-breakers, their effects on behavior, and subsequent outcomes. We found that emotions triggered by interaction outcomes are predictable and also predict subsequent apology and trust re-extension. The role of emotions in behavioral regulation helps explain why messages are produced, when they can be trusted, and when trust will be re-extended. PMID:25477797

  15. Predictable and predictive emotions: explaining cheap signals and trust re-extension.

    PubMed

    Schniter, Eric; Sheremeta, Roman M

    2014-01-01

    Despite normative predictions from economics and biology, unrelated strangers will often develop the trust necessary to reap gains from one-shot economic exchange opportunities. This appears to be especially true when declared intentions and emotions can be cheaply communicated. Perhaps even more puzzling to economists and biologists is the observation that anonymous and unrelated individuals, known to have breached trust, often make effective use of cheap signals, such as promises and apologies, to encourage trust re-extension. We used a pair of trust games with one-way communication and an emotion survey to investigate the role of emotions in regulating the propensity to message, apologize, re-extend trust, and demonstrate trustworthiness. This design allowed us to observe the endogenous emergence and natural distribution of trust-relevant behaviors, remedial strategies used by promise-breakers, their effects on behavior, and subsequent outcomes. We found that emotions triggered by interaction outcomes are predictable and also predict subsequent apology and trust re-extension. The role of emotions in behavioral regulation helps explain why messages are produced, when they can be trusted, and when trust will be re-extended.

  16. Speech-based E-mail and driver behavior: effects of an in-vehicle message system interface.

    PubMed

    Jamson, A Hamish; Westerman, Stephen J; Hockey, G Robert J; Carsten, Oliver M J

    2004-01-01

    As mobile office technology becomes more advanced, drivers have increased opportunity to process information "on the move." Although speech-based interfaces can minimize direct interference with driving, the cognitive demands associated with such systems may still cause distraction. We studied the effects on driving performance of an in-vehicle simulated "E-mail" message system; E-mails were either system controlled or driver controlled. A high-fidelity, fixed-base driving simulator was used to test 19 participants on a car-following task. Virtual traffic scenarios varying in driving demand. Drivers compensated for the secondary task by adopting longer headways but showed reduced anticipation of braking requirements and shorter time to collision. Drivers were also less reactive when processing E-mails, demonstrated by a reduction in steering wheel inputs. In most circumstances, there were advantages in providing drivers with control over when E-mails were opened. However, during periods without E-mail interaction in demanding traffic scenarios, drivers showed reduced braking anticipation. This may be a result of increased cognitive costs associated with the decision making process when using a driver-controlled interface when the task of scheduling E-mail acceptance is added to those of driving and E-mail response. Actual or potential applications of this research include the design of speech-based in-vehicle messaging systems.

  17. Development of structural health monitoring and early warning system for reinforced concrete system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Iranata, Data, E-mail: iranata-data@yahoo.com, E-mail: data@ce.its.ac.id; Wahyuni, Endah; Murtiadi, Suryawan

    Many buildings have been damaged due to earthquakes that occurred recently in Indonesia. The main cause of the damage is the large deformation of the building structural component cannot accommodate properly. Therefore, it is necessary to develop the Structural Health Monitoring System (SHMS) to measure precisely the deformation of the building structural component in the real time conditions. This paper presents the development of SHMS for reinforced concrete structural system. This monitoring system is based on deformation component such as strain of reinforcement bar, concrete strain, and displacement of reinforced concrete component. Since the deformation component has exceeded the limitmore » value, the warning message can be sent to the building occupies. This warning message has also can be performed as early warning system of the reinforced concrete structural system. The warning message can also be sent via Short Message Service (SMS) through the Global System for Mobile Communications (GSM) network. Hence, the SHMS should be integrated with internet modem to connect with GSM network. Additionally, the SHMS program is verified with experimental study of simply supported reinforced concrete beam. Verification results show that the SHMS has good agreement with experimental results.« less

  18. Teenagers and Texting: Use of a Youth Ecological Momentary Assessment System in Trajectory Health Research With Latina Adolescents

    PubMed Central

    Hardeman, Rachel R; Kwon, Gyu; Lando-King, Elizabeth; Zhang, Lei; Genis, Therese; Brady, Sonya S; Kinder, Elizabeth

    2014-01-01

    Background Adolescent females send and receive more text messages than any others, with an average of 4050 texts a month. Despite this technological inroad among adolescents, few researchers are utilizing text messaging technology to collect real time, contextualized data. Temporal variables (ie, mood) collected regularly over a period of time could yield useful insights, particularly for evaluating health intervention outcomes. Use of text messaging technology has multiple benefits, including capacity of researchers to immediately act in response to texted information. Objective The objective of our study was to custom build a short messaging service (SMS) or text messaging assessment delivery system for use with adolescents. The Youth Ecological Momentary Assessment System (YEMAS) was developed to collect automated texted reports of daily activities, behaviors, and attitudes among adolescents, and to examine the feasibility of YEMAS. This system was created to collect and transfer real time data about individual- and social-level factors that influence physical, mental, emotional, and social well-being. Methods YEMAS is a custom designed system that interfaces with a cloud-based communication system to automate scheduled delivery of survey questions via text messaging; we designed this university-based system to meet data security and management standards. This was a two-phase study that included development of YEMAS and a feasibility pilot with Latino adolescent females. Relative homogeneity of participants was desired for the feasibility pilot study; adolescent Latina youth were sought because they represent the largest and fastest growing ethnic minority group in the United States. Females were targeted because they demonstrate the highest rate of text messaging and were expected to be interested in participating. Phase I involved development of YEMAS and Phase II involved piloting of the system with Latina adolescents. Girls were eligible to participate if they were attending one of the participating high schools and self-identified as Latina. We contacted 96 adolescents; of these, 24 returned written parental consent forms, completed assent processes, and enrolled in the study. Results YEMAS was collaboratively developed and implemented. Feasibility was established with Latina adolescents (N=24), who responded to four surveys daily for two two-week periods (four weeks total). Each survey had between 12 and 17 questions, with responses including yes/no, Likert scale, and open-ended options. Retention and compliance rates were high, with nearly 18,000 texts provided by the girls over the course of the pilot period. Conclusions Pilot results support the feasibility and value of YEMAS, an automated SMS-based text messaging data collection system positioned within a secure university environment. This approach capitalizes on immediate data transfer protocols and enables the documentation of participants’ thoughts, feelings, and behaviors in real time. Data are collected using mobile devices that are familiar to participants and nearly ubiquitous in developed countries. PMID:25098355

  19. 77 FR 65646 - Determination of Attainment for the Yuba City-Marysville Nonattainment Area for the 2006 Fine...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-30

    ...\\ from its Technical System Audit of the CARB PQAO (conducted during the summer of 2007) that the ambient... email. www.regulations.gov is an ``anonymous access'' system, and EPA will not know your identity or... PM 2.5 NAAQS based on 2009-2011 monitoring data. Preliminary data in EPA's Air Quality System (AQS...

  20. A Research Protocol to Test the Effectiveness of Text Messaging and Reminder Calls to Increase Service Use Referrals in a Community Engagement Program.

    PubMed

    Varma, Deepthi Satheesa; Hart, Mark; McIntyre, Denise Sonya; Kwiatkowski, Evan; Cottler, Linda Bauer

    2016-06-28

    Mobile phoned-based interventions have been increasingly used in clinical populations to improve health and health care delivery. The literature has shown that mobile phone-based text messages (short message service, SMS) are instantaneous, cost effective, and have less chance of being misplaced. Studies using mobile phone based-text messages have reported text messages as effective reminders that have resulted in increased appointment attendance, adherence to treatment, and better self-management. There have been no reports of adverse events when using text messaging in terms of misreading or misinterpreting data, transmitting inaccurate data, losing verbal or nonverbal communication cues, privacy issues, or failure or delay in message delivery. However, the literature has cited a need for personalized messages that are more responsive to individual needs. In addition, there has been a dearth of information on the use of reminders in nonclinical populations. The goal of this study is to assess the effectiveness of adding reminders in the form of text messaging versus reminder calls versus text messages and reminder calls to increase use of service referrals provided through community outreach. A total of 300 participants will be recruited for the study. Each participant will be randomized to one of three arms: a group that receives only reminder calls (CALLSONLY); a group that receives only text message reminders (TEXTONLY); and a group that receives both reminder calls and text messages (CALLS+TEXT). All groups will receive their reminder intervention on the 15th and 45th day after baseline when they receive medical and social service referrals from the community health workers (CHWs). A standard script will be used to administer the call and text reminders and a 15-item telephone-based satisfaction survey will be administered to assess the participant satisfaction with the process of receiving periodic reminders. The study is in the recruitment and follow-up phase. The authors anticipate completion of recruitment, interventions, and data entry by July 2016. Preliminary results are expected to be available by September 2016. This study will provide an opportunity to test the effectiveness of mobile-based interventions on nonclinical, community-recruited populations. In particular, such a protocol would increase the effectiveness of a community-based engagement program by instating a formal reminder system for all program members who receive social and/or medical service referrals during outreach in the community. Findings from this study would guide the development and implementation of reminder protocols for community-based engagement programs nationwide.

  1. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  2. Design and implementation of a near-miss reporting system at a large, academic pediatric anesthesia department.

    PubMed

    Guffey, Patrick; Szolnoki, Judit; Caldwell, James; Polaner, David

    2011-07-01

    Current incident reporting systems encourage retrospective reporting of morbidity and mortality and have low participation rates. A near miss is an event that did not cause patient harm, but had the potential to. By tracking and analyzing near misses, systems improvements can be targeted appropriately, and future errors may be prevented. An electronic, web based, secure, anonymous reporting system for anesthesiologists was designed and instituted at The Children's Hospital, Denver. This portal was compared to an existing hospital incident reporting system. A total of 150 incidents were reported in the first 3 months of operation, compared to four entered in the same time period 1 year ago. An anesthesia-specific anonymous near-miss reporting system, which eases and facilitates data entry and can prospectively identify processes and practices that place patients at risk, was implemented at a large, academic, freestanding children's hospital. This resulted in a dramatic increase in reported events and provided data to target and drive quality and process improvement. © 2011 Blackwell Publishing Ltd.

  3. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from R.E. Criss and A.M. Hofmeister

    NASA Astrophysics Data System (ADS)

    Criss, Robert E.; Hofmeister, Anne M.

    We share many of the experiences and most of the sentiments relayed by Myrl Beck in his 1 July contribution to the Eos Forum, as well as those of a similar nature expressed by Alexander McBirney in his March 2003 commentary in GSA Today. We are in fact delighted that senior scientists are speaking up about the unsatisfactory nature of anonymous reviews. However, we believe they understate the problems, partly because the situation is worsening with time. Moreover, the brunt of such problems is disproportionately felt not by emeritus professors but by young scientists, women, and minorities, and this is the crux of the issue.This year, we have, like Beck, received rejections based on comments by two anonymous reviewers and an anonymous associate editor. We have also received rejections from anonymous associate editors based on a single constructive review requesting minor revision, along with an anonymous hostile “review” that could have been written about any manuscript on any topic by any author. More common than these are rejections from identified associate editors based on one or two anonymous reviews, which more often than not err on most of the points made, and in two cases dispute work that resulted in Nobel Prizes. We have examples this year of each type where the senior authors are recent Ph.D.s, whose vulnerabilities underscore the reprehensible nature of this “process.”

  4. Development of a staff recall system for mass casualty incidents using cell phone text messaging.

    PubMed

    Epstein, Richard H; Ekbatani, Ali; Kaplan, Javier; Shechter, Ronen; Grunwald, Zvi

    2010-03-01

    After a mass casualty incident (MCI), rapid mobilization of hospital personnel is required because of an expected surge of victims. Risk assessment of our department's manual phone tree recall system revealed multiple weaknesses that would limit an effective response. Because cell phone use is widespread within the department, we developed and tested a staff recall system, based in our anesthesia information management system (AIMS), using Short Message Service (SMS) text messaging. We sent test text messages to anesthesia staff members' cell phone numbers, determined the distance from their home to the hospital, and stored this information in our AIMS. Latency testing for the time from transmission of SMS test messages from the server to return of an e-mail reply was determined at 2 different times on 2 different dates, 1 of which was a busy holiday weekend, using volunteers within the department. Two unannounced simulated disaster recall drills were conducted, with text messages sent asking for the anticipated time to return to the hospital. A timeline of available staff on site was determined. Reasons for failure to respond to the disaster notification message were tabulated. Latency data were fit by a log-normal distribution with an average of 82 seconds from message transmission to e-mail reply. Replies to the simulated disaster alert were received from approximately 50% of staff, with 16 projecting that they would have been able to be back at the hospital within 30 minutes on both dates. There would have been 21 and 23 staff in-house at 30 minutes, and 32 and 37 staff in-house at 60 minutes on the first and second test date, respectively, including in-house staff. Of the nonresponders to the alert, 48% indicated that their cell phone was not with them or was turned off, whereas 22% missed the message. Our SMS staff recall system is likely to be able to rapidly mobilize sufficient numbers of anesthesia personnel in response to an MCI, but actual performance cannot be predicted with confidence. Using our AIMS as the source for contact information and from which to send messages was simple, inexpensive, and easy to implement. Updating contact information, periodic testing, and analysis of responses to simulated disaster alerts are essential for the effective functioning of such a system. However, maintenance of alternative methods of communication is recommended, because there may be more significant message transmission delays and failures during an actual MCI, and not all staff will receive the text message in a timely fashion.

  5. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  6. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  7. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    PubMed

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  8. Results of a randomized controlled trial to assess the effects of a mobile SMS-based intervention on treatment adherence in HIV/AIDS-infected Brazilian women and impressions and satisfaction with respect to incoming messages

    PubMed Central

    da Costa, Thiago Martini; Barbosa, Bárbara Jaqueline Peres; e Costa, Durval Alex Gomes; Sigulem, Daniel; de Fátima Marin, Heimar; Filho, Adauto Castelo; Pisa, Ivan Torres

    2013-01-01

    Objective To assess whether a warning system based on mobile SMS messages increases the adherence of HIV-infected Brazilian women to antiretroviral drug-based treatment regimens and their impressions and satisfaction with respect to incoming messages. Design A randomized controlled trial was conducted from May 2009 to April 2010 with HIV-infected Brazilian women. All participants (n = 21) had a monthly multidisciplinary attendance; each participant was followed over a 4-month period, when adherence measures were obtained. Participants in the intervention group (n = 8) received SMS messages 30 min before their last scheduled time for a dose of medicine during the day. The messages were sent every Saturday and Sunday and on alternate days during the working week. Participants in the control group (n = 13) did not receive messages. Measurements Self-reported adherence, pill counting, microelectronic monitors (MEMS) and an interview about the impressions and satisfaction with respect to incoming messages. Results The HIV Alert System (HIVAS) was developed over 7 months during 2008 and 2009. After the study period, self-reported adherence indicated that 11 participants (84.62%) remained compliant in the control group (adherence exceeding 95%), whereas all 8 participants in the intervention group (100.00%) remained compliant. In contrast, the counting pills method indicated that the number of compliant participants was 5 (38.46%) for the control group and 4 (50.00%) for the intervention group. Microelectronic monitoring indicated that 6 participants in the control group (46.15%) were adherent during the entire 4-month period compared to 6 participants in the intervention group (75.00%). According to the feedback of the 8 participants who completed the research in the intervention group, along with the feedback of 3 patients who received SMS for less than 4 months, that is, did not complete the study, 9 (81.81%) believed that the SMS messages aided them in treatment adherence, and 10 (90.90%) responded that they would like to continue receiving SMS messages. SMS messaging can help Brazilian women living with HIV/AIDS to adhere to antiretroviral therapy for a period of at least 4 months. In general, the results are encouraging because the SMS messages stimulated more participants in the intervention group to be adherent to their treatment, and the patients were satisfied with the messages received, which were seen as reminders, incentives and signs of affection by the health clinic for a marginalized population. PMID:22296762

  9. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women.

    PubMed

    Jeon, Yongwoog Andrew; Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-03-20

    Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled "Fat Girl Tinder Date" and "Fat Guy Tinder Date." The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Our data elucidate a worrying situation of frequent disinhibited aggressive messages against overweight individuals online. Importantly, the patterns of verbal aggression differ depending on the gender of the targeted overweight individuals. Thus, gender-tailored intervention strategies that specifically tackle Internet users' verbal aggression against overweight individuals need to be developed. ©Yongwoog Andrew Jeon, Brent Hale, Eric Knackmuhs, Michael Mackert. Originally published in the Interactive Journal of Medical Research (http://www.i-jmr.org/), 20.03.2018.

  10. Design and Development of a Web-Based Self-Monitoring System to Support Wellness Coaching.

    PubMed

    Zarei, Reza; Kuo, Alex

    2017-01-01

    We analyzed, designed and deployed a web-based, self-monitoring system to support wellness coaching. A wellness coach can plan for clients' exercise and diet through the system and is able to monitor the changes in body dimensions and body composition that the client reports. The system can also visualize the client's data in form of graphs for both the client and the coach. Both parties can also communicate through the messaging feature embedded in the application. A reminder system is also incorporated into the system and sends reminder messages to the clients when their reporting is due. The web-based self-monitoring application uses Oracle 11g XE as the backend database and Application Express 4.2 as user interface development tool. The system allowed users to access, update and modify data through web browser anytime, anywhere, and on any device.

  11. Extensions to the Parallel Real-Time Artificial Intelligence System (PRAIS) for fault-tolerant heterogeneous cycle-stealing reasoning

    NASA Technical Reports Server (NTRS)

    Goldstein, David

    1991-01-01

    Extensions to an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS) are discussed. PRAIS strives for transparently parallelizing production (rule-based) systems, even under real-time constraints. PRAIS accomplished these goals (presented at the first annual C Language Integrated Production System (CLIPS) conference) by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors. Results using the original PRAIS architecture over a network of Sun 3's, Sun 4's and VAX's are presented. Mechanisms using the producer-consumer model to extend the architecture for fault-tolerance and distributed truth maintenance initiation are also discussed.

  12. A Struggle for Dominance: Relational Communication Messages in Television Programming.

    ERIC Educational Resources Information Center

    Barbatsis, Gretchen S.; And Others

    Television's messages about sex role behavior were analyzed by collecting and coding spot samples of the ten top ranked programs in prime viewing time and proportionate numbers of daytime soap operas and Saturday morning children's programs. The content analysis was based on a relational coding system developed to assess interpersonal…

  13. 77 FR 73386 - Approval and Promulgation of Air Quality Implementation Plans; Maryland; the 2002 Base Year...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ... Department of the Environment (MDE), on June 6, 2008 for Baltimore, Maryland. In the Final Rules section of... www.regulations.gov or email. The www.regulations.gov Web site is an ``anonymous access'' system...

  14. Rural patients' access to mobile phones and willingness to receive mobile phone-based pharmacy and other health technology services: a pilot study.

    PubMed

    Sankaranarayanan, Jayashri; Sallach, Rory E

    2014-02-01

    This pilot study explores the patient-centered demand for mobile phone-based health (mobile health [m-health]) services in the rural United States by documenting rural patients' access to mobile phones and patients' willingness to receive m-health services. An anonymous institutional review board-approved survey was completed by patients visiting two rural pharmacies in Nebraska from August to October 2011. Patients who volunteered to complete the survey provided their demographic data, disease state information, health status, mobile phone access, and willingness to receive (in terms of using and giving time to) m-health services. The majority of the 24 survey respondents were 19-40 years old (52%), female (88%), married (63%), with excellent to very good health status (63%), with no comorbidities (83%), with ≤$100 monthly medication expenses (80%), with private insurance (78%), living within 5 miles of their pharmacy (71%), and reporting that m-health services are important to them (75%; 12/16). Approximately 95%, 81%, 73%, and 55% of respondents reported access to a mobile phone, voice mails, text messaging, and mobile phone applications, respectively. Of the respondents, 65%, 57%, 52%, and 48% were willing to receive prerecorded messages for appointment reminders from the doctor, disease information, medication use/self-care information, and symptom monitoring information, respectively. In total, 70%, 63%, 61%, 54%, and 50% were willing to receive prerecorded messages from the pharmacist containing contact requests, new/refill prescription reminders, information on medication problems, reviewing/monitoring of medication use, and medication self-management/preventive screenings/immunizations, respectively. Of 44% (7/16) respondents willing to give time for m-health services, 83% were willing to give 15 min, and 17% were willing to give 30 min every month. By demonstrating rural patients' demand for m-health (including pharmacy) services, this is one of the first pilot studies showing rural patients have access to mobile phones and may be willing to use and give time to m-health services. Further research is needed on delivery and coordination of transitions in patient-centered care in the United States with m-health services.

  15. Utility-preserving anonymization for health data publishing.

    PubMed

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  16. Ethical practice in internet research involving vulnerable people: lessons from a self-harm discussion forum study (SharpTalk).

    PubMed

    Sharkey, Siobhan; Jones, Ray; Smithson, Janet; Hewis, Elaine; Emmens, Tobit; Ford, Tamsin; Owens, Christabel

    2011-12-01

    The internet is widely used for health information and support, often by vulnerable people. Internet-based research raises both familiar and new ethical problems for researchers and ethics committees. While guidelines for internet-based research are available, it is unclear to what extent ethics committees use these. Experience of gaining research ethics approval for a UK study (SharpTalk), involving internet-based discussion groups with young people who self-harm and health professionals is described. During ethical review, unsurprisingly, concerns were raised about the vulnerability of potential participants. These were dominated by the issue of anonymity, which also affected participant safety and consent. These ethical problems are discussed, and our solutions, which included: participant usernames specific to the study, a closed website, private messaging facilities, a direct contact email to researchers, information about forum rules displayed on the website, a 'report' button for participants, links to online support, and a discussion room for forum moderators. This experience with SharpTalk suggests that an approach to ethics, which recognises the relational aspects of research with vulnerable people, is particularly useful for internet-based health research. The solutions presented here can act as guidance for researchers developing proposals and for ethics committees reviewing them.

  17. A Crime Analysis Decision Support System for Crime Report Classification and Visualization

    ERIC Educational Resources Information Center

    Ku, Chih-Hao

    2012-01-01

    Today's Internet-based crime reporting systems make timely and anonymous crime reporting possible. However, these reports also result in a rapidly growing set of unstructured text files. Complicating the problem is that the information has not been filtered or guided in a detective-led interview resulting in much irrelevant information. To…

  18. A Third-Party E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Niu, Xu-Feng; Zhang, Jian-Zhong; Xie, Shu-Cui; Chen, Bu-Qing

    2018-05-01

    A third-party E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, the proposed system could support the E-payment which using the third-party platforms.

  19. Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

    PubMed Central

    Liu, Lei; Zhao, Jing

    2014-01-01

    An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spatial anonymous operations, and it allows the users to configure their custom-made privacy-preserving location query requests. The simulated experiment results show that the proposed algorithm can offer simultaneously the location query services for more users and improve the performance of the anonymous server and satisfy the anonymous location requests of the users. PMID:24790579

  20. Privacy-preserving location-based query using location indexes and parallel searching in distributed networks.

    PubMed

    Zhong, Cheng; Liu, Lei; Zhao, Jing

    2014-01-01

    An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spatial anonymous operations, and it allows the users to configure their custom-made privacy-preserving location query requests. The simulated experiment results show that the proposed algorithm can offer simultaneously the location query services for more users and improve the performance of the anonymous server and satisfy the anonymous location requests of the users.

  1. Architectural approaches for HL7-based health information systems implementation.

    PubMed

    López, D M; Blobel, B

    2010-01-01

    Information systems integration is hard, especially when semantic and business process interoperability requirements need to be met. To succeed, a unified methodology, approaching different aspects of systems architecture such as business, information, computational, engineering and technology viewpoints, has to be considered. The paper contributes with an analysis and demonstration on how the HL7 standard set can support health information systems integration. Based on the Health Information Systems Development Framework (HIS-DF), common architectural models for HIS integration are analyzed. The framework is a standard-based, consistent, comprehensive, customizable, scalable methodology that supports the design of semantically interoperable health information systems and components. Three main architectural models for system integration are analyzed: the point to point interface, the messages server and the mediator models. Point to point interface and messages server models are completely supported by traditional HL7 version 2 and version 3 messaging. The HL7 v3 standard specification, combined with service-oriented, model-driven approaches provided by HIS-DF, makes the mediator model possible. The different integration scenarios are illustrated by describing a proof-of-concept implementation of an integrated public health surveillance system based on Enterprise Java Beans technology. Selecting the appropriate integration architecture is a fundamental issue of any software development project. HIS-DF provides a unique methodological approach guiding the development of healthcare integration projects. The mediator model - offered by the HIS-DF and supported in HL7 v3 artifacts - is the more promising one promoting the development of open, reusable, flexible, semantically interoperable, platform-independent, service-oriented and standard-based health information systems.

  2. In the Face of Cybersecurity: How the Common Information Model Can Be Used

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Skare, Paul; Falk, Herbert; Rice, Mark

    2016-01-01

    Efforts are underway to combine smart grid information, devices, networking, and emergency response information to create messages that are not dependent on specific standards development organizations (SDOs). This supports a future-proof approach of allowing changes in the canonical data models (CDMs) going forward without having to perform forklift replacements of solutions that use the messages. This also allows end users (electric utilities) to upgrade individual components of a larger system while keeping the message payload definitions intact. The goal is to enable public and private information sharing securely in a standards-based approach that can be integrated into existing operations. Wemore » provide an example architecture that could benefit from this multi-SDO, secure message approach. This article also describes how to improve message security« less

  3. A Cognitive Behavioral Therapy-Based Text Messaging Intervention for Methamphetamine Dependence

    PubMed Central

    Keoleian, Victoria; Stalcup, S. Alex; Polcin, Douglas L.; Brown, Michelle; Galloway, Gantt

    2013-01-01

    Psychosocial treatments for methamphetamine dependence are of limited effectiveness. Thus, a significant need exists for add-on therapy for this substance user disorder. The aim of this study was to develop and test a novel text messaging intervention for use as an adjunct to cognitive behavioral group therapy for methamphetamine users. Text messaging has the potential to support patients in real-time, around the clock. We convened 2 meetings of an expert panel, held 3 focus groups in current and former users, and conducted 15 semi-structured interviews with in-treatment users in order to develop a fully-automated, cognitive behavioral therapy-based text messaging intervention. We then conducted a randomized, crossover pre-test in 5 users seeking treatment. Participants’ ratings of ease of use and functionality of the system were high. During the pre-test we performed real-time assessments via text messaging on daily methamphetamine use, craving levels, and the perceived usefulness of messages; 79% of scheduled assessments were collected. The odds of messages being rated as “very” or “extremely” useful were 6.6 times [95% CI: 2.2, 19.4] higher in the active vs. placebo periods. The intervention is now ready for testing in randomized clinical trials. PMID:24592670

  4. Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS

    NASA Astrophysics Data System (ADS)

    Onyisi, Peter

    2015-12-01

    During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.

  5. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  6. Performance measures to characterize directional corridor travel time delay based on probe vehicle data : final report.

    DOT National Transportation Integrated Search

    2015-10-01

    Anonymous probe vehicle data are currently being collected on roadways throughout the United States. These data are being incorporated into local and statewide mobility reports to measure the performance of freeways and arterial systems. Predefined s...

  7. Recursivity in Lingua Cosmica

    NASA Astrophysics Data System (ADS)

    Ollongren, Alexander

    2011-02-01

    In a sequence of papers on the topic of message construction for interstellar communication by means of a cosmic language, the present author has discussed various significant requirements such a lingua should satisfy. The author's Lingua Cosmica is a (meta) system for annotating contents of possibly large-scale messages for ETI. LINCOS, based on formal constructive logic, was primarily designed for dealing with logic contents of messages but is also applicable for denoting structural properties of more general abstractions embedded in such messages. The present paper explains ways and means for achieving this for a special case: recursive entities. As usual two stages are involved: first the domain of discourse is enriched with suitable representations of the entities concerned, after which properties over them can be dealt with within the system itself. As a representative example the case of Russian dolls (Matrjoshka's) is discussed in some detail and relations with linguistic structures in natural languages are briefly exploited.

  8. Creative Analytics of Mission Ops Event Messages

    NASA Technical Reports Server (NTRS)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non-telemetry mission operations information into a common log format and then providing display and analytics tools to provide in-depth assessment of the log contents. The work includes: Common interface formats for acquiring time-tagged text messages Conversion of common files for schedules, orbital events, and stored commands to the common log format Innovative displays to depict thousands of messages on a single display Structured English text queries against the log message data store, extensible to a more mature natural language query capability Goal of speech-to-text and text-to-speech additions to create a personal mission operations assistant to aid on-console operations. A wide variety of planned uses identified by the mission operations teams will be discussed.

  9. Two-out-of-two color matching based visual cryptography schemes.

    PubMed

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  10. K-Anonymous Multi-party Secret Handshakes

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai; Yung, Moti

    Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, authentication methods are also crucial for such interactions. Secret handshake is a relatively recent mechanism that facilitates privacy-preserving mutual authentication between communicating peers. In recent years, researchers have proposed a set of secret handshake schemes based on different assumptions about the credentials used: from one-time credentials to the more general PKI-like credentials. In this paper, we concentrate on k-anonymous secret handshake schemes based on PKI-like infrastructures. More specifically, we deal with the k-anonymous m-party (m > 2) secret handshake problem, which is significantly more involved than its two-party counterpart due to the following: When an honest user hand-shakes with m - 1 parties, it must be assured that these parties are distinct; otherwise, under the mask of anonymity a dishonest participant may clone itself in a single handshake session (i.e., assuming multiple personalities).

  11. A flexible approach to distributed data anonymization.

    PubMed

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. Asbestos: Securing Untrusted Software with Interposition

    DTIC Science & Technology

    2005-09-01

    consistent intelligible interfaces to different types of resource. Message-based operating systems, such as Accent, Amoeba, Chorus, L4 , Spring...control on self-authenticating capabilities, precluding policies that restrict delegation. L4 uses a strict hierarchy of interpositions, useful for...the OS de- sign space amenable to secure application construction. Similar effects might be possible with message-passing microkernels , or unwieldy

  13. A decentralized software bus based on IP multicas ting

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd

    1995-01-01

    We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.

