Signaling completion of a message transfer from an origin compute node to a target compute node
Blocksome, Michael A [Rochester, MN; Parker, Jeffrey J [Rochester, MN
2011-05-24
Signaling completion of a message transfer from an origin node to a target node includes: sending, by an origin DMA engine, an RTS message, the RTS message specifying an application message for transfer to the target node from the origin node; receiving, by the origin DMA engine, a remote get message containing a data descriptor for the message and a completion notification descriptor, the completion notification descriptor specifying a local direct put transfer operation for transferring data locally on the origin node; inserting, by the origin DMA engine in an injection FIFO buffer, the data descriptor followed by the completion notification descriptor; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that transfer of the message is complete in dependence upon the completion notification descriptor.
Signaling completion of a message transfer from an origin compute node to a target compute node
Blocksome, Michael A [Rochester, MN
2011-02-15
Signaling completion of a message transfer from an origin node to a target node includes: sending, by an origin DMA engine, an RTS message, the RTS message specifying an application message for transfer to the target node from the origin node; receiving, by the origin DMA engine, a remote get message containing a data descriptor for the message and a completion notification descriptor, the completion notification descriptor specifying a local memory FIFO data transfer operation for transferring data locally on the origin node; inserting, by the origin DMA engine in an injection FIFO buffer, the data descriptor followed by the completion notification descriptor; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that transfer of the message is complete in dependence upon the completion notification descriptor.
Dispatching packets on a global combining network of a parallel computer
Almasi, Gheorghe [Ardsley, NY; Archer, Charles J [Rochester, MN
2011-07-19
Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.
Administering an epoch initiated for remote memory access
Blocksome, Michael A; Miller, Douglas R
2014-03-18
Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.
Administering an epoch initiated for remote memory access
Blocksome, Michael A; Miller, Douglas R
2012-10-23
Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.
Administering an epoch initiated for remote memory access
Blocksome, Michael A.; Miller, Douglas R.
2013-01-01
Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.
Minimally buffered data transfers between nodes in a data communications network
Miller, Douglas R.
2015-06-23
Methods, apparatus, and products for minimally buffered data transfers between nodes in a data communications network are disclosed that include: receiving, by a messaging module on an origin node, a storage identifier, a origin data type, and a target data type, the storage identifier specifying application storage containing data, the origin data type describing a data subset contained in the origin application storage, the target data type describing an arrangement of the data subset in application storage on a target node; creating, by the messaging module, origin metadata describing the origin data type; selecting, by the messaging module from the origin application storage in dependence upon the origin metadata and the storage identifier, the data subset; and transmitting, by the messaging module to the target node, the selected data subset for storing in the target application storage in dependence upon the target data type without temporarily buffering the data subset.
Direct memory access transfer completion notification
Archer, Charles J.; Blocksome, Michael A.; Parker, Jeffrey J.
2010-08-17
Methods, apparatus, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA engine on an origin compute node in an injection FIFO buffer, a data descriptor for an application message to be transferred to a target compute node on behalf of an application on the origin compute node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying an address of a completion notification field in application storage for the application; transferring, by the origin DMA engine to the target compute node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that the transfer of the message is complete, including performing a local direct put operation to store predesignated notification data at the address of the completion notification field.
Controlling data transfers from an origin compute node to a target compute node
Archer, Charles J [Rochester, MN; Blocksome, Michael A [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian E [Rochester, MN
2011-06-21
Methods, apparatus, and products are disclosed for controlling data transfers from an origin compute node to a target compute node that include: receiving, by an application messaging module on the target compute node, an indication of a data transfer from an origin compute node to the target compute node; and administering, by the application messaging module on the target compute node, the data transfer using one or more messaging primitives of a system messaging module in dependence upon the indication.
Direct memory access transfer completion notification
Archer, Charles J [Rochester, MN; Blocksome, Michael A [Rochester, MN; Parker, Jeffrey J [Rochester, MN
2011-02-15
DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.
Direct memory access transfer completion notification
Archer, Charles J. , Blocksome; Michael A. , Parker; Jeffrey, J [Rochester, MN
2011-02-15
Methods, systems, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA on an origin node in an origin injection FIFO, a data descriptor for an application message; inserting, by the origin DMA, a reflection descriptor in the origin injection FIFO, the reflection descriptor specifying a remote get operation for injecting a completion notification descriptor in a reflection injection FIFO on a reflection node; transferring, by the origin DMA to a target node, the message in dependence upon the data descriptor; in response to completing the message transfer, transferring, by the origin DMA to the reflection node, the completion notification descriptor in dependence upon the reflection descriptor; receiving, by the origin DMA from the reflection node, a completion packet; and notifying, by the origin DMA in response to receiving the completion packet, the origin node's processing core that the message transfer is complete.
Signaling communication events in a computer network
Bender, Carl A.; DiNicola, Paul D.; Gildea, Kevin J.; Govindaraju, Rama K.; Kim, Chulho; Mirza, Jamshed H.; Shah, Gautam H.; Nieplocha, Jaroslaw
2000-01-01
A method, apparatus and program product for detecting a communication event in a distributed parallel data processing system in which a message is sent from an origin to a target. A low-level application programming interface (LAPI) is provided which has an operation for associating a counter with a communication event to be detected. The LAPI increments the counter upon the occurrence of the communication event. The number in the counter is monitored, and when the number increases, the event is detected. A completion counter in the origin is associated with the completion of a message being sent from the origin to the target. When the message is completed, LAPI increments the completion counter such that monitoring the completion counter detects the completion of the message. The completion counter may be used to insure that a first message has been sent from the origin to the target and completed before a second message is sent.
Pacing a data transfer operation between compute nodes on a parallel computer
Blocksome, Michael A [Rochester, MN
2011-09-13
Methods, systems, and products are disclosed for pacing a data transfer between compute nodes on a parallel computer that include: transferring, by an origin compute node, a chunk of an application message to a target compute node; sending, by the origin compute node, a pacing request to a target direct memory access (`DMA`) engine on the target compute node using a remote get DMA operation; determining, by the origin compute node, whether a pacing response to the pacing request has been received from the target DMA engine; and transferring, by the origin compute node, a next chunk of the application message if the pacing response to the pacing request has been received from the target DMA engine.
Direct memory access transfer completion notification
Chen, Dong; Giampapa, Mark E.; Heidelberger, Philip; Kumar, Sameer; Parker, Jeffrey J.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos
2010-07-27
Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.
NASA Technical Reports Server (NTRS)
Hockney, George; Lee, Seungwon
2008-01-01
A computer program known as PyPele, originally written as a Pythonlanguage extension module of a C++ language program, has been rewritten in pure Python language. The original version of PyPele dispatches and coordinates parallel-processing tasks on cluster computers and provides a conceptual framework for spacecraft-mission- design and -analysis software tools to run in an embarrassingly parallel mode. The original version of PyPele uses SSH (Secure Shell a set of standards and an associated network protocol for establishing a secure channel between a local and a remote computer) to coordinate parallel processing. Instead of SSH, the present Python version of PyPele uses Message Passing Interface (MPI) [an unofficial de-facto standard language-independent application programming interface for message- passing on a parallel computer] while keeping the same user interface. The use of MPI instead of SSH and the preservation of the original PyPele user interface make it possible for parallel application programs written previously for the original version of PyPele to run on MPI-based cluster computers. As a result, engineers using the previously written application programs can take advantage of embarrassing parallelism without need to rewrite those programs.
Self-pacing direct memory access data transfer operations for compute nodes in a parallel computer
Blocksome, Michael A
2015-02-17
Methods, apparatus, and products are disclosed for self-pacing DMA data transfer operations for nodes in a parallel computer that include: transferring, by an origin DMA on an origin node, a RTS message to a target node, the RTS message specifying an message on the origin node for transfer to the target node; receiving, in an origin injection FIFO for the origin DMA from a target DMA on the target node in response to transferring the RTS message, a target RGET descriptor followed by a DMA transfer operation descriptor, the DMA descriptor for transmitting a message portion to the target node, the target RGET descriptor specifying an origin RGET descriptor on the origin node that specifies an additional DMA descriptor for transmitting an additional message portion to the target node; processing, by the origin DMA, the target RGET descriptor; and processing, by the origin DMA, the DMA transfer operation descriptor.
Enhanced, Partially Redundant Emergency Notification System
NASA Technical Reports Server (NTRS)
Pounds, Clark D.
2005-01-01
The Johnson Space Center Emergency Notification System (JENS) software utilizes pre-existing computation and communication infrastructure to augment a prior variable-tone, siren-based, outdoor alarm system, in order to enhance the ability to give notice of emergencies to employees working in multiple buildings. The JENS software includes a component that implements an administrative Web site. Administrators can grant and deny access to the administrative site and to an originator Web site that enables authorized individuals to quickly compose and issue alarms. The originator site also facilitates maintenance and review of alarms already issued. A custom client/server application program enables an originator to notify every user who is logged in on a Microsoft Windows-based desktop computer by means of a pop-up message that interrupts, but does not disrupt, the user s work. Alternatively or in addition, the originator can send an alarm message to recipients on an e-mail distribution list and/or can post the notice on an internal Web site. An alarm message can consist of (1) text describing the emergency and suggesting a course of action and (2) a replica of the corresponding audible outdoor alarm.
SMS Security System on Mobile Devices Using Tiny Encryption Algorithm
NASA Astrophysics Data System (ADS)
Novelan, M. S.; Husein, A. M.; Harahap, M.; Aisyah, S.
2018-04-01
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the Java programming language. JDK 1.7 as the Java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the Java compiler. Eclipse, a Java SDK and the Android SDK as a Java source code editor.
Mwogi, Thomas S.; Biondich, Paul G.; Grannis, Shaun J.