  14. The influence of affective and cognitive arguments on message judgement and attitude change: The moderating effects of meta-bases and structural bases.

    PubMed

    Keer, Mario; van den Putte, Bas; Neijens, Peter; de Wit, John

    2013-01-01

    This study investigated whether the efficacy of affective vs. cognitive persuasive messages was moderated by (1) individuals' subjective assessments of whether their attitudes were based on affect or cognition (i.e. meta-bases) and (2) the degree individuals' attitudes were correlated with affect and cognition (i.e. structural bases). Participants (N = 97) were randomly exposed to a message containing either affective or cognitive arguments discouraging binge drinking. The results demonstrated that meta-bases and not structural bases moderated the influence of argument type on message judgement. Affective (cognitive) messages were judged more positively when individuals' meta-bases were more affective (cognitive). In contrast, structural bases and not meta-bases moderated the influence of argument type on attitude and intention change following exposure to the message. Surprisingly, change was greater among individuals who read a message that mismatched their structural attitude base. Affective messages were more effective as attitudes were more cognition-based, and vice versa. Thus, although individuals prefer messages that match their meta-base, attitude and intention change regarding binge drinking are best established by mismatching their structural base.

  15. Low latency messages on distributed memory multiprocessors

    NASA Technical Reports Server (NTRS)

    Rosing, Matthew; Saltz, Joel

    1993-01-01

    Many of the issues in developing an efficient interface for communication on distributed memory machines are described and a portable interface is proposed. Although the hardware component of message latency is less than one microsecond on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 microseconds. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. Based on several tests that were run on the iPSC/860, an interface that will better match current distributed memory machines is proposed. The model used in the proposed interface consists of a computation processor and a communication processor on each node. Communication between these processors and other nodes in the system is done through a buffered network. Information that is transmitted is either data or procedures to be executed on the remote processor. The dual processor system is better suited for efficiently handling asynchronous communications compared to a single processor system. The ability to send data or procedure is very flexible for minimizing message latency, based on the type of communication being performed. The test performed and the proposed interface are described.

  16. MPF: A portable message passing facility for shared memory multiprocessors

    NASA Technical Reports Server (NTRS)

    Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.

    1987-01-01

    The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.

  17. Proposal: A Hybrid Dictionary Modelling Approach for Malay Tweet Normalization

    NASA Astrophysics Data System (ADS)

    Muhamad, Nor Azlizawati Binti; Idris, Norisma; Arshi Saloot, Mohammad

    2017-02-01

    Malay Twitter message presents a special deviation from the original language. Malay Tweet widely used currently by Twitter users, especially at Malaya archipelago. Thus, it is important to make a normalization system which can translated Malay Tweet language into the standard Malay language. Some researchers have conducted in natural language processing which mainly focuses on normalizing English Twitter messages, while few studies have been done for normalize Malay Tweets. This paper proposes an approach to normalize Malay Twitter messages based on hybrid dictionary modelling methods. This approach normalizes noisy Malay twitter messages such as colloquially language, novel words, and interjections into standard Malay language. This research will be used Language Model and N-grams model.

  18. Simulation of Controller Pilot Data Link Communications over VHF Digital Link Mode 3

    NASA Technical Reports Server (NTRS)

    Bretmersky, Steven C.; Murawski, Robert; Nguyen, Thanh C.; Raghavan, Rajesh S.

    2004-01-01

    The Federal Aviation Administration (FAA) has established an operational plan for the future Air Traffic Management (ATM) system, in which the Controller Pilot Data Link Communications (CPDLC) is envisioned to evolve into digital messaging that will take on an ever increasing role in controller to pilot communications, significantly changing the way the National Airspace System (NAS) is operating. According to FAA, CPDLC represents the first phase of the transition from the current analog voice system to an International Civil Aviation Organization (ICAO) compliant system in which digital communication becomes the alternate and perhaps primary method of routine communication. The CPDLC application is an Air Traffic Service (ATS) application in which pilots and controllers exchange messages via an addressed data link. CPDLC includes a set of clearance, information, and request message elements that correspond to existing phraseology employed by current Air Traffic Control (ATC) procedures. These message elements encompass altitude assignments, crossing constraints, lateral deviations, route changes and clearances, speed assignments, radio frequency assignments, and various requests for information. The pilot is provided with the capability to respond to messages, to request clearances and information, to report information, and to declare/rescind an emergency. A 'free text' capability is also provided to exchange information not conforming to defined formats. This paper presents simulated results of the aeronautical telecommunication application Controller Pilot Data Link Communications over VHF Digital Link Mode 3 (VDL Mode 3). The objective of this simulation study was to determine the impact of CPDLC traffic loads, in terms of timely message delivery and capacity of the VDL Mode 3 subnetwork. The traffic model is based on and is used for generating air/ground messages with different priorities. Communication is modeled for the en route domain of the Cleveland Center air traffic (ZOB ARTCC).

  19. Effect of audio in-vehicle red light-running warning message on driving behavior based on a driving simulator experiment.

    PubMed

    Yan, Xuedong; Liu, Yang; Xu, Yongcun

    2015-01-01

    Drivers' incorrect decisions of crossing signalized intersections at the onset of the yellow change may lead to red light running (RLR), and RLR crashes result in substantial numbers of severe injuries and property damage. In recent years, some Intelligent Transport System (ITS) concepts have focused on reducing RLR by alerting drivers that they are about to violate the signal. The objective of this study is to conduct an experimental investigation on the effectiveness of the red light violation warning system using a voice message. In this study, the prototype concept of the RLR audio warning system was modeled and tested in a high-fidelity driving simulator. According to the concept, when a vehicle is approaching an intersection at the onset of yellow and the time to the intersection is longer than the yellow interval, the in-vehicle warning system can activate the following audio message "The red light is impending. Please decelerate!" The intent of the warning design is to encourage drivers who cannot clear an intersection during the yellow change interval to stop at the intersection. The experimental results showed that the warning message could decrease red light running violations by 84.3 percent. Based on the logistic regression analyses, drivers without a warning were about 86 times more likely to make go decisions at the onset of yellow and about 15 times more likely to run red lights than those with a warning. Additionally, it was found that the audio warning message could significantly reduce RLR severity because the RLR drivers' red-entry times without a warning were longer than those with a warning. This driving simulator study showed a promising effect of the audio in-vehicle warning message on reducing RLR violations and crashes. It is worthwhile to further develop the proposed technology in field applications.

  20. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  1. Increasing Perioperative Communication With Automated Mobile Phone Messaging in Total Joint Arthroplasty.

    PubMed

    Day, Molly A; Anthony, Christopher A; Bedard, Nicholas A; Glass, Natalie A; Clark, Charles R; Callaghan, John J; Noiseux, Nicolas O

    2018-01-01

    Automated mobile phone messaging has not been reported in total joint arthroplasty (TJA). Our purpose was to compare Press Ganey (PG) and Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) scores between TJA patients who did and did not receive perioperative automated mobile phone messages. Patients were prospectively enrolled and received messages for 1 week prior until 2 weeks after TJA. Message content included reminders, activity, and pain control. Patients answered select PG/HCAHPS and questions regarding their experience with the automated communication platform. Average PG/HCAHPS scores were compared to historical TJA patients in the 3-year window prior (control group) with significance P < .05. Thirty-seven consecutive patients were approached and 92% (n = 34) were enrolled. The experimental group was 47% male, with 80% patients between 51 and 75 years. The experimental (n = 30) and control groups (n = 26) were similar. Patients receiving messages were more likely to have a good understanding of health responsibilities (P = .024) and feel that the care team demonstrated shared decision-making (P = .024). Of patients enrolled, 87% felt messages helped them be more prepared for surgery, 100% felt messages kept them better informed, and 97% would participate again. TJA patients who received perioperative communication via automated mobile phone messaging had improved patient satisfaction scores postoperatively. Patients perceived this form of communication was useful and kept them better informed. Automated mobile phone messaging can be an easily integrated, helpful adjunct to surgeons, healthcare systems, and case managers to more effectively communicate with patients undergoing TJA in this era of value-based care. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Learning from Marketing: Rapid Development of Medication Messages that Engage Patients

    PubMed Central

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-01-01

    Objective To adapt marketing approaches in a health services environment. Methods Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. Results The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. Conclusion We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Practice Implications Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. PMID:25913245

  3. Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data.

    PubMed

    Um, Ki Sung; Kwak, Yun Sik; Cho, Hune; Kim, Il Kon

    2005-11-01

    A basic assumption of Health Level Seven (HL7) protocol is 'No limitation of message length'. However, most existing commercial HL7 interface engines do limit message length because they use the string array method, which is run in the main memory for the HL7 message parsing process. Specifically, messages with image and multi-media data create a long string array and thus cause the computer system to raise critical and fatal problem. Consequently, HL7 messages cannot handle the image and multi-media data necessary in modern medical records. This study aims to solve this problem with the 'streaming algorithm' method. This new method for HL7 message parsing applies the character-stream object which process character by character between the main memory and hard disk device with the consequence that the processing load on main memory could be alleviated. The main functions of this new engine are generating, parsing, validating, browsing, sending, and receiving HL7 messages. Also, the engine can parse and generate XML-formatted HL7 messages. This new HL7 engine successfully exchanged HL7 messages with 10 megabyte size images and discharge summary information between two university hospitals.

  4. Learning from marketing: Rapid development of medication messages that engage patients.

    PubMed

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-08-01

    To adapt marketing approaches in a health services environment. Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. Copyright © 2015. Published by Elsevier Ireland Ltd.

  5. A lightweight messaging-based distributed processing and workflow execution framework for real-time and big data analysis

    NASA Astrophysics Data System (ADS)

    Laban, Shaban; El-Desouky, Aly

    2014-05-01

    To achieve a rapid, simple and reliable parallel processing of different types of tasks and big data processing on any compute cluster, a lightweight messaging-based distributed applications processing and workflow execution framework model is proposed. The framework is based on Apache ActiveMQ and Simple (or Streaming) Text Oriented Message Protocol (STOMP). ActiveMQ , a popular and powerful open source persistence messaging and integration patterns server with scheduler capabilities, acts as a message broker in the framework. STOMP provides an interoperable wire format that allows framework programs to talk and interact between each other and ActiveMQ easily. In order to efficiently use the message broker a unified message and topic naming pattern is utilized to achieve the required operation. Only three Python programs and simple library, used to unify and simplify the implementation of activeMQ and STOMP protocol, are needed to use the framework. A watchdog program is used to monitor, remove, add, start and stop any machine and/or its different tasks when necessary. For every machine a dedicated one and only one zoo keeper program is used to start different functions or tasks, stompShell program, needed for executing the user required workflow. The stompShell instances are used to execute any workflow jobs based on received message. A well-defined, simple and flexible message structure, based on JavaScript Object Notation (JSON), is used to build any complex workflow systems. Also, JSON format is used in configuration, communication between machines and programs. The framework is platform independent. Although, the framework is built using Python the actual workflow programs or jobs can be implemented by any programming language. The generic framework can be used in small national data centres for processing seismological and radionuclide data received from the International Data Centre (IDC) of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO). Also, it is possible to extend the use of the framework in monitoring the IDC pipeline. The detailed design, implementation,conclusion and future work of the proposed framework will be presented.

  6. Tempest in a Therapeutic Community: Implementation and Evaluation Issues for Faith-Based Programming

    ERIC Educational Resources Information Center

    Scott, Diane L.; Crow, Matthew S.; Thompson, Carla J.

    2010-01-01

    The therapeutic community (TC) is an increasingly utilized intervention model in corrections settings. Rarely do these TCs include faith-based curriculum other than that included in Alcoholics Anonymous or Narcotics Anonymous programs as does the faith-based TC that serves as the basis for this article. Borrowing from the successful TC model, the…

  7. Distributed parallel messaging for multiprocessor systems

    DOEpatents

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  8. Driver performance while text messaging using handheld and in-vehicle systems.

    PubMed

    Owens, Justin M; McLaughlin, Shane B; Sudweeks, Jeremy

    2011-05-01

    This study presents an evaluation of driver performance while text messaging via handheld mobile phones and an in-vehicle texting system. Participants sent and received text messages while driving with an experimenter on a closed-road course, using their personal mobile phones and the vehicle's system. The test vehicle was an instrumented 2010 Mercury Mariner equipped with an OEM in-vehicle system that supports text messaging and voice control of mobile devices via Bluetooth, which was modified to allow text message sending during driving. Twenty participants were tested, 11 younger (19-34) and 9 older (39-51). All participants were regular users of the in-vehicle system, although none had experience with the texting functions. Results indicated that handheld text message sending and receiving resulted in higher mental demand, more frequent and longer glances away from the roadway, and degraded steering measures compared to baseline. Using the in-vehicle system to send messages showed less performance degradation, but still had more task-related interior glance time and higher mental demand than baseline; using the system's text-to-speech functionality for incoming messages showed no differences from baseline. These findings suggest that using handheld phones to send and receive text messages may interfere with drivers' visual and steering behaviors; the in-vehicle system showed improvement, but performance was not at baseline levels during message sending. Copyright © 2010 Elsevier Ltd. All rights reserved.

  9. Feasibility and usability of a text message-based program for diabetes self-management in an urban African-American population.

    PubMed

    Dick, Jonathan J; Nundy, Shantanu; Solomon, Marla C; Bishop, Keisha N; Chin, Marshall H; Peek, Monica E

    2011-09-01

    We pilot-tested a text message-based diabetes care program in an urban African-American population in which automated text messages were sent to participants with personalized medication, foot care, and appointment reminders and text messages were received from participants on adherence. Eighteen patients participated in a 4-week pilot study. Baseline surveys collected data about demographics, historical cell phone usage, and adherence to core diabetes care measures. Exit interview surveys (using close-coded and open-ended questions) were administered to patients at the end of the program. A 1-month follow-up interview was conducted surveying patients on perceived self-efficacy. Wilcoxon signed-rank tests were used to compare baseline survey responses about self-management activities to those at the pilot's end and at 1-month follow-up. Eighteen urban African-American participants completed the pilot study. The average age was 55 and the average number of years with diabetes was 8. Half the participants were initially uncomfortable with text messaging. Example messages include "Did you take your diabetes medications today" and "How many times did you check your feet for wounds this week?" Participants averaged 220 text messages with the system, responded to messages 80% of the time, and on average responded within 6 minutes. Participants strongly agreed that text messaging was easy to perform and helped with diabetes self-care. Missed medication doses decreased from 1.6 per week to 0.6 (p = .003). Patient confidence in diabetes self-management was significantly increased during and 1 month after the pilot (p = .002, p = .008). Text messaging may be a feasible and useful approach to improve diabetes self-management in urban African Americans. © 2011 Diabetes Technology Society.

  10. Social Media and HIV: A Systematic Review of Uses of Social Media in HIV Communication

    PubMed Central

    Grewe, Mary Elisabeth; Conserve, Donaldson F; Gliwa, Catherine; Roman Isler, Malika

    2015-01-01

    Background Social media, including mobile technologies and social networking sites, are being used increasingly as part of human immunodeficiency virus (HIV) prevention and treatment efforts. As an important avenue for communication about HIV, social media use may continue to increase and become more widespread. Objective The objective of this paper is to present a comprehensive systematic review of the current published literature on the design, users, benefits, and limitations of using social media to communicate about HIV prevention and treatment. Methods This review paper used a systematic approach to survey all literature published before February 2014 using 7 electronic databases and a manual search. The inclusion criteria were (1) primary focus on communication/interaction about HIV/acquired immunodeficiency syndrome (AIDS), (2) discusses the use of social media to facilitate communication, (3) communication on the social media platform is between individuals or a group of individuals rather than the use of preset, automated responses from a platform, (4) published before February 19, 2014, and (5) all study designs. Results The search identified 35 original research studies. Thirty studies had low or unclear risk of at least one of the bias items in the methodological quality assessment. Among the 8 social media platform types described, short message service text messaging was most commonly used. Platforms served multiple purposes including disseminating health information, conducting health promotion, sharing experiences, providing social support, and promoting medication adherence. Social media users were diverse in geographic location and race/ethnicity; studies commonly reported users aged 18-40 years and users with lower income. Although most studies did not specify whether use was anonymous, studies reported the importance of anonymity in social media use to communicate about HIV largely due to the stigma associated with HIV. The ability to share and receive information about HIV was the most commonly reported benefit of social media use and the most common challenges were related to technology. Measures of frequency of use, satisfaction, and effects of use varied across studies. Conclusions Using social media to bridge communication among a diverse range of users, in various geographic and social contexts, may be leveraged through pre-existing platforms and with attention to the roles of anonymity and confidentiality in communication about HIV prevention and treatment. More robust research is needed to determine the effects of social media use on various health and social outcomes related to HIV. PMID:26525289

  11. High performance interconnection between high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Zhang, L.; Sun, W.

    1992-01-01

    The bridge/gateway system needed to interconnect a wide range of computer networks to support a wide range of user quality-of-service requirements is discussed. The bridge/gateway must handle a wide range of message types including synchronous and asynchronous traffic, large, bursty messages, short, self-contained messages, time critical messages, etc. It is shown that messages can be classified into three basic classes, synchronous and large and small asynchronous messages. The first two require call setup so that packet identification, buffer handling, etc. can be supported in the bridge/gateway. Identification enables resequences in packet size. The third class is for messages which do not require call setup. Resequencing hardware based to handle two types of resequencing problems is presented. The first is for a virtual parallel circuit which can scramble channel bytes. The second system is effective in handling both synchronous and asynchronous traffic between networks with highly differing packet sizes and data rates. The two other major needs for the bridge/gateway are congestion and error control. A dynamic, lossless congestion control scheme which can easily support effective error correction is presented. Results indicate that the congestion control scheme provides close to optimal capacity under congested conditions. Under conditions where error may develop due to intervening networks which are not lossless, intermediate error recovery and correction takes 1/3 less time than equivalent end-to-end error correction under similar conditions.

  12. An Investigation of Flight Deck Data Link in the Terminal Area

    NASA Technical Reports Server (NTRS)

    Martin, Lynne; Lozito, Sandra; Kaneshige, John; Dulchinos, Vicki; Sharma, Shivanjli

    2013-01-01

    The Next Generation Air Transportation System (NextGen) and Europe's Single European Sky ATM Research (SESAR) concepts require an increased use of trajectory-based operations, including extensive strategic air traffic control clearances. The clearances are lengthy and complex, which necessitate data link communications to allow for message permanence and integration into the autoflight systems (i.e., autoload capability). This paper examines the use of flight deck data link communications for strategic and tactical clearance usage in the terminal area. A human-in-the-loop simulation was conducted using a high-fidelity flight deck simulator, with ten commercial flight crews as participants. Data were collected from six flight scenarios in the San Francisco terminal airspace. The variables of interest were ATC message modality (voice v. data link), temporal quality of the message (tactical v. strategic) and message length. Dependent variables were message response times, communication clarifications, communication-related errors, and pilot workload. Response time results were longer in data link compared to voice, a finding that has been consistently revealed in a number of other simulations [1]. In addition, strategic clearances and longer messages resulted in a greater number of clarifications and errors, suggesting an increase in uncertainty of message interpretation for the flight crews when compared to tactical clearances. The implications for strategic and compound clearance usage in NextGen and SESAR are discussed

  13. Encouraging children to eat more fruit and vegetables: Health vs. descriptive social norm-based messages.

    PubMed

    Sharps, Maxine; Robinson, Eric

    2016-05-01

    Traditional intervention approaches to promote fruit and vegetable consumption outline the health benefits of eating fruit and vegetables. More recently, social norm-based messages describing the healthy eating habits of others have been shown to increase fruit and vegetable intake in adults. Here we report two experimental studies which investigated whether exposure to descriptive social norm-based messages about the behaviour of other children and health-based messages increased fruit and vegetable intake in young children. In both studies children were exposed to messages whilst playing a board-game. After exposure to the messages, children were able to consume fruit and vegetables, as well as high calorie snack foods. Although findings were inconsistent across the two individual studies, in a pooled analysis we found evidence that both health messages and descriptive social norm-based messages increased children's fruit and vegetable intake, relative to control condition messages (p < .05). Whether descriptive social norm-based messages can be used to promote meaningful changes to children's dietary behaviour warrants further study. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. Encouraging children to eat more fruit and vegetables: Health vs. descriptive social norm-based messages

    PubMed Central

    Sharps, Maxine; Robinson, Eric

    2016-01-01

    Traditional intervention approaches to promote fruit and vegetable consumption outline the health benefits of eating fruit and vegetables. More recently, social norm-based messages describing the healthy eating habits of others have been shown to increase fruit and vegetable intake in adults. Here we report two experimental studies which investigated whether exposure to descriptive social norm-based messages about the behaviour of other children and health-based messages increased fruit and vegetable intake in young children. In both studies children were exposed to messages whilst playing a board-game. After exposure to the messages, children were able to consume fruit and vegetables, as well as high calorie snack foods. Although findings were inconsistent across the two individual studies, in a pooled analysis we found evidence that both health messages and descriptive social norm-based messages increased children's fruit and vegetable intake, relative to control condition messages (p < .05). Whether descriptive social norm-based messages can be used to promote meaningful changes to children's dietary behaviour warrants further study. PMID:26820776

  15. 'He left me a message on Facebook': comparing the risk profiles of self-harming patients who leave paper suicide notes with those who leave messages on new media.

    PubMed

    Barrett, Jessica R; Shetty, Hitesh; Broadbent, Matthew; Cross, Sean; Hotopf, Matthew; Stewart, Robert; Lee, William

    2016-05-01

    In cases of non-fatal self-harm, suicide notes are a major risk factor for repeated self-harm and suicide. Suicide notes can now be left on new media services, emails or text messages, as well as on paper. In a group of people who had harmed themselves, we aimed to compare new media note-leavers with paper note-leavers and characterise these groups demographically and by risk factors. Clinical notes of patients who presented with non-fatal self-harm to two London emergency departments were anonymously searched for mentions of new media use. These were categorised and risk factors were compared for those who had left a new media note, a paper note, or no note to establish differences in risk of note-leaving. New media note-leaving was associated with younger age and substance use; both risk factors for repeated self-harm. However, suicidal intent remained highest in paper note-leavers. Paper note-leavers remain at greatest risk, however new media note leaving is still correlated with risk factors related to repeated self-harm and suicide. Clinicians should enquire about new media use during emergency department assessments of self-harm. None. © The Royal College of Psychiatrists 2016. This is an open access article distributed under the terms of the Creative Commons Non-Commercial, No Derivatives (CC BY-NC-ND) licence.

  16. Progressive retry for software error recovery in distributed systems

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Huang, Yennun; Fuchs, W. K.

    1993-01-01

    In this paper, we describe a method of execution retry for bypassing software errors based on checkpointing, rollback, message reordering and replaying. We demonstrate how rollback techniques, previously developed for transient hardware failure recovery, can also be used to recover from software faults by exploiting message reordering to bypass software errors. Our approach intentionally increases the degree of nondeterminism and the scope of rollback when a previous retry fails. Examples from our experience with telecommunications software systems illustrate the benefits of the scheme.

  17. Privacy Breach Analysis in Social Networks

    NASA Astrophysics Data System (ADS)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  18. Exploring the venue’s role in risky sexual behavior among gay and bisexual men: An event-level analysis from a national online survey in the U.S

    PubMed Central

    Grov, Christian; Hirshfield, Sabina; Remien, Robert H.; Humberstone, Mike; Chiasson, Mary Ann

    2013-01-01

    Venue-based characteristics (e.g., alcohol in bars, anonymous chat online, dark/quiet spaces in bathhouses) can impact how men who have sex with men (MSM) negotiate sex and HIV-associated risk behavior. We sought to determine the association between HIV-associated risk factors and the venues where MSM met their most recent new (first-time) male sex partner, using data from a 2004–2005 national online anonymous survey of MSM in the U.S (n = 2865). Most men (62%) met their partner through the Internet. Among those reporting anal sex during their last encounter (n = 1,550), half had not used a condom. In multivariate modeling, and among men reporting anal sex during their last encounter, venue where partner was met was not associated with unprotected anal intercourse (UAI). Nevertheless, venue was related to other factors that contextualized men’s sexual encounters. For example, HIV status disclosure was lowest among men who met their most recent partner in a park, outdoors, or other public place and highest among men who met their most recent partner online. Alcohol use prior to/during last sexual encounter was highest among men who met their most recent partner in a bathhouse or a bar/club/party/event. These data suggest it is possible to reach men online who seek sex in many different venues, thus potentially broadening the impact of prevention messages delivered in virtual environments. Although not associated with UAI, venues are connected to social-behavioral facets of corresponding sexual encounters, and may be important arenas for differential HIV and STI education, treatment, and prevention. PMID:22012413

  19. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  20. Connection anonymity analysis in coded-WDM PONs

    NASA Astrophysics Data System (ADS)

    Sue, Chuan-Ching

    2008-04-01

    A coded wavelength division multiplexing passive optical network (WDM PON) is presented for fiber to the home (FTTH) systems to protect against eavesdropping. The proposed scheme applies spectral amplitude coding (SAC) with a unipolar maximal-length sequence (M-sequence) code matrix to generate a specific signature address (coding) and to retrieve its matching address codeword (decoding) by exploiting the cyclic properties inherent in array waveguide grating (AWG) routers. In addition to ensuring the confidentiality of user data, the proposed coded-WDM scheme is also a suitable candidate for the physical layer with connection anonymity. Under the assumption that the eavesdropper applies a photo-detection strategy, it is shown that the coded WDM PON outperforms the conventional TDM PON and WDM PON schemes in terms of a higher degree of connection anonymity. Additionally, the proposed scheme allows the system operator to partition the optical network units (ONUs) into appropriate groups so as to achieve a better degree of anonymity.

  1. User preferences for a text message-based smoking cessation intervention.

    PubMed

    Bock, Beth C; Heron, Kristin E; Jennings, Ernestine G; Magee, Joshua C; Morrow, Kathleen M

    2013-04-01

    Younger adults are more likely to smoke and less likely to seek treatment than older smokers. They are also frequent users of communication technology. In the current study, we conducted focus groups to obtain feedback about preferences for a text message-based smoking cessation program from potential users. Participants (N = 21, M age = 25.6 years, age range = 20-33 years) were current or recently quit smokers (M cigarettes/day = 12.8) who used text messaging. Participants completed questionnaires and participated in a 2-hour focus group. Focus groups were conducted using an a priori semistructured interview guide to promote discussion of the content and functionality of the intervention. Major themes from analysis of the focus groups included support for the acceptability of a text-based cessation program, suggestions for a more technologically broad-based program, and adjustments to the program structure. Participants recommended including social networking functions, user control of program output through an online profile, and text message features to promote interaction with the system. Interestingly, many participants suggested the program should begin on individuals' identified quit day, challenging the procedures used in most cessation programs, which begin by preparing participants for a future quit date. Overall, younger adult smokers appear to be interested in participating in a smoking cessation program that uses text messages and web-based elements. Qualitative feedback regarding the perceived optimal features and structure of a technology-based intervention challenged traditional methods of implementing smoking cessation interventions and will inform the development of future programs.

  2. Experimental comparisons of face-to-face and anonymous real-time team competition in a networked gaming learning environment.

    PubMed

    Yu, Fu-Yun; Han, Chialing; Chan, Tak-Wai

    2008-08-01

    This study investigates the impact of anonymous, computerized, synchronized team competition on students' motivation, satisfaction, and interpersonal relationships. Sixty-eight fourth-graders participated in this study. A synchronous gaming learning system was developed to have dyads compete against each other in answering multiple-choice questions set in accordance with the school curriculum in two conditions (face-to-face and anonymous). The results showed that students who were exposed to the anonymous team competition condition responded significantly more positively than those in the face-to-face condition in terms of motivation and satisfaction at the 0.050 and 0.056 levels respectively. Although further studies regarding the effects of anonymous interaction in a networked gaming learning environment are imperative, the positive effects detected in this preliminary study indicate that anonymity is a viable feature for mitigating the negative effects that competition may inflict on motivation and satisfaction as reported in traditional face-to-face environments.

  3. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    NASA Astrophysics Data System (ADS)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  4. PCCEServer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perry, Marcia; Agarwal, Deb

    2003-03-17

    The PCCEServer application is a server that should be used in conjunction with the LBNLSecureMessaging user interface to enable secure synchronous and asynchronous messaging. It provides authentication and authorization services for members of a collaboration group via PKI/SSL and maintains an access control list. Members of collaboration groups using the LBNLSecureMessaging client must register identifying information. including usemame and password and an optional X.509 certificate, with the PCCEServer. This registration not only restricts access to instant messaging, but augments the LBNLSecureMessaging's IRC-based chat facility with persistence. Users register permanent unique user ids by which they are knowTl to other usersmore » in the system and create permanent venues intended for group conversations on a tong-term or continuous basis. In addition, the PCCEServer enhances instant messaging with presence and awareness information such as user availability, and it allows users to leave notes asynchronously for other users who are online or offline. Written in Java, it is a standalone application that can run on any platform that supports a Java Virtual Machine.« less

  5. How much importance do we give to target audiences in article writing?

    PubMed

    Nedjat, Sima; Nedjat, Saharnaz; Gholami, Jaleh; Ashoorkhani, Mahnaz; Maleki, Katayoun; Hejrie, Soroush Mortaz; Majdzadeh, Reza

    2010-01-01

    Writing papers can be used as a means to convey a message. Knowledge transfer is also about conveying the right message to the right target audience. The aim of this study was to determine the proportion of articles that had mentioned a clear message and the target audience in the abstract and the article as a whole, and also to examine their association with different determinant factors. Articles published from 2001 to 2006 that were based on clinical and health system research conducted on Iranian populations and on maternal care, diabetes and tuberculosis were searched systematically in domestic and international databases. Eventually checklists (Additional file 1) were completed for 795 articles. Overall, 98.5% of articles had a clear message, whereas 12.5% had addressed the direct target audience. Presence of a clear message in formatted abstracts were seen 3.6 times more (CI95%: 1.5-8.7) than in articles without formatted abstracts (p = 0.005). Addressing of the direct target audience was seen twice as much in health system research articles as compared to clinical studies, odds ratio was 2.3 (CI95%: 1.47-3.48, p<0.001). Creating a format for journal abstracts seems to be an effective intervention for presenting the message in articles.

  6. The perceived effects of drug messages on use patterns in adolescents.

    PubMed

    Mayton, D M; Nagel, E A; Parker, R

    1990-01-01

    Following a survey of over 5,000 students in north central Idaho and southeast Washington, an interviewing strategy was implemented with 223 adolescents randomly selected by their principals. The strategy was designed to learn: 1) which sources have utility and credibility with youth in providing drug information; 2) whether different message content and delivery style have differential effects upon that group; and 3) whether widely held perceptions voiced by parents and teachers about their ineffectiveness as information sources were accurate. Double-blind interviews, arranged to protect respondent anonymity, were conducted by trained interviewers from a research methods class. No interview was held when either an interviewer or respondent knew the other. Among the important findings of the study were that: 1) parents and teachers are trusted, credible sources of drug information; 2) doctors, nurses, law officers, and clergy are also credible but not visible to youth; 3) the evil media and celebrity fears of parents and teachers are largely ungrounded in adolescent perception; and 4) factual information from credible sources emphasizing the range of types of negative consequences associated with drug use can exert powerful effects upon adolescents' reported personal use of drugs.

  7. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    PubMed

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  8. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    PubMed

    Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan

    2018-01-01

    Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  9. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments

    PubMed Central

    Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan

    2018-01-01

    Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio. PMID:29438438

  10. Text-Based On-Line Conferencing: A Conceptual and Empirical Analysis Using a Minimal Prototype.

    ERIC Educational Resources Information Center

    McCarthy, John C.; And Others

    1993-01-01

    Analyzes requirements for text-based online conferencing through the use of a minimal prototype. Topics discussed include prototyping with a minimal system; text-based communication; the system as a message passer versus the system as a shared data structure; and three exercises that showed how users worked with the prototype. (Contains 61…

  11. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    NASA Astrophysics Data System (ADS)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  12. Enhanced, Partially Redundant Emergency Notification System

    NASA Technical Reports Server (NTRS)

    Pounds, Clark D.

    2005-01-01

    The Johnson Space Center Emergency Notification System (JENS) software utilizes pre-existing computation and communication infrastructure to augment a prior variable-tone, siren-based, outdoor alarm system, in order to enhance the ability to give notice of emergencies to employees working in multiple buildings. The JENS software includes a component that implements an administrative Web site. Administrators can grant and deny access to the administrative site and to an originator Web site that enables authorized individuals to quickly compose and issue alarms. The originator site also facilitates maintenance and review of alarms already issued. A custom client/server application program enables an originator to notify every user who is logged in on a Microsoft Windows-based desktop computer by means of a pop-up message that interrupts, but does not disrupt, the user s work. Alternatively or in addition, the originator can send an alarm message to recipients on an e-mail distribution list and/or can post the notice on an internal Web site. An alarm message can consist of (1) text describing the emergency and suggesting a course of action and (2) a replica of the corresponding audible outdoor alarm.

  13. Message Passing on GPUs

    NASA Astrophysics Data System (ADS)

    Stuart, J. A.

    2011-12-01

    This paper explores the challenges in implementing a message passing interface usable on systems with data-parallel processors, and more specifically GPUs. As a case study, we design and implement the ``DCGN'' API on NVIDIA GPUs that is similar to MPI and allows full access to the underlying architecture. We introduce the notion of data-parallel thread-groups as a way to map resources to MPI ranks. We use a method that also allows the data-parallel processors to run autonomously from user-written CPU code. In order to facilitate communication, we use a sleep-based polling system to store and retrieve messages. Unlike previous systems, our method provides both performance and flexibility. By running a test suite of applications with different communication requirements, we find that a tolerable amount of overhead is incurred, somewhere between one and five percent depending on the application, and indicate the locations where this overhead accumulates. We conclude that with innovations in chipsets and drivers, this overhead will be mitigated and provide similar performance to typical CPU-based MPI implementations while providing fully-dynamic communication.

  14. Digital Voting Systems and Communication in Classroom Lectures--An Empirical Study Based around Physics Teaching at Bachelor Level at Two Danish Universities

    ERIC Educational Resources Information Center

    Mathiasen, Helle

    2015-01-01

    Studies on the use of digital voting systems in large group teaching situations have often focused on the "non-anonymity" and control and testing functions that the technology provides. There has also been some interest in how students might use their votes tactically to gain "credits". By focusing on an empirical study of…

  15. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    NASA Astrophysics Data System (ADS)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  16. Exploring bi-directional and SMS messaging for communications between Public Health Agencies and their stakeholders: a qualitative study.

    PubMed

    Revere, Debra; Calhoun, Rebecca; Baseman, Janet; Oberle, Mark

    2015-07-08

    Communication technologies that enable bi-directional/two-way communications and cell phone texting (SMS) between public health agencies and their stakeholders may improve public health surveillance, ensure targeted distribution of alerts to hard-to-reach populations, reduce mortality and morbidity in an emergency, and enable a crucial feedback loop between public health agencies and the communities they serve. Building on prior work regarding health care provider preferences for receiving one-way public health communications by email, fax or SMS, we conducted a formative, exploratory study to understand how a bi-directional system and the incorporation of SMS in that system might be used as a strategy to send and receive messages between public health agencies and community-based organizations which serve vulnerable populations, health care providers, and public health workers. Our research question: Under what conditions and/or situations might public health agencies utilize bi-directional and/or SMS messaging for disseminating time-sensitive public health information (alerts, advisories, updates, etc.) to their stakeholders? A mixed methods (qualitative and quantitative) study was conducted between April and July 2014. Data collection included a survey distributed to health care providers and semi-structured interviews with providers, community- and government-based organization leaders and directors, and public health agency internal workforce staff. Survey respondents and interviewees were asked about their exposure to public health messages, how these messages are received and how the information in these messages are handled, and in what situations (for example, a local vs. a national event, a pandemic or emergency vs. a health update) a bi-directional and/or SMS messaging system might improve communications between public health agencies and their stakeholder group. Interview and survey data were qualitatively analyzed. Thematic codes were quantitized into dichotomous variables of 0 or 1 on a per respondent basis to enumerate the presence or absence of each thematic code, enable quantitative analysis, and inform interpretation of findings. Five major themes emerged from synthesizing survey and interview results: 1) Regardless of situational context (emergency vs. non-urgent) and message recipient (stakeholder group), e-mail is a favored modality for receiving public health messages; 2) The decision to use bi-directional, SMS or multiple communication strategies is complex and public health agencies' need to manage messaging concerns/barriers and benefits for all parties; 3) Both public health agencies and their stakeholders share similar values/uses and concerns regarding two-way public health messaging and SMS; 4) Public health is highly trusted, thus thoughtful, effective messaging will ensure continuation of this goodwill; and 5) Information reciprocity between public health agencies and stakeholders who share their information is essential. Multiple communication strategies might be utilized but the choice of a specific strategy needs to balance message content (emergency vs. routine communications), delivery (one- vs. two-way), channel (SMS, email, etc.), and public health agency burden with stakeholder preferences and technical capabilities, all while mitigating the risk of message overload and disregard of important communications by recipients.

  17. Error Recovery in the Time-Triggered Paradigm with FTT-CAN.

    PubMed

    Marques, Luis; Vasconcelos, Verónica; Pedreiras, Paulo; Almeida, Luís

    2018-01-11

    Data networks are naturally prone to interferences that can corrupt messages, leading to performance degradation or even to critical failure of the corresponding distributed system. To improve resilience of critical systems, time-triggered networks are frequently used, based on communication schedules defined at design-time. These networks offer prompt error detection, but slow error recovery that can only be compensated with bandwidth overprovisioning. On the contrary, the Flexible Time-Triggered (FTT) paradigm uses online traffic scheduling, which enables a compromise between error detection and recovery that can achieve timely recovery with a fraction of the needed bandwidth. This article presents a new method to recover transmission errors in a time-triggered Controller Area Network (CAN) network, based on the Flexible Time-Triggered paradigm, namely FTT-CAN. The method is based on using a server (traffic shaper) to regulate the retransmission of corrupted or omitted messages. We show how to design the server to simultaneously: (1) meet a predefined reliability goal, when considering worst case error recovery scenarios bounded probabilistically by a Poisson process that models the fault arrival rate; and, (2) limit the direct and indirect interference in the message set, preserving overall system schedulability. Extensive simulations with multiple scenarios, based on practical and randomly generated systems, show a reduction of two orders of magnitude in the average bandwidth taken by the proposed error recovery mechanism, when compared with traditional approaches available in the literature based on adding extra pre-defined transmission slots.

  18. Error Recovery in the Time-Triggered Paradigm with FTT-CAN

    PubMed Central

    Pedreiras, Paulo; Almeida, Luís

    2018-01-01

    Data networks are naturally prone to interferences that can corrupt messages, leading to performance degradation or even to critical failure of the corresponding distributed system. To improve resilience of critical systems, time-triggered networks are frequently used, based on communication schedules defined at design-time. These networks offer prompt error detection, but slow error recovery that can only be compensated with bandwidth overprovisioning. On the contrary, the Flexible Time-Triggered (FTT) paradigm uses online traffic scheduling, which enables a compromise between error detection and recovery that can achieve timely recovery with a fraction of the needed bandwidth. This article presents a new method to recover transmission errors in a time-triggered Controller Area Network (CAN) network, based on the Flexible Time-Triggered paradigm, namely FTT-CAN. The method is based on using a server (traffic shaper) to regulate the retransmission of corrupted or omitted messages. We show how to design the server to simultaneously: (1) meet a predefined reliability goal, when considering worst case error recovery scenarios bounded probabilistically by a Poisson process that models the fault arrival rate; and, (2) limit the direct and indirect interference in the message set, preserving overall system schedulability. Extensive simulations with multiple scenarios, based on practical and randomly generated systems, show a reduction of two orders of magnitude in the average bandwidth taken by the proposed error recovery mechanism, when compared with traditional approaches available in the literature based on adding extra pre-defined transmission slots. PMID:29324723

  19. The Impact of Anonymous and Assigned Use of Student Response Systems on Student Achievement

    ERIC Educational Resources Information Center

    Poole, Dawn

    2012-01-01

    This study examined the impact of two approaches to use of student response systems (SRSs) on achievement in a study designed to better understand effective use of the devices. One condition was anonymous use of SRSs, in which graduate students selected a random clicker when entering the classroom. The second condition assigned devices to students…

  20. A Model-based Approach to Controlling the ST-5 Constellation Lights-Out Using the GMSEC Message Bus and Simulink

    NASA Technical Reports Server (NTRS)

    Witt, Kenneth J.; Stanley, Jason; Shendock, Robert; Mandl, Daniel

    2005-01-01

    Space Technology 5 (ST-5) is a three-satellite constellation, technology validation mission under the New Millennium Program at NASA to be launched in March 2006. One of the key technologies to be validated is a lights-out, model-based operations approach to be used for one week to control the ST-5 constellation with no manual intervention. The ground architecture features the GSFC Mission Services Evolution Center (GMSEC) middleware, which allows easy plugging in of software components and a standardized messaging protocol over a software bus. A predictive modeling tool built on MatLab's Simulink software package makes use of the GMSEC standard messaging protocol to interface to the Advanced Mission Planning System (AMPS) Scenario Scheduler which controls all activities, resource allocation and real-time re-profiling of constellation resources when non-nominal events occur. The key features of this system, which we refer to as the ST-5 Simulink system, are as follows: Original daily plan is checked to make sure that predicted resources needed are available by comparing the plan against the model. As the plan is run in real-time, the system re-profiles future activities in real-time if planned activities do not occur in the predicted timeframe or fashion. Alert messages are sent out on the GMSEC bus by the system if future predicted problems are detected. This will allow the Scenario Scheduler to correct the situation before the problem happens. The predictive model is evolved automatically over time via telemetry updates thus reducing the cost of implementing and maintaining the models by an order of magnitude from previous efforts at GSFC such as the model-based system built for MAP in the mid-1990's. This paper will describe the key features, lessons learned and implications for future missions once this system is successfully validated on-orbit in 2006.

  1. Patient-Provider Communication: Does Electronic Messaging Reduce Incoming Telephone Calls?

    PubMed

    Dexter, Eve N; Fields, Scott; Rdesinski, Rebecca E; Sachdeva, Bhavaya; Yamashita, Daisuke; Marino, Miguel

    2016-01-01

    Internet-based patient portals are increasingly being implemented throughout health care organizations to enhance health and optimize communication between patients and health professionals. The decision to adopt a patient portal requires careful examination of the advantages and disadvantages of implementation. This study aims to investigate 1 proposed advantage of implementation: alleviating some of the clinical workload faced by employees. A retrospective time-series analysis of the correlation between the rate of electronic patient-to-provider messages-a common attribute of Internet-based patient portals-and incoming telephone calls. The rate of electronic messages and incoming telephone calls were monitored from February 2009 to June 2014 at 4 economically diverse clinics (a federally qualified health center, a rural health clinic, a community-based clinic, and a university-based clinic) related to 1 university hospital. All 4 clinics showed an increase in the rate of portal use as measured by electronic patient-to-provider messaging during the study period. Electronic patient-to-provider messaging was significantly positively correlated with incoming telephone calls at 2 of the clinics (r = 0.546, P < .001 and r = 0.543, P < .001). The remaining clinics were not significantly correlated but demonstrated a weak positive correlation (r = 0.098, P = .560 and r = 0.069, P = .671). Implementation and increased use of electronic patient-to-provider messaging was associated with increased use of telephone calls in 2 of the study clinics. While practices are increasingly making the decision of whether to implement a patient portal as part of their system of care, it is important that the motivation behind such a change not be based on the idea that it will alleviate clinical workload. © Copyright 2016 by the American Board of Family Medicine.

  2. A Software Technology Transition Entropy Based Engineering Model

    DTIC Science & Technology

    2002-03-01

    Systems Basics, p273). (Prigogine 1997 p81). It is not the place of this research to provide a mathematical formalism with theorems and lemmas. Rather...science). The ancient philosophers, 27 Pythagoras , Protagoras, Socrates, and Plato start the first discourse (the message) that has continued...unpacking of the technology "message" from Pythagoras . This process is characterized by accumulation learning, modeled by learning curves in

  3. A Multi-mission Event-Driven Component-Based System for Support of Flight Software Development, ATLO, and Operations first used by the Mars Science Laboratory (MSL) Project

    NASA Technical Reports Server (NTRS)

    Dehghani, Navid; Tankenson, Michael

    2006-01-01

    This paper details an architectural description of the Mission Data Processing and Control System (MPCS), an event-driven, multi-mission ground data processing components providing uplink, downlink, and data management capabilities which will support the Mars Science Laboratory (MSL) project as its first target mission. MPCS is developed based on a set of small reusable components, implemented in Java, each designed with a specific function and well-defined interfaces. An industry standard messaging bus is used to transfer information among system components. Components generate standard messages which are used to capture system information, as well as triggers to support the event-driven architecture of the system. Event-driven systems are highly desirable for processing high-rate telemetry (science and engineering) data, and for supporting automation for many mission operations processes.

  4. Volcano warning systems: Chapter 67

    USGS Publications Warehouse

    Gregg, Chris E.; Houghton, Bruce F.; Ewert, John W.

    2015-01-01

    Messages conveying volcano alert level such as Watches and Warnings are designed to provide people with risk information before, during, and after eruptions. Information is communicated to people from volcano observatories and emergency management agencies and from informal sources and social and environmental cues. Any individual or agency can be both a message sender and a recipient and multiple messages received from multiple sources is the norm in a volcanic crisis. Significant challenges to developing effective warning systems for volcanic hazards stem from the great diversity in unrest, eruption, and post-eruption processes and the rapidly advancing digital technologies that people use to seek real-time risk information. Challenges also involve the need to invest resources before unrest to help people develop shared mental models of important risk factors. Two populations of people are the target of volcano notifications–ground- and aviation-based populations, and volcano warning systems must address both distinctly different populations.

  5. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  6. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  7. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  8. System and method for authentication of goods

    DOEpatents

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  9. Online Meta-data Collection and Monitoring Framework for the STAR Experiment at RHIC

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Lauret, J.; Betts, W.; Van Buren, G.

    2012-12-01

    The STAR Experiment further exploits scalable message-oriented model principles to achieve a high level of control over online data streams. In this paper we present an AMQP-powered Message Interface and Reliable Architecture framework (MIRA), which allows STAR to orchestrate the activities of Meta-data Collection, Monitoring, Online QA and several Run-Time and Data Acquisition system components in a very efficient manner. The very nature of the reliable message bus suggests parallel usage of multiple independent storage mechanisms for our meta-data. We describe our experience with a robust data-taking setup employing MySQL- and HyperTable-based archivers for meta-data processing. In addition, MIRA has an AJAX-enabled web GUI, which allows real-time visualisation of online process flow and detector subsystem states, and doubles as a sophisticated alarm system when combined with complex event processing engines like Esper, Borealis or Cayuga. The performance data and our planned path forward are based on our experience during the 2011-2012 running of STAR.

  10. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  11. The efficacy of mobile phone-based text message interventions ('Happy Quit') for smoking cessation in China.

    PubMed

    Liao, Yanhui; Wu, Qiuxia; Tang, Jinsong; Zhang, Fengyu; Wang, Xuyi; Qi, Chang; He, Haoyu; Long, Jiang; Kelly, Brian C; Cohen, Joanna

    2016-08-19

    Considering the extreme shortage of smoking cessation services in China, and the acceptability, feasibility and efficacy of mobile phone-based text message interventions for quitting smoking in other countries, here we propose a study of "the efficacy of mobile phone-based text message interventions ('Happy Quit') for smoking cessation in China". The primary objective of this proposed project is to assess whether a program of widely accessed mobile phone-based text message interventions ('Happy Quit') will be effective at helping people in China who smoke, to quit. Based on the efficacy of previous studies in smoking cessation, we hypothesize that 'Happy Quit' will be an effective, feasible and affordable smoking cessation program in China. In this single-blind, randomized trial, undertaken in China, about 2000 smokers willing to make a quit attempt will be randomly allocated, using an independent telephone randomization system that includes a minimization algorithm balancing for sex (male, female), age (19-34 or >34 years), educational level (≤ or >12 years), and Fagerstrom score for nicotine addiction (≤5, >5), to 'Happy Quit', comprising motivational messages and behavioral-change support, or to a control group that receives text messages unrelated to quitting. Messages will be developed to be suitable for Chinese. A pilot study will be conducted before the intervention to modify the library of messages and interventions. The primary outcome will be self-reported continuous smoking abstinence. A secondary outcome will be point prevalence of abstinence. Abstinence will be assessed at six time points (4, 8, 12, 16, 20 and 24 weeks post-intervention). A third outcome will be reductions in number of cigarettes smoked per day. The results will provide valuable insights into bridging the gap between need and services received for smoking cessation interventions and tobacco use prevention in China. It will also serve as mHealth model for extending the public health significance of other interventions, such as mental health interventions. NCT02693626 (Registration data April 11, 2016).

  12. Simultaneous trilateral communication based on three mutually coupled chaotic semiconductor lasers with optical feedback.

    PubMed

    Li, Qiliang; Lu, Shanshan; Bao, Qi; Chen, Dewang; Hu, Miao; Zeng, Ran; Yang, Guowei; Li, Shuqin

    2018-01-10

    In this paper, we propose a chaos-based scheme allowing for trilateral communication among three mutually coupled chaotic semiconductor lasers. The coupling through a partially transparent optical mirror between two lasers induces the chaotic dynamics. We numerically solve the delay rate equations of three lasers and demonstrate that the dynamics is completely synchronous. Herein, each laser is not only a transmitter but a receiver; three different messages are encoded by simultaneously modulating bias current of the three lasers. By monitoring the synchronization error between transmitter and receiver, and comparing the error with the message of the local laser, we can decipher the message of the sender. The investigation indicates that these messages introduced on the two ends of each link among three lasers can be simultaneously transmitted and restored, so the system can realize simultaneous trilateral communication. In this scheme, an eavesdropper can monitor the synchronization error, but one has no way to obtain the bits that are being sent, so the trilateral communication is secure.

  13. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    PubMed

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  14. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  15. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  16. Internet-based recruitment system for HIV and STI screening for men who have sex with men in Estonia, 2013: analysis of preliminary outcomes.

    PubMed

    Ruutel, K; Lohmus, L; Janes, J

    2015-04-16

    The aim of the current project was to develop an Internet-based recruitment system for HIV and sexually transmitted infection (STI) screening for men who have sex with men (MSM) in Estonia in order to collect biological samples during behavioural studies. In 2013, an Internet-based HIV risk-behaviour survey was conducted among MSM living in Estonia. After completing the questionnaire, all participants were offered anonymous and free-of-charge STI testing. They could either order a urine sample kit by post to screen for chlamydia infections (including lymphogranuloma venereum (LGV)), trichomoniasis, gonorrhoea and Mycoplasma genitalium infections, or visit a laboratory for HIV, hepatitis A virus, hepatitis B virus,hepatitis C virus and syphilis screening. Of 301 participants who completed the questionnaire, 265 (88%),reported that they were MSM. Of these 265 MSM,68 (26%) underwent various types of testing. In the multiple regression analysis, Russian as the first language,previous HIV testing and living in a city or town increased the odds of testing during the study. Linking Internet-based behavioural data collection with biological sample collection is a promising approach. As there are no specific STI services for MSM in Estonia,this system could also be used as an additional option for anonymous and free-of-charge STI screening.

  17. Neural bases of ingroup altruistic motivation in soccer fans.

    PubMed

    Bortolini, Tiago; Bado, Patrícia; Hoefle, Sebastian; Engel, Annerose; Zahn, Roland; de Oliveira Souza, Ricardo; Dreher, Jean-Claude; Moll, Jorge

    2017-11-23

    Humans have a strong need to belong to social groups and a natural inclination to benefit ingroup members. Although the psychological mechanisms behind human prosociality have extensively been studied, the specific neural systems bridging group belongingness and altruistic motivation remain to be identified. Here, we used soccer fandom as an ecological framing of group membership to investigate the neural mechanisms underlying ingroup altruistic behaviour in male fans using event-related functional magnetic resonance. We designed an effort measure based on handgrip strength to assess the motivation to earn money (i) for oneself, (ii) for anonymous ingroup fans, or (iii) for a neutral group of anonymous non-fans. While overlapping valuation signals in the medial orbitofrontal cortex (mOFC) were observed for the three conditions, the subgenual cingulate cortex (SCC) exhibited increased functional connectivity with the mOFC as well as stronger hemodynamic responses for ingroup versus outgroup decisions. These findings indicate a key role for the SCC, a region previously implicated in altruistic decisions and group affiliation, in dovetailing altruistic motivations with neural valuation systems in real-life ingroup behaviour.

  18. Developing and Pretesting a Text Messaging Program for Health Behavior Change: Recommended Steps.

    PubMed

    Abroms, Lorien C; Whittaker, Robyn; Free, Caroline; Mendel Van Alstyne, Judith; Schindler-Ruwisch, Jennifer M

    2015-12-21

    A growing body of evidence demonstrates that text messaging-based programs (short message service [SMS]) on mobile phones can help people modify health behaviors. Most of these programs have consisted of automated and sometimes interactive text messages that guide a person through the process of behavior change. This paper provides guidance on how to develop text messaging programs aimed at changing health behaviors. Based on their collective experience in designing, developing, and evaluating text messaging programs and a review of the literature, the authors drafted the guide. One author initially drafted the guide and the others provided input and review. Steps for developing a text messaging program include conducting formative research for insights into the target audience and health behavior, designing the text messaging program, pretesting the text messaging program concept and messages, and revising the text messaging program. The steps outlined in this guide may help in the development of SMS-based behavior change programs.

  19. How lay people respond to messages about genetics, health, and race.

    PubMed

    Condit, C; Bates, B

    2005-08-01

    There is a growing movement in medical genetics to develop, implement, and promote a model of race-based medicine. Although race-based medicine may become a widely disseminated standard of care, messages that advocate race-based selection for diagnosing, screening and prescribing drugs may exacerbate health disparities. These messages are present in clinical genetic counseling sessions, mass media, and everyday talk. Messages promoting linkages among genes, race, and health and messages emphasizing genetic causation may promote both general racism and genetically based racism. This mini-review examines research in three areas: studies that address the effects of these messages about genetics on levels of genetic determinism and genetic discrimination; studies that address the effects of these messages on attitudes about race; and, studies of the impacts of race-specific genetic messages on recipients. Following an integration of this research, this mini-review suggests that the current literature appears fragmented because of methodological and measurement issues and offers strategies for future research. Finally, the authors offer a path model to help organize future research examining the effects of messages about genetics on socioculturally based racism, genetically based racism, and unaccounted for racism. Research in this area is needed to understand and mitigate the negative attitudinal effects of messages that link genes, race, and health and/or emphasize genetic causation.

  20. Design and implementation considerations of a MSAT packet data network

    NASA Technical Reports Server (NTRS)

    Karam, Fouad G.; Hearn, Terry; Rohr, Doug; Guibord, Arthur F.

    1993-01-01

    The Mobile Data System, which is intended to provide for packet switched data services is currently under development. The system is based on a star network topology consisting of a centralized Data Hub (DH) serving a large number of mobile terminals. Through the Data Hub, end-to-end connections can be established between terrestrial users on public or private data networks and mobile users. The MDS network will be capable of offering a variety of services some of which are based on the standard X.25 network interface protocol, and others optimized for short messages and broadcast messages. A description of these services and the trade-offs in the DH design are presented.

  1. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  2. Extended write combining using a write continuation hint flag

    DOEpatents

    Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin; Vranas, Pavlos

    2013-06-04

    A computing apparatus for reducing the amount of processing in a network computing system which includes a network system device of a receiving node for receiving electronic messages comprising data. The electronic messages are transmitted from a sending node. The network system device determines when more data of a specific electronic message is being transmitted. A memory device stores the electronic message data and communicating with the network system device. A memory subsystem communicates with the memory device. The memory subsystem stores a portion of the electronic message when more data of the specific message will be received, and the buffer combines the portion with later received data and moves the data to the memory device for accessible storage.

  3. Learning experiences in population education: proposed guidelines and core messages.

    PubMed

    1984-01-01

    As a result of the 1984 Regional Workshop for the Development of Packages of Adequate Learning Requirements in Population Education, the participants tackled the problem of non-institutionalization of population education into the formal and non-formal educational curricula in their countries. Based on their deliberations, several sets of guidelines and core messages were formulated to provide countries with a more definite direction that will hopefully ensure the functional and effective integration of population education in their respective national school and out-of-school curriculum system. Useful packages of learning materials in population education should help realize the country's population policy and goals within the broader framework of socioeconomic development, and the content of the package should comprehensively cover the core messages of the country's Population Information, Education and Communication (IEC) Program. The population knowledge base of the package should be accurate and relevant; the package should provide for graphic and visual presentation and for assessment of effects on the target groups. Proposed core messages in population education discuss the advantages of small family size and delayed marriage, and aspects of responsible parenthood. Other messages discuss population resource development and population-related beliefs and values.

  4. Medical document anonymization with a semantic lexicon.

    PubMed Central

    Ruch, P.; Baud, R. H.; Rassinoux, A. M.; Bouillon, P.; Robert, G.