2014-01-01
Motivated by the need for readily available data for testing an open-source health information exchange platform, we developed and evaluated two methods for generating synthetic messages. The methods used HL7 version 2 messages obtained from the Indiana Network for Patient Care. Data from both methods were analyzed to assess how effectively the output reflected original ‘real-world’ data. The Markov Chain method (MCM) used an algorithm based on transitional probability matrix while the Music Box model (MBM) randomly selected messages of particular trigger type from the original data to generate new messages. The MBM was faster, generated shorter messages and exhibited less variation in message length. The MCM required more computational power, generated longer messages with more message length variability. Both methods exhibited adequate coverage, producing a high proportion of messages consistent with original messages. Both methods yielded similar rates of valid messages. PMID:25954458
Spread spectrum image steganography.
Marvel, L M; Boncelet, C R; Retter, C T
1999-01-01
In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.
Data communications in a parallel active messaging interface of a parallel computer
Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E
2014-02-11
Data communications in a parallel active messaging interface ('PAMI') or a parallel computer, the parallel computer including a plurality of compute nodes that execute a parallel application, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution of a compute node, including specification of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications instruction, the instruction characterized by instruction type, the instruction specifying a transmission of transfer data from the origin endpoint to a target endpoint and transmitting, in accordance witht the instruction type, the transfer data from the origin endpoin to the target endpoint.
Data communications in a parallel active messaging interface of a parallel computer
Davis, Kristan D.; Faraj, Daniel A.
2014-07-22
Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and ranges of message sizes so that each algorithm is associated with a separate range of message sizes; receiving in an origin endpoint of the PAMI a data communications instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint, the data communications message characterized by a message size; selecting, from among the associated algorithms and ranges, a data communications algorithm in dependence upon the message size; and transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.
Data communications in a parallel active messaging interface of a parallel computer
Davis, Kristan D; Faraj, Daniel A
2013-07-09
Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and ranges of message sizes so that each algorithm is associated with a separate range of message sizes; receiving in an origin endpoint of the PAMI a data communications instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint, the data communications message characterized by a message size; selecting, from among the associated algorithms and ranges, a data communications algorithm in dependence upon the message size; and transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.
Data communications in a parallel active messaging interface of a parallel computer
Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E
2013-10-29
Data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the parallel computer including a plurality of compute nodes that execute a parallel application, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a data communications instruction, the instruction characterized by an instruction type, the instruction specifying a transmission of transfer data from the origin endpoint to a target endpoint and transmitting, in accordance with the instruction type, the transfer data from the origin endpoint to the target endpoint.
Replenishing data descriptors in a DMA injection FIFO buffer
Archer, Charles J [Rochester, MN; Blocksome, Michael A [Rochester, MN; Cernohous, Bob R [Rochester, MN; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN
2011-10-11
Methods, apparatus, and products are disclosed for replenishing data descriptors in a Direct Memory Access (`DMA`) injection first-in-first-out (`FIFO`) buffer that include: determining, by a messaging module on an origin compute node, whether a number of data descriptors in a DMA injection FIFO buffer exceeds a predetermined threshold, each data descriptor specifying an application message for transmission to a target compute node; queuing, by the messaging module, a plurality of new data descriptors in a pending descriptor queue if the number of the data descriptors in the DMA injection FIFO buffer exceeds the predetermined threshold; establishing, by the messaging module, interrupt criteria that specify when to replenish the injection FIFO buffer with the plurality of new data descriptors in the pending descriptor queue; and injecting, by the messaging module, the plurality of new data descriptors into the injection FIFO buffer in dependence upon the interrupt criteria.
Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai
2016-01-01
To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.
Steganalysis based on JPEG compatibility
NASA Astrophysics Data System (ADS)
Fridrich, Jessica; Goljan, Miroslav; Du, Rui
2001-11-01
In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leave unique fingerprints and serves as a fragile watermark enabling us to detect changes as small as modifying the LSB of one randomly chosen pixel. The detection of changes is based on investigating the compatibility of 8x8 blocks of pixels with JPEG compression with a given quantization matrix. The proposed steganalytic method is applicable to virtually all steganongraphic and watermarking algorithms with the exception of those that embed message bits into the quantized JPEG DCT coefficients. The method can also be used to estimate the size of the secret message and identify the pixels that carry message bits. As a consequence of our steganalysis, we strongly recommend avoiding using images that have been originally stored in the JPEG format as cover-images for spatial-domain steganography.
Reactions to threatening health messages.
Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo
2012-11-21
Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.
Reactions to threatening health messages
2012-01-01
Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal. PMID:23171445
Message From the Editor for Contributions to the 2010 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Schmeling, Sascha Marc
2011-08-01
The 72 papers in this special issue were originally presented at the 17th IEEE-NPSS Real Time Conference (RT2010) on Computing Applications in Nuclear and Plasma Sciences, held in Lisbon, Portugal in May 2010.
Cook, Timothy Wayne; Cavalini, Luciana Tricai
2016-01-01
Objectives To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. Methods This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Results Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. Conclusions This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies. PMID:26893947
Message From the Editor for Contributions to the 2007 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Dufey, Jean-Pierre
2008-02-01
This issue presents 67 papers which were originally presented at the 15th IEEE-NPSS Real Time Conference (RT2007) on Computing Applications in Nuclear and Plasma Sciences held at Fermilab, Batavia, IL, April 29-May 4, 2007.
Towards ontology personalization to enrich social conversations on AAC systems
NASA Astrophysics Data System (ADS)
Mancilla V., Daniela; Sastoque H., Sebastian; Iregui G., Marcela
2015-01-01
Communication is one of the essential needs of human beings. Augmentative and Alternative Communication Systems (AAC) seek to help in the generation of oral and written language to people with physical disorders that limit their natural communication. These systems present significant challenges such as: the composition of consistent messages according to syntactic and semantic rules, the improvement of message production times, the application to social contexts and, consequently, the incorporation of user-specific information. This work presents an original ontology personalization approach for an AAC instant messaging system incorporating personalized information to improve the efficacy and efficiency of the message production. This proposal is based on a projection of a general ontology into a more specific one, avoiding storage redundancy and data coupling, representing a big opportunity to enrich communication capabilities of current AAC systems. The evaluation was performed for a study case based on an AAC system for assistance in composing messages. The results show that adding user-specific information allows generation of enriched phrases, so improving the accuracy of the message, facilitating the communication process.
ConformRank: A conformity-based rank for finding top-k influential users
NASA Astrophysics Data System (ADS)
Wang, Qiyao; Jin, Yuehui; Cheng, Shiduan; Yang, Tan
2017-05-01
Finding influential users is a hot topic in social networks. For example, advertisers identify influential users to make a successful campaign. Retweeters forward messages from original users, who originally publish messages. This action is referred to as retweeting. Retweeting behaviors generate influence. Original users have influence on retweeters. Whether retweeters keep the same sentiment as original users is taken into consideration in this study. Influence is calculated based on conformity from emotional perspective after retweeting. A conformity-based algorithm, called ConformRank, is proposed to find top-k influential users, who make the most users keep the same sentiment after retweeting messages. Emotional conformity is introduced to denote how users conform to original users from the emotional perspective. Conforming weights are introduced to denote how two users keep the same sentiment after retweeting messages. Emotional conformity is applied for users and conforming weights are used for relations. Experiments were conducted on Sina Weibo. Experimental results show that users have larger influence when they publish positive messages.
Archer, Charles J.; Blocksome, Michael A.
2012-12-11
Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.
A Weak Quantum Blind Signature with Entanglement Permutation
NASA Astrophysics Data System (ADS)
Lou, Xiaoping; Chen, Zhigang; Guo, Ying
2015-09-01
Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.
Message From the Editor for Contributions to the 2012 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Schmeling, Sascha Marc
2013-10-01
The papers in this special issue were originally presented at the 18th IEEE-NPSS Real Time Conference (RT2012) on Computing Applications in Nuclear and Plasma Sciences, held in Berkeley, California, USA, in June 2012. These contributions come from a broad range of fields of application, including Astrophysics, Medical Imaging, Nuclear and Plasma Physics, Particle Accelerators, and Particle Physics Experiments.
Low latency, high bandwidth data communications between compute nodes in a parallel computer
Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.
2010-11-02
Methods, parallel computers, and computer program products are disclosed for low latency, high bandwidth data communications between compute nodes in a parallel computer. Embodiments include receiving, by an origin direct memory access (`DMA`) engine of an origin compute node, data for transfer to a target compute node; sending, by the origin DMA engine of the origin compute node to a target DMA engine on the target compute node, a request to send (`RTS`) message; transferring, by the origin DMA engine, a predetermined portion of the data to the target compute node using memory FIFO operation; determining, by the origin DMA engine whether an acknowledgement of the RTS message has been received from the target DMA engine; if the an acknowledgement of the RTS message has not been received, transferring, by the origin DMA engine, another predetermined portion of the data to the target compute node using a memory FIFO operation; and if the acknowledgement of the RTS message has been received by the origin DMA engine, transferring, by the origin DMA engine, any remaining portion of the data to the target compute node using a direct put operation.
Protocols for Handling Messages Between Simulation Computers
NASA Technical Reports Server (NTRS)
Balcerowski, John P.; Dunnam, Milton
2006-01-01
Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.
LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network
NASA Astrophysics Data System (ADS)
Lu, Xiaofeng; Hui, Pan; Towsley, Don; Pu, Juhua; Xiong, Zhang
In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Faraj, Daniel A.
Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks,more » a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.« less
Faraj, Daniel A
2013-07-16
Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks, a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.
Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter
Chu, Kar-Hai; Unger, Jennifer B.; Allem, Jon-Patrick; Pattarroyo, Monica; Soto, Daniel; Cruz, Tess Boley; Yang, Haodong; Jiang, Ling; Yang, Christopher C.