    2000-01-01

    We present an original system for locating and removing personally-identifying information in patient records. In this experiment, anonymization is seen as a particular case of knowledge extraction. We use natural language processing tools provided by the MEDTAG framework: a semantic lexicon specialized in medicine, and a toolkit for word-sense and morpho-syntactic tagging. The system finds 98-99% of all personally-identifying information. PMID:11079980

  5. Development and Testing of an Automated 4-Day Text Messaging Guidance as an Aid for Improving Colonoscopy Preparation

    PubMed Central

    Klare, Peter; Neu, Bruno; Schmid, Roland M; von Delius, Stefan

    2016-01-01

    Background In gastroenterology a sufficient colon cleansing improves adenoma detection rate and prevents the need for preterm repeat colonoscopies due to invalid preparation. It has been shown that patient education is of major importance for improvement of colon cleansing. Objective Objective of this study was to assess the function of an automated text messaging (short message service, SMS)–supported colonoscopy preparation starting 4 days before colonoscopy appointment. Methods After preevaluation to assess mobile phone usage in the patient population for relevance of this approach, a Web-based, automated SMS text messaging system was developed, following which a single-center feasibility study at a tertiary care center was performed. Patients scheduled for outpatient colonoscopy were invited to participate. Patients enrolled in the study group received automated information about dietary recommendations and bowel cleansing during colonoscopy preparation. Data of outpatient colonoscopies with regular preparation procedure were used for pair matching and served as control. Primary end point was feasibility of SMS text messaging support in colonoscopy preparation assessed as stable and satisfactory function of the system. Secondary end points were quality of bowel preparation according to the Boston Bowel Preparation Scale (BBPS) and patient satisfaction with SMS text messaging–provided information assessed by a questionnaire. Results Web-based SMS text messaging–supported colonoscopy preparation was successful and feasible in 19 of 20 patients. Mean (standard error of the mean, SEM) total BBPS score was slightly higher in the SMS group than in the control group (7.3, SEM 0.3 vs 6.4, SEM 0.2) and for each colonic region (left, transverse, and right colon). Patient satisfaction regarding SMS text messaging–based information was high. Conclusions Using SMS for colonoscopy preparation with 4 days’ guidance including dietary recommendation is a new approach to improve colonoscopy preparation. Quality of colonoscopy preparation was sufficient and patients were highly satisfied with the system during colonoscopy preparation. PMID:27329204

  6. Development of patient-centric linguistically tailored psychoeducational messages to support nutrition and medication self-management in type 2 diabetes: a feasibility study

    PubMed Central

    Ellis, Rebecca J Bartlett; Connor, Ulla; Marshall, James

    2014-01-01

    Purpose This study evaluated the feasibility of developing linguistically tailored educational messages designed to match the linguistic styles of patients segmented into types with the Descriptor™, and to determine patient preferences for tailored or standard messages based on their segments. Patients and methods Twenty patients with type 2 diabetes (T2DM) were recruited from a diabetes health clinic. Participants were segmented using the Descriptor™, a language-based questionnaire, to identify patient types based on their control orientation (internal/external), agency (high/low), and affect (positive/negative), which are well studied constructs related to T2DM self-management. Two of the seven self-care behaviors described by the American Association of Diabetes Educators (healthy eating and taking medication) were used to develop standard messages and then linguistically tailored using features of the six different construct segment types of the Descriptor™. A subset of seven participants each provided feedback on their preference for standard or linguistically tailored messages; 12 comparisons between standard and tailored messages were made. Results Overall, the tailored messages were preferred to the standard messages. When the messages were matched to specific construct segment types, the tailored messages were preferred over the standard messages, although this was not statistically significant. Conclusion Linguistically tailoring messages based on construct segments is feasible. Furthermore, tailored messages were more often preferred over standard messages. This study provides some preliminary evidence for tailoring messages based on the linguistic features of control orientation, agency, and affect. The messages developed in this study should be tested in a larger more representative sample. The present study did not explore whether tailored messages were better understood. This research will serve as preliminary evidence to develop future studies with the ultimate goal to design intervention studies to investigate if linguistically tailoring communication within the context of patient education influences patient knowledge, motivation, and activation toward making healthy behavior changes in T2DM self-management. PMID:25336928

  7. Hypertext: Improved Capability for Shipboard Naval Messages

    DTIC Science & Technology

    1989-09-01

    message handling system; a complete working model of the system has not been developed . 3 D. ORGANIZATION OF STUDY 1. The "Paperless" Ship Initiative...work in tandem to improve afloat message handling procedures. The objective of the PCMT project is to develop a system that could be installed on...working group has identified a list of requirements to guide the DoD’s progress towards improving its message communication system. These

  8. Scalable Integrated Multi-Mission Support System (SIMSS) Simulator Release 2.0 for GMSEC

    NASA Technical Reports Server (NTRS)

    Kim, John; Velamuri, Sarma; Casey, Taylor; Bemann, Travis

    2012-01-01

    Scalable Integrated Multi-Mission Support System (SIMSS) Simulator Release 2.0 software is designed to perform a variety of test activities related to spacecraft simulations and ground segment checks. This innovation uses the existing SIMSS framework, which interfaces with the GMSEC (Goddard Mission Services Evolution Center) Application Programming Interface (API) Version 3.0 message middleware, and allows SIMSS to accept GMSEC standard messages via the GMSEC message bus service. SIMSS is a distributed, component-based, plug-and-play client-server system that is useful for performing real-time monitoring and communications testing. SIMSS runs on one or more workstations, and is designed to be user-configurable, or to use predefined configurations for routine operations. SIMSS consists of more than 100 modules that can be configured to create, receive, process, and/or transmit data. The SIMSS/GMSEC innovation is intended to provide missions with a low-cost solution for implementing their ground systems, as well as to significantly reduce a mission s integration time and risk.

  9. Upgrading the Space Shuttle Caution and Warning System

    NASA Technical Reports Server (NTRS)

    McCandless, Jeffrey W.; McCann, Robert S.; Hilty, Bruce T.

    2005-01-01

    A report describes the history and the continuing evolution of an avionic system aboard the space shuttle, denoted the caution and warning system, that generates visual and auditory displays to alert astronauts to malfunctions. The report focuses mainly on planned human-factors-oriented upgrades of an alphanumeric fault-summary display generated by the system. Such upgrades are needed because the display often becomes cluttered with extraneous messages that contribute to the difficulty of diagnosing malfunctions. In the first of two planned upgrades, the fault-summary display will be rebuilt with a more logical task-oriented graphical layout and multiple text fields for malfunction messages. In the second upgrade, information displayed will be changed, such that text fields will indicate only the sources (that is, root causes) of malfunctions; messages that are not operationally useful will no longer appear on the displays. These and other aspects of the upgrades are based on extensive collaboration among astronauts, engineers, and human-factors scientists. The report describes the human-factors principles applied in the upgrades.

  10. Response efficacy: the key to minimizing rejection and maximizing acceptance of emotion-based anti-speeding messages.

    PubMed

    Lewis, I M; Watson, B; White, K M

    2010-03-01

    This study sought to improve understanding of the persuasive process of emotion-based appeals not only in relation to negative, fear-based appeals but also for appeals based upon positive emotions. In particular, the study investigated whether response efficacy, as a cognitive construct, mediated outcome measures of message effectiveness in terms of both acceptance and rejection of negative and positive emotion-based messages. Licensed drivers (N=406) participated via the completion of an on-line survey. Within the survey, participants received either a negative (fear-based) appeal or one of the two possible positive appeals (pride or humor-based). Overall, the study's findings confirmed the importance of emotional and cognitive components of persuasive health messages and identified response efficacy as a key cognitive construct influencing the effectiveness of not only fear-based messages but also positive emotion-based messages. Interestingly, however, the results suggested that response efficacy's influence on message effectiveness may differ for positive and negative emotion-based appeals such that significant indirect (and mediational) effects were found with both acceptance and rejection of the positive appeals yet only with rejection of the fear-based appeal. As such, the study's findings provide an important extension to extant literature and may inform future advertising message design. Copyright 2009 Elsevier Ltd. All rights reserved.

  11. Asynchronous Message Service Reference Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.

  12. Monitoring tools of COMPASS experiment at CERN

    NASA Astrophysics Data System (ADS)

    Bodlak, M.; Frolov, V.; Huber, S.; Jary, V.; Konorov, I.; Levit, D.; Novy, J.; Salac, R.; Tomsa, J.; Virius, M.

    2015-12-01

    This paper briefly introduces the data acquisition system of the COMPASS experiment and is mainly focused on the part that is responsible for the monitoring of the nodes in the whole newly developed data acquisition system of this experiment. The COMPASS is a high energy particle experiment with a fixed target located at the SPS of the CERN laboratory in Geneva, Switzerland. The hardware of the data acquisition system has been upgraded to use FPGA cards that are responsible for data multiplexing and event building. The software counterpart of the system includes several processes deployed in heterogenous network environment. There are two processes, namely Message Logger and Message Browser, taking care of monitoring. These tools handle messages generated by nodes in the system. While Message Logger collects and saves messages to the database, the Message Browser serves as a graphical interface over the database containing these messages. For better performance, certain database optimizations have been used. Lastly, results of performance tests are presented.

  13. Development and Usability of REACH: A Tailored Theory-Based Text Messaging Intervention for Disadvantaged Adults With Type 2 Diabetes.

    PubMed

    Nelson, Lyndsay A; Mayberry, Lindsay S; Wallston, Kenneth; Kripalani, Sunil; Bergner, Erin M; Osborn, Chandra Y

    2016-09-08

    Among adults with type 2 diabetes mellitus (T2DM), adherence to recommended self-care activities is suboptimal, especially among racial and ethnic minorities with low income. Self-care nonadherence is associated with having worse glycemic control and diabetes complications. Text messaging interventions are improving the self-care of adults with T2DM, but few have been tested with disadvantaged populations. To develop Rapid Education/Encouragement And Communications for Health (REACH), a tailored, text messaging intervention to support the self-care adherence of disadvantaged patients with T2DM, based on the Information-Motivation-Behavioral skills model. We then tested REACH's usability to make improvements before evaluating its effects. We developed REACH's content and functionality using an empirical and theory-based approach, findings from a previously pilot-tested intervention, and the expertise of our interdisciplinary research team. We recruited 36 adults with T2DM from Federally Qualified Health Centers to participate in 1 of 3 rounds of usability testing. For 2 weeks, participants received daily text messages assessing and promoting self-care, including tailored messages addressing users' unique barriers to adherence, and weekly text messages with adherence feedback. We analyzed quantitative and qualitative user feedback and system-collected data to improve REACH. Participants were, on average, 52.4 (SD 9.5) years old, 56% (20/36) female, 63% (22/35) were a racial or ethnic minority, and 67% (22/33) had an income less than US $35,000. About half were taking insulin, and average hemoglobin A1c level was 8.2% (SD 2.2%). We identified issues (eg, user concerns with message phrasing, technical restrictions with responding to assessment messages) and made improvements between testing rounds. Overall, participants favorably rated the ease of understanding (mean 9.6, SD 0.7) and helpfulness (mean 9.3, SD 1.4) of self-care promoting text messages on a scale of 1-10, responded to 96% of assessment text messages, and rated the helpfulness of feedback text messages 8.5 (SD 2.7) on a scale of 1-10. User feedback led to refining our study enrollment process so that users understood the flexibility in message timing and that computers, not people, send the messages. Furthermore, research assistants' feedback on the enrollment process helped improve participants' engagement with study procedures. Testing technology-delivered interventions with disadvantaged adults revealed preferences and concerns unique to this population. Through iterative testing and multiple data sources, we identified and responded to users' intervention preferences, technical issues, and shortcomings in our research procedures.

  14. Efficient Data Generation and Publication as a Test Tool

    NASA Technical Reports Server (NTRS)

    Einstein, Craig Jakob

    2017-01-01

    A tool to facilitate the generation and publication of test data was created to test the individual components of a command and control system designed to launch spacecraft. Specifically, this tool was built to ensure messages are properly passed between system components. The tool can also be used to test whether the appropriate groups have access (read/write privileges) to the correct messages. The messages passed between system components take the form of unique identifiers with associated values. These identifiers are alphanumeric strings that identify the type of message and the additional parameters that are contained within the message. The values that are passed with the message depend on the identifier. The data generation tool allows for the efficient creation and publication of these messages. A configuration file can be used to set the parameters of the tool and also specify which messages to pass.

  15. Dispatching packets on a global combining network of a parallel computer

    DOEpatents

    Almasi, Gheorghe [Ardsley, NY; Archer, Charles J [Rochester, MN

    2011-07-19

    Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.

  16. Communication theory and the search for effective feedback.

    PubMed

    Simonds, S K

    1995-01-01

    If messages transmitted to the public, patients and health professionals could be assured of being received, understood and acted on as intended by the senders of messages, there would be little need to focus on communications and feedback. That the physician's office, the healthcare system and the community are littered with messages that 'never got through' attests to the problem of ineffective communications and the absence of effective feedback. Communication theorists, health psychologists and thoughtful health professionals, particularly those working in community hypertension programmes, have developed approaches that improve the probabilities of 'getting the message through'. Theory-based communications with built-in feedback and 'feed-forward' enhance the probabilities of success considerably. This presentation explores these problems using the SMCR model of communication. Differences between linear models and transactional models are discussed. On the assumption that the health message environments of the future will be increasingly complex with highly differentiated target audiences in a rapid paced computer and electronically driven world, 'getting the message through' will become an even greater challenge than in the recent past. Specific steps to change communication approaches in this setting are proposed.

  17. Extending the explanatory utility of the EPPM beyond fear-based persuasion.

    PubMed

    Lewis, Ioni; Watson, Barry; White, Katherine M

    2013-01-01

    In the 20 years since its inception, the Extended Parallel Process Model (EPPM) has attracted much empirical support. Currently, and unsurprisingly, given that is a model of fear-based persuasion, the EPPM's explanatory utility has been based only upon fear-based messages. However, an argument is put forth herein that draws upon existing evidence that the EPPM may be an efficacious framework for explaining the persuasive process and outcomes of emotion-based messages more broadly when such messages are addressing serious health topics. For the current study, four different types of emotional appeals were purposefully devised and included a fear-, an annoyance/agitation-, a pride-, and a humor-based message. All messages addressed the serious health issue of road safety, and in particular the risky behavior of speeding. Participants (n = 551) were exposed to only one of the four messages and subsequently provided responses within a survey. A series of 2 (threat: low, high) × 2 (efficacy: low, high) analysis of variance was conducted for each of the appeals based on the EPPM's message outcomes of acceptance and rejection. Support was found for the EPPM with a number of main effects of threat and efficacy emerging, reflecting that, irrespective of emotional appeal type, high levels of threat and efficacy enhanced message outcomes via maximizing acceptance and minimizing rejection. Theoretically, the findings provide support for the explanatory utility of the EPPM for emotion-based health messages more broadly. In an applied sense, the findings highlight the value of adopting the EPPM as a framework when devising and evaluating emotion-based health messages for serious health topics.

  18. Probabilistic Priority Message Checking Modeling Based on Controller Area Networks

    NASA Astrophysics Data System (ADS)

    Lin, Cheng-Min

    Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.

  19. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    NASA Astrophysics Data System (ADS)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  20. AMS -- The Unix ADAM Message System

    NASA Astrophysics Data System (ADS)

    Kelly, B. D.; Chipperfield, A. J.

    The ADAM Message System (AMS) library, which implements the ADAM inter-task communications protocol under Unix, is described, along with its Fortran-callable interface (FAMS). The description of AMS is distinguished from the current implementation which uses the Message System Primitives (MSP).

  1. Multi-views storage model and access methods of conversation history in converged IP messaging system

    NASA Astrophysics Data System (ADS)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  2. Understanding Messaging Preferences to Inform Development of Mobile Goal-Directed Behavioral Interventions

    PubMed Central

    van Stolk-Cooke, Katherine; Morgenstern, Jon; Kuerbis, Alexis N; Markle, Kendra

    2014-01-01

    Background Mobile messaging interventions have been shown to improve outcomes across a number of mental health and health-related conditions, but there are still significant gaps in our knowledge of how to construct and deliver the most effective brief messaging interventions. Little is known about the ways in which subtle linguistic variations in message content can affect user receptivity and preferences. Objective The aim of this study was to determine whether any global messaging preferences existed for different types of language content, and how certain characteristics moderate those preferences, in an effort to inform the development of mobile messaging interventions. Methods This study examined user preferences for messages within 22 content groupings. Groupings were presented online in dyads of short messages that were identical in their subject matter, but structurally or linguistically varied. Participants were 277 individuals residing in the United States who were recruited and compensated through Amazon’s Mechanical Turk (MTurk) system. Participants were instructed to select the message in each dyad that they would prefer to receive to help them achieve a personal goal of their choosing. Results Results indicate global preferences of more than 75% of subjects for certain types of messages, such as those that were grammatically correct, free of textese, benefit-oriented, polite, nonaggressive, and directive as opposed to passive, among others. For several classes of messages, few or no clear global preferences were found. There were few personality- and trait-based moderators of message preferences, but subtle manipulations of message structure, such as changing “Try to…” to “You might want to try to…” affected message choice. Conclusions The results indicate that individuals are sensitive to variations in the linguistic content of text messages designed to help them achieve a personal goal and, in some cases, have clear preferences for one type of message over another. Global preferences were indicated for messages that contained accurate spelling and grammar, as well as messages that emphasize the positive over the negative. Research implications and a guide for developing short messages for goal-directed behaviors are presented in this paper. PMID:24500775

  3. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    PubMed Central

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  4. An Interactive Real-Time Locating System Based on Bluetooth Low-Energy Beacon Network †

    PubMed Central

    Lin, You-Wei

    2018-01-01

    The ubiquity of Bluetooth-enabled smartphones and peripherals has brought tremendous convenience to our daily life. In recent years, Bluetooth beacons have also been gaining popularity in implementing a variety of innovative location-based services such as self-guided systems in exhibition centers. However, the broadcast-based beacon technology can only provide unidirectional communication. In case smartphone users would like to respond to the beacon messages, they have to rely on their own mobile Internet connections to send the information back to the backend system. Nevertheless, mobile Internet services may not be always available or too costly. In this work, we develop a real-time locating system based only on the Bluetooth low energy (BLE) technology to support interactive communications by combining the broadcast and mesh topology options to extend the applicability of beacon solutions. Specifically, we turn the smartphone into a beacon device and augment the beacon devices with the capability of forming a mesh network. The implementation result shows that our beacon devices can detect the presence of specific users at specific locations, and then the presence state can be sent to the application server via the relay of beacon devices. Moreover, the application server can send personalized location-based messages to the users, again via the relay of beacon devices. With the capability of relaying messages between the beacon devices, it would be convenient for developers to implement a variety of interactive applications such as tracking VIP customers at the airport, or tracking an elder with Alzheimer’s disease in the neighborhood. PMID:29883386

  5. An Interactive Real-Time Locating System Based on Bluetooth Low-Energy Beacon Network †.

    PubMed

    Lin, You-Wei; Lin, Chi-Yi

    2018-05-21

    The ubiquity of Bluetooth-enabled smartphones and peripherals has brought tremendous convenience to our daily life. In recent years, Bluetooth beacons have also been gaining popularity in implementing a variety of innovative location-based services such as self-guided systems in exhibition centers. However, the broadcast-based beacon technology can only provide unidirectional communication. In case smartphone users would like to respond to the beacon messages, they have to rely on their own mobile Internet connections to send the information back to the backend system. Nevertheless, mobile Internet services may not be always available or too costly. In this work, we develop a real-time locating system based only on the Bluetooth low energy (BLE) technology to support interactive communications by combining the broadcast and mesh topology options to extend the applicability of beacon solutions. Specifically, we turn the smartphone into a beacon device and augment the beacon devices with the capability of forming a mesh network. The implementation result shows that our beacon devices can detect the presence of specific users at specific locations, and then the presence state can be sent to the application server via the relay of beacon devices. Moreover, the application server can send personalized location-based messages to the users, again via the relay of beacon devices. With the capability of relaying messages between the beacon devices, it would be convenient for developers to implement a variety of interactive applications such as tracking VIP customers at the airport, or tracking an elder with Alzheimer’s disease in the neighborhood.

  6. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    PubMed

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  7. [Current trends in gamete donation - psychosocial and ethical issues].

    PubMed

    Rumpíková, T; Oborná, I; Konečná, H

    2017-01-01

    To overview contemporary knowledge of legal and psychosocial rules in gamete donation. Previously, anonymous donation was preferred and recommended by experts but currently, with respect to the right to know the genetic origin of individuals, the relation to donor anonymity was reconsidered in many countries. There is a growing tendency to introduce the open identity system in gamete donation. Such system may guarantee that the child born after gamete donation may have receive the identification data of the donor of gametes. A review. Clinic of Reproductive Medicine and Gynecology Zlin. An overview of recent literature evaluating the influence of donor anonymity vs. open identity on psychosocial development of children born after gamete donation as well as on the quality of the relationship between parents and children in such families. New medical technologies usually overtake the developmental speed of ethics and psychology, and their impact on human society. Current trend to open identity is strong but there is no clear evidence that the open identity is of real importance for the healthy psychosocial development of a child born after gamete donation. Furthermore, there is no evidence that anonymity and secrecy of the gamete donation is harmful. In case of the consideration of the change in legal regulation in anonymity/open identity in gamete donation we would suggest the thorough consideration of all consequences.

  8. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications.

    PubMed

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-09-18

    Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.

  9. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fields, C.A.

    1994-09-01

    This Report concludes the DOE Human Genome Program project, ``Identification of Genes in Anonymous DNA Sequence.`` The central goals of this project have been (1) understanding the problem of identifying genes in anonymous sequences, and (2) development of tools, primarily the automated identification system gm, for identifying genes. The activities supported under the previous award are summarized here to provide a single complete report on the activities supported as part of the project from its inception to its completion.

  10. ExplaNet: A Collaborative Learning Tool and Hybrid Recommender System for Student-Authored Explanations

    ERIC Educational Resources Information Center

    Masters, Jessica; Madhyastha, Tara; Shakouri, Ali

    2008-01-01

    ExplaNet is a web-based, anonymous, asynchronous explanation-sharing network. Instructors post questions to the network and students submit explanatory answers. Students then view and rank the explanations submitted by their peers before optionally resubmitting a final and revised answer. Three classroom evaluations of ExplaNet showed that by…

  11. Furloughs and Faculty Management of Time: Maintaining Quality in an Economic Crisis

    ERIC Educational Resources Information Center

    Jones, Loring; Hohman, Melinda; Mathiesen, Sally; Finnegan, Daniel

    2014-01-01

    An anonymous Web-based survey was used to gather the perceptions and experiences from 114 faculty members teaching in 16 social work programs in the California State University system about the effect of severe budget cuts on their educational activities. Most respondents reported they worked on their furlough days and maintained the same or…

  12. Document Concurrence System

    NASA Technical Reports Server (NTRS)

    Muhsin, Mansour; Walters, Ian

    2004-01-01

    The Document Concurrence System is a combination of software modules for routing users expressions of concurrence with documents. This system enables determination of the current status of concurrences and eliminates the need for the prior practice of manually delivering paper documents to all persons whose approvals were required. This system runs on a server, and participants gain access via personal computers equipped with Web-browser and electronic-mail software. A user can begin a concurrence routing process by logging onto an administration module, naming the approvers and stating the sequence for routing among them, and attaching documents. The server then sends a message to the first person on the list. Upon concurrence by the first person, the system sends a message to the second person, and so forth. A person on the list indicates approval, places the documents on hold, or indicates disapproval, via a Web-based module. When the last person on the list has concurred, a message is sent to the initiator, who can then finalize the process through the administration module. A background process running on the server identifies concurrence processes that are overdue and sends reminders to the appropriate persons.

  13. Enhanced blood-brain barrier transport of vinpocetine by oral delivery of mixed micelles in combination with a message guider.

    PubMed

    Ding, Jiaojiao; Sun, Yujiao; Li, Jinfeng; Wang, Huimin; Mao, Shirui

    2017-07-01

    The blood-brain barrier represents an insurmountable obstacle for the therapy of central nervous system related diseases. Polymeric micelles have many desirable properties for brain targeting by oral delivery, but the stability and targeting efficiency needs to be improved. In this study, it was demonstrated that binary micelle system can compensate the drawbacks of mono system by preparing mixed micelles in combination with PEG-based copolymers. Here, we explored a brain targeting drug delivery system via facile approaches using P123 based mixed micelles in combination with a message guider from traditional Chinese medicine, borneol, for oral delivery. With higher drug-loading, improved stability, prolonged in vitro release profile, increased bioavailability and enhanced brain targeting effect was achieved after peroral delivery of the mixed micelles. More importantly, without extra structure modification for active targeting, it was demonstrated for the first time that oral delivery of vinpocetine loaded mixed micelles together with borneol is an effective way to increase drug concentration in the brain and the targeting efficiency is borneol dose dependent. Such a "simple but effective" modality may shed light on the potential use of polymeric micelles in combination with a message drug to achieve drug brain targeting or other targeting sites via oral delivery.

  14. A Multilayer Secure Biomedical Data Management System for Remotely Managing a Very Large Number of Diverse Personal Healthcare Devices.

    PubMed

    Park, KeeHyun; Lim, SeungHyeon

    2015-01-01

    In this paper, a multilayer secure biomedical data management system for managing a very large number of diverse personal health devices is proposed. The system has the following characteristics: the system supports international standard communication protocols to achieve interoperability. The system is integrated in the sense that both a PHD communication system and a remote PHD management system work together as a single system. Finally, the system proposed in this paper provides user/message authentication processes to securely transmit biomedical data measured by PHDs based on the concept of a biomedical signature. Some experiments, including the stress test, have been conducted to show that the system proposed/constructed in this study performs very well even when a very large number of PHDs are used. For a stress test, up to 1,200 threads are made to represent the same number of PHD agents. The loss ratio of the ISO/IEEE 11073 messages in the normal system is as high as 14% when 1,200 PHD agents are connected. On the other hand, no message loss occurs in the multilayered system proposed in this study, which demonstrates the superiority of the multilayered system to the normal system with regard to heavy traffic.

  15. A Multilayer Secure Biomedical Data Management System for Remotely Managing a Very Large Number of Diverse Personal Healthcare Devices

    PubMed Central

    Lim, SeungHyeon

    2015-01-01

    In this paper, a multilayer secure biomedical data management system for managing a very large number of diverse personal health devices is proposed. The system has the following characteristics: the system supports international standard communication protocols to achieve interoperability. The system is integrated in the sense that both a PHD communication system and a remote PHD management system work together as a single system. Finally, the system proposed in this paper provides user/message authentication processes to securely transmit biomedical data measured by PHDs based on the concept of a biomedical signature. Some experiments, including the stress test, have been conducted to show that the system proposed/constructed in this study performs very well even when a very large number of PHDs are used. For a stress test, up to 1,200 threads are made to represent the same number of PHD agents. The loss ratio of the ISO/IEEE 11073 messages in the normal system is as high as 14% when 1,200 PHD agents are connected. On the other hand, no message loss occurs in the multilayered system proposed in this study, which demonstrates the superiority of the multilayered system to the normal system with regard to heavy traffic. PMID:26247034

  16. A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    NASA Astrophysics Data System (ADS)

    Carrilho, Sergio; Esaki, Hiroshi

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  17. AN-Type Fittings in the International Space System (ISS) Node 2 Ammonia System Technical Assessment Report

    NASA Technical Reports Server (NTRS)

    Cragg, Clinton H.; Dibbern, Andreas W.; Beil, Robert J.; Terrone, Mark; Rotter, Henry A.; Ernest, Steve; Frankenfield, Bruce; Solano, Paul

    2009-01-01

    Based on an anonymous request, an NESC Assessment Team was formed to investigate potential leakage problems from the ISS Program's Node 2 Anhydrous Ammonia System AN fittings. The Team's charter was to provide the ISS Program with a path to follow, which could include testing, to ensure the ISS Program felt confident that the AN fittings' leakage would not exceed specified limits in orbit. The findings from that assessment are contained in this document.

  18. Evaluation of Chlamydia Partner Notification Practices and Use of the "Let Them Know" Website by Family Planning Clinicians in Australia: Cross-Sectional Study.

    PubMed

    Guy, Rebecca J; Micallef, Joanne M; Mooney-Somers, Julie; Jamil, Muhammad S; Harvey, Caroline; Bateson, Deborah; van Gemert, Caroline; Wand, Handan; Kaldor, John

    2016-06-24

    Chlamydia, caused by Chlamydia trachomatis, is the most common reportable infection in many developed countries. Testing, treatment, and partner notification (PN) are key strategies for chlamydia control. In 2008 the Let Them Know (LTK) PN website was established, which provided means for people to send anonymous PN messages by text messaging (short message service, SMS), email, or letter. We evaluated PN practices among Australian family planning clinicians following chlamydia diagnosis and assessed how often clinicians refer their patients to the LTK website. A mixed methods approach included a Web-based cross-sectional survey of Australian family planning clinicians to examine PN attitudes and practices and focus groups to explore the context of LTK website use. Between May 2012 and June 2012, all clinicians from 29 different family planning services (n=212) were invited to complete the survey, and 164 participated (response rate=77.4%); of the clinicians, 96.3% (158/164) were females, 56.1% (92/164) nurses, and 43.9% (72/164) doctors. More than half (62.2%, 92/148) agreed that PN was primarily the client's responsibility; however, 93.2% (138/148) agreed it was the clinician's responsibility to support the client in informing their partners by providing information or access to resources. Almost half (49.4%, 76/154) of the clinicians said that they always or usually referred clients to the LTK website, with variation across clinics in Australian states and territories (0%-77%). Eleven focus groups among 70 clinicians at 11 family planning services found that the LTK website had been integrated into routine practice; that it was particularly useful for clients who found it difficult to contact partners; and that the LTK letters and fact sheets were useful. However, many clinicians were not aware of the website and noted a lack of internal clinic training about LTK. The LTK website has become an important PN tool for family planning clinicians. The variation in referral of patients to the LTK website and lack of awareness among some clinicians suggest further promotion of the website, PN training, and clinic protocols are warranted.

  19. Randomized controlled trial of a messaging intervention to increase fruit and vegetable intake in adolescents: Affective versus instrumental messages.

    PubMed

    Carfora, Valentina; Caso, Daniela; Conner, Mark

    2016-11-01

    The present research aimed to test the efficacy of affective and instrumental text messages compared with a no-message control as a strategy to increase fruit and vegetable intake (FVI) in adolescents. A randomized controlled trial was used test impact of different text messages compared with no message on FVI over a 2-week period. A total of 1,065 adolescents (14-19 years) from a high school of the South of Italy completed the baseline questionnaire and were randomly allocated to one of three conditions: instrumental messages (N = 238), affective messages (N = 300), and no messages (N = 521). Students in the message conditions received one message each day over a 2-week period. The messages targeted affective (affective benefits) or instrumental (instrumental benefits) information about FVI. Self-reported FVI at 2 weeks was the key dependent variable. Analyses were based on the N = 634 who completed all aspects of the study. Findings showed that messages significantly increased FVI, particularly in the affective condition and this effect was partially mediated by changes in affective attitude and intentions towards FVI. Text messages can be used to increase FVI in adolescents. Text messages based on affective benefits are more effective than text messages based on instrumental benefits. Statement of contribution What is already known on this subject? Text messages have been shown to promote positive change in health behaviours. However, the most appropriate target for such text messages is less clear although targeting attitudes may be effective. What does this study add? This randomized controlled study shows that text messages targeting instrumental or affective attitudes produce changes in fruit and vegetable intake (FVI) in adolescents. Text messages targeting affective attitudes are shown to be more effective than text messages targeting instrumental attitudes. The effect of affective text messages on FVI was partially mediated by changes in affective attitudes. © 2016 The British Psychological Society.

  20. Generic Ada code in the NASA space station command, control and communications environment

    NASA Technical Reports Server (NTRS)

    Mcdougall, D. P.; Vollman, T. E.

    1986-01-01

    The results of efforts to apply powerful Ada constructs to the formatted message handling process are described. The goal of these efforts was to extend the state-of-technology in message handling while at the same time producing production-quality, reusable code. The first effort was initiated in September, 1984 and delivered in April, 1985. That product, the Generic Message Handling Facility, met initial goals, was reused, and is available in the Ada Repository on ARPANET. However, it became apparent during its development that the initial approach to building a message handler template was not optimal. As a result of this initial effort, several alternate approaches were identified, and research is now on-going to identify an improved product. The ultimate goal is to be able to instantly build a message handling system for any message format given a specification of that message format. The problem lies in how to specify the message format, and one that is done, how to use that information to build the message handler. Message handling systems and message types are described. The initial efforts, its results and its shortcomings are detailed. The approach now being taken to build a system which will be significantly easier to implement, and once implemented, easier to use, is described. Finally, conclusions are offered.

  1. SMC Message Browser Projects

    NASA Technical Reports Server (NTRS)

    Wichmann, Benjamin C.

    2013-01-01

    I work directly with the System Monitoring and Control (SMC) software engineers who develop, test and release custom and commercial software in support of the Kennedy Space Center Spaceport Command and Control System. (SCCS). SMC uses Commercial Off-The-Shelf (COTS) Enterprise Management Systems (EMS) software which provides a centralized subsystem for configuring, monitoring, and controlling SCCS hardware and software used in the Control Rooms. There are multiple projects being worked on using the COTS EMS software. I am currently working with the HP Operations Manager for UNIX (OMU) software which allows Master Console Operators (MCO) to access, view and interpret messages regarding the status of the SCCS hardware and software. The OMU message browser gets cluttered with messages which can make it difficult for the MCO to manage. My main project involves determining ways to reduce the number of messages being displayed in the OMU message browser. I plan to accomplish this task in two different ways: (1) by correlating multiple messages into one single message being displayed and (2) to create policies that will determine the significance of each message and whether or not it needs to be displayed to the MCO. The core idea is to lessen the number of messages being sent to the OMU message browser so the MCO can more effectively use it.

  2. Meanings of blood, bleeding and blood donations in Pakistan: implications for national vs global safe blood supply policies

    PubMed Central

    Mumtaz, Zubia; Bowen, Sarah; Mumtaz, Rubina

    2012-01-01

    Contemporary public policy, supported by international arbitrators of blood policy such as the World Health Organization and the International Federation of the Red Cross, asserts that the safest blood is that donated by voluntary, non-remunerated donors from low-risk groups of the population. These policies promote anonymous donation and discourage kin-based or replacement donation. However, there is reason to question whether these policies, based largely on Western research and beliefs, are the most appropriate for ensuring an adequate safe blood supply in many other parts of the world. This research explored the various and complex meanings embedded in blood using empirical ethnographic data from Pakistan, with the intent of informing development of a national blood policy in that country. Using a focused ethnographic approach, data were collected in 26 in-depth interviews, 6 focus group discussions, 12 key informant interviews and 25 hours of observations in blood banks and maternity and surgical wards. The key finding was that notions of caste-based purity of blood, together with the belief that donors and recipients are symbolically knitted in a kin relationship, place a preference on kin-blood. The anonymity inherent in current systems of blood extraction, storage and use as embedded in contemporary policy discourse and practice was problematic as it blurred distinctions that were important within this society. The article highlights the importance—to ensuring a safe blood supply—of basing blood procurement policies on local, context-specific belief systems rather than relying on uniform, one-size-fits-all global policies. Drawing on our empirical findings and the literature, it is argued that the practice of kin-donated blood remains a feasible alternative to the global ideal of voluntary, anonymous donations. There is a need to focus on developing context-sensitive strategies for promoting blood safety, and critically revisit the assumptions underlying contemporary global blood procurement policies. PMID:21372061

  3. Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages.

    PubMed

    Muthukumar, P; Balasubramaniam, P; Ratnavelu, K

    2017-07-26

    This paper proposes a generalized robust synchronization method for different dimensional fractional order dynamical systems with mismatched fractional derivatives in the presence of function uncertainty and external disturbance by a designing sliding mode controller. Based on the proposed theory of generalized robust synchronization criterion, a novel audio cryptosystem is proposed for sending or sharing voice messages secretly via insecure channel. Numerical examples are given to verify the potency of the proposed theories. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  4. DEVS Unified Process for Web-Centric Development and Testing of System of Systems

    DTIC Science & Technology

    2008-05-20

    gathering from the user. Further, methodologies have been developed to generate DEVS models from BPMN /BPEL-based and message-based requirement specifications...27] 3. BPMN /BPEL based system specifications: Business Process Modeling Notation ( BPMN ) [bpm] or Business Process Execution Language (BPEL) provide a...information is stored in .wsdl and .bpel files for BPEL but in proprietary format for BPMN . 4. DoDAF-based requirement specifications: Department of

  5. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  6. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  7. Time Warp Operating System (TWOS)

    NASA Technical Reports Server (NTRS)

    Bellenot, Steven F.

    1993-01-01

    Designed to support parallel discrete-event simulation, TWOS is complete implementation of Time Warp mechanism - distributed protocol for virtual time synchronization based on process rollback and message annihilation.

  8. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  9. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  10. Efficient Privacy-Enhancing Techniques for Medical Databases

    NASA Astrophysics Data System (ADS)

    Schartner, Peter; Schaffer, Martin

    In this paper, we introduce an alternative for using linkable unique health identifiers: locally generated system-wide unique digital pseudonyms. The presented techniques are based on a novel technique called collision-free number generation which is discussed in the introductory part of the article. Afterwards, attention is payed onto two specific variants of collision-free number generation: one based on the RSA-Problem and the other one based on the Elliptic Curve Discrete Logarithm Problem. Finally, two applications are sketched: centralized medical records and anonymous medical databases.

  11. Novel Techniques for Secure Use of Public Cloud Computing Resources

    DTIC Science & Technology

    2015-09-17

    applications such as Twitter and Instagram . It allows users to post messages to their public feed, where any followers of that feed will receive them...86]) and topic based systems, this work focuses on a topic based systems. Due to the recent popularity of social networks such as Twitter and Instagram

  12. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Message elements. 10.420 Section 10.420 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message Requirements § 10.420 Message elements. A CMAS Alert Message processed by a Participating CMS Provider shall...

  13. Deterministic secure quantum communication using a single d-level system

    PubMed Central

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557

  14. Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light

    PubMed Central

    Clarke, Patrick J.; Collins, Robert J.; Dunjko, Vedran; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2012-01-01

    Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called ‘one-way' mathematical functions is used to provide security over sufficiently long timescales. No mathematical proofs are known for the long-term security of such techniques. Quantum digital signatures offer a means of sending a message, which cannot be forged or repudiated, with security verified by information-theoretical limits and quantum mechanics. Here we demonstrate an experimental system, which distributes quantum signatures from one sender to two receivers and enables message sending ensured against forging and repudiation. Additionally, we analyse the security of the system in some typical scenarios. Our system is based on the interference of phase-encoded coherent states of light and our implementation utilizes polarization-maintaining optical fibre and photons with a wavelength of 850 nm. PMID:23132024

  15. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  16. DMS message design workshops.

    DOT National Transportation Integrated Search

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  17. A personalized health-monitoring system for elderly by combining rules and case-based reasoning.

    PubMed

    Ahmed, Mobyen Uddin

    2015-01-01

    Health-monitoring system for elderly in home environment is a promising solution to provide efficient medical services that increasingly interest by the researchers within this area. It is often more challenging when the system is self-served and functioning as personalized provision. This paper proposed a personalized self-served health-monitoring system for elderly in home environment by combining general rules with a case-based reasoning approach. Here, the system generates feedback, recommendation and alarm in a personalized manner based on elderly's medical information and health parameters such as blood pressure, blood glucose, weight, activity, pulse, etc. A set of general rules has used to classify individual health parameters. The case-based reasoning approach is used to combine all different health parameters, which generates an overall classification of health condition. According to the evaluation result considering 323 cases and k=2 i.e., top 2 most similar retrieved cases, the sensitivity, specificity and overall accuracy are achieved as 90%, 97% and 96% respectively. The preliminary result of the system is acceptable since the feedback; recommendation and alarm messages are personalized and differ from the general messages. Thus, this approach could be possibly adapted for other situations in personalized elderly monitoring.

  18. Legal Medicine Information System using CDISC ODM.

    PubMed

    Kiuchi, Takahiro; Yoshida, Ken-ichi; Kotani, Hirokazu; Tamaki, Keiji; Nagai, Hisashi; Harada, Kazuki; Ishikawa, Hirono

    2013-11-01

    We have developed a new database system for forensic autopsies, called the Legal Medicine Information System, using the Clinical Data Interchange Standards Consortium (CDISC) Operational Data Model (ODM). This system comprises two subsystems, namely the Institutional Database System (IDS) located in each institute and containing personal information, and the Central Anonymous Database System (CADS) located in the University Hospital Medical Information Network Center containing only anonymous information. CDISC ODM is used as the data transfer protocol between the two subsystems. Using the IDS, forensic pathologists and other staff can register and search for institutional autopsy information, print death certificates, and extract data for statistical analysis. They can also submit anonymous autopsy information to the CADS semi-automatically. This reduces the burden of double data entry, the time-lag of central data collection, and anxiety regarding legal and ethical issues. Using the CADS, various studies on the causes of death can be conducted quickly and easily, and the results can be used to prevent similar accidents, diseases, and abuse. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  19. IP telephony based danger alert communication system and its implementation

    NASA Astrophysics Data System (ADS)

    Rezac, Filip; Safarik, Jakub; Voznak, Miroslav; Tomala, Karel; Partila, Pavol

    2013-05-01

    This article discusses a danger alert system created as a part of the research project at Department of Telecommunications of Technical University of Ostrava. The aim of the system is to distribute pre-recorded voice messages in order to alert the called party in danger. This article describes individual technologies, which the application uses for its operation as well as issues relating to hardware requirements and transfer line bandwidth load. The article also describes new algorithms, which had to be developed in order to ensure the reliability of the system. Our intent is focused on disaster management, the message, which should be delivered within specified time span, is typed in the application and text-to-speech module ensures its transformation to a speech format, after that a particular scenario or warned area is selected and a target group is automatically unloaded. For this purpose, we have defined XML format for delivery of phone numbers which are located in the target area and these numbers are obtained from mobile BTS's (Base transmission stations). The benefit of such communication compared to others, is the fact, that it uses a phone call and, therefore, it is possible to get feedback who accepted the message and to improve efficiency of alert system. Finally, the list of unanswered calls is exported and these users can be informed via SMS.

  20. STAR Online Meta-Data Collection Framework: Integration with the Pre-existing Controls Infrastructure

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Lauret, J.

    2017-10-01

    One of the STAR experiment’s modular Messaging Interface and Reliable Architecture framework (MIRA) integration goals is to provide seamless and automatic connections with the existing control systems. After an initial proof of concept and operation of the MIRA system as a parallel data collection system for online use and real-time monitoring, the STAR Software and Computing group is now working on the integration of Experimental Physics and Industrial Control System (EPICS) with MIRA’s interfaces. This integration goals are to allow functional interoperability and, later on, to replace the existing/legacy Detector Control System components at the service level. In this report, we describe the evolutionary integration process and, as an example, will discuss the EPICS Alarm Handler conversion. We review the complete upgrade procedure starting with the integration of EPICS-originated alarm signals propagation into MIRA, followed by the replacement of the existing operator interface based on Motif Editor and Display Manager (MEDM) with modern portable web-based Alarm Handler interface. To achieve this aim, we have built an EPICS-to-MQTT [8] bridging service, and recreated the functionality of the original Alarm Handler using low-latency web messaging technologies. The integration of EPICS alarm handling into our messaging framework allowed STAR to improve the DCS alarm awareness of existing STAR DAQ and RTS services, which use MIRA as a primary source of experiment control information.

  1. I-39 dynamic message sign project summary

    DOT National Transportation Integrated Search

    2005-01-01

    The Illinois Department of Transportation (IDOT) sought to deploy a message sign system consisting of permanently-mounted dynamic message signs around the Rockford metropolitan area. The project goal was to begin building a system of remotely-activat...

  2. Designing Messaging to Engage Patients in an Online Suicide Prevention Intervention: Survey Results From Patients With Current Suicidal Ideation

    PubMed Central

    Lungu, Anita; Richards, Julie; Simon, Gregory E; Clingan, Sarah; Siler, Jaeden; Snyder, Lorilei; Ludman, Evette

    2014-01-01

    Background Computerized, Internet-delivered interventions can be efficacious; however, uptake and maintaining sustained client engagement are still big challenges. We see the development of effective engagement strategies as the next frontier in online health interventions, an area where much creative research has begun. We also argue that for engagement strategies to accomplish their purpose with novel targeted populations, they need to be tailored to such populations (ie, content is designed with the target population in mind). User-centered design frameworks provide a theoretical foundation for increasing user engagement and uptake by including users in development. However, deciding how to implement this approach to enage users in mental health intervention development is challenging. Objective The aim of this study was to get user input and feedback on acceptability of messaging content intended to engage suicidal individuals. Methods In March 2013, clinic intake staff distributed flyers announcing the study, “Your Feedback Counts” to potential participants (individuals waiting to be seen for a mental health appointment) together with the Patient Health Questionnaire. The flyer explained that a score of two or three (“more than half the days” or “nearly every day” respectively) on the suicide ideation question made them eligible to provide feedback on components of a suicide prevention intervention under development. The patient could access an anonymous online survey by following a link. After providing consent online, participants completed the anonymous survey. Results Thirty-four individuals provided data on past demographic information. Participants reported that they would be most drawn to an intervention where they knew that they were cared about, that was personalized, that others like them had found it helpful, and that included examples with real people. Participants preferred email invitations with subject lines expressing concern and availability of extra resources. Participants also provided feedback about a media prototype including a brand design and advertisement video for introducing the intervention. Conclusions This paper provides one model (including development of an engagement survey, audience for an engagement survey, methods for presenting results of an engagement survey) for including target users in the development of uptake strategies for online mental health interventions. PMID:24509475

  3. Two Women with Multiple Disabilities Communicate with Distant Partners via a Special Text Messaging System

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Green, Vanessa A.; Oliva, Doretta; Alberti, Gloria; Carrella, Luigina

    2013-01-01

    This study extended the research on a special text messaging system, which allows persons with multiple disabilities to (a) write and send messages to distant partners and (b) have messages from those partners read out to them. The study involved two women with multiple disabilities (including blindness or minimal residual vision). The system…

  4. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    ERIC Educational Resources Information Center

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  5. Principles and techniques in the design of ADMS+. [advanced data-base management system

    NASA Technical Reports Server (NTRS)

    Roussopoulos, Nick; Kang, Hyunchul

    1986-01-01

    'ADMS+/-' is an advanced data base management system whose architecture integrates the ADSM+ mainframe data base system with a large number of work station data base systems, designated ADMS-; no communications exist between these work stations. The use of this system radically decreases the response time of locally processed queries, since the work station runs in a single-user mode, and no dynamic security checking is required for the downloaded portion of the data base. The deferred update strategy used reduces overhead due to update synchronization in message traffic.

  6. Development and Usability of REACH: A Tailored Theory-Based Text Messaging Intervention for Disadvantaged Adults With Type 2 Diabetes

    PubMed Central

    Nelson, Lyndsay A; Mayberry, Lindsay S; Wallston, Kenneth; Kripalani, Sunil; Bergner, Erin M

    2016-01-01

    Background Among adults with type 2 diabetes mellitus (T2DM), adherence to recommended self-care activities is suboptimal, especially among racial and ethnic minorities with low income. Self-care nonadherence is associated with having worse glycemic control and diabetes complications. Text messaging interventions are improving the self-care of adults with T2DM, but few have been tested with disadvantaged populations. Objective To develop Rapid Education/Encouragement And Communications for Health (REACH), a tailored, text messaging intervention to support the self-care adherence of disadvantaged patients with T2DM, based on the Information-Motivation-Behavioral skills model. We then tested REACH’s usability to make improvements before evaluating its effects. Methods We developed REACH’s content and functionality using an empirical and theory-based approach, findings from a previously pilot-tested intervention, and the expertise of our interdisciplinary research team. We recruited 36 adults with T2DM from Federally Qualified Health Centers to participate in 1 of 3 rounds of usability testing. For 2 weeks, participants received daily text messages assessing and promoting self-care, including tailored messages addressing users’ unique barriers to adherence, and weekly text messages with adherence feedback. We analyzed quantitative and qualitative user feedback and system-collected data to improve REACH. Results Participants were, on average, 52.4 (SD 9.5) years old, 56% (20/36) female, 63% (22/35) were a racial or ethnic minority, and 67% (22/33) had an income less than US $35,000. About half were taking insulin, and average hemoglobin A1c level was 8.2% (SD 2.2%). We identified issues (eg, user concerns with message phrasing, technical restrictions with responding to assessment messages) and made improvements between testing rounds. Overall, participants favorably rated the ease of understanding (mean 9.6, SD 0.7) and helpfulness (mean 9.3, SD 1.4) of self-care promoting text messages on a scale of 1-10, responded to 96% of assessment text messages, and rated the helpfulness of feedback text messages 8.5 (SD 2.7) on a scale of 1-10. User feedback led to refining our study enrollment process so that users understood the flexibility in message timing and that computers, not people, send the messages. Furthermore, research assistants’ feedback on the enrollment process helped improve participants’ engagement with study procedures. Conclusions Testing technology-delivered interventions with disadvantaged adults revealed preferences and concerns unique to this population. Through iterative testing and multiple data sources, we identified and responded to users’ intervention preferences, technical issues, and shortcomings in our research procedures. PMID:27609738

  7. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications

    PubMed Central

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-01-01

    Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces. PMID:27649209

  8. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    PubMed

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  9. Advanced information processing system: Authentication protocols for network communication

    NASA Technical Reports Server (NTRS)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  10. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    PubMed Central

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  11. Survey of Computer-Based Message Systems; COM/PortaCOM Conference System: Design Goals and Principles; Computer Conferencing Is More Than Electronic Mail; Effects of the COM Computer Conference System.

    ERIC Educational Resources Information Center

    Palme, Jacob

    The four papers contained in this document provide: (1) a survey of computer based mail and conference systems; (2) an evaluation of systems for both individually addressed mail and group addressing through conferences and distribution lists; (3) a discussion of various methods of structuring the text data in existing systems; and (4) a…

  12. Size matters: How population size influences genotype–phenotype association studies in anonymized data

    PubMed Central

    Denny, Joshua C.; Haines, Jonathan L.; Roden, Dan M.; Malin, Bradley A.

    2014-01-01

    Objective Electronic medical records (EMRs) data is increasingly incorporated into genome-phenome association studies. Investigators hope to share data, but there are concerns it may be “re-identified” through the exploitation of various features, such as combinations of standardized clinical codes. Formal anonymization algorithms (e.g., k-anonymization) can prevent such violations, but prior studies suggest that the size of the population available for anonymization may influence the utility of the resulting data. We systematically investigate this issue using a large-scale biorepository and EMR system through which we evaluate the ability of researchers to learn from anonymized data for genome- phenome association studies under various conditions. Methods We use a k-anonymization strategy to simulate a data protection process (on data sets containing clinical codes) for resources of similar size to those found at nine academic medical institutions within the United States. Following the protection process, we replicate an existing genome-phenome association study and compare the discoveries using the protected data and the original data through the correlation (r2) of the p-values of association significance. Results Our investigation shows that anonymizing an entire dataset with respect to the population from which it is derived yields significantly more utility than small study-specific datasets anonymized unto themselves. When evaluated using the correlation of genome-phenome association strengths on anonymized data versus original data, all nine simulated sites, results from largest-scale anonymizations (population ∼ 100;000) retained better utility to those on smaller sizes (population ∼ 6000—75;000). We observed a general trend of increasing r2 for larger data set sizes: r2 = 0.9481 for small-sized datasets, r2 = 0.9493 for moderately-sized datasets, r2 = 0.9934 for large-sized datasets. Conclusions This research implies that regardless of the overall size of an institution's data, there may be significant benefits to anonymization of the entire EMR, even if the institution is planning on releasing only data about a specific cohort of patients. PMID:25038554

  13. Development of a mobile phone-based intervention to improve adherence to secondary prevention of coronary heart disease in China.

    PubMed

    Chen, Shu; Gong, Enying; Kazi, Dhruv S; Gates, Ann B; Karaye, Kamilu Musa; Girerd, Nicolas; Bai, Rong; AlHabib, Khalid F; Li, Chaoyun; Sun, Kelly; Hong, Louisa; Fu, Hua; Peng, Weixia; Liu, Xianxia; Chen, Lei; Schwalm, J-D; Yan, Lijing L

    Coronary heart disease (CHD) is a major disease burden globally and in China, but secondary prevention among CHD patients remains insufficient. Mobile health (mHealth) technology holds promise for improving secondary prevention but few previous studies included both provider-facing and patient-directed measures. We conducted a physician needs assessment survey (n = 59), physician interviews (n = 6), one focus group and a short cellphone message validation survey (n = 14) in Shanghai and Hainan, China. Based on these results, we developed a multifaceted mHealth intervention that includes: (1) a provider-facing bilingual mobile app guiding prescription of evidence-based medications for secondary prevention and (2) a patient-directed short messaging system automatically sending reminders to patients regarding medication adherence and lifestyle changes (4-5 messages per week for 12 weeks). This combined intervention has the potential to improve secondary prevention of CHD and to be adapted to other countries and healthcare conditions.

  14. Driver memory retention of in-vehicle information system messages

    DOT National Transportation Integrated Search

    1997-01-01

    Memory retention of drivers was tested for traffic- and traveler-related messages displayed on an in-vehicle information system (IVIS). Three research questions were asked: (a) How does in-vehicle visual message format affect comprehension? (b) How d...

  15. Phone-Based Interventions in Adolescent Psychiatry: A Perspective and Proof of Concept Pilot Study With a Focus on Depression and Autism

    PubMed Central

    Feltes, Jordan Robert; Tzeng, William Shun; Lu, Zoe Yunzhu; Pan, Michael; Zhao, Nan; Talkin, Rebecca; Javaherian, Kavon; Glowinski, Anne; Ross, Will

    2017-01-01

    Background Telemedicine has emerged as an innovative platform to diagnose and treat psychiatric disorders in a cost-effective fashion. Previous studies have laid the functional framework for monitoring and treating child psychiatric disorders electronically using videoconferencing, mobile phones (smartphones), and Web-based apps. However, phone call and text message (short message service, SMS) interventions in adolescent psychiatry are less studied than other electronic platforms. Further investigations on the development of these interventions are needed. Objective The aim of this paper was to explore the utility of text message interventions in adolescent psychiatry and describe a user feedback-driven iterative design process for text message systems. Methods We developed automated text message interventions using a platform for both depression (EpxDepression) and autism spectrum disorder (ASD; EpxAutism) and conducted 2 pilot studies for each intervention (N=3 and N=6, respectively). The interventions were prescribed by and accessible to the patients’ healthcare providers. EpxDepression and EpxAutism utilized an automated system to triage patients into 1 of 3 risk categories based on their text responses and alerted providers directly via phone and an online interface when patients met provider-specified risk criteria. Rapid text-based feedback from participants and interviews with providers allowed for quick iterative cycles to improve interventions. Results Patients using EpxDepression had high weekly response rates (100% over 2 to 4 months), but exhibited message fatigue with daily prompts with mean (SD) overall response rates of 66.3% (21.6%) and 64.7% (8.2%) for mood and sleep questionnaires, respectively. In contrast, parents using EpxAutism displayed both high weekly and overall response rates (100% and 85%, respectively, over 1 to 4 months) that did not decay significantly with time. Monthly participant feedback surveys for EpxDepression (7 surveys) and EpxAutism (18 surveys) preliminarily indicated that for both interventions, daily messages constituted the “perfect amount” of contact and that EpxAutism, but not EpxDepression, improved patient communication with providers. Notably, EpxDepression detected thoughts of self-harm in patients before their case managers or caregivers were aware of such ideation. Conclusions Text-message interventions in adolescent psychiatry can provide a cost-effective and engaging method to track symptoms, behavior, and ideation over time. Following the collection of pilot data and feedback from providers and patients, larger studies are already underway to validate the clinical utility of EpxDepression and EpxAutism. Trial Registration Clinicaltrials.gov NCT03002311; https://clinicaltrials.gov/ct2/show/NCT03002311 (Archived by WebCite at http://www.webcitation.org/6qQtlCIS0) PMID:28623183

  16. Anonymity communication VPN and Tor: a comparative study

    NASA Astrophysics Data System (ADS)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  17. A Context-Aware-Based Audio Guidance System for Blind People Using a Multimodal Profile Model

    PubMed Central

    Lin, Qing; Han, Youngjoon

    2014-01-01

    A wearable guidance system is designed to provide context-dependent guidance messages to blind people while they traverse local pathways. The system is composed of three parts: moving scene analysis, walking context estimation and audio message delivery. The combination of a downward-pointing laser scanner and a camera is used to solve the challenging problem of moving scene analysis. By integrating laser data profiles and image edge profiles, a multimodal profile model is constructed to estimate jointly the ground plane, object locations and object types, by using a Bayesian network. The outputs of the moving scene analysis are further employed to estimate the walking context, which is defined as a fuzzy safety level that is inferred through a fuzzy logic model. Depending on the estimated walking context, the audio messages that best suit the current context are delivered to the user in a flexible manner. The proposed system is tested under various local pathway scenes, and the results confirm its efficiency in assisting blind people to attain autonomous mobility. PMID:25302812

  18. Networking and Microcomputers. ERIC Digest.

    ERIC Educational Resources Information Center

    Klausmeier, Jane

    Computer networks can fall into three broad categories--local area networks (LAN), microcomputer based messaging systems (this includes computer bulletin board systems), or commercial information systems. Many of the same types of activities take place within the three categories. The major differences are the types of information available and…

  19. Google glass: a driver distraction cause or cure?

    PubMed

    Sawyer, Ben D; Finomore, Victor S; Calvo, Andres A; Hancock, P A

    2014-11-01

    We assess the driving distraction potential of texting with Google Glass (Glass), a mobile wearable platform capable of receiving and sending short-message-service and other messaging formats. A known roadway danger, texting while driving has been targeted by legislation and widely banned. Supporters of Glass claim the head-mounted wearable computer is designed to deliver information without concurrent distraction. Existing literature supports the supposition that design decisions incorporated in Glass might facilitate messaging for drivers. We asked drivers in a simulator to drive and use either Glass or a smartphone-based messaging interface, then interrupted them with an emergency brake event. Both the response event and subsequent recovery were analyzed. Glass-delivered messages served to moderate but did not eliminate distracting cognitive demands. A potential passive cost to drivers merely wearing Glass was also observed. Messaging using either device impaired driving as compared to driving without multitasking. Glass in not a panacea as some supporters claim, but it does point the way to design interventions that effect reduced load in multitasking. Discussions of these identified benefits are framed within the potential of new in-vehicle systems that bring both novel forms of distraction and tools for mitigation into the driver's seat.

  20. Boyer-Moore Algorithm in Retrieving Deleted Short Message Service in Android Platform

    NASA Astrophysics Data System (ADS)

    Rahmat, R. F.; Prayoga, D. F.; Gunawan, D.; Sitompul, O. S.

    2018-02-01

    Short message service (SMS) can be used as digital evidence of disclosure of crime because it can strengthen the charges against the offenders. Criminals use various ways to destroy the evidence, including by deleting SMS. On the Android OS, SMS is stored in a SQLite database file. Deletion of SMS data is not followed by bit deletion in memory so that it is possible to rediscover the deleted SMS. Based on this case, the mobile forensic needs to be done to rediscover the short message service. The proposed method in this study is Boyer-Moore algorithm for searching string matching. An auto finds feature is designed to rediscover the short message service by searching using a particular pattern to rematch a text with the result of the hex value conversion in the database file. The system will redisplay the message for each of a match. From all the testing results, the proposed method has quite a high accuracy in rediscovering the short message service using the used dataset. The search results to rediscover the deleted SMS depend on the possibility of overwriting process and the vacuum procedure on the database file.

  1. Data Retention and Anonymity Services

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  2. A Weak Quantum Blind Signature with Entanglement Permutation

    NASA Astrophysics Data System (ADS)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  3. 75 FR 82365 - Determinations Concerning Need for Error Correction, Partial Approval and Partial Disapproval...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-30

    ...) for Texas. This action is based on EPA's determination that Texas's PSD program is flawed because the...://www.regulations.gov Web site is an ``anonymous access'' system, which means EPA will not know your... open from 8:30 a.m. to 4:30 p.m., Monday through Friday, excluding legal holidays. The telephone number...

  4. Working with previously anonymous gamete donors and donor-conceived adults: recent practice experiences of running the DNA-based voluntary information exchange and contact register, UK DonorLink.

    PubMed

    Crawshaw, Marilyn; Gunter, Christine; Tidy, Christine; Atherton, Freda

    2013-03-01

    This article describes recent practice experiences with donor conceived adults, donors, non-donor-conceived adult children of donors using the voluntary DNA-based register, UK DonorLink. It highlights additional complexities faced when using DNA rather than paper records for searching, in particular from the risk of false positives, low chances of success and potential inclusion of biological parents' DNA. Professionals' experiences in supporting those being "linked" suggest challenges as well as rewards. Registration carries the potential to be therapeutic for donor-conceived adults and donors and to enhance their political awareness regardless of links being made. Registrants value both peer and professional support, providing the latter can respond flexibly and be delivered by staff experienced in intermediary work. Given that the majority of those affected by donor conception internationally come from anonymous donation systems, these findings are highly pertinent and argue the need for political and moral debate about such service provision.

  5. Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?

    PubMed

    Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M

    2015-11-26

    Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.

  6. Study on virtual instrument developing system based on intelligent virtual control

    NASA Astrophysics Data System (ADS)

    Tang, Baoping; Cheng, Fabin; Qin, Shuren

    2005-01-01

    The paper introduces a non-programming developing system of a virtual instument (VI), i.e., a virtual measurement instrument developing system (VMIDS) based on intelligent virtual control (IVC). The background of the IVC-based VMIDS is described briefly, and the hierarchical message bus (HMB)-based software architecture of VMIDS is discussed in detail. The three parts and functions of VMIDS are introduced, and the process of non-programming developing VI is further described.

  7. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  8. Learning classifier systems for single and multiple mobile robots in unstructured environments

    NASA Astrophysics Data System (ADS)

    Bay, John S.