2015-01-01
Objective This study explores the presence and actions of an electronic cigarette (e-cigarette) brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding) functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender’s local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed. Methods We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread. Results The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes. Conclusions Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion. PMID:26684746
Texting for Health: The Use of Participatory Methods to Develop Healthy Lifestyle Messages for Teens
ERIC Educational Resources Information Center
Hingle, Melanie; Nichter, Mimi; Medeiros, Melanie; Grace, Samantha
2013-01-01
Objective: To develop and test messages and a mobile phone delivery protocol designed to influence the nutrition and physical activity knowledge, attitudes, and behavior of adolescents. Design: Nine focus groups, 4 classroom discussions, and an 8-week pilot study exploring message content, format, origin, and message delivery were conducted over…
How communication goals determine when audience tuning biases memory.
Echterhoff, Gerald; Higgins, E Tory; Kopietz, René; Groll, Stephan
2008-02-01
After tuning their message to suit their audience's attitude, communicators' own memories for the original information (e.g., a target person's behaviors) often reflect the biased view expressed in their message--producing an audience-congruent memory bias. Exploring the motivational circumstances of message production, the authors investigated whether this bias depends on the goals driving audience tuning. In 4 experiments, the memory bias was found to a greater extent when audience tuning served the creation of a shared reality than when it served alternative, nonshared reality goals (being polite toward a stigmatized-group audience; obtaining incentives; being entertaining; complying with a blatant demand). In addition, the authors found that these effects were mediated by the epistemic trust in the audience-congruent view but not by the rehearsal or accurate retrieval of the original input information, the ability to discriminate between the original and the message information, or a contrast away from extremely tuned messages. The central role of epistemic trust, a measure of the communicators' experience of shared reality, was supported in meta-analyses across the experiments. PsycINFO Database Record (c) 2008 APA, all rights reserved.
Event Driven Messaging with Role-Based Subscriptions
NASA Technical Reports Server (NTRS)
Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed
2009-01-01
Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).
Jiang, Wei; Wang, Yandong; Tsou, Ming-Hsiang; Fu, Xiaokang
2015-01-01
Outdoor air pollution is a serious problem in many developing countries today. This study focuses on monitoring the dynamic changes of air quality effectively in large cities by analyzing the spatiotemporal trends in geo-targeted social media messages with comprehensive big data filtering procedures. We introduce a new social media analytic framework to (1) investigate the relationship between air pollution topics posted in Sina Weibo (Chinese Twitter) and the daily Air Quality Index (AQI) published by China's Ministry of Environmental Protection; and (2) monitor the dynamics of air quality index by using social media messages. Correlation analysis was used to compare the connections between discussion trends in social media messages and the temporal changes in the AQI during 2012. We categorized relevant messages into three types, retweets, mobile app messages, and original individual messages finding that original individual messages had the highest correlation to the Air Quality Index. Based on this correlation analysis, individual messages were used to monitor the AQI in 2013. Our study indicates that the filtered social media messages are strongly correlated to the AQI and can be used to monitor the air quality dynamics to some extent.
Tsou, Ming-Hsiang; Fu, Xiaokang
2015-01-01
Outdoor air pollution is a serious problem in many developing countries today. This study focuses on monitoring the dynamic changes of air quality effectively in large cities by analyzing the spatiotemporal trends in geo-targeted social media messages with comprehensive big data filtering procedures. We introduce a new social media analytic framework to (1) investigate the relationship between air pollution topics posted in Sina Weibo (Chinese Twitter) and the daily Air Quality Index (AQI) published by China’s Ministry of Environmental Protection; and (2) monitor the dynamics of air quality index by using social media messages. Correlation analysis was used to compare the connections between discussion trends in social media messages and the temporal changes in the AQI during 2012. We categorized relevant messages into three types, retweets, mobile app messages, and original individual messages finding that original individual messages had the highest correlation to the Air Quality Index. Based on this correlation analysis, individual messages were used to monitor the AQI in 2013. Our study indicates that the filtered social media messages are strongly correlated to the AQI and can be used to monitor the air quality dynamics to some extent. PMID:26505756
Managing internode data communications for an uninitialized process in a parallel computer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Archer, Charles J; Blocksome, Michael A; Miller, Douglas R
2014-05-20
A parallel computer includes nodes, each having main memory and a messaging unit (MU). Each MU includes computer memory, which in turn includes, MU message buffers. Each MU message buffer is associated with an uninitialized process on the compute node. In the parallel computer, managing internode data communications for an uninitialized process includes: receiving, by an MU of a compute node, one or more data communications messages in an MU message buffer associated with an uninitialized process on the compute node; determining, by an application agent, that the MU message buffer associated with the uninitialized process is full prior tomore » initialization of the uninitialized process; establishing, by the application agent, a temporary message buffer for the uninitialized process in main computer memory; and moving, by the application agent, data communications messages from the MU message buffer associated with the uninitialized process to the temporary message buffer in main computer memory.« less
Managing internode data communications for an uninitialized process in a parallel computer
Archer, Charles J; Blocksome, Michael A; Miller, Douglas R; Parker, Jeffrey J; Ratterman, Joseph D; Smith, Brian E
2014-05-20
A parallel computer includes nodes, each having main memory and a messaging unit (MU). Each MU includes computer memory, which in turn includes, MU message buffers. Each MU message buffer is associated with an uninitialized process on the compute node. In the parallel computer, managing internode data communications for an uninitialized process includes: receiving, by an MU of a compute node, one or more data communications messages in an MU message buffer associated with an uninitialized process on the compute node; determining, by an application agent, that the MU message buffer associated with the uninitialized process is full prior to initialization of the uninitialized process; establishing, by the application agent, a temporary message buffer for the uninitialized process in main computer memory; and moving, by the application agent, data communications messages from the MU message buffer associated with the uninitialized process to the temporary message buffer in main computer memory.
Forman, Leah S; Patts, Gregory J; Coleman, Sharon M; Blokhina, Elena; Lu, John; Yaroslavtseva, Tatiana; Gnatienko, Natalia; Krupitsky, Evgeny; Samet, Jeffrey H; Chaisson, Christine E
2018-02-01
Reproducible outcomes in clinical trials depend on adherence to study protocol. Short message service (also known as text message) reminders have been shown to improve clinical trial adherence in the United States and elsewhere. However, due to systematic differences in mobile data plans, languages, and technology, these systems are not easily translated to international settings. To gauge technical capabilities for international projects, we developed SMSMessenger, an automated Android application that uses a US server to send medication reminders to participants in a clinical trial in St. Petersburg, Russia (Zinc for HIV disease among alcohol users-a randomized controlled trial in the Russia Alcohol Research Collaboration on HIV/AIDS cohort). The application is downloaded once onto an Android study phone. When it is time for the text message reminders to be sent, study personnel access the application on a local phone, which in turn accesses the existing clinical trial database hosted on a US web server. The application retrieves a list of participants with the following information: phone number, whether a message should be received at that time, and the appropriate text of the message. The application is capable of storing multiple outgoing messages. With a few clicks, text messages are sent to study participants who can reply directly to the message. Study staff can check the local phone for incoming messages. The SMSMessenger application uses an existing clinical trial database and is able to receive real-time updates. All communications between the application and server are encrypted, and phone numbers are stored in a secure database behind a firewall. No sensitive data are stored on the phone, as outgoing messages are sent through the application and not by messaging features on the phone itself. Messages are sent simultaneously to study participants, which reduces the burden on local study staff. Costs and setup are minimal. The only local requirements are an Android phone and data plan. The SMSMessenger technology could be modified to be applied anywhere in the world, in any language, script, or alphabet, and for many different purposes. The novel application of this existing low-cost technology can improve the usefulness of text messaging in advancing the goals of international clinical trials.
The Development of Message Evaluation Skills in Young Children.
ERIC Educational Resources Information Center
Beal, Carole R.; Belgrad, Susan L.
Two studies investigated the origins of message evaluation skills in preschool children. In the first study, 14 preschoolers and 14 second graders were asked to evaluate the informativeness of pictorial messages in a referential communication task in two sessions. Results showed that the younger children overestimated the informativeness of…
How Communication Goals Determine when Audience Tuning Biases Memory
ERIC Educational Resources Information Center
Echterhoff, Gerald; Higgins, E. Tory; Kopietz, Rene; Groll, Stephan
2008-01-01
After tuning their message to suit their audience's attitude, communicators' own memories for the original information (e.g., a target person's behaviors) often reflect the biased view expressed in their message--producing an audience-congruent memory bias. Exploring the motivational circumstances of message production, the authors investigated…
Social Email: A Framework and Application for More Socially-Aware Communications
NASA Astrophysics Data System (ADS)
Tran, Thomas; Rowe, Jeff; Wu, S. Felix
As online social networks (OSN) attempt to mimic real life social networks, we have made progress towards using OSNs to provide us with data to allow for richer and more robust online communications. In this paper, we present a novel approach towards socially-aware email. Currently, email provides too little control to the recipient. Our approach, dubbed SoEmail, provides social context to messages using an OSN's underlying social graph. This not only gives the recipient control over who can message her, but it also provides her with an understanding of where the message originated from, socially. Furthermore, users who do not wish to use the built-in social aspect of SoEmail, can send and receive emails without any changes to their behavior. The modifications we made to the email application to provide this social context are not invasive and can be easily ignored by any existing email client. We built SoEmail on top of an existing framework, known as Davis Social Links, which allows SoEmail to be completely agnostic about the underlying OSN. We created a web-based, standards-based web client for SoEmail using Facebook and Gmail as the underlying systems which has been released for public use and has had a good adoption rate.
CMCpy: Genetic Code-Message Coevolution Models in Python
Becich, Peter J.; Stark, Brian P.; Bhat, Harish S.; Ardell, David H.
2013-01-01
Code-message coevolution (CMC) models represent coevolution of a genetic code and a population of protein-coding genes (“messages”). Formally, CMC models are sets of quasispecies coupled together for fitness through a shared genetic code. Although CMC models display plausible explanations for the origin of multiple genetic code traits by natural selection, useful modern implementations of CMC models are not currently available. To meet this need we present CMCpy, an object-oriented Python API and command-line executable front-end that can reproduce all published results of CMC models. CMCpy implements multiple solvers for leading eigenpairs of quasispecies models. We also present novel analytical results that extend and generalize applications of perturbation theory to quasispecies models and pioneer the application of a homotopy method for quasispecies with non-unique maximally fit genotypes. Our results therefore facilitate the computational and analytical study of a variety of evolutionary systems. CMCpy is free open-source software available from http://pypi.python.org/pypi/CMCpy/. PMID:23532367
78 FR 32169 - Facilitating the Deployment of Text-to-911 and Other Next Generation 911 Applications
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... messaging services (i.e., all providers of software applications that enable a consumer to send text... messaging services (i.e., all providers of software applications that enable a consumer to send text... providers of interconnected text messaging services (i.e., all providers of software applications that...
A Real-Time System for Abusive Network Traffic Detection
2011-03-01
examine the spamming behavior at the network layer (IP layer) by correlating data collected from three sources: a sinkhole , a large e-mail provider, and...which spam originates • autonomous systems that sent spam messages to their sinkhole • BGP route announcements With respect to IP address space, their...applications or machines to communicate with each other. They exchange XML- formatted data [58] using the HTTP [59] protocol. Specifically, the client uses the
The Network Protocol Analysis Technique in Snort
NASA Astrophysics Data System (ADS)
Wu, Qing-Xiu
Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.
NASA Technical Reports Server (NTRS)
Saini, Subhash; Frumkin, Michael; Hribar, Michelle; Jin, Hao-Qiang; Waheed, Abdul; Yan, Jerry
1998-01-01
Porting applications to new high performance parallel and distributed computing platforms is a challenging task. Since writing parallel code by hand is extremely time consuming and costly, porting codes would ideally be automated by using some parallelization tools and compilers. In this paper, we compare the performance of the hand written NAB Parallel Benchmarks against three parallel versions generated with the help of tools and compilers: 1) CAPTools: an interactive computer aided parallelization too] that generates message passing code, 2) the Portland Group's HPF compiler and 3) using compiler directives with the native FORTAN77 compiler on the SGI Origin2000.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-31
... after logon 10:00:020--CAS receives a message from Client Application --Counter re-starts 10:00:070--No... receives a message from Client Application --Counter restarts (2) 10:00:000--Heartbeat Request sent to Client Application within login 10:00:020--CAS receives a message from Client Application --Counter re...
Using the Clear Communication Index to Improve Materials for a Behavioral Intervention.
Porter, Kathleen J; Alexander, Ramine; Perzynski, Katelynn M; Kruzliakova, Natalie; Zoellner, Jamie M
2018-02-08
Ensuring that written materials used in behavioral interventions are clear is important to support behavior change. This study used the Clear Communication Index (CCI) to assess the original and revised versions of three types of written participant materials from the SIPsmartER intervention. Materials were revised based on original scoring. Scores for the entire index were significantly higher among revised versions than originals (57% versus 41%, p < 0.001); however, few revised materials (n = 2 of 53) achieved the benchmark of ≥90%. Handouts scored higher than worksheets and slide sets for both versions. The proportion of materials scored as having "a single main message" significantly increased between versions for worksheets (7% to 57%, p = 0.003) and slide sets (33% to 67%, p = 0.004). Across individual items, most significant improvements were in Core, with four-items related to the material having a single main message. Findings demonstrate that SIPsmartER's revised materials improved after CCI-informed edits. They advance the evidence and application of the CCI, suggesting it can be effectively used to support improvement in clarity of different types of written materials used in behavioral interventions. Implications for practical considerations of using the tool and suggestions for modifications for specific types of materials are presented.
1992-10-01
5 2.1 Network Overview ................................................ 5 2.2 Network Access Methods...to TAC and ?4ini-TAC users, such as common error messages, TAC commands, and instructions for performing file tranders. Section 5 , Network Use...originally known as Interface Message Processors, or IMPs. 5 THE DEFENSE DATA NETWORK DRAFt NIC 60001, October 1992 message do not necessarily take the same
Preventing messaging queue deadlocks in a DMA environment
Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff
2014-01-14
Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.
Shaw, Ryan J; Bosworth, Hayden B; Hess, Jeffrey C; Silva, Susan G; Lipkus, Isaac M; Davis, Linda L; Johnson, Constance M
2013-05-07
Mobile phone short message service (SMS) text messaging, has the potential to serve as an intervention medium to promote sustainability of weight loss that can be easily and affordably used by clinicians and consumers. To develop theoretically driven weight loss sustaining text messages and pilot an mHealth SMS text messaging intervention to promote sustaining recent weight loss in order to understand optimal frequency and timing of message delivery, and for feasibility and usability testing. Results from the pilot study were used to design and construct a patient privacy compliant automated SMS application to deliver weight loss sustaining messages. We first conducted a pilot study in which participants (N=16) received a daily SMS text message for one month following a structured weight loss program. Messages were developed from diet and exercise guidelines. Following the intervention, interviews were conducted and self-reported weight was collected via SMS text messaging. All participants (N=16) were capable of sending and receiving SMS text messages. During the phone interview at 1 month post-baseline and at 3 months post-baseline, 13/14 (93%) of participants who completed the study reported their weight via SMS. At 3 months post-baseline, 79% (11/14) participants sustained or continued to lose weight. Participants (13/14, 93%) were favorable toward the messages and the majority (10/14, 71%) felt they were useful in helping them sustain weight loss. All 14 participants who completed the interview thought SMS was a favorable communication medium and was useful to receive short relevant messages promptly and directly. All participants read the messages when they knew they arrived and most (11/14, 79%) read the messages at the time of delivery. All participants felt that at least one daily message is needed to sustain weight loss behaviors and that they should be delivered in the morning. Results were then used to develop the SMS text messaging application. Study results demonstrated the feasibility of developing weight loss SMS text messages, and the development of an mHealth SMS text messaging application. SMS text messaging was perceived as an appropriate and accepted tool to deliver health promotion content.
PEM public key certificate cache server
NASA Astrophysics Data System (ADS)
Cheung, T.
1993-12-01
Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.
Dixon, Brian E; Siegel, Jason A; Oemig, Tanya V; Grannis, Shaun J
2013-01-01
We examined completeness, an attribute of data quality, in the context of electronic laboratory reporting (ELR) of notifiable disease information to public health agencies. We extracted more than seven million ELR messages from multiple clinical information systems in two states. We calculated and compared the completeness of various data fields within the messages that were identified to be important to public health reporting processes. We compared unaltered, original messages from source systems with similar messages from another state as well as messages enriched by a health information exchange (HIE). Our analysis focused on calculating completeness (i.e., the number of nonmissing values) for fields deemed important for inclusion in notifiable disease case reports. The completeness of data fields for laboratory transactions varied across clinical information systems and jurisdictions. Fields identifying the patient and test results were usually complete (97%-100%). Fields containing patient demographics, patient contact information, and provider contact information were suboptimal (6%-89%). Transactions enhanced by the HIE were found to be more complete (increases ranged from 2% to 25%) than the original messages. ELR data from clinical information systems can be of suboptimal quality. Public health monitoring of data sources and augmentation of ELR message content using HIE services can improve data quality.
Simulations of linear and Hamming codes using SageMath
NASA Astrophysics Data System (ADS)
Timur, Tahta D.; Adzkiya, Dieky; Soleha
2018-03-01
Digital data transmission over a noisy channel could distort the message being transmitted. The goal of coding theory is to ensure data integrity, that is, to find out if and where this noise has distorted the message and what the original message was. Data transmission consists of three stages: encoding, transmission, and decoding. Linear and Hamming codes are codes that we discussed in this work, where encoding algorithms are parity check and generator matrix, and decoding algorithms are nearest neighbor and syndrome. We aim to show that we can simulate these processes using SageMath software, which has built-in class of coding theory in general and linear codes in particular. First we consider the message as a binary vector of size k. This message then will be encoded to a vector with size n using given algorithms. And then a noisy channel with particular value of error probability will be created where the transmission will took place. The last task would be decoding, which will correct and revert the received message back to the original message whenever possible, that is, if the number of error occurred is smaller or equal to the correcting radius of the code. In this paper we will use two types of data for simulations, namely vector and text data.
Unlinkable Serial Transactions: Protocols and Applications
1999-11-01
4) intends for the blind signature to be secure from “one-more” forgery attacks [Pointcheval and Stern 1996]. Such forgery enables the originator to...protocols we describe. The signature indicated by S in message 2 uses the vendor’s signature key for service S and is only used to sign blinded hashes. We...make use of blind signatures ; although, not surprisingly, their sys- tems are rather different from the ones given here [Fujioka et al. 1993; Cranor 1996
Implementing Multidisciplinary and Multi-Zonal Applications Using MPI
NASA Technical Reports Server (NTRS)
Fineberg, Samuel A.
1995-01-01
Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. Unfortunately, simple message passing models, like Intel's NX library, only allow point-to-point and global communication within a single system-defined partition. This makes implementation of these applications quite difficult, if not impossible. In this report it is shown that the new Message Passing Interface (MPI) standard is a viable portable library for implementing the message passing portion of multidisciplinary applications. Further, with the extension of a portable loader, fully portable multidisciplinary application programs can be developed. Finally, the performance of MPI is compared to that of some native message passing libraries. This comparison shows that MPI can be implemented to deliver performance commensurate with native message libraries.
Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos
2016-09-18
Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.
How to Take HRMS Process Management to the Next Level with Workflow Business Event System
NASA Technical Reports Server (NTRS)
Rajeshuni, Sarala; Yagubian, Aram; Kunamaneni, Krishna
2006-01-01
Oracle Workflow with the Business Event System offers a complete process management solution for enterprises to manage business processes cost-effectively. Using Workflow event messaging, event subscriptions, AQ Servlet and advanced queuing technologies, this presentation will demonstrate the step-by-step design and implementation of system solutions in order to integrate two dissimilar systems and establish communication remotely. As a case study, the presentation walks you through the process of propagating organization name changes in other applications that originated from the HRMS module without changing applications code. The solution can be applied to your particular business cases for streamlining or modifying business processes across Oracle and non-Oracle applications.