    1995-12-01

    The learning classifier system (LCS) is a learning production system that generates behavioral rules via an underlying discovery mechanism. The LCS architecture operates similarly to a blackboard architecture; i.e., by posted-message communications. But in the LCS, the message board is wiped clean at every time interval, thereby requiring no persistent shared resource. In this paper, we adapt the LCS to the problem of mobile robot navigation in completely unstructured environments. We consider the model of the robot itself, including its sensor and actuator structures, to be part of this environment, in addition to the world-model that includes a goal and obstacles at unknown locations. This requires a robot to learn its own I/O characteristics in addition to solving its navigation problem, but results in a learning controller that is equally applicable, unaltered, in robots with a wide variety of kinematic structures and sensing capabilities. We show the effectiveness of this LCS-based controller through both simulation and experimental trials with a small robot. We then propose a new architecture, the Distributed Learning Classifier System (DLCS), which generalizes the message-passing behavior of the LCS from internal messages within a single agent to broadcast massages among multiple agents. This communications mode requires little bandwidth and is easily implemented with inexpensive, off-the-shelf hardware. The DLCS is shown to have potential application as a learning controller for multiple intelligent agents.

  9. A De-Identification Pipeline for Ultrasound Medical Images in DICOM Format.

    PubMed

    Monteiro, Eriksson; Costa, Carlos; Oliveira, José Luís

    2017-05-01

    Clinical data sharing between healthcare institutions, and between practitioners is often hindered by privacy protection requirements. This problem is critical in collaborative scenarios where data sharing is fundamental for establishing a workflow among parties. The anonymization of patient information burned in DICOM images requires elaborate processes somewhat more complex than simple de-identification of textual information. Usually, before sharing, there is a need for manual removal of specific areas containing sensitive information in the images. In this paper, we present a pipeline for ultrasound medical image de-identification, provided as a free anonymization REST service for medical image applications, and a Software-as-a-Service to streamline automatic de-identification of medical images, which is freely available for end-users. The proposed approach applies image processing functions and machine-learning models to bring about an automatic system to anonymize medical images. To perform character recognition, we evaluated several machine-learning models, being Convolutional Neural Networks (CNN) selected as the best approach. For accessing the system quality, 500 processed images were manually inspected showing an anonymization rate of 89.2%. The tool can be accessed at https://bioinformatics.ua.pt/dicom/anonymizer and it is available with the most recent version of Google Chrome, Mozilla Firefox and Safari. A Docker image containing the proposed service is also publicly available for the community.

  10. Can anti-speeding messages based on protection motivation theory influence reported speeding intentions?

    PubMed

    Glendon, A Ian; Walker, Britta L

    2013-08-01

    The study investigated the effects of anti-speeding messages based on protection motivation theory (PMT) components: severity, vulnerability, rewards, self-efficacy, response efficacy, and response cost, on reported speeding intentions. Eighty-three participants aged 18-25 years holding a current Australian driver's license completed a questionnaire measuring their reported typical and recent speeding behaviors. Comparisons were made between 18 anti-speeding messages used on Australian roads and 18 new anti-speeding messages developed from the PMT model. Participants reported their reactions to the 36 messages on the perceived effectiveness of the message for themselves and for the general population of drivers, and also the likelihood of themselves and other drivers driving within the speed limit after viewing each message. Overall the PMT model-derived anti-speeding messages were better than jurisdiction-use anti-speeding messages in influencing participants' reported intention to drive within the speed limit. Severity and vulnerability were the most effective PMT components for developing anti-speeding messages. Male participants reported significantly lower intention to drive within the speed limit than did female participants. However, males reported significantly higher intention to drive within the speed limit for PMT-derived messages compared with jurisdiction-based messages. Third-person effects were that males reported anti-speeding messages to be more effective for the general driving population than for themselves. Females reported the opposite effect - that all messages would be more effective for themselves than for the general driving population. Findings provided support for using a sound conceptual basis as an effective foundation for anti-speeding message development as well as for evaluating proposed anti-speeding messages on the target driver population. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Online health communication about human genetics: perceptions and preferences of internet users.

    PubMed

    Bernhardt, Jay M; McClain, Jacqueline; Parrott, Roxanne L

    2004-12-01

    Unprecedented advancements in human genetics research necessitate keeping the public abreast of new information, applications, and implications and the Internet represents an important method of communicating with the public. Our research used cross-sectional self-report survey data collected from a diverse convenience sample of 780 Internet users in two states. Multivariate regression analysis explored the relationships between experiences, perceptions, and preferences for online health and genetics communication. Online health information seeking was associated with previous genetic information seeking, comfort with online genetic communication, perceived risk for genetic abnormality, being female, and having more education. Comfort with online genetics communication was associated with a preference for online genetic information, previous online health and off-line genetics information seeking, having a healthy lifestyle, believing in the positive impact of human genetics research, and being female. Perceiving online health information to be accurate was associated with preferring the Internet for genetics communication, being older, less educated, and perceiving Internet use as anonymous. Preferring online genetics communication to other communication channels was associated with perceiving online health information as accurate, being comfortable receiving online genetics information, having lower intrinsic religiosity, and being male. The implications of findings for Web-based health message design are discussed.

  12. Social media, cyber-aggression and student mental health on a university campus.

    PubMed

    Mishna, Faye; Regehr, Cheryl; Lacombe-Duncan, Ashley; Daciuk, Joanne; Fearing, Gwendolyn; Van Wert, Melissa

    2018-06-01

    Information and communication technologies (ICTs) offer immense benefits for university students including enhancing engagement and connections with others and promoting self-directed and interactive learning. Perceived anonymity and the absence of social cues, however, may contribute to risk of interpersonal aggression. While extensive research examines bullying in child and adolescent educational settings, this study addresses a gap regarding post-secondary environments. An internet-based survey was provided to 5004 university students to examine the nature, extent and consequences of cyber-aggression. The survey received a response from 1350 students, a response rate of 28.5%. To enable further exploration, nine focus groups and eight individual interviews were conducted. This exploratory study found one quarter of respondents had a private video or photo shared without their permission and 28% were sent angry, vulgar, threatening or intimating messages. Perpetrators were most likely to be a friend (50%), another student (20%) or an intimate partner (18%). Focus group data revealed risks of ICTs and the need for resources and support to address students' wellbeing in the context of cyber-aggression. Cyber-aggression is experienced by a significant minority of university students, impacting their sense of wellbeing and mental health.

  13. Invisible Ink Marking in ECL Membrane Assays.

    PubMed

    Kurien, Biji T

    2015-01-01

    Invisible ink and writing secret messages have been part of man's fantasy, having proven useful in clandestine and high sensitivity areas. Security inks, made up of invisible materials that give printed, anti-photocopy images capable of being read only under special environments, have become important. An ink formulation based on silicon(IV) 2,3-naphthalocyanine bis(trihexylsilyloxide) as colorant, invisible to the naked eye but infrared readable, has been described earlier. Biometric DNA ink has also been developed for security authentication. In lighter vein, many budding scientists and others have often experimented with writing secret messages on paper, either for purposes of fun or actually sending secret messages to friends. It involved the use of lemon juice, milk, or other solutions that could be used with a dip pen, brush, or a fountain pen to write invisible messages on a blank white paper. Words turn up as magic when the paper is exposed to heat in one form or the other. Here, we attempt to end this book on a slightly humorous note by showing that invisible messages can be written on nitrocellulose membranes (but not on polyvinylidene difluoride membranes) using an appropriately diluted horse radish peroxidase/alkaline phosphatase anti-IgG conjugate (rabbit, mouse, or human anti-IgG). The message is written on the membrane, preferably with a fountain pen, and the membrane is allowed to dry. Regular detection with enhanced chemiluminescence plus or nitro blue tetrazolium/5-bromo-4-chloro-3-indolyl phosphate systems is used to unravel the secret message. In addition, this method could be used to mark nitrocellulose membranes for orientation purposes using ECL detection system and thus can eliminate the use of autoradiography pens.

  14. Between control and hacker activism: the political actions of Anonymous Brasil.

    PubMed

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  15. A modern diagnostic approach for automobile systems condition monitoring

    NASA Astrophysics Data System (ADS)

    Selig, M.; Shi, Z.; Ball, A.; Schmidt, K.

    2012-05-01

    An important topic in automotive research and development is the area of active and passive safety systems. In general, it is grouped in active safety systems to prevent accidents and passive systems to reduce the impact of a crash. An example for an active system is ABS while a seat belt tensioner represents the group of passive systems. Current developments in the automotive industry try to link active with passive system components to enable a complete event sequence, beginning with the warning of the driver about a critical situation till the automatic emergency call after an accident. The cross-linking has an impact on the current diagnostic approach, which is described in this paper. Therefore, this contribution introduces a new diagnostic approach for automotive mechatronic systems. The concept is based on monitoring the messages which are exchanged via the automotive communication systems, e.g. the CAN bus. According to the authors' assumption, the messages on the bus are changing between faultless and faulty vehicle condition. The transmitted messages of the sensors and control units are different depending on the condition of the car. First experiments are carried and in addition, the hardware design of a suitable diagnostic interface is presented. Finally, first results will be presented and discussed.

  16. Role of Narrative Perspective and Modality in the Persuasiveness of Public Service Advertisements Promoting HPV Vaccination.

    PubMed

    Nan, Xiaoli; Futerfas, Michelle; Ma, Zexin

    2017-03-01

    In the context of public service advertisements promoting human papillomavirus (HPV) vaccination, the current research examines 1) the relative persuasiveness of narrative vs. non-narrative messages and 2) the influence of narrative perspective (first- vs. third-person) and modality (text-based vs. audio-based) on message effectiveness. Results of a controlled experiment (N = 121) suggested that both a non-narrative message and a first-person narrative message led to greater perceived risk of getting HPV than a third-person narrative message. There was no difference in risk perception between the non-narrative and first-person narrative conditions. These findings were confined to the text-based condition, however. When the messages were audio-based, no differential message effects were detected. The analysis also provided partial evidence for an indirect effect of narrative perspective on intentions to vaccinate against HPV through HPV risk perception. Theoretical and practical implications of the findings are discussed.

  17. mHealth Series: Measuring maternal newborn and child health coverage by text messaging – a county–level model for China

    PubMed Central

    Zhang, Yanfeng; Chen, Li; van Velthoven, Michelle H. M. M. T.; Wang, Wei; Liu, Li; Du, Xiaozhen; Wu, Qiong; Li, Ye; Car, Josip

    2013-01-01

    Background Effective interventions in maternal, newborn and child health (MNCH), if achieving high level of population coverage, could prevent most of deaths in children under five years of age. High–quality measurements of MNCH coverage are essential for tracking progress and making evidence–based decisions. Methods MNCH coverage data are mainly collected through fieldworkers’ interview with preselected households in standard programs of Demographic and Health Surveys (DHS) or Multiple Indicator Cluster Surveys (MICS) in most low– and middle–income countries. Household surveys will continue to be the major data source for MNCH coverage in the foreseeable future. However, face–to–face data collection broadly used in household surveys is labor–intensive, time–consuming and expensive. Mobile phones are drawing more and more interest in medical research with the rapid increase in usage and text messaging could be an innovative way of data collection, that is, we could collect DHS data through mHealth method. We refer to it as “mDHS”. Finding We propose in this paper a conceptual model for measuring MNCH coverage by text messaging in China. In developing this model, we considered resource constraints, sample representativeness, sample size and survey bias. The components of the model are text messaging platform, routine health information system, health facilities, communities and households. Conclusions Measuring MNCH interventions coverage by text messaging could be advantageous in many ways and establish a much larger evidence–base for MNCH health policies in China. Before mDHS could indeed be launched, research priorities would include a systematic assessment of routine health information systems and exploring feasibility to collect name lists, mobile phone numbers and general demographic and socio–economic data; qualitative interviews with health workers and caregivers; assessment of data validity of all indicators to be collected by text messaging; and exploring approaches to increase participation rate. PMID:24363920

  18. HIV behavioral research online.

    PubMed

    Chiasson, Mary Ann; Parsons, Jeffrey T; Tesoriero, James M; Carballo-Dieguez, Alex; Hirshfield, Sabina; Remien, Robert H

    2006-01-01

    Internet access has caused a global revolution in the way people of all ages and genders interact. Many have turned to the Internet to seek love, companionship, and sex, prompting researchers to move behavioral studies online. The sexual behavior of men who have sex with men (MSM) has been more closely studied than that of any other group online given the abundance of gay-oriented websites and concerns about increasing transmission of HIV and other sexually transmitted infections. Not only does the Internet provide a new medium for the conduct of behavioral research and for participant recruitment into an array of research studies, it has the as yet unrealized potential to reach huge numbers of MSM with innovative harm reduction and prevention messages tailored to individualized needs, interests, and risk behavior. Internet-based research on sexual behavior has many advantages in rapidity of recruitment of diverse samples which include individuals unreachable through conventional methods (i.e., non-gay identified and geographically and socially isolated MSM, etc.). Internet-based research also presents some new methodologic challenges in study design, participant recruitment, survey implementation, and interpretation of results. In addition, there are ethical issues unique to online research including difficulties in verifying informed consent, obstacles to surveying minors, and the ability to assure anonymity. This paper presents a review of Internet-based research on sexual behavior in MSM, a general discussion of the methodologic and ethical challenges of Internet-based research, and recommendations for future interdisciplinary research.

  19. HIV Behavioral Research Online

    PubMed Central

    Parsons, Jeffrey T.; Tesoriero, James M.; Carballo-Dieguez, Alex; Hirshfield, Sabina; Remien, Robert H.

    2006-01-01

    Internet access has caused a global revolution in the way people of all ages and genders interact. Many have turned to the Internet to seek love, companionship, and sex, prompting researchers to move behavioral studies online. The sexual behavior of men who have sex with men (MSM) has been more closely studied than that of any other group online given the abundance of gay-oriented websites and concerns about increasing transmission of HIV and other sexually transmitted infections. Not only does the Internet provide a new medium for the conduct of behavioral research and for participant recruitment into an array of research studies, it has the as yet unrealized potential to reach huge numbers of MSM with innovative harm reduction and prevention messages tailored to individualized needs, interests, and risk behavior. Internet-based research on sexual behavior has many advantages in rapidity of recruitment of diverse samples which include individuals unreachable through conventional methods (i.e., non-gay identified and geographically and socially isolated MSM, etc.). Internet-based research also presents some new methodologic challenges in study design, participant recruitment, survey implementation, and interpretation of results. In addition, there are ethical issues unique to online research including difficulties in verifying informed consent, obstacles to surveying minors, and the ability to assure anonymity. This paper presents a review of Internet-based research on sexual behavior in MSM, a general discussion of the methodologic and ethical challenges of Internet-based research, and recommendations for future interdisciplinary research. PMID:16736356

  20. Monitoring anonymous HIV testing in Estonia from 2005 to 2015.

    PubMed

    Rüütel, K; Kallavus, K; Tomera, I

    2018-02-01

    In Estonia, a network of anonymous and free of charge HIV testing sites has been operating since 1988. Services are provided by health care organizations and financed by the National Institute for Health Development from the state budget. The objective of this analysis was to assess anonymous HIV testing in Estonia from 2005 to 2015. We used data collected from the National Institute for Health Development's annual reports, Health Board and Estonian Health Insurance Fund. In Estonia, more than 200 000 HIV-tests are performed annually, and of these approximately 5-6% are within anonymous HIV testing sites. The percentage tested with rapid tests in anonymous testing sites has increased from 15% in 2010 to 53% in 2015. Furthermore, up to 65% of all newly diagnosed HIV-cases have been detected in these sites. The proportion of HIV-positive tests has decreased from 3.8% to 0.5% in anonymous testing sites and from 0.3% to 0.1% in general health care. Simultaneously, the cost of detecting one new HIV case has increased almost six times. This analysis reveals that anonymous HIV testing services are well accepted by the general population as well as vulnerable populations. The positivity rate among those tested in anonymous testing sites remains higher than among all people tested, showing that the sites reach more of those who are at higher risk of HIV. In the light of decreasing positivity rate, more attention should be paid to people with higher HIV risk and increasing access to testing in community based settings. © 2018 British HIV Association.

  1. Development of a Browser-Based Mobile Audience Response System for Large Classrooms

    ERIC Educational Resources Information Center

    Andergassen, Monika; Guerra, Victor; Ledermüller, Karl; Neumann, Gustaf

    2013-01-01

    Didactical advantages of audience response systems (ARS) have been discussed extensively ever since they have been used in classes. However, conventional ARS bear some drawbacks, such as requiring specific hardware, generating costs (text messaging based and web service fees) and creating a dependency on external hosts. In this paper we present a…

  2. Performance Analysis of Distributed Object-Oriented Applications

    NASA Technical Reports Server (NTRS)

    Schoeffler, James D.

    1998-01-01

    The purpose of this research was to evaluate the efficiency of a distributed simulation architecture which creates individual modules which are made self-scheduling through the use of a message-based communication system used for requesting input data from another module which is the source of that data. To make the architecture as general as possible, the message-based communication architecture was implemented using standard remote object architectures (Common Object Request Broker Architecture (CORBA) and/or Distributed Component Object Model (DCOM)). A series of experiments were run in which different systems are distributed in a variety of ways across multiple computers and the performance evaluated. The experiments were duplicated in each case so that the overhead due to message communication and data transmission can be separated from the time required to actually perform the computational update of a module each iteration. The software used to distribute the modules across multiple computers was developed in the first year of the current grant and was modified considerably to add a message-based communication scheme supported by the DCOM distributed object architecture. The resulting performance was analyzed using a model created during the first year of this grant which predicts the overhead due to CORBA and DCOM remote procedure calls and includes the effects of data passed to and from the remote objects. A report covering the distributed simulation software and the results of the performance experiments has been submitted separately. The above report also discusses possible future work to apply the methodology to dynamically distribute the simulation modules so as to minimize overall computation time.

  3. Response to a Community-Based Information and Communication System.

    ERIC Educational Resources Information Center

    Trachtman, Leon E.; And Others

    A study investigated the introduction of an experimental school-centered and neighborhood-oriented communication system in a small midwestern town. It was anticipated that normal parent-teacher-school communication would be enhanced by the electronic messaging potential of the system. Researchers observed the entire adoption process from the…

  4. Feasibility and effectiveness of an automated bilingual text message intervention for weight loss: pilot study.

    PubMed

    Kolodziejczyk, Julia K; Norman, Gregory J; Barrera-Ng, Angelica; Dillon, Lindsay; Marshall, Simon; Arredondo, Elva; Rock, Cheryl L; Raab, Fred; Griswold, William G; Sullivan, Mark; Patrick, Kevin

    2013-11-06

    Little is known about the feasibility and acceptability of tailored text message based weight loss programs for English and Spanish-language speakers. This pilot study evaluated the feasibility, acceptability, and estimated impact of a tailored text message based weight loss program for English and Spanish-language speakers. The purpose of this pilot study was to inform the development of a full-scale randomized trial. There were 20 overweight or obese participants (mean age 40.10, SD 8.05; 8/20, 40% male; 9/20, 45% Spanish-speakers) that were recruited in San Diego, California, from March to May 2011 and evaluated in a one-group pre/post clinical trial. For 8 weeks, participants received and responded to 3-5 text messages daily sent from a fully automated text messaging system. They also received printed weight loss materials and brief 10-15 minute weekly counseling calls. To estimate the impact of the program, the primary outcome was weight (kg) measured during face-to-face measurement visits by trained research staff. Pre and post differences in weight were analyzed with a one-way repeated measures analysis of variance. Differences by language preference at both time points were analyzed with t tests. Body mass index and weight management behaviors also were examined. Feasibility and acceptability were determined by recruitment success, adherence (ie, percentage of replies to interactive text messages and attrition), and participant satisfaction. Participants who completed the final assessment (N=18) decreased body weight by 1.85 kg (F1,17=10.80, P=.004, CI∆ 0.66-3.03, η(2)=0.39). At both time points, there were no differences in weight by language preference. Participants responded to 88.04% (986/1120) of interactive text messages, attrition rate was 10% (2/20), and 94% (19/20) of participants reported satisfaction with the program. This fully automated text message based weight program was feasible with English and Spanish-speakers and may have promoted modest weight loss over an 8-week period. Clinicaltrials.gov NCT01171586; http://clinicaltrials.gov/ct2/show/NCT01171586 (Archived by WebCite at http://www.webcitation.org/6Ksr6dl7n).

  5. The TextBase project--implementation of a base level message supporting electronic patient record transfer in English general practice.

    PubMed

    Booth, N; Jain, N L; Sugden, B

    1999-01-01

    The TextBase project is a laboratory experiment to assess the feasibility of a common exchange format for sending a transcription of the contents of the Electronic Patient Record (EPR) between different general practices, when patients move from one practice to another in the NHS in England. The project was managed using a partnership arrangement between the four EPR systems vendors who agreed to collaborate and the project team. It lasted one year and consisted of an iterative design process followed by creation of message generation and reading modules within the collaborating EPR systems according to a software requirement specification created by the project team. The paper describes the creation of a common record display format, the implementation of transfer using a floppy disk in the lab, and considers the further barriers before a national implementation might be achieved.

  6. Experiences Using OpenMP Based on Compiler Directed Software DSM on a PC Cluster

    NASA Technical Reports Server (NTRS)

    Hess, Matthias; Jost, Gabriele; Mueller, Matthias; Ruehle, Roland; Biegel, Bryan (Technical Monitor)

    2002-01-01

    In this work we report on our experiences running OpenMP (message passing) programs on a commodity cluster of PCs (personal computers) running a software distributed shared memory (DSM) system. We describe our test environment and report on the performance of a subset of the NAS (NASA Advanced Supercomputing) Parallel Benchmarks that have been automatically parallelized for OpenMP. We compare the performance of the OpenMP implementations with that of their message passing counterparts and discuss performance differences.

  7. Guaranteeing Isochronous Control of Networked Motion Control Systems Using Phase Offset Adjustment

    PubMed Central

    Kim, Ikhwan; Kim, Taehyoun

    2015-01-01

    Guaranteeing isochronous transfer of control commands is an essential function for networked motion control systems. The adoption of real-time Ethernet (RTE) technologies may be profitable in guaranteeing deterministic transfer of control messages. However, unpredictable behavior of software in the motion controller often results in unexpectedly large deviation in control message transmission intervals, and thus leads to imprecise motion. This paper presents a simple and efficient heuristic to guarantee the end-to-end isochronous control with very small jitter. The key idea of our approach is to adjust the phase offset of control message transmission time in the motion controller by investigating the behavior of motion control task. In realizing the idea, we performed a pre-runtime analysis to determine a safe and reliable phase offset and applied the phase offset to the runtime code of motion controller by customizing an open-source based integrated development environment (IDE). We also constructed an EtherCAT-based motion control system testbed and performed extensive experiments on the testbed to verify the effectiveness of our approach. The experimental results show that our heuristic is highly effective even for low-end embedded controller implemented in open-source software components under various configurations of control period and the number of motor drives. PMID:26076407

  8. Effect of an anonymous reporting system on near-miss and harmful medical error reporting in a pediatric intensive care unit.

    PubMed

    Grant, Mary Jo C; Larsen, Gitte Y

    2007-01-01

    Adverse event reporting is a key element for improving patient safety. This study describes a new voluntary, anonymous reporting system that facilitates reporting of near-miss and patient harm events and an assessment of patient harm by the bedside care provider in a pediatric intensive care unit. The results demonstrated the effectiveness of the Patient Safety Report as a method to capture near-miss and patient harm events.

  9. A multi-institution evaluation of clinical profile anonymization

    PubMed Central

    Heatherly, Raymond; Rasmussen, Luke V; Peissig, Peggy L; Pacheco, Jennifer A; Harris, Paul; Denny, Joshua C

    2016-01-01

    Background and objective: There is an increasing desire to share de-identified electronic health records (EHRs) for secondary uses, but there are concerns that clinical terms can be exploited to compromise patient identities. Anonymization algorithms mitigate such threats while enabling novel discoveries, but their evaluation has been limited to single institutions. Here, we study how an existing clinical profile anonymization fares at multiple medical centers. Methods: We apply a state-of-the-art k-anonymization algorithm, with k set to the standard value 5, to the International Classification of Disease, ninth edition codes for patients in a hypothyroidism association study at three medical centers: Marshfield Clinic, Northwestern University, and Vanderbilt University. We assess utility when anonymizing at three population levels: all patients in 1) the EHR system; 2) the biorepository; and 3) a hypothyroidism study. We evaluate utility using 1) changes to the number included in the dataset, 2) number of codes included, and 3) regions generalization and suppression were required. Results: Our findings yield several notable results. First, we show that anonymizing in the context of the entire EHR yields a significantly greater quantity of data by reducing the amount of generalized regions from ∼15% to ∼0.5%. Second, ∼70% of codes that needed generalization only generalized two or three codes in the largest anonymization. Conclusions: Sharing large volumes of clinical data in support of phenome-wide association studies is possible while safeguarding privacy to the underlying individuals. PMID:26567325

  10. Assessment--Service--Training: The Many Faces of a University Peer Hotline.

    ERIC Educational Resources Information Center

    Curran, Jack

    In this study, a peer-operated university-based anonymous hotline is a data source for the assessment of student concerns and needs, providing empirical information for prevention-oriented psycho-educational campus programming. This paper covers the collection and assessment of data from the anonymous hotline service of the Middle Earth Peer…

  11. Unpacking the Black Box: A Formative Research Approach to the Development of Theory-Driven, Evidence-Based, and Culturally Safe Text Messages in Mobile Health Interventions.

    PubMed

    Maar, Marion A; Yeates, Karen; Toth, Zsolt; Barron, Marcia; Boesch, Lisa; Hua-Stewart, Diane; Liu, Peter; Perkins, Nancy; Sleeth, Jessica; Wabano, Mary Jo; Williamson, Pamela; Tobe, Sheldon W

    2016-01-22

    Mobile-cellular subscriptions have increased steadily over the past decade. The accessibility of SMS messages over existing mobile networks is high and has almost universal availability even on older and unsophisticated mobile phones and in geographic settings where wireless coverage is weak. There is intensive exploration of this inexpensive mobile telecommunication technology to improve health services and promote behavior change among vulnerable populations. However, a neglected area of research is the documentation and critical analysis of the formative research process required in the development and refinement of effective SMS messages. The objective of this qualitative research study was to identify major factors that may impact on the effectiveness of evidence-based SMS messages designed to reduce health inequities in hypertension management in low resource settings, including Aboriginal populations in high-income countries and rural populations in low-income countries. Specifically, we were interested in uncovering the range of mediators that impact on appropriate message content transmission and, ultimately, on health behavior improvements in a range of these sociocultural settings. Collaborative qualitative research with Canadian Aboriginal and Tanzanian participants was conducted to deconstruct the content and transmission of evidence-based health information contained in SMS messages in the context of an international research project designed to address health inequalities in hypertension, and to develop a grounded theory of the major factors that mediate the effectiveness of this communication. We also examined the interrelationship of these mediators with the three essential conditions of the behavior system of the Behavioral Change Wheel model (capability, opportunity, and motivation) and cultural safety. Four focus groups with a total of 45 participants were conducted. Our grounded theory research revealed how discrepancies develop between the evidence-based text message created by researchers and the message received by the recipient in mobile health interventions. These discrepancies were primarily generated by six mediators of meaning in SMS messages: (1) negative or non-affirming framing of advocacies, (2) fear- or stress-inducing content, (3) oppressive or authoritarian content, (4) incongruity with cultural and traditional practices, (5) disconnect with the reality of the social determinants of health and the diversity of cultures within a population, and (6) lack of clarity and/or practicality of content. These 6 mediators of meaning provide the basis for sound strategies for message development because they impact directly on the target populations' capability, opportunity, and motivation for behavior change. The quality of text messages impacts significantly on the effectiveness of a mobile health intervention. Our research underscores the urgent need for interventions to incorporate and evaluate the quality of SMS messages and to examine the mediators of meaning within each targeted cultural and demographic group. Reporting on this aspect of mobile health intervention research will allow researchers to move away from the current black box of SMS text message development, thus improving the transparency of the process as well as the quality of the outcomes.

  12. Unpacking the Black Box: A Formative Research Approach to the Development of Theory-Driven, Evidence-Based, and Culturally Safe Text Messages in Mobile Health Interventions

    PubMed Central

    Yeates, Karen; Toth, Zsolt; Barron, Marcia; Boesch, Lisa; Hua-Stewart, Diane; Liu, Peter; Perkins, Nancy; Sleeth, Jessica; Wabano, Mary Jo; Williamson, Pamela; Tobe, Sheldon W

    2016-01-01

    Background Mobile-cellular subscriptions have increased steadily over the past decade. The accessibility of SMS messages over existing mobile networks is high and has almost universal availability even on older and unsophisticated mobile phones and in geographic settings where wireless coverage is weak. There is intensive exploration of this inexpensive mobile telecommunication technology to improve health services and promote behavior change among vulnerable populations. However, a neglected area of research is the documentation and critical analysis of the formative research process required in the development and refinement of effective SMS messages. Objective The objective of this qualitative research study was to identify major factors that may impact on the effectiveness of evidence-based SMS messages designed to reduce health inequities in hypertension management in low resource settings, including Aboriginal populations in high-income countries and rural populations in low-income countries. Specifically, we were interested in uncovering the range of mediators that impact on appropriate message content transmission and, ultimately, on health behavior improvements in a range of these sociocultural settings. Methods Collaborative qualitative research with Canadian Aboriginal and Tanzanian participants was conducted to deconstruct the content and transmission of evidence-based health information contained in SMS messages in the context of an international research project designed to address health inequalities in hypertension, and to develop a grounded theory of the major factors that mediate the effectiveness of this communication. We also examined the interrelationship of these mediators with the three essential conditions of the behavior system of the Behavioral Change Wheel model (capability, opportunity, and motivation) and cultural safety. Results Four focus groups with a total of 45 participants were conducted. Our grounded theory research revealed how discrepancies develop between the evidence-based text message created by researchers and the message received by the recipient in mobile health interventions. These discrepancies were primarily generated by six mediators of meaning in SMS messages: (1) negative or non-affirming framing of advocacies, (2) fear- or stress-inducing content, (3) oppressive or authoritarian content, (4) incongruity with cultural and traditional practices, (5) disconnect with the reality of the social determinants of health and the diversity of cultures within a population, and (6) lack of clarity and/or practicality of content. These 6 mediators of meaning provide the basis for sound strategies for message development because they impact directly on the target populations’ capability, opportunity, and motivation for behavior change. Conclusions The quality of text messages impacts significantly on the effectiveness of a mobile health intervention. Our research underscores the urgent need for interventions to incorporate and evaluate the quality of SMS messages and to examine the mediators of meaning within each targeted cultural and demographic group. Reporting on this aspect of mobile health intervention research will allow researchers to move away from the current black box of SMS text message development, thus improving the transparency of the process as well as the quality of the outcomes. PMID:26800712

  13. A historical review of perceptions of key aspects of spirituality and religion within alcoholics anonymous.

    PubMed

    Feigenbaum, Janice Cooke

    2013-01-01

    This historical research aimed to develop an accurate perception of the role of spirituality and religion within the history of Alcoholics Anonymous. Primary and secondary sources were reviewed. The study identified that Bill W. and Dr. Bob established the format for the support group based on the ideas of William James, which formed the base for the Oxford Groups. Alcoholics Anonymous was clearly viewed as a spiritual group and not a religion. The review also showed that the two founders had each experienced one of the two types of spiritual awakenings that James had addressed. These findings will help nurses clarify their own perceptions of this organization so they may accurately educate individuals who they are encouraging to participate in this program while recovering from an addiction.