Gulacti, Umut; Lok, Ugur
2017-07-19
Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.
Data communications in a parallel active messaging interface of a parallel computer
Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.
2014-09-02
Eager send data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints that specify a client, a context, and a task, including receiving an eager send data communications instruction with transfer data disposed in a send buffer characterized by a read/write send buffer memory address in a read/write virtual address space of the origin endpoint; determining for the send buffer a read-only send buffer memory address in a read-only virtual address space, the read-only virtual address space shared by both the origin endpoint and the target endpoint, with all frames of physical memory mapped to pages of virtual memory in the read-only virtual address space; and communicating by the origin endpoint to the target endpoint an eager send message header that includes the read-only send buffer memory address.
Data communications in a parallel active messaging interface of a parallel computer
Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.
2014-09-16
Eager send data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints that specify a client, a context, and a task, including receiving an eager send data communications instruction with transfer data disposed in a send buffer characterized by a read/write send buffer memory address in a read/write virtual address space of the origin endpoint; determining for the send buffer a read-only send buffer memory address in a read-only virtual address space, the read-only virtual address space shared by both the origin endpoint and the target endpoint, with all frames of physical memory mapped to pages of virtual memory in the read-only virtual address space; and communicating by the origin endpoint to the target endpoint an eager send message header that includes the read-only send buffer memory address.
Data communications in a parallel active messaging interface of a parallel computer
Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E
2015-02-03
Data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a SEND instruction, the SEND instruction specifying a transmission of transfer data from the origin endpoint to a first target endpoint; transmitting from the origin endpoint to the first target endpoint a Request-To-Send (`RTS`) message advising the first target endpoint of the location and size of the transfer data; assigning by the first target endpoint to each of a plurality of target endpoints separate portions of the transfer data; and receiving by the plurality of target endpoints the transfer data.
Data communications in a parallel active messaging interface of a parallel computer
Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E
2014-11-18
Data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a SEND instruction, the SEND instruction specifying a transmission of transfer data from the origin endpoint to a first target endpoint; transmitting from the origin endpoint to the first target endpoint a Request-To-Send (`RTS`) message advising the first target endpoint of the location and size of the transfer data; assigning by the first target endpoint to each of a plurality of target endpoints separate portions of the transfer data; and receiving by the plurality of target endpoints the transfer data.
Increasing available FIFO space to prevent messaging queue deadlocks in a DMA environment
Blocksome, Michael A [Rochester, MN; Chen, Dong [Croton On Hudson, NY; Gooding, Thomas [Rochester, MN; Heidelberger, Philip [Cortlandt Manor, NY; Parker, Jeff [Rochester, MN
2012-02-07
Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate an interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.
Waddell, T Franklin
2016-07-01
Temporary messaging programs continue to rise in popularity, due in large part to the perceived privacy that they afford. However, recent controversies have revealed that messages shared on ephemeral messaging services are persistent and potentially retrieval, thus undermining the privacy they are assumed to provide. Given this paradox, why are temporary messaging services so popular? Does the allure of privacy still motivate the use of temporary messaging programs? Or, if privacy is no longer afforded by ephemeral messaging, what other psychological gratifications do these applications fulfill that might account for their continued use? Informed by the Modality-Agency-Interactivity-Navigability (MAIN) model and the uses and gratifications tradition, the current study conducted qualitative interviews to identify the gratifications that individuals derive from the popular ephemeral messaging application, Snapchat. Study results show that the visual affordances of ephemeral messaging have legitimized photographic communication, providing self-expression and relational gratifications that are unfulfilled by text-based applications. By comparison, users report low levels of trust in the privacy affordances of ephemeral messaging, and instead projecting negative effects of temporary messaging on other users rather than self. Theoretical and practical implications of these results are discussed.
Stimulating dental attendance in the Netherlands: comparison of three conceptual frameworks.
ter Horst, G; Hoogstraten, J; de Haan, W
1985-06-01
A field-experiment was done to study the differential effectiveness of three conceptual approaches to stimulate the demand for dental care. Persuasive messages were based on Ajzen & Fishbein's theory of reasoned action, on the health-belief model, and on the notion that knowledge of rights and obligations is a prerequisite for seeking dental care. All messages included an application form and a return envelope. Subjects were 269 members of Amsterdam health insurance companies. They had not received regular dental treatment and/or a certificate of dental fitness for at least 21/2 yr. Subjects received one of the three messages, an application form only (with a return envelope), or no message at all. Applying for treatment and acquiring a dental certificate were the behavioral measures. In all, 47.4% of insured who received message and/or application form applied for treatment. No control subjects applied. Fifteen months later 70% of the applicants had obtained a dental certificate. A differential effectiveness of the three messages was absent. Contrary to our expectations the condition of no message, application form only proved as effective as the message conditions. Results furthermore indicate that the main reason for not applying concerns fear of dental treatment. Whether or not the subject applied did not correlate with his knowledge of rights and obligations, sex, age, level of education, and occupational status.
Low latency, high bandwidth data communications between compute nodes in a parallel computer
Blocksome, Michael A
2014-04-01
Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.
Low latency, high bandwidth data communications between compute nodes in a parallel computer
Blocksome, Michael A
2014-04-22
Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.
Low latency, high bandwidth data communications between compute nodes in a parallel computer
Blocksome, Michael A
2013-07-02
Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.
Introduction to the special issue: message design in health communication research.
Harrington, Nancy Grant
2015-01-01
Message design is one of the most complex and vibrant research areas in the communication discipline. Based on the preconference of the 2014 Kentucky Conference on Health Communication, this special issue of Health Communication is focused on a broad range of message design concerns. It features 10 original articles addressing topics ranging from fundamental questions related to theory and method to questions of message adaptation for translation and dissemination. Together, these articles reflect the rich variety of health behaviors addressed by health communication researchers and the breadth and depth of theoretical, methodological, and practical approaches to be considered in message design research.
Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos
2016-01-01
Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces. PMID:27649209
Protocol for multiple node network
NASA Technical Reports Server (NTRS)
Kirkham, Harold (Inventor)
1995-01-01
The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.
Protocol for multiple node network
NASA Technical Reports Server (NTRS)
Kirkham, Harold (Inventor)
1994-01-01
The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.
DMA engine for repeating communication patterns
Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard; Vranas, Pavlos
2010-09-21
A parallel computer system is constructed as a network of interconnected compute nodes to operate a global message-passing application for performing communications across the network. Each of the compute nodes includes one or more individual processors with memories which run local instances of the global message-passing application operating at each compute node to carry out local processing operations independent of processing operations carried out at other compute nodes. Each compute node also includes a DMA engine constructed to interact with the application via Injection FIFO Metadata describing multiple Injection FIFOs where each Injection FIFO may containing an arbitrary number of message descriptors in order to process messages with a fixed processing overhead irrespective of the number of message descriptors included in the Injection FIFO.
A flexible software architecture for scalable real-time image and video processing applications
NASA Astrophysics Data System (ADS)
Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.
2012-06-01
Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility because they are normally oriented towards particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse and inefficient execution on multicore processors. This paper presents a novel software architecture for real-time image and video processing applications which addresses these issues. The architecture is divided into three layers: the platform abstraction layer, the messaging layer, and the application layer. The platform abstraction layer provides a high level application programming interface for the rest of the architecture. The messaging layer provides a message passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of messages. The application layer provides a repository for reusable application modules designed for real-time image and video processing applications. These modules, which include acquisition, visualization, communication, user interface and data processing modules, take advantage of the power of other well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, we present different prototypes and applications to show the possibilities of the proposed architecture.
Buller, David B; Borland, Ron; Bettinghaus, Erwin P; Shane, James H; Zimmerman, Donald E
2014-03-01
Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Young adult smokers 18-30 years old (n = 102) participated in a randomized pretest-posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and quitting behavior (quit attempts, point-prevalence, 30-day point-prevalence, and continued abstinence) were assessed in posttests. Overall, 60% of smokers used mobile services (REQ-Mobile, 61%, mean of 128.5 messages received; onQ, 59%, mean of 107.8 messages), and 75% evaluated REQ-Mobile as user-friendly. A majority of smokers reported being abstinent at posttest (6 weeks, 53% of completers; 12 weeks, 66% of completers [44% of all cases]). Also, 37% (25%of all cases) reported 30-day point-prevalence abstinence, and 32% (22% of all cases) reported continuous abstinence at 12 weeks. OnQ produced more abstinence (p<0.05) than REQ-Mobile. Use of both services predicted increased 30-day abstinence at 12 weeks (used, 47%; not used, 20%; p = 0.03). REQ-Mobile was feasible for delivering cessation support but appeared to not move smokers to quit as quickly as text messaging. Text messaging may work better because it is simple, well known, and delivered to a primary inbox. These advantages may disappear as smokers become more experienced with new handsets. Mobile phones may be promising delivery platforms for cessation services using either smartphone applications or text messaging.
Lightweight SIP/SDP compression scheme (LSSCS)
NASA Astrophysics Data System (ADS)
Wu, Jian J.; Demetrescu, Cristian
2001-10-01
In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.
Comparison of Origin 2000 and Origin 3000 Using NAS Parallel Benchmarks
NASA Technical Reports Server (NTRS)
Turney, Raymond D.
2001-01-01
This report describes results of benchmark tests on the Origin 3000 system currently being installed at the NASA Ames National Advanced Supercomputing facility. This machine will ultimately contain 1024 R14K processors. The first part of the system, installed in November, 2000 and named mendel, is an Origin 3000 with 128 R12K processors. For comparison purposes, the tests were also run on lomax, an Origin 2000 with R12K processors. The BT, LU, and SP application benchmarks in the NAS Parallel Benchmark Suite and the kernel benchmark FT were chosen to determine system performance and measure the impact of changes on the machine as it evolves. Having been written to measure performance on Computational Fluid Dynamics applications, these benchmarks are assumed appropriate to represent the NAS workload. Since the NAS runs both message passing (MPI) and shared-memory, compiler directive type codes, both MPI and OpenMP versions of the benchmarks were used. The MPI versions used were the latest official release of the NAS Parallel Benchmarks, version 2.3. The OpenMP versiqns used were PBN3b2, a beta version that is in the process of being released. NPB 2.3 and PBN 3b2 are technically different benchmarks, and NPB results are not directly comparable to PBN results.
Borland, Ron; Bettinghaus, Erwin P.; Shane, James H.; Zimmerman, Donald E.
2014-01-01
Abstract Background: Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Materials and Methods: Young adult smokers 18–30 years old (n=102) participated in a randomized pretest–posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and quitting behavior (quit attempts, point-prevalence, 30-day point-prevalence, and continued abstinence) were assessed in posttests. Results: Overall, 60% of smokers used mobile services (REQ-Mobile, 61%, mean of 128.5 messages received; onQ, 59%, mean of 107.8 messages), and 75% evaluated REQ-Mobile as user-friendly. A majority of smokers reported being abstinent at posttest (6 weeks, 53% of completers; 12 weeks, 66% of completers [44% of all cases]). Also, 37% (25%of all cases) reported 30-day point-prevalence abstinence, and 32% (22% of all cases) reported continuous abstinence at 12 weeks. OnQ produced more abstinence (p<0.05) than REQ-Mobile. Use of both services predicted increased 30-day abstinence at 12 weeks (used, 47%; not used, 20%; p=0.03). Conclusions: REQ-Mobile was feasible for delivering cessation support but appeared to not move smokers to quit as quickly as text messaging. Text messaging may work better because it is simple, well known, and delivered to a primary inbox. These advantages may disappear as smokers become more experienced with new handsets. Mobile phones may be promising delivery platforms for cessation services using either smartphone applications or text messaging. PMID:24350804
Software architecture for time-constrained machine vision applications
NASA Astrophysics Data System (ADS)
Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.
2013-01-01
Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility, because they are normally oriented toward particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse, and inefficient execution on multicore processors. We present a novel software architecture for time-constrained machine vision applications that addresses these issues. The architecture is divided into three layers. The platform abstraction layer provides a high-level application programming interface for the rest of the architecture. The messaging layer provides a message-passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of message. The application layer provides a repository for reusable application modules designed for machine vision applications. These modules, which include acquisition, visualization, communication, user interface, and data processing, take advantage of the power of well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, the proposed architecture is applied to a real machine vision application: a jam detector for steel pickling lines.
77 FR 16688 - Review of the Emergency Alert System
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
... the approximately three and one half-year window it is providing for intermediary device users is..., including the originator, event, location and the valid time period of the EAS message, from the CAP text... event, which it believes would provide more visual information to alert message viewers. The Commission...
A clinician's artificial organ? Instant messaging applications in medical care.
Tazegul, Gokhan; Bozoglan, Humeyra; Ogut, Tahir S; Balcı, Mustafa K
2017-09-15
After the development of the first phone at the end of 19th century, communication technologies took a great leap forward in the 20th century. With the birth of the "smartphone" in the 21st century, communication technologies exponentially evolved and became an important part of our daily routine. Effective communications between clinicians is critical in medical care and miscommunications are a source of errors. Although telecommunication technologies have proliferated dramatically in the last decade, there is scarce evidence-based information on the use of this technology in medical care. For the purposes of medical communication, we can now consult each other about patients individually and within a group via instant messaging applications by using text messages, photos, audio messages and even videos. In this review, we examine the uses and drawbacks of instant messaging applications in medical communications.
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies
Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton
2016-01-01
Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files. PMID:26982207
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton
2016-01-01
Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perry, Marcia
The IRCD is an IRC server that was originally distributed by the IRCD Hybrid developer team for use as a server in IRC message over the public Internet. By supporting the IRC protocol defined in the IRC RFC, IRCD allows the users to create and join channels for group or one-to-one text-based instant messaging. It stores information about channels (e.g., whether it is public, secret, or invite-only, the topic set, membership) and users (who is online and what channels they are members of). It receives messages for a specific user or channel and forwards these messages to the targeted destination.more » Since server-to-server communication is also supported, these targeted destinations may be connected to different IRC servers. Messages are exchanged over TCP connections that remain open between the client and the server. The IRCD is being used within the Pervasive Computing Collaboration Environment (PCCE) as the 'chat server' for message exchange over public and private channels. After an LBNLSecureMessaging(PCCE chat) client has been authenticated, the client connects to IRCD with its assigned nickname or 'nick.' The client can then create or join channels for group discussions or one-to-one conversations. These channels can have an initial mode of public or invite-only and the mode may be changed after creation. If a channel is public, any one online can join the discussion; if a channel is invite-only, users can only join if existing members of the channel explicity invite them. Users can be invited to any type of channel and users may be members of multiple channels simultaneously. For use with the PCCE environment, the IRCD application (which was written in C) was ported to Linux and has been tested and installed under Linux Redhat 7.2. The source code was also modified with SSL so that all messages exchanged over the network are encrypted. This modified IRC server also verifies with an authentication server that the client is who he or she claims to be and that this user is authorized to ain access to the IRCD.« less
Information theory and the ethylene genetic network.
González-García, José S; Díaz, José
2011-10-01
The original aim of the Information Theory (IT) was to solve a purely technical problem: to increase the performance of communication systems, which are constantly affected by interferences that diminish the quality of the transmitted information. That is, the theory deals only with the problem of transmitting with the maximal precision the symbols constituting a message. In Shannon's theory messages are characterized only by their probabilities, regardless of their value or meaning. As for its present day status, it is generally acknowledged that Information Theory has solid mathematical foundations and has fruitful strong links with Physics in both theoretical and experimental areas. However, many applications of Information Theory to Biology are limited to using it as a technical tool to analyze biopolymers, such as DNA, RNA or protein sequences. The main point of discussion about the applicability of IT to explain the information flow in biological systems is that in a classic communication channel, the symbols that conform the coded message are transmitted one by one in an independent form through a noisy communication channel, and noise can alter each of the symbols, distorting the message; in contrast, in a genetic communication channel the coded messages are not transmitted in the form of symbols but signaling cascades transmit them. Consequently, the information flow from the emitter to the effector is due to a series of coupled physicochemical processes that must ensure the accurate transmission of the message. In this review we discussed a novel proposal to overcome this difficulty, which consists of the modeling of gene expression with a stochastic approach that allows Shannon entropy (H) to be directly used to measure the amount of uncertainty that the genetic machinery has in relation to the correct decoding of a message transmitted into the nucleus by a signaling pathway. From the value of H we can define a function I that measures the amount of information content in the input message that the cell's genetic machinery is processing during a given time interval. Furthermore, combining Information Theory with the frequency response analysis of dynamical systems we can examine the cell's genetic response to input signals with varying frequencies, amplitude and form, in order to determine if the cell can distinguish between different regimes of information flow from the environment. In the particular case of the ethylene signaling pathway, the amount of information managed by the root cell of Arabidopsis can be correlated with the frequency of the input signal. The ethylene signaling pathway cuts off very low and very high frequencies, allowing a window of frequency response in which the nucleus reads the incoming message as a varying input. Outside of this window the nucleus reads the input message as an approximately non-varying one. This frequency response analysis is also useful to estimate the rate of information transfer during the transport of each new ERF1 molecule into the nucleus. Additionally, application of Information Theory to analysis of the flow of information in the ethylene signaling pathway provides a deeper insight in the form in which the transition between auxin and ethylene hormonal activity occurs during a circadian cycle. An ambitious goal for the future would be to use Information Theory as a theoretical foundation for a suitable model of the information flow that runs at each level and through all levels of biological organization.
MPIRUN: A Portable Loader for Multidisciplinary and Multi-Zonal Applications
NASA Technical Reports Server (NTRS)
Fineberg, Samuel A.; Woodrow, Thomas S. (Technical Monitor)
1994-01-01
Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. One method for implementing the message passing portion of these codes is with the new Message Passing Interface (MPI) standard. Unfortunately, this standard only specifies the message passing portion of an application, but does not specify any portable mechanisms for loading an application. MPIRUN was developed to provide a portable means for loading MPI programs, and was specifically targeted at multidisciplinary and multi-zonal applications. Programs using MPIRUN for loading and MPI for message passing are then portable between all machines supported by MPIRUN. MPIRUN is currently implemented for the Intel iPSC/860, TMC CM5, IBM SP-1 and SP-2, Intel Paragon, and workstation clusters. Further, MPIRUN is designed to be simple enough to port easily to any system supporting MPI.
Piterman, L; McCall, L
1999-07-01
While research is scientific, publication is a mixture of science and political pragmatism. Targeting the right journal is influenced by the following factors: the discipline that best represents the subject; the purpose of the message; the audience who are to be recipients of the message; the realities of geographic parochialism; the desire of authors to maximise personal and professional opportunities. If the originally targeted journal rejects the article, authors should have alternative publication strategies that give them professional recognition without requiring them to compromise the message or their ethics.
Speech-Message Extraction from Interference Introduced by External Distributed Sources
NASA Astrophysics Data System (ADS)
Kanakov, V. A.; Mironov, N. A.
2017-08-01
The problem of this study involves the extraction of a speech signal originating from a certain spatial point and calculation of the intelligibility of the extracted voice message. It is solved by the method of decreasing the influence of interference from the speech-message sources on the extracted signal. This method is based on introducing the time delays, which depend on the spatial coordinates, to the recording channels. Audio records of the voices of eight different people were used as test objects during the studies. It is proved that an increase in the number of microphones improves intelligibility of the speech message which is extracted from interference.