  14. DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers.

    PubMed

    Sujansky, Walter; Wilson, Tom

    2015-04-01

    This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. The use of microblog-based case studies in a pharmacotherapy introduction class in China.

    PubMed

    Wang, Tiansheng; Wang, Fei; Shi, Luwen

    2013-09-08

    Microblog is a Web 2.0 technology that provides an online social networking platform for communicating and sharing information among web users. Pharmacy educators have previously used microblog to promote active engagement of students. However, there is very little research to demonstrate how to use microblogging effectively to enhance pedagogy in a blended or face-to-face classroom environment. We used the most popular microblog website in China to create a "space" within the classroom to evaluate an interactive microblogging forum for the integration of pharmacotherapy case studies. This study is aimed to determine students' attitudes toward microblog-based case studies (MBC) in a pharmacotherapy class. We created a group on Sina Weibo, the most popular microblog website in China, to explore the possibilities of using microblog-based case discussions in pharmacy education to promote and motivate student learning. The class teaching activities began in November 2011; individual group assignments to a single case study were administered to 21 groups with a total of 126 participating pharmacy students. Each group was required to share a discussion care plan on the microblogging platform. Individual students were expected to participate in an online discussion related to at least two other group cases by posting their comments on the microblog platform. All postings were tracked and analyzed, and then a post MBC survey was administered anonymously to determine students' opinions towards MBC. A total of 126 students posted 592 messages and 112 students (89%) completed the survey. More than 80% of students agreed that MBC improved communication; nearly 70% agreed that MBC increased the amount of interaction, and over 50% found value in reading other students' messages. However, 25% students believed the collaborative learning was not effective and 22% indicated the quality of interaction was low. MBC appears to be well-accepted learning method to students in this study. Educators who wish to use MBC for pharmacy courses should balance the potential advantages, such as improving communication and the amount of interaction, with potential disadvantages, such as inefficient collaborative learning and the low quality of interaction.

  16. Photo-sharing social media for eHealth: analysing perceived message effectiveness of sexual health information on Instagram.

    PubMed

    O'Donnell, Nicole Hummel; Willoughby, Jessica Fitts

    2017-10-01

    Health professionals increasingly use social media to communicate health information, but it is unknown how visual message presentation on these platforms affects message reception. This study used an experiment to analyse how young adults (n = 839) perceive sexual health messages on Instagram. Participants were exposed to one of four conditions based on visual message presentation. Messages with embedded health content had the highest perceived message effectiveness ratings. Additionally, message sensation value, attitudes and systematic information processing were significant predictors of perceived message effectiveness. Implications for visual message design for electronic health are discussed.

  17. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  18. 'Yeast mail': a novel Saccharomyces application (NSA) to encrypt messages.

    PubMed

    Rosemeyer, Helmut; Paululat, Achim; Heinisch, Jürgen J

    2014-09-01

    The universal genetic code is used by all life forms to encode biological information. It can also be used to encrypt semantic messages and convey them within organisms without anyone but the sender and recipient knowing, i.e., as a means of steganography. Several theoretical, but comparatively few experimental, approaches have been dedicated to this subject, so far. Here, we describe an experimental system to stably integrate encrypted messages within the yeast genome using a polymerase chain reaction (PCR)-based, one-step homologous recombination system. Thus, DNA sequences encoding alphabetical and/or numerical information will be inherited by yeast propagation and can be sent in the form of dried yeast. Moreover, due to the availability of triple shuttle vectors, Saccharomyces cerevisiae can also be used as an intermediate construction device for transfer of information to either Drosophila or mammalian cells as steganographic containers. Besides its classical use in alcoholic fermentation and its modern use for heterologous gene expression, we here show that baker's yeast can thus be employed in a novel Saccharomyces application (NSA) as a simple steganographic container to hide and convey messages. Copyright © 2014 Verlag Helvetica Chimica Acta AG, Zürich.

  19. Instant messaging at the hospital: supporting articulation work?

    PubMed

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  20. Announcement/Subscription/Publication: Message Based Communication for Heterogeneous Mobile Environments

    NASA Astrophysics Data System (ADS)

    Ristau, Henry

    Many tasks in smart environments can be implemented using message based communication paradigms that decouple applications in time, space, synchronization and semantics. Current solutions for decoupled message based communication either do not support message processing and thus semantic decoupling or rely on clearly defined network structures. In this paper we present ASP, a novel concept for such communication that can directly operate on neighbor relations between brokers and does not rely on a homogeneous addressing scheme or anymore than simple link layer communication. We show by simulation that ASP performs well in a heterogeneous scenario with mobile nodes and decreases network or processor load significantly compared to message flooding.

  1. Defining the ATC Controller Interface for Data Link Clearances

    NASA Technical Reports Server (NTRS)

    Rankin, James

    1998-01-01

    The Controller Interface (CI) is the primary method for Air Traffic Controllers to communicate with aircraft via Controller-Pilot Data Link Communications (CPDLC). The controller, wearing a microphone/headset, aurally gives instructions to aircraft as he/she would with today's voice radio systems. The CI's voice recognition system converts the instructions to digitized messages that are formatted according to the RTCA DO-219 Operational Performance Standards for ATC Two-Way Data Link Communications. The DO-219 messages are transferred via RS-232 to the ATIDS system for uplink using a Mode-S datalink. Pilot acknowledgments of controller messages are downlinked to the ATIDS system and transferred to the Cl. A computer monitor is used to convey information to the controller. Aircraft data from the ARTS database are displayed on flight strips. The flight strips are electronic versions of the strips currently used in the ATC system. Outgoing controller messages cause the respective strip to change color to indicate an unacknowledged transmission. The message text is shown on the flight strips for reference. When the pilot acknowledges the message, the strip returns to its normal color. A map of the airport can also be displayed on the monitor. In addition to voice recognition, the controller can enter messages using the monitor's touch screen or by mouse/keyboard.

  2. Public responses to flood warning messages: the Floodline service in Scotland

    NASA Astrophysics Data System (ADS)

    Cranston, Michael; Geddes, Alistair; Black, Andrew; Ambler, Alice; Menmuir, Cordelia

    2017-04-01

    Over the past decade, efforts have been made to improve the national flood warning system in Scotland, with new capabilities in the underlying flood forecasting tools, as well as development of an active flood warning dissemination service. This paper focusses on the latter service, for which there are around 26,000 customers registered at present, and which saw over 300,000 individual messages being issued during recent floods in winter 2015/16. However, notwithstanding such promising signs of change, evidence of how (if at all) the flood warning messages disseminated by the service actually impacts on recipient behaviour remains more limited. For example, this includes knowledge of the extent to which the messages influence actions on flood preparedness and mitigation. In consequence, there are also ongoing questions over the cost-effectiveness of the service in its current format, and of its scalability to even larger numbers of recipients. This paper will present initial findings from the first detailed study of customer perceptions of the messages distributed via the Scottish flood warning system, officially known as Floodline. In particular, the primary focus will be on results generated from a web-based questionnaire survey of registered Floodline customers. The survey was designed to assess associations between multiple customer characteristics, including location and risk level, type of warning message received, prior experience of flooding, risk awareness, and demographics. The study was conducted for the Scottish Environment Protection Agency, which is responsible for running the Floodline service. More broadly it resonates with current emphases on exploring effective means of hazard communication and encouraging public engagement in flood risk management.

  3. GMSEC Interface Specification Document 2016 March

    NASA Technical Reports Server (NTRS)

    Handy, Matthew

    2016-01-01

    The GMSEC Interface Specification Document contains the standard set of defined messages. Each GMSEC standard message contains a GMSEC Information Bus Header section and a Message Contents section. Each message section identifies required fields, optional fields, data type and recommended use of the fields. Additionally, this document includes the message subjects associated with the standard messages. The system design of the operations center should ensure the components that are selected use both the API and the defined standard messages in order to achieve full interoperability from component to component.

  4. C2 Core and UCore Message Design Capstone: Interoperable Message Structure

    DTIC Science & Technology

    2009-09-01

    there are sufficient resources to carry out a mission. The Team used the Theatre Battle Management Command System ( TBMCS ) to generate sample CMD...System ( TBMCS ) was used to generate CMD messages as inputs for both use cases. These were programmatically transformed into the three-layer message...used for the experiment was generated from the TBMCS in the form of a CMD XML document. The Capstone experiment included transforming that document to

  5. Creating buzz: the neural correlates of effective message propagation.

    PubMed

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  6. Using Visual Metaphors in Health Messages: A Strategy to Increase Effectiveness for Mental Illness Communication.

    PubMed

    Lazard, Allison J; Bamgbade, Benita A; Sontag, Jennah M; Brown, Carolyn

    2016-12-01

    Depression is highly prevalent among college students. Although treatment is often available on university campuses, many stigma-based barriers prevent students from seeking help. Communication strategies, such as the use of metaphors, are needed to reduce barriers. Specially, the use of visual metaphors, as a strategic message design tactic, may be an effective communication strategy to increase message appeal and engagement. Using a 2-phase approach, this study first identified common metaphors students use to conceptualize mental illness. Messages incorporating conceptual and visual metaphors were then designed and tested to determine their potential in reducing stigma. Participants (n = 256) were randomly assigned to 1 of 4 conditions in a between-subjects experiment: messages with visual and textual metaphors, messages with straightforward visuals and textual metaphors, text-based metaphor messages, or a control group. Overall, metaphorical messages are appealing, the use of visual metaphors leads to greater message engagement, and messages based on conceptual metaphors have the potential to reduce stigma. The use of conceptual and visual metaphors in campaign design is an effective strategy to communicate about a complex health topic, such as mental illness, and should be considered for use in campaigns to reduce barriers for help-seeking behavior.

  7. Translation of globin messenger RNA by the mouse ovum

    PubMed Central

    Brinster, R. L.; Chen, H. Y.; Trumbauer, M. E.; Avarbock, M. R.

    2016-01-01

    It has been demonstrated that the Xenopus oocyte can translate rabbit haemoglobin messenger RNA (mRNA) following microinjection of the message into the cell1. The Xenopus oocyte has since been shown to be capable of translating a variety of messenger RNAs from different species2–4. This system has proved useful in understanding the mechanism of message translation and has also provided information about the translation capability of the Xenopus oocyte5,6. Several other cell types, including HeLa cells and fibroblasts, can also translate exogenous message injected into the cell7,8. However, there have been no reports of injection of mRNA into oocytes or fertilised one-cell ova of mammalian species. Nevertheless, the latter system could be of considerable use in studying the processing of exogenous messages in a mammalian system undergoing development, as well as providing insight into the way the early embryo processes injected messages and the protein products of such messages. We report here the results of injecting message into the fertilised one-cell mouse ovum and show that both mouse and rabbit globin mRNA are translated in this system. PMID:7352032

  8. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading.

    PubMed

    Van Hout, Marie Claire; Bingham, Tim

    2014-03-01

    Silk Road is located on the Deep Web and provides an anonymous transacting infrastructure for the retail of drugs and pharmaceuticals. Members are attracted to the site due to protection of identity by screen pseudonyms, variety and quality of product listings, selection of vendors based on reviews, reduced personal risks, stealth of product delivery, development of personal connections with vendors in stealth modes and forum activity. The study aimed to explore vendor accounts of Silk Road as retail infrastructure. A single and holistic case study with embedded units approach (Yin, 2003) was chosen to explore the accounts of vendor subunits situated within the Silk Road marketplace. Vendors (n=10) completed an online interview via the direct message facility and via Tor mail. Vendors described themselves as 'intelligent and responsible' consumers of drugs. Decisions to commence vending operations on the site centred on simplicity in setting up vendor accounts, and opportunity to operate within a low risk, high traffic, high mark-up, secure and anonymous Deep Web infrastructure. The embedded online culture of harm reduction ethos appealed to them in terms of the responsible vending and use of personally tested high quality products. The professional approach to running their Silk Road businesses and dedication to providing a quality service was characterised by professional advertising of quality products, professional communication and visibility on forum pages, speedy dispatch of slightly overweight products, competitive pricing, good stealth techniques and efforts to avoid customer disputes. Vendors appeared content with a fairly constant buyer demand and described a relatively competitive market between small and big time market players. Concerns were evident with regard to Bitcoin instability. The greatest threat to Silk Road and other sites operating on the Deep Web is not law enforcement or market dynamics, it is technology itself. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. A New Quantum Proxy Multi-signature Scheme Using Maximally Entangled Seven-Qubit States

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Zhang, Jia-Fu; Liu, Jian; Li, Zeng-You

    2016-02-01

    In this paper, we propose a new secure quantum proxy multi-signature scheme using seven-qubit entangled quantum state as quantum channels, which may have applications in e-payment system, e-government, e-business, etc. This scheme is based on controlled quantum teleportation. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, traceability, unforgetability and undeniability.

  10. The AAL project: automated monitoring and intelligent analysis for the ATLAS data taking infrastructure

    NASA Astrophysics Data System (ADS)

    Kazarov, A.; Lehmann Miotto, G.; Magnoni, L.

    2012-06-01

    The Trigger and Data Acquisition (TDAQ) system of the ATLAS experiment at CERN is the infrastructure responsible for collecting and transferring ATLAS experimental data from detectors to the mass storage system. It relies on a large, distributed computing environment, including thousands of computing nodes with thousands of application running concurrently. In such a complex environment, information analysis is fundamental for controlling applications behavior, error reporting and operational monitoring. During data taking runs, streams of messages sent by applications via the message reporting system together with data published from applications via information services are the main sources of knowledge about correctness of running operations. The flow of data produced (with an average rate of O(1-10KHz)) is constantly monitored by experts to detect problem or misbehavior. This requires strong competence and experience in understanding and discovering problems and root causes, and often the meaningful information is not in the single message or update, but in the aggregated behavior in a certain time-line. The AAL project is meant at reducing the man power needs and at assuring a constant high quality of problem detection by automating most of the monitoring tasks and providing real-time correlation of data-taking and system metrics. This project combines technologies coming from different disciplines, in particular it leverages on an Event Driven Architecture to unify the flow of data from the ATLAS infrastructure, on a Complex Event Processing (CEP) engine for correlation of events and on a message oriented architecture for components integration. The project is composed of 2 main components: a core processing engine, responsible for correlation of events through expert-defined queries and a web based front-end to present real-time information and interact with the system. All components works in a loose-coupled event based architecture, with a message broker to centralize all communication between modules. The result is an intelligent system able to extract and compute relevant information from the flow of operational data to provide real-time feedback to human experts who can promptly react when needed. The paper presents the design and implementation of the AAL project, together with the results of its usage as automated monitoring assistant for the ATLAS data taking infrastructure.

  11. Remote monitoring and security alert based on motion detection using mobile

    NASA Astrophysics Data System (ADS)

    Suganya Devi, K.; Srinivasan, P.

    2016-03-01

    Background model does not have any robust solution and constitutes one of the main problems in surveillance systems. The aim of the paper is to provide a mobile based security to a remote monitoring system through a WAP using GSM modem. It is most designed to provide durability and versatility for a wide variety of indoor and outdoor applications. It is compatible with both narrow and band networks and provides simultaneous image detection. The communicator provides remote control, event driven recording, including pre-alarm and post-alarm and image motion detection. The web cam allowing them to be mounted either to a ceiling or wall without requiring bracket, with the use of web cam. We could continuously monitoring status in the client system through the web. If any intruder arrives in the client system, server will provide an alert to the mobile (what we are set in the message that message send to the authorized person) and the client can view the image using WAP.

  12. A systematic review of three approaches for constructing physical activity messages: What messages work and what improvements are needed?

    PubMed Central

    2010-01-01

    Background To motivate individuals to adhere to a regular physical activity regime, guidelines must be supplemented with persuasive messages that are disseminated widely. While substantial research has examined effective strategies for disseminating physical activity messages, there has been no systematic effort to examine optimal message content. This paper reviews studies that evaluate the effectiveness of three approaches for constructing physical activity messages including tailoring messages to suit individual characteristics of message recipients (message tailoring), framing messages in terms of gains versus losses (message framing), and targeting messages to affect change in self-efficacy (i.e., a theoretical determinant of behavior change). Methods We searched the MEDLINE, PsycINFO, EMBASE and CINAHL databases up to July 2008. Relevant reference lists also were searched. We included intervention trials, field experiments, and laboratory-based studies that aimed to test the efficacy or effectiveness of tailored messages, framed messages and self-efficacy change messages among healthy adults. We used a descriptive approach to analyze emerging patterns in research findings. Based on this evidence we made recommendations for practice and future research. Results Twenty-two studies were identified. Twelve studies evaluated message tailoring. In 10 of these studies, tailored messages resulted in greater physical activity than a control message. Six studies evaluated framed messages. Five of these studies demonstrated that gain-framed messages lead to stronger intentions to be active compared to a control message. Moreover, a gain-frame advantage was evident in three of the four studies that assessed physical activity. Four studies evaluated self-efficacy change messages. The two studies that used an experimental design provide a clear indication that individuals' beliefs can be affected by messages that incorporate types of information known to be determinants of self-efficacy. Overall, strong evidence to support definitive recommendations for optimal message content and structure was lacking. Conclusions Additional research testing the optimal content of messages used to supplement physical activity guidelines is needed. Tailored messages, gain-framed messages, and self-efficacy change messages hold promise as strategies for constructing physical activity messages and should be a focus of future research. PMID:20459779

  13. Evaluation of smoking prevention television messages based on the elaboration likelihood model

    PubMed Central

    Flynn, Brian S.; Worden, John K.; Bunn, Janice Yanushka; Connolly, Scott W.; Dorwaldt, Anne L.

    2011-01-01

    Progress in reducing youth smoking may depend on developing improved methods to communicate with higher risk youth. This study explored the potential of smoking prevention messages based on the Elaboration Likelihood Model (ELM) to address these needs. Structured evaluations of 12 smoking prevention messages based on three strategies derived from the ELM were conducted in classroom settings among a diverse sample of non-smoking middle school students in three states (n = 1771). Students categorized as likely to have higher involvement in a decision to initiate cigarette smoking reported relatively high ratings on a cognitive processing indicator for messages focused on factual arguments about negative consequences of smoking than for messages with fewer or no direct arguments. Message appeal ratings did not show greater preference for this message type among higher involved versus lower involved students. Ratings from students reporting lower academic achievement suggested difficulty processing factual information presented in these messages. The ELM may provide a useful strategy for reaching adolescents at risk for smoking initiation, but particular attention should be focused on lower academic achievers to ensure that messages are appropriate for them. This approach should be explored further before similar strategies could be recommended for large-scale implementation. PMID:21885672

  14. Evaluation of smoking prevention television messages based on the elaboration likelihood model.

    PubMed

    Flynn, Brian S; Worden, John K; Bunn, Janice Yanushka; Connolly, Scott W; Dorwaldt, Anne L

    2011-12-01

    Progress in reducing youth smoking may depend on developing improved methods to communicate with higher risk youth. This study explored the potential of smoking prevention messages based on the Elaboration Likelihood Model (ELM) to address these needs. Structured evaluations of 12 smoking prevention messages based on three strategies derived from the ELM were conducted in classroom settings among a diverse sample of non-smoking middle school students in three states (n = 1771). Students categorized as likely to have higher involvement in a decision to initiate cigarette smoking reported relatively high ratings on a cognitive processing indicator for messages focused on factual arguments about negative consequences of smoking than for messages with fewer or no direct arguments. Message appeal ratings did not show greater preference for this message type among higher involved versus lower involved students. Ratings from students reporting lower academic achievement suggested difficulty processing factual information presented in these messages. The ELM may provide a useful strategy for reaching adolescents at risk for smoking initiation, but particular attention should be focused on lower academic achievers to ensure that messages are appropriate for them. This approach should be explored further before similar strategies could be recommended for large-scale implementation.

  15. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  16. International Students, University Health Centers, and Memorable Messages about Health

    ERIC Educational Resources Information Center

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  17. Protecting genomic sequence anonymity with generalization lattices.

    PubMed

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  18. SU-F-T-223: Radiotherapy Incident Reporting and Analysis System (RIRAS):Early Experience

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kapoor, R; Palta, J; Hagan, M

    Background & Purpose: RIRAS is a web-based information system deployed on the Veterans Health Administration intranet in early 2014 to collect adverse events and good catch data; analyze the causes and contributing factors; and find ways to prevent future occurrences. Material and Methods: Incident learning consists of a feedback loop which starts with reporting an event, followed by analysis of contributing factors, and culminates in the development of a patient safety work product (PSWP) to prevent recurrence. RIRAS permits both anonymous and non-anonymous reporting. Each report is analyzed by a team of medical physicists who are independent of the reportingmore » facility. The analysts usually contact the reporting facilities for additional information. We analyzed all reports and held telephonic interviews (when necessary) with the reporters. We then generated PSWPs with corrective/preventive and learning actions. Anonymous reporting is handled in the same manner, except without the ability to further interview the reporter. Results: In a significant number of reports, the causes and recommended preventive actions were considerably altered by the independent analysis and additional information from the facility. 130 reports have been entered in RIRAS; 9 misadministrations, 83 good catches, 3 anonymous good catches, and 35 earlier reported incidents from FY2005-14. 45% of the reported incidents occurred in the treatment delivery stages, 19% in on-treatment management, and 16% in pre-treatment verification. 80% of the good catches were found in the treatment delivery workflow. Majority of these incidents were due to inconsistent patient setup instructions or documentation, nonadherence to policies and procedures, lax time-out policy, distracted RTTs, and inadequate RTT staffing. Conclusion: RIRAS has identified many areas for improvement and elevated the quality and safety of radiation treatments in the VHA. We found that the ability to learn is significantly diminished when the analysts do not have the ability to request additional information.« less

  19. Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)

    NASA Astrophysics Data System (ADS)

    Ratnadewi; Pramono Adhie, Roy; Hutama, Yonatan; Saleh Ahmar, A.; Setiawan, M. I.

    2018-01-01

    Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.

  20. Evaluation of emotion-based messages designed to motivate Hispanic and Asian parents of early adolescents to engage in calcium-rich food and beverage parenting practices.

    PubMed

    Banna, Jinan Corinne; Reicks, Marla; Gunther, Carolyn; Richards, Rickelle; Bruhn, Christine; Cluskey, Mary; Wong, Siew Sun; Misner, Scottie; Hongu, Nobuko; Johnston, N Paul

    2016-08-01

    Setting healthful beverage expectations, making calcium-rich foods and beverages (CRF/B) available, and role modeling are parenting practices promoting calcium intake among early adolescents. This study aimed to evaluate emotion-based messages designed to motivate parents of early adolescents to perform these practices. Emotion-based messages were developed for each parenting practice and tested in 35 parents from 5 states. Findings were used to modify messages and develop a survey administered via Amazon MechanicalTurk to a convenience sample of Asian (n = 166) and Hispanic (n = 184) parents of children 10-13 years. Main outcome measures were message comprehension, motivation, relevance, acceptability, and novelty. Engagement in the parenting practices was also assessed. Message comprehension was acceptable for the majority of parents. Most also agreed that messages were motivational (setting healthful beverage expectations (69.0%), making CRF/B available (67.4%), and role modeling (80.0%)), relevant and acceptable. About 30-50% indicated they had not seen the information before. Many parents indicated they were already engaging in the practices (> 70%). No racial/ethnic differences were observed for responses to messages or engaging in parenting practices. Results indicate that emotion-based messages designed to motivate parents to engage in parenting practices that promote calcium intake among early adolescents were motivating, relevant, and acceptable.

  1. Evaluation of Smoking Prevention Television Messages Based on the Elaboration Likelihood Model

    ERIC Educational Resources Information Center

    Flynn, Brian S.; Worden, John K.; Bunn, Janice Yanushka; Connolly, Scott W.; Dorwaldt, Anne L.

    2011-01-01

    Progress in reducing youth smoking may depend on developing improved methods to communicate with higher risk youth. This study explored the potential of smoking prevention messages based on the Elaboration Likelihood Model (ELM) to address these needs. Structured evaluations of 12 smoking prevention messages based on three strategies derived from…

  2. IDCDACS: IDC's Distributed Application Control System

    NASA Astrophysics Data System (ADS)

    Ertl, Martin; Boresch, Alexander; Kianička, Ján; Sudakov, Alexander; Tomuta, Elena

    2015-04-01

    The Preparatory Commission for the CTBTO is an international organization based in Vienna, Austria. Its mission is to establish a global verification regime to monitor compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT), which bans all nuclear explosions. For this purpose time series data from a global network of seismic, hydro-acoustic and infrasound (SHI) sensors are transmitted to the International Data Centre (IDC) in Vienna in near-real-time, where it is processed to locate events that may be nuclear explosions. We newly designed the distributed application control system that glues together the various components of the automatic waveform data processing system at the IDC (IDCDACS). Our highly-scalable solution preserves the existing architecture of the IDC processing system that proved successful over many years of operational use, but replaces proprietary components with open-source solutions and custom developed software. Existing code was refactored and extended to obtain a reusable software framework that is flexibly adaptable to different types of processing workflows. Automatic data processing is organized in series of self-contained processing steps, each series being referred to as a processing pipeline. Pipelines process data by time intervals, i.e. the time-series data received from monitoring stations is organized in segments based on the time when the data was recorded. So-called data monitor applications queue the data for processing in each pipeline based on specific conditions, e.g. data availability, elapsed time or completion states of preceding processing pipelines. IDCDACS consists of a configurable number of distributed monitoring and controlling processes, a message broker and a relational database. All processes communicate through message queues hosted on the message broker. Persistent state information is stored in the database. A configurable processing controller instantiates and monitors all data processing applications. Due to decoupling by message queues the system is highly versatile and failure tolerant. The implementation utilizes the RabbitMQ open-source messaging platform that is based upon the Advanced Message Queuing Protocol (AMQP), an on-the-wire protocol (like HTML) and open industry standard. IDCDACS uses high availability capabilities provided by RabbitMQ and is equipped with failure recovery features to survive network and server outages. It is implemented in C and Python and is operated in a Linux environment at the IDC. Although IDCDACS was specifically designed for the existing IDC processing system its architecture is generic and reusable for different automatic processing workflows, e.g. similar to those described in (Olivieri et al. 2012, Kværna et al. 2012). Major advantages are its independence of the specific data processing applications used and the possibility to reconfigure IDCDACS for different types of processing, data and trigger logic. A possible future development would be to use the IDCDACS framework for different scientific domains, e.g. for processing of Earth observation satellite data extending the one-dimensional time-series intervals to spatio-temporal data cubes. REFERENCES Olivieri M., J. Clinton (2012) An almost fair comparison between Earthworm and SeisComp3, Seismological Research Letters, 83(4), 720-727. Kværna, T., S. J. Gibbons, D. B. Harris, D. A. Dodge (2012) Adapting pipeline architectures to track developing aftershock sequences and recurrent explosions, Proceedings of the 2012 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, 776-785.

  3. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    NASA Technical Reports Server (NTRS)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  4. Remote Access to CD-ROM for the Distant Learner.

    ERIC Educational Resources Information Center

    Cutright, Patricia; Girrard, Kenneth M.

    1991-01-01

    A dial-access, multiuser, multiaccess CD-ROM search system with end-user capability was developed to provide Eastern Oregon State College distance education students with access to the information required by their studies. Based on UNIX, the system provides students with access to 12 databases, an e-mail system for messaging, interlibrary loan…

  5. Strategic Embodiment in Virtual Spaces: Exploring an On-Line Discussion about Sexualities Equality in Schools

    ERIC Educational Resources Information Center

    Depalma, Renee; Atkinson, Elizabeth

    2007-01-01

    This paper analyses patterns of participation on a voluntary anonymous Web-based discussion forum, open to students and faculty in one UK university, concerning sexualities equality in schools. Analysis revealed that participants often rejected the security of anonymity and strategically embodied themselves and others (as gay, straight, parents,…

  6. Secure Messaging in Electronic Health Records and Its Impact on Diabetes Clinical Outcomes: A Systematic Review.

    PubMed

    Kuo, Alyce; Dang, Stuti

    2016-09-01

    In 2009, President Barack Obama signed into law the Health Information Technology for Economic and Clinical Health (HITECH) Act, which aims for the universal adoption of electronic health records (EHRs) in primary care settings and "meaningful use" of this technology. The objectives of "meaningful use" are well defined and executed in stages; one of the objectives of stage 2, beginning in 2014, was implementation of a secure messaging system between patients and providers. Secure messaging has been shown to positively affect patients who struggle with managing chronic diseases on a day to day basis. This review aims to assess the clinical evidence supporting the use of secure messaging in EHRs in self-management of diabetes. A systematic search of PubMed was conducted, and 320 results were returned. Of these, 11 were selected based on outlined criteria. Evidence from 7 of the 11 included studies suggests significant improvement in patients' hemoglobin A1c (HbA1c) with the use of secure messaging. However, improvements in patients' secondary outcomes, such as blood pressure and cholesterol, were inconsistent. Further work must be done to determine how to best maximize the potential of available tools such as secure messaging and EHRs to improve patient outcomes.