Baca-García, Enrique; Brandt, Sara; Walter, Michel; Courtet, Philippe
2016-01-01
Background Mobile phone text messages (short message service, SMS) are used pervasively as a form of communication. Almost 100% of the population uses text messaging worldwide and this technology is being suggested as a promising tool in psychiatry. Text messages can be sent either from a classic mobile phone or a web-based application. Reviews are needed to better understand how text messaging can be used in mental health care and other fields of medicine. Objective The objective of the study was to review the literature regarding the use of mobile phone text messaging in mental health care. Methods We conducted a thorough literature review of studies involving text messaging in health care management. Searches included PubMed, PsycINFO, Cochrane, Scopus, Embase and Web of Science databases on May 25, 2015. Studies reporting the use of text messaging as a tool in managing patients with mental health disorders were included. Given the heterogeneity of studies, this review was summarized using a descriptive approach. Results From 677 initial citations, 36 studies were included in the review. Text messaging was used in a wide range of mental health situations, notably substance abuse (31%), schizophrenia (22%), and affective disorders (17%). We identified four ways in which text messages were used: reminders (14%), information (17%), supportive messages (42%), and self-monitoring procedures (42%). Applications were sometimes combined. Conclusions We report growing interest in text messaging since 2006. Text messages have been proposed as a health care tool in a wide spectrum of psychiatric disorders including substance abuse, schizophrenia, affective disorders, and suicide prevention. Most papers described pilot studies, while some randomized clinical trials (RCTs) were also reported. Overall, a positive attitude toward text messages was reported. RCTs reported improved treatment adherence and symptom surveillance. Other positive points included an increase in appointment attendance and in satisfaction with management and health care services. Insight into message content, preventative strategies, and innovative approaches derived from the mental health field may be applicable in other medical specialties. PMID:27287668
Berrouiguet, Sofian; Baca-García, Enrique; Brandt, Sara; Walter, Michel; Courtet, Philippe
2016-06-10
Mobile phone text messages (short message service, SMS) are used pervasively as a form of communication. Almost 100% of the population uses text messaging worldwide and this technology is being suggested as a promising tool in psychiatry. Text messages can be sent either from a classic mobile phone or a web-based application. Reviews are needed to better understand how text messaging can be used in mental health care and other fields of medicine. The objective of the study was to review the literature regarding the use of mobile phone text messaging in mental health care. We conducted a thorough literature review of studies involving text messaging in health care management. Searches included PubMed, PsycINFO, Cochrane, Scopus, Embase and Web of Science databases on May 25, 2015. Studies reporting the use of text messaging as a tool in managing patients with mental health disorders were included. Given the heterogeneity of studies, this review was summarized using a descriptive approach. From 677 initial citations, 36 studies were included in the review. Text messaging was used in a wide range of mental health situations, notably substance abuse (31%), schizophrenia (22%), and affective disorders (17%). We identified four ways in which text messages were used: reminders (14%), information (17%), supportive messages (42%), and self-monitoring procedures (42%). Applications were sometimes combined. We report growing interest in text messaging since 2006. Text messages have been proposed as a health care tool in a wide spectrum of psychiatric disorders including substance abuse, schizophrenia, affective disorders, and suicide prevention. Most papers described pilot studies, while some randomized clinical trials (RCTs) were also reported. Overall, a positive attitude toward text messages was reported. RCTs reported improved treatment adherence and symptom surveillance. Other positive points included an increase in appointment attendance and in satisfaction with management and health care services. Insight into message content, preventative strategies, and innovative approaches derived from the mental health field may be applicable in other medical specialties.
Lewkowitz, Adam K; O'Donnell, Betsy E; Nakagawa, Sanae; Vargas, Juan E; Zlatnik, Marya G
2016-03-01
Text4baby is the only free text-message program for pregnancy available. Our objective was to determine whether content differed between Text4baby and popular pregnancy smart phone applications (apps). Researchers enrolled in Text4baby in 2012 and downloaded the four most-popular free pregnancy smart phone apps in July 2013; content was re-extracted in February 2014. Messages were assigned thematic codes. Two researchers coded messages independently before reviewing all the codes jointly to ensure consistency. Logistic regression modeling determined statistical differences between Text4baby and smart phone apps. About 1399 messages were delivered. Of these, 333 messages had content related to more than one theme and were coded as such, resulting in 1820 codes analyzed. Compared to smart phone apps, Text4baby was significantly more likely to have content regarding Postpartum Planning, Seeking Care, Recruitment and Prevention and significantly less likely to mention Normal Pregnancy Symptoms. No messaging program included content regarding postpartum contraception. To improve content without increasing text message number, Text4baby could replace messages on recruitment with messages regarding normal pregnancy symptoms, fetal development and postpartum contraception.
Automatic speech recognition in air-ground data link
NASA Technical Reports Server (NTRS)
Armstrong, Herbert B.
1989-01-01
In the present air traffic system, information presented to the transport aircraft cockpit crew may originate from a variety of sources and may be presented to the crew in visual or aural form, either through cockpit instrument displays or, most often, through voice communication. Voice radio communications are the most error prone method for air-ground data link. Voice messages can be misstated or misunderstood and radio frequency congestion can delay or obscure important messages. To prevent proliferation, a multiplexed data link display can be designed to present information from multiple data link sources on a shared cockpit display unit (CDU) or multi-function display (MFD) or some future combination of flight management and data link information. An aural data link which incorporates an automatic speech recognition (ASR) system for crew response offers several advantages over visual displays. The possibility of applying ASR to the air-ground data link was investigated. The first step was to review current efforts in ASR applications in the cockpit and in air traffic control and evaluated their possible data line application. Next, a series of preliminary research questions is to be developed for possible future collaboration.
Eksert, Sami; Aşık, Mehmet Burak; Akay, Sinan; Keklikçi, Kenan; Aydın, Fevzi Nuri; Çoban, Mehmet; Kantemir, Ali; Güngör, Onur; Garip, Beyazıt; Turgut, Mustafa Suphi; Olcay, Kenan
2017-05-01
Coordination of an emergency response team is an important determinant of prompt treatment for combat injuries in hospitals. The authors hypothesized that instant messaging applications for smartphones could be appropriate tools for notifying emergency response team members. The objective of this study was to investigate the efficiency of a commercial instant messaging application (WhatsApp, Mountain View, CA) as a communication tool for the emergency team in a level-I trauma center. We retrospectively evaluated the messages in the instant messaging application group that was formed to coordinate responses to patients who suffered from combat injuries and who were transported to our hospital via helicopter during an 8-week period. We evaluated the response times, response time periods during or outside of work hours, and the differences in the response times of doctors, nurses, and technicians among the members of the emergency team to the team leader's initial message about the patients. A total of 510 emergency call messages pertaining to 17 combat injury emergency cases were logged. The median time of emergency response was 4.1 minutes, 6 minutes, and 5.3 minutes for doctors, nurses, and the other team members, respectively. The differences in these response times between the groups were statistically significant (p=0.03), with subgroup analyses revealing significant differences between doctors and nurses (p=0.038). However, no statistically significant differences were observed between the doctors and the technicians (p=0.19) or the nurses and the technicians (p=1.0). From the team leader's perspective, using this application reduced the workload and the time loss, and also encouraged the team. Instant messaging applications for smartphones can be efficient, easy-to-operate, and time-saving communication tools in the transfer of medical information and the coordination of emergency response team members in hospitals.
Tweeting Supertyphoon Haiyan: Evolving Functions of Twitter during and after a Disaster Event.
David, Clarissa C; Ong, Jonathan Corpus; Legara, Erika Fille T
2016-01-01
When disaster events capture global attention users of Twitter form transient interest communities that disseminate information and other messages online. This paper examines content related to Typhoon Haiyan (locally known as Yolanda) as it hit the Philippines and triggered international humanitarian response and media attention. It reveals how Twitter conversations about disasters evolve over time, showing an issue attention cycle on a social media platform. The paper examines different functions of Twitter and the information hubs that drive and sustain conversation about the event. Content analysis shows that the majority of tweets contain information about the typhoon or its damage, and disaster relief activities. There are differences in types of content between the most retweeted messages and posts that are original tweets. Original tweets are more likely to come from ordinary users, who are more likely to tweet emotions, messages of support, and political content compared with official sources and key information hubs that include news organizations, aid organization, and celebrities. Original tweets reveal use of the site beyond information to relief coordination and response.
Tweeting Supertyphoon Haiyan: Evolving Functions of Twitter during and after a Disaster Event
David, Clarissa C.; Ong, Jonathan Corpus; Legara, Erika Fille T.
2016-01-01
When disaster events capture global attention users of Twitter form transient interest communities that disseminate information and other messages online. This paper examines content related to Typhoon Haiyan (locally known as Yolanda) as it hit the Philippines and triggered international humanitarian response and media attention. It reveals how Twitter conversations about disasters evolve over time, showing an issue attention cycle on a social media platform. The paper examines different functions of Twitter and the information hubs that drive and sustain conversation about the event. Content analysis shows that the majority of tweets contain information about the typhoon or its damage, and disaster relief activities. There are differences in types of content between the most retweeted messages and posts that are original tweets. Original tweets are more likely to come from ordinary users, who are more likely to tweet emotions, messages of support, and political content compared with official sources and key information hubs that include news organizations, aid organization, and celebrities. Original tweets reveal use of the site beyond information to relief coordination and response. PMID:27019425
Reference Architecture for MNE 5 Technical System
2007-05-30
of being available in most experiments. Core Services A core set of applications whi directories, web portal and collaboration applications etc. A...classifications Messages (xml, JMS, content level…) Meta data filtering, who can initiate services Web browsing Collaboration & messaging Border...Exchange Ref Architecture for MNE5 Tech System.doc 9 of 21 audit logging Person and machine Data lev objects, web services, messages rification el
Is Provider Secure Messaging Associated With Patient Messaging Behavior? Evidence From the US Army.