  7. User Registration Systems for Distributed Systems

    NASA Astrophysics Data System (ADS)

    Murphy, K. J.; Cechini, M.; Pilone, D.; Mitchell, A.

    2010-12-01

    As NASA’s Earth Observing System Data and Information System (EOSDIS) systems have evolved over the years, most of the EOSDIS data are now available to users via anonymous on-line access. Although the changes have improved the dissemination efficiency of earth science data, the anonymous access has made it difficult to characterize users, capture metrics on the value of EOSDIS and provide customized services that benefit users. As the number of web-based applications continues to grow, data centers and application providers have implemented their own user registration systems and provided new tools and interfaces for their registered users. This has led to the creation of independent registration systems for accessing data and interacting with online tools and services. The user profile information maintained at each of these registration systems is not consistent and the registration enforcement varies by system as well. This problem is in no way unique to EOSDIS and represents a general challenge to the distributed computing community. In a study done in 2007(http://www2007.org/papers/paper620.pd), the average user has approximately 7 passwords for about 25 accounts and enters a password 8 times a day. These numbers have only increased in the last three years. To try and address this, a number of solutions have been offered including Single Sign-On solutions using a common backend like Microsoft Active Directory or an LDAP server, trust based identity providers like OpenID, and various forms of authorization delegation like OAuth or SAML/XACML. This talk discusses the differences between authentication and authorization, the state of the more popular user registration solutions available for distributed use, and some of the technical and policy drivers that need to be considered when incorporating a user registration system into your application.

  8. Re-Engineering the Tropical Rainfall Measuring Mission (TRMM) Satellite Utilizing Goddard Space Flight Center (GSFC) Mission Services Center (GMSEC) Middleware Based Technology to Enable Lights Out Operations and Autonomous Re-Dump of Lost Telemetry Data

    NASA Technical Reports Server (NTRS)

    Marius, Julio L.; Busch, Jim

    2008-01-01

    The Tropical Rainfall Measuring Mission (TRMM) spacecraft was launched in November of 1996 in order to obtain unique three dimensional radar cross sectional observations of cloud structures with particular interest in hurricanes. The TRMM mission life was recently extended with current estimates that operations will continue through the 2012-2013 timeframe. Faced with this extended mission profile, the project has embarked on a technology refresh and re-engineering effort. TRMM has recently implemented a re-engineering effort to expand a middleware based messaging architecture to enable fully redundant lights-out of flight operations activities. The middleware approach is based on the Goddard Mission Services Evolution Center (GMSEC) architecture, tools and associated open-source Applications Programming Interface (API). Middleware based messaging systems are useful in spacecraft operations and automation systems because private node based knowledge (such as that within a telemetry and command system) can be broadcast on the middleware messaging bus and hence enable collaborative decisions to be made by multiple subsystems. In this fashion, private data is made public and distributed within the local area network and multiple nodes can remain synchronized with other nodes. This concept is useful in a fully redundant architecture whereby one node is monitoring the processing of the 'prime' node so that in the event of a failure the backup node can assume operations of the prime, without loss of state knowledge. This paper will review and present the experiences, architecture, approach and lessons learned of the TRMM re-engineering effort centered on the GMSEC middleware architecture and tool suite. Relevant information will be presented that relates to the dual redundant parallel nature of the Telemetry and Command (T and C) and Front-End systems and how these systems can interact over a middleware bus to achieve autonomous operations including autonomous commanding to recover missing science data during the same spacecraft contact.

  9. Some Features of Maritime Telex Service Communication.

    ERIC Educational Resources Information Center

    Johnson, Barry

    1995-01-01

    This article analyzes four categories of English-language maritime telex service communication: (1) standard, system- generated messages; (2) standard procedures for transmitting messages; (3) nonstandard messages related to maritime mobile radio service (MMRS); and (4) nonstandard messages related to the organization, procedures, or equipment of…

  10. A Social Systems Approach to Evaluation Research.

    ERIC Educational Resources Information Center

    Olien, C. N.; And Others

    An information-control systems model for evaluation of adult education programs is offered and illustrated. The model is based upon identifying principal subsystems, such as source, channel and audience, which are involved in initiation, production, delivery and reception of educational messages. These subsystems are seen as separate but…

  11. Explaining the Efficacy of Pre-exposure Prophylaxis (PrEP) for HIV Prevention: A Qualitative Study of Message Framing and Messaging Preferences Among US Men Who have Sex with Men.

    PubMed

    Underhill, Kristen; Morrow, Kathleen M; Colleran, Christopher; Calabrese, Sarah K; Operario, Don; Salovey, Peter; Mayer, Kenneth H

    2016-07-01

    We investigated message comprehension and message framing preferences for communicating about PrEP efficacy with US MSM. We conducted eight focus groups (n = 38) and n = 56 individual interviews with MSM in Providence, RI. Facilitators probed comprehension, credibility, and acceptability of efficacy messages, including percentages, non-numerical paraphrases, efficacy ranges versus point estimates, and success- versus failure-framed messages. Our findings indicated a range of comprehension and operational understandings of efficacy messages. Participants tended to prefer percentage-based and success-framed messages, although preferences varied for communicating about efficacy using a single percentage versus a range. Participants reported uncertainty about how to interpret numerical estimates, and many questioned whether trial results would predict personal effectiveness. These results suggest that providers and researchers implementing PrEP may face challenges in communicating with users about efficacy. Efforts to educate MSM about PrEP should incorporate percentage-based information, and message framing decisions may influence message credibility and overall PrEP acceptability.

  12. Design and Implementation of Vehicle Navigation System in Urban Environments using Internet of Things (Iot)

    NASA Astrophysics Data System (ADS)

    Godavarthi, Bhavana; Nalajala, Paparao; Ganapuram, Vasavi

    2017-08-01

    Advanced vehicle monitoring and tracking system based on embedded Linux board and android application is designed and implemented for monitoring the school vehicle from any location A to location B at real time. The present system would make good use of new technology that based on embedded Linux namely Raspberry Pi and Smartphone android application. This system works on GPS/GPRS/GSM SIM900A. GPS finds the current location of the vehicle, GPRS sends the tracking information to the server and the GSM is used for sending alert message to vehicle’s owner mobile. This system is placed inside the vehicle whose position is to be determined on the web page and monitored at real time. There is a comparison between the current vehicle path already specified paths into the file system. Inside the raspberry pi’s file system taken from vehicle owners through android phone using android application. Means the selection of path from location A to B takes place from vehicle owner’s android application which gives more safety and secures traveling to the traveler. Hence the driver drives the vehicle only on the vehicle owner’s specified path. The driver drives the vehicle only on the vehicle owner’s specified path but if the driver drives in wrong path the message alert will be sent from this system to the vehicle owners mobile and also sent speakers alert to driver through audio jack. If the vehicles speed goes beyond the specified value of the speed, then warning message will be sent to owner mobile. This system also takes care of the traveler’s safety by using Gas leakage and Temperature sensors

  13. Potential effects of the introduction of the discrete address beacon system data link on air/ground information transfer problems

    NASA Technical Reports Server (NTRS)

    Grayson, R. L.

    1981-01-01

    This study of Aviation Safety Reporting System reports suggests that benefits should accure from implementation of discrete address beacon system data link. The phase enhanced terminal information system service is expected to provide better terminal information than present systems by improving currency and accuracy. In the exchange of air traffic control messages, discrete address insures that only the intended recipient receives and acts on a specific message. Visual displays and printer copy of messages should mitigate many of the reported problems associated with voice communications. The problems that remain unaffected include error in addressing the intended recipient and messages whose content is wrong but are otherwise correct as to format and reasonableness.

  14. A multi-institution evaluation of clinical profile anonymization.

    PubMed

    Heatherly, Raymond; Rasmussen, Luke V; Peissig, Peggy L; Pacheco, Jennifer A; Harris, Paul; Denny, Joshua C; Malin, Bradley A

    2016-04-01

    There is an increasing desire to share de-identified electronic health records (EHRs) for secondary uses, but there are concerns that clinical terms can be exploited to compromise patient identities. Anonymization algorithms mitigate such threats while enabling novel discoveries, but their evaluation has been limited to single institutions. Here, we study how an existing clinical profile anonymization fares at multiple medical centers. We apply a state-of-the-artk-anonymization algorithm, withkset to the standard value 5, to the International Classification of Disease, ninth edition codes for patients in a hypothyroidism association study at three medical centers: Marshfield Clinic, Northwestern University, and Vanderbilt University. We assess utility when anonymizing at three population levels: all patients in 1) the EHR system; 2) the biorepository; and 3) a hypothyroidism study. We evaluate utility using 1) changes to the number included in the dataset, 2) number of codes included, and 3) regions generalization and suppression were required. Our findings yield several notable results. First, we show that anonymizing in the context of the entire EHR yields a significantly greater quantity of data by reducing the amount of generalized regions from ∼15% to ∼0.5%. Second, ∼70% of codes that needed generalization only generalized two or three codes in the largest anonymization. Sharing large volumes of clinical data in support of phenome-wide association studies is possible while safeguarding privacy to the underlying individuals. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. System and method for transferring telemetry data between a ground station and a control center

    NASA Technical Reports Server (NTRS)

    Ray, Timothy J. (Inventor); Ly, Vuong T. (Inventor)

    2012-01-01

    Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for coordinating communications between a ground station, a control center, and a spacecraft. The method receives a call to a simple, unified application programmer interface implementing communications protocols related to outer space, when instruction relates to receiving a command at the control center for the ground station generate an abstract message by agreeing upon a format for each type of abstract message with the ground station and using a set of message definitions to configure the command in the agreed upon format, encode the abstract message to generate an encoded message, and transfer the encoded message to the ground station, and perform similar actions when the instruction relates to receiving a second command as a second encoded message at the ground station from the control center and when the determined instruction type relates to transmitting information to the control center.

  16. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.

    PubMed

    Guo, Dong; Cao, Jian; Wang, Xiaoqi; Fu, Qiang; Li, Qiang

    2016-09-20

    Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices' operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors' messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  17. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks

    PubMed Central

    Guo, Dong; Cao, Jian; Wang, Xiaoqi; Fu, Qiang; Li, Qiang

    2016-01-01

    Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs. PMID:27657071

  18. A mobile telephone-based SMS and internet survey system for self-assessment in Australian anaesthesia: experience of a single practitioner.

    PubMed

    Belavy, D

    2014-11-01

    Self-assessment and audit in anaesthesia require a systematic approach to postoperative data collection. The increasing prevalence of mobile internet technology offers a new data collection method for anaesthetists. In this paper, a system for mobile internet data collection is described and the preliminary experience with its use is presented. The system was developed by the author and combined an open source survey application and a short message service (SMS) gateway to send SMS messages to patients after their anaesthesia and surgery. The messages requested patients to complete an online Quality of Recovery survey questionnaire if they had a smartphone. The results were immediately available. A preliminary survey of consenting patients with available mobile telephone numbers in a private practice was undertaken by the author. A total of 123 procedures were eligible for follow-up and survey requests were sent to 94 patients. Sixty-five surveys were completed. This represents 69% of surveys requested, demonstrating that mobile phone technology can be used to provide significant amounts of data for quality assurance. However, the implementation of a mobile internet data collection system requires consideration of privacy principles, security and ethical handling of data.

  19. Prevalence and Risk Profile Of Unread Messages To Patients In A Patient Web Portal.

    PubMed

    Crotty, B H; Mostaghimi, A; O'Brien, J; Bajracharya, A; Safran, C; Landon, B E

    2015-01-01

    Excitement around the adoption of electronic communication between physicians and patients is tempered by the possibility of increased clinical and legal risk. If patients do not read messages in a timely fashion, duplicative communication efforts may be required and patient safety may be jeopardized. We sought to assess the prevalence and risk profile of unread messages in a mature patient portal. We analyzed six years of messages (2005-2010) from physicians to patients to determine the prevalence and associated characteristics of unread messages in a patient portal. We focused on clinical messages, and excluded announcements. Because some physicians sent clinical messages to groups of patients, we labeled messages sent to more than 5 patients as "outreach" messages and excluded them from general analyses. We performed a chart review of 75 clinical messages to assess for harm. We found that 3% of clinical messages were unread after 21 days. Messages arriving outside of business hours were slightly more likely to go unread (RR 1.15 95% CI 1.11-1.19). Patients who were male (OR 1.14 CI 1.04-1.26) African American (OR 1.69 CI 1.29-2.22) or Hispanic (OR 1.74 CI 1.17-2.59), or in the lowest income group (OR 1.72 CI 1.19-2.49) were more likely to have unread messages. Chart review showed no evidence of harm, but 13% of sampled unread messages were associated with potential delays in care. Incidentally, we found 50% of the physician-initiated outreach messages were unread. Overall, secure messaging appears a safe form of communication, but systems to notify senders when messages are unread may have value. While most clinical messages were read, many outreach messages were not, providing caution for relying on such systems for information dissemination. Similar to other studies, differences by race and income were observed and require further study.

  20. Designing for scale: optimising the health information system architecture for mobile maternal health messaging in South Africa (MomConnect).

    PubMed

    Seebregts, Christopher; Dane, Pierre; Parsons, Annie Neo; Fogwill, Thomas; Rogers, Debbie; Bekker, Marcha; Shaw, Vincent; Barron, Peter

    2018-01-01

    MomConnect is a national initiative coordinated by the South African National Department of Health that sends text-based mobile phone messages free of charge to pregnant women who voluntarily register at any public healthcare facility in South Africa. We describe the system design and architecture of the MomConnect technical platform, planned as a nationally scalable and extensible initiative. It uses a health information exchange that can connect any standards-compliant electronic front-end application to any standards-compliant electronic back-end database. The implementation of the MomConnect technical platform, in turn, is a national reference application for electronic interoperability in line with the South African National Health Normative Standards Framework. The use of open content and messaging standards enables the architecture to include any application adhering to the selected standards. Its national implementation at scale demonstrates both the use of this technology and a key objective of global health information systems, which is to achieve implementation scale. The system's limited clinical information, initially, allowed the architecture to focus on the base standards and profiles for interoperability in a resource-constrained environment with limited connectivity and infrastructural capacity. Maintenance of the system requires mobilisation of national resources. Future work aims to use the standard interfaces to include data from additional applications as well as to extend and interface the framework with other public health information systems in South Africa. The development of this platform has also shown the benefits of interoperability at both an organisational and technical level in South Africa.

  1. Variable Message Signs for road tunnel emergency evacuations.

    PubMed

    Ronchi, Enrico; Nilsson, Daniel; Modig, Henric; Walter, Anders Lindgren

    2016-01-01

    This paper investigates the design of Variable Message Signs (VMS) as a way-finding aid for road tunnel emergency evacuations. The use of the Theory of Affordances is suggested to provide recommendations on the design of VMS. A preliminary evaluation of 11 selected VMS systems was performed and 6 of them were further evaluated using an affordance-based within subject stated-preference questionnaire administered to a sample of 62 participants. Results are used to provide recommendations on the characteristics of the VMS systems, such as (1) size of the sign (large or small); (2) use of flashing lights; (3) colour scheme; (4) message coding (i.e., text, pictograms or a combination of them). The best performing VMS features for road tunnel emergency evacuation included the use of larger signs, flashing lights, the combination of emergency exit pictorial symbol in green in one panel and text in amber in the other panel. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  2. Mobile Technology for Community Health in Ghana: what happens when technical functionality threatens the effectiveness of digital health programs?

    PubMed

    LeFevre, Amnesty E; Mohan, Diwakar; Hutchful, David; Jennings, Larissa; Mehl, Garrett; Labrique, Alain; Romano, Karen; Moorthy, Anitha

    2017-03-14

    Despite the growing use of technology in the health sector, little evidence is available on the technological performance of mobile health programs nor on the willingness of target users to utilize these technologies as intended (behavioral performance). In this case study of the Mobile Technology for Health (MOTECH) program in Ghana, we assess the platform's effectiveness in delivering messages, along with user response across sites in five districts from 2011 to 2014. MOTECH is comprised of "Client Data Application" (CDA) which allows providers to digitize and track service delivery information for women and infants and "Mobile Midwife" (MM) which sends automated educational voice messages to the mobile phones of pregnant and postpartum women. Using a naturalist study design, we draw upon system generated data to evaluate message delivery, client engagement, and provider responsiveness to MOTECH over time and by level of facility. A total of 7,370 women were enrolled in MM during pregnancy and 14,867 women were enrolled postpa1rtum. While providers were able to register and upload patient-level health information using CDA, the majority of these uploads occurred in Community-based facilities versus Health Centers. For MM, 25% or less of expected messages were received by pregnant women, despite the majority (>77%) owning a private mobile phone. While over 80% of messages received by pregnant women were listened to, postpartum rates of listening declined over time. Only 25% of pregnant women received and listened to at least 1 first trimester message. By 6-12 months postpartum, less than 6% of enrolled women were exposed to at least one message. Caution should be exercised in assuming that digital health programs perform as intended. Evaluations should measure the technological, behavioral, health systems, and/or community factors which may lead to breaks in the impact pathway and influence findings on effectiveness. The MOTECH platform's technological limitations in 'pushing' out voice messages highlights the need for more timely use of data to mitigate delivery challenges and improve exposure to health information. Alternative message delivery channels (USSD or SMS) could improve the platform's ability to deliver messages but may not be appropriate for illiterate users. Not applicable.

  3. Human factors research problems in electronic voice warning system design

    NASA Technical Reports Server (NTRS)

    Simpson, C. A.; Williams, D. H.

    1975-01-01

    The speech messages issued by voice warning systems must be carefully designed in accordance with general principles of human decision making processes, human speech comprehension, and the conditions in which the warnings can occur. The operator's effectiveness must not be degraded by messages that are either inappropriate or difficult to comprehend. Important experimental variables include message content, linguistic redundancy, signal/noise ratio, interference with concurrent tasks, and listener expectations generated by the pragmatic or real world context in which the messages are presented.

  4. Digital mobile technology facilitates HIPAA-sensitive perioperative messaging, improves physician-patient communication, and streamlines patient care.

    PubMed

    Gordon, Chad R; Rezzadeh, Kameron S; Li, Andrew; Vardanian, Andrew; Zelken, Jonathan; Shores, Jamie T; Sacks, Justin M; Segovia, Andres L; Jarrahy, Reza

    2015-01-01

    Mobile device technology has revolutionized interpersonal communication, but the application of this technology to the physician-patient relationship remains limited due to concerns over patient confidentiality and the security of digital information. Nevertheless, there is a continued focus on improving communication between doctors and patients in all fields of medicine as a means of improving patient care. In this study, we implement a novel communications platform to demonstrate that instantaneously sharing perioperative information with surgical patients and members of their support networks can improve patient care and strengthen the physician-patient relationship. 423 consecutive patients scheduled to undergo elective surgical procedures were offered complimentary registration to a secure, web-based service designed to distribute perioperative updates to a group of recipients designated by each patient via Short Message Service (SMS) and/or email. Messages were created by attending surgeons and delivered instantaneously through the web-based platform. In the postoperative period, patients and their designated message recipients, as well as participating healthcare providers, were asked to complete a survey designed to assess their experience with the messaging system. Survey results were statistically analyzed to determine satisfaction rates. Of the qualifying 423 patients, 313 opted to enroll in the study. On average, patients selected a total of 3.5 recipients to receive perioperative updates. A total of 1,195 electronic messages were generated for distribution to designated recipients during the study period and delivered to recipients located around the world. There were no documented errors or failures in message delivery. Satisfaction surveys were completed by 190 users of the service (73 %). Respondents identified themselves as either patients (n = 48, 25.5 %), family/friends (n = 120, 63.8 %), or healthcare providers (n = 15, 12 %). Satisfaction with the service was high: 94.2 % of users "enjoyed this software" and and 94.2 % of family/friends "felt more connected to their loved ones during surgery." 92.5 % would "recommend their loved ones sign up for this service". Ninety percent of patients who completed the survey reported "an improved hospital experience". Digital communications platforms can facilitate the immediate transfer of HIPAA-compliant data to patients and their designees. Such systems can greatly improve the level of communication between physicians, patients, and patients' families and caregivers. All types of users, including healthcare professionals, patients, and their loved ones, recorded high levels of satisfaction. Based on these observations, we conclude that mobile digital communications platforms represent a way to harness the power of social media to enhance patient care.

  5. "Failure-to-Identify" Hunting Incidents: A Resilience Engineering Approach.

    PubMed

    Bridges, Karl E; Corballis, Paul M; Hollnagel, Erik

    2018-03-01

    Objective The objective was to develop an understanding, using the Functional Resonance Analysis Method (FRAM), of the factors that could cause a deer hunter to misidentify their intended target. Background Hunting is a popular activity in many communities. However, hunters vary considerably based on training, experience, and expertise. Surprisingly, safety in hunting has not received much attention, especially failure-to-identify hunting incidents. These are incidents in which the hunter, after spotting and targeting their quarry, discharge their firearm only to discover they have been spotting and targeting another human, an inanimate object, or flora by mistake. The hunter must consider environment, target, time of day, weather, and many other factors-continuously evaluating whether the hunt should continue. To understand how these factors can relate to one another is fundamental to begin to understand how incidents happen. Method Workshops with highly experienced and active hunters led to the development of a FRAM model detailing the functions of a "Hunting FRAM." The model was evaluated for correctness based on confidential and anonymous near-miss event submissions by hunters. Results A FRAM model presenting the functions of a hunt was produced, evaluated, and accepted. Using the model, potential sources of incidents or other unintended outcomes were identified, which in turn helped to improve the model. Conclusion Utilizing principles of understanding and visualization tools of the FRAM, the findings create a foundation for safety improvements potentially through training or safety messages based on an increased understanding of the complexity of hunting.

  6. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    PubMed

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  7. Security risks associated with radio frequency identification in medical environments.

    PubMed

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  8. Electronic health information quality challenges and interventions to improve public health surveillance data and practice.

    PubMed

    Dixon, Brian E; Siegel, Jason A; Oemig, Tanya V; Grannis, Shaun J

    2013-01-01

    We examined completeness, an attribute of data quality, in the context of electronic laboratory reporting (ELR) of notifiable disease information to public health agencies. We extracted more than seven million ELR messages from multiple clinical information systems in two states. We calculated and compared the completeness of various data fields within the messages that were identified to be important to public health reporting processes. We compared unaltered, original messages from source systems with similar messages from another state as well as messages enriched by a health information exchange (HIE). Our analysis focused on calculating completeness (i.e., the number of nonmissing values) for fields deemed important for inclusion in notifiable disease case reports. The completeness of data fields for laboratory transactions varied across clinical information systems and jurisdictions. Fields identifying the patient and test results were usually complete (97%-100%). Fields containing patient demographics, patient contact information, and provider contact information were suboptimal (6%-89%). Transactions enhanced by the HIE were found to be more complete (increases ranged from 2% to 25%) than the original messages. ELR data from clinical information systems can be of suboptimal quality. Public health monitoring of data sources and augmentation of ELR message content using HIE services can improve data quality.

  9. Six-Message Electromechanical Display System

    NASA Technical Reports Server (NTRS)

    Howard, Richard T.

    2007-01-01

    A proposed electromechanical display system would be capable of presenting as many as six distinct messages. In the proposed system, each display element would include a cylinder having a regular hexagonal cross section.

  10. Degree sequence in message transfer

    NASA Astrophysics Data System (ADS)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  11. Individual differences in drivers' cognitive processing of road safety messages.

    PubMed

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message acceptance measures. As predicted, the degree of initial processing of the content of the social gain-framed message mediated the relationship between the reward sensitive trait and message effectiveness. Initial processing of the physical loss-framed message partially mediated the relationship between the punishment sensitive trait and both message effectiveness and behavioural intention ratings. These results show that reward sensitivity and punishment sensitivity traits influence cognitive processing of gain-framed and loss-framed message content, respectively, and subsequently, message effectiveness and behavioural intention ratings. Specifically, a range of road safety messages (i.e., gain-frame and loss-frame messages) could be designed which align with the processing biases associated with personality and which would target those individuals who are sensitive to rewards and those who are sensitive to punishments. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Computer-mediated communication: task performance and satisfaction.

    PubMed

    Simon, Andrew F

    2006-06-01

    The author assessed satisfaction and performance on 3 tasks (idea generation, intellective, judgment) among 75 dyads (N = 150) working through 1 of 3 modes of communication (instant messaging, videoconferencing, face to face). The author based predictions on the Media Naturalness Theory (N. Kock, 2001, 2002) and on findings from past researchers (e.g., D. M. DeRosa, C. Smith, & D. A. Hantula, in press) of the interaction between tasks and media. The present author did not identify task performance differences, although satisfaction with the medium was lower among those dyads communicating through an instant-messaging system than among those interacting face to face or through videoconferencing. The findings support the Media Naturalness Theory. The author discussed them in relation to the participants' frequent use of instant messaging and their familiarity with new communication media.

  13. Assessment of motivations for return donation among deferred blood donors. American Red Cross ARCNET Study Group.

    PubMed

    Munsterman, K A; Grindon, A J; Sullivan, M T; Trouern-Trend, J; Blackmon, M J; Watkins, J; Williams, A E

    1998-01-01

    The recent addition of a computerized donor deferral registry to American Red Cross blood donation procedures has enabled blood center staffs to identify, before donation, persons who attempt to donate despite previous deferral. The current study investigated reasons that deferred donors return to donate, despite having been notified that they are ineligible. Anonymous mail surveys requesting demographic information, details of last donation or attempted donation, and assessments of incentives for donating were sent to 311 donors presenting inappropriately at blood drives and 849 matched controls in three American Red Cross regions between April and July 1996. Responses were received from a total of 113 deferred donors and 388 matched controls. Analysis of the 49 permanently deferred donors indicated that they were more likely than controls to donate blood to receive test results or to be awarded community service credit. Responses also revealed that some deferred donors may return to donate blood because of a misunderstanding of the deferral message or erroneous recruitment by blood center staff. There is a need before donation for the provision of educational materials regarding the window period of infection and for careful consideration of the use of incentives to attract donors to blood centers. It is also important to provide to donors a clear and consistent message regarding their test results and deferral status.

  14. Baby Steps Text: Feasibility Study of an SMS-Based Tool for Tracking Children's Developmental Progress.

    PubMed

    Suh, Hyewon; Porter, John R; Racadio, Robert; Sung, Yi-Chen; Kientz, Julie A

    2016-01-01

    To help reach populations of children without consistent Internet access or medical care, we designed and implemented Baby Steps Text, an automated text message-based screening tool. We conducted preliminary user research via storyboarding and prototyping with target populations and then developed a fully functional system. In a one-month deployment study, we evaluated the feasibility of Baby Steps Text with fourteen families. During a one-month study, 13 out of 14 participants were able to learn and use the response structure (yielding 2.88% error rate) and complete a child development screener entirely via text messages. All post-study survey respondents agreed Baby Steps Text was understandable and easy to use, which was also confirmed through post-study interviews. Some survey respondents expressed liking Baby Steps Text because it was easy, quick, convenient to use, and delivered helpful, timely information. Our initial deployment study shows text messaging is a feasible tool for supporting parents in tracking and monitoring their child's development.

  15. Can human-like Bots control collective mood: agent-based simulations of online chats

    NASA Astrophysics Data System (ADS)

    Tadić, Bosiljka; Šuvakov, Milovan

    2013-10-01

    Using an agent-based modeling approach, in this paper, we study self-organized dynamics of interacting agents in the presence of chat Bots. Different Bots with tunable ‘human-like’ attributes, which exchange emotional messages with agents, are considered, and the collective emotional behavior of agents is quantitatively analyzed. In particular, using detrended fractal analysis we determine persistent fluctuations and temporal correlations in time series of agent activity and statistics of avalanches carrying emotional messages of agents when Bots favoring positive/negative affects are active. We determine the impact of Bots and identify parameters that can modulate that impact. Our analysis suggests that, by these measures, the emotional Bots induce collective emotion among interacting agents by suitably altering the fractal characteristics of the underlying stochastic process. Positive emotion Bots are slightly more effective than negative emotion Bots. Moreover, Bots which periodically alternate between positive and negative emotion can enhance fluctuations in the system, leading to avalanches of agent messages that are reminiscent of self-organized critical states.

  16. Broadcasting a message in a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Ahmad A

    2013-04-16

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  17. Broadcasting a message in a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the childmore » nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.« less

  18. Send-side matching of data communications messages

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2014-06-17

    Send-side matching of data communications messages in a distributed computing system comprising a plurality of compute nodes, including: issuing by a receiving node to source nodes a receive message that specifies receipt of a single message to be sent from any source node, the receive message including message matching information, a specification of a hardware-level mutual exclusion device, and an identification of a receive buffer; matching by two or more of the source nodes the receive message with pending send messages in the two or more source nodes; operating by one of the source nodes having a matching send message the mutual exclusion device, excluding messages from other source nodes with matching send messages and identifying to the receiving node the source node operating the mutual exclusion device; and sending to the receiving node from the source node operating the mutual exclusion device a matched pending message.

  19. Trace-Driven Debugging of Message Passing Programs

    NASA Technical Reports Server (NTRS)

    Frumkin, Michael; Hood, Robert; Lopez, Louis; Bailey, David (Technical Monitor)

    1998-01-01

    In this paper we report on features added to a parallel debugger to simplify the debugging of parallel message passing programs. These features include replay, setting consistent breakpoints based on interprocess event causality, a parallel undo operation, and communication supervision. These features all use trace information collected during the execution of the program being debugged. We used a number of different instrumentation techniques to collect traces. We also implemented trace displays using two different trace visualization systems. The implementation was tested on an SGI Power Challenge cluster and a network of SGI workstations.

  20. Multiple node remote messaging

    DOEpatents

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

Top