Wolcott, Vickee; Agarwal, Ritu; Nelson, D Alan
2017-04-06
Secure messaging with health care providers offers the promise of improved patient-provider relationships, potentially facilitating outcome improvements. But, will patients use messaging technology in the manner envisioned by policy-makers if their providers do not actively use it? We hypothesized that the level and type of secure messaging usage by providers might be associated with messaging initiation by their patients. The study employed a dataset of health care and secure messaging records of more than 81,000 US Army soldiers and nearly 3000 clinicians with access to a patient portal system. We used a negative binomial regression model on over 25 million observations to determine the adjusted association between provider-initiated and provider-response messaging and subsequent messaging by their patients in this population over a 4-year period. Prior provider-initiated and response messaging levels were associated with new patient messaging when controlling for the patient's health care utilization and diagnoses, with the strongest association for high provider-response messaging level. Patients whose providers were highly responsive to the messages of other patients initiated 334% more secure messages (P<.001) than patients with providers who did not personally respond to other patients' messages. Our results indicate that provider messaging usage levels and types thereof predict their patients' subsequent communication behavior. The findings suggest the need for more study into the factors associated with provider messaging to fully understand the mechanisms of this relationship. ©Vickee Wolcott, Ritu Agarwal, D. Alan Nelson. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.
Mobile phone messaging reminders for attendance at healthcare appointments.
Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Atun, Rifat; Car, Josip
2013-12-05
This review is an update of the original Cochrane review published in July 2012. Missed appointments are a major cause of inefficiency in healthcare delivery with substantial monetary costs for the health system, leading to delays in diagnosis and appropriate treatment. Patients' forgetfulness is one of the main reasons for missed appointments. Patient reminders may help reduce missed appointments. Modes of communicating reminders for appointments to patients include face-to-face communication, postal messages, calls to landlines or mobile phones, and mobile phone messaging. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could provide an important, inexpensive delivery medium for reminders for healthcare appointments. To update our review assessing the effects of mobile phone messaging reminders for attendance at healthcare appointments. Secondary objectives include assessment of costs; health outcomes; patients' and healthcare providers' evaluation of the intervention and perceptions of safety; and possible harms and adverse effects associated with the intervention. Original searches were run in June 2009. For this update, we searched the Cochrane Central Register of Controlled Trials (CENTRAL,The Cochrane Library 2012, Issue 8), MEDLINE (OvidSP) (January 1993 to August 2012), EMBASE (OvidSP) (January 1993 to August 2012), PsycINFO (OvidSP) (January 1993 to August 2012) and CINAHL (EbscoHOST) (January 1993 to August 2012). We also reviewed grey literature (including trial registers) and reference lists of articles. Randomised controlled trials (RCTs) assessing mobile phone messaging as reminders for healthcare appointments. We only included studies in which it was possible to assess effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features, characteristics of target populations, interventions and controls, and results data were extracted by two review authors and confirmed by a third author. Two authors assessed the risk of bias of the included studies. As the intervention characteristics and outcome measures were similar across included studies, we conducted a meta-analysis to estimate an overall effect size. We included eight randomised controlled trials involving 6615 participants. Four of these studies were newly identified during this update.We found moderate quality evidence from seven studies (5841 participants) that mobile text message reminders improved the rate of attendance at healthcare appointments compared to no reminders (risk ratio (RR) 1.14 (95% confidence interval (CI) 1.03 to 1.26)). There was also moderate quality evidence from three studies (2509 participants) that mobile text message reminders had a similar impact to phone call reminders (RR 0.99 (95% CI 0.95 to 1.02). Low quality evidence from one study (291 participants) suggests that mobile text message reminders combined with postal reminders improved the rate of attendance at healthcare appointments compared to postal reminders alone (RR 1.10 (95% CI 1.02 to 1.19)). Overall, the attendance to appointment rates were 67.8% for the no reminders group, 78.6% for the mobile phone messaging reminders group and 80.3% for the phone call reminders group. One study reported generally that there were no adverse effects during the study period; none of the studies reported in detail on specific adverse events such as loss of privacy, data misinterpretation, or message delivery failure. Two studies reported that the costs per text message per attendance were respectively 55% and 65% lower than costs per phone call reminder. The studies included in the review did not report on health outcomes or people's perceptions of safety related to receiving reminders by text message. Low to moderate quality evidence included in this review shows that mobile phone text messaging reminders increase attendance at healthcare appointments compared to no reminders, or postal reminders.Text messaging reminders were similar to telephone reminders in terms of their effect on attendance rates, and cost less than telephone reminders. However, the included studies were heterogeneous and the quality of the evidence therein is low to moderate. Further, there is a lack of information about health effects, adverse effects and harms, user evaluation of the intervention and user perceptions of its safety. The current evidence therefore still remains insufficient to conclusively inform policy decisions.There is a need for more high-quality randomised trials of mobile phone messaging reminders, that measure not only patients' attendance rates, but also focus on the cost-effectiveness of these interventions. Health outcomes, patients' and healthcare providers' evaluation and perceptions of the safety of the interventions, potential harms, and adverse effects of mobile phone messaging reminders should be assessed. Studies should report message content and timing in relation to the appointment.
Parallelization of NAS Benchmarks for Shared Memory Multiprocessors
NASA Technical Reports Server (NTRS)
Waheed, Abdul; Yan, Jerry C.; Saini, Subhash (Technical Monitor)
1998-01-01
This paper presents our experiences of parallelizing the sequential implementation of NAS benchmarks using compiler directives on SGI Origin2000 distributed shared memory (DSM) system. Porting existing applications to new high performance parallel and distributed computing platforms is a challenging task. Ideally, a user develops a sequential version of the application, leaving the task of porting to new generations of high performance computing systems to parallelization tools and compilers. Due to the simplicity of programming shared-memory multiprocessors, compiler developers have provided various facilities to allow the users to exploit parallelism. Native compilers on SGI Origin2000 support multiprocessing directives to allow users to exploit loop-level parallelism in their programs. Additionally, supporting tools can accomplish this process automatically and present the results of parallelization to the users. We experimented with these compiler directives and supporting tools by parallelizing sequential implementation of NAS benchmarks. Results reported in this paper indicate that with minimal effort, the performance gain is comparable with the hand-parallelized, carefully optimized, message-passing implementations of the same benchmarks.
Efficient Parallelization of a Dynamic Unstructured Application on the Tera MTA
NASA Technical Reports Server (NTRS)
Oliker, Leonid; Biswas, Rupak
1999-01-01
The success of parallel computing in solving real-life computationally-intensive problems relies on their efficient mapping and execution on large-scale multiprocessor architectures. Many important applications are both unstructured and dynamic in nature, making their efficient parallel implementation a daunting task. This paper presents the parallelization of a dynamic unstructured mesh adaptation algorithm using three popular programming paradigms on three leading supercomputers. We examine an MPI message-passing implementation on the Cray T3E and the SGI Origin2OOO, a shared-memory implementation using cache coherent nonuniform memory access (CC-NUMA) of the Origin2OOO, and a multi-threaded version on the newly-released Tera Multi-threaded Architecture (MTA). We compare several critical factors of this parallel code development, including runtime, scalability, programmability, and memory overhead. Our overall results demonstrate that multi-threaded systems offer tremendous potential for quickly and efficiently solving some of the most challenging real-life problems on parallel computers.
Nurses' use of mobile instant messaging applications: A uses and gratifications perspective.
Bautista, John Robert; Lin, Trisha T C
2017-10-01
To explore how and why mobile instant messaging applications are used by Filipino nurses as part of their work. Guided by the uses and gratifications theory, in-depth interviews with 20 staff nurses working in 9 hospitals (ie, 4 private and 5 public hospitals) in the Philippines were conducted in July 2015. Interview data were analysed through a phenomenological perspective to thematic analysis. Results show that mobile instant messaging applications such as Facebook Messenger and Viber were mostly used by staff nurses and these were accessed using their own smartphones. Thematic analysis indicates that they were used to meet staff nurses' need for information exchange, socialization, and catharsis. Moreover, user interactions vary depending on members within a chat group. For instance, communication via mobile instant messaging applications are much formal when superiors are included in a chat group. In general, the results show that mobile instant messaging applications are routinely used by Filipino staff nurses not only for clinical purposes (ie, information exchange) but also for non-clinical purposes (ie, socialization and catharsis). This paper ends with several practical and theoretical implications including future research directions. © 2017 John Wiley & Sons Australia, Ltd.
2010-02-01
8217Ŕ IPACE: lfCUNTY TACTlet lRAINIIIG CI! NT1 !IIt (NIITTC) /lllfll!tA DI!W!l.OPI&I!NT JI\\AH c co -c._ -.; Q) ~::: Ill~ +-’ ~~ ·- ~~ (f) ti li LA N...Manager WMD- CFMO 3919 Central Ave. Cheyenne, WY 82001 (307) 772-5066 (o) (307) 274-0844 ( cell ) --- - -Original Message----- From: Lloyd, Dee W Mr...772-5066 (o) (307) 274-0844 ( cell ) -----Original Message----- From: Pesenti, Cathryn M Civ USAF AFGSC 90 CES/CEV [mailto:Cathryn.Pesenti@warren
ERIC Educational Resources Information Center
Huang, Yong-Ming
2017-01-01
Team messaging services represent a type of cloud computing applications that support not only the messaging among users but also the collaboration in a team. Accordingly, team messaging services have great potential to facilitate students' collaboration. However, only few studies utilized such services to support students' collaboration and…
Chan, Brian; Lopez, Andrea; Sarkar, Urmimala
2015-01-01
Non-medical prescription opioid use is a growing public health concern. Social media is an emerging tool to understand health attitudes, beliefs, and behaviors. We retrieved a sample of publicly available Twitter messages in early 2014, using common opioid medication names and slang search terms. We used content analysis to code messages by user, context of message (personal vs general experiences), and key content themes. We reviewed 540 messages, of which 375 (69%) messages were related to opioid behaviors. Of these, 316 (84%) originated from individual user accounts; 125 messages expressed personal experience with opioids. The majority of personal messages referenced using opioids to obtain a "high", use for sleep, or other non-intended use (87,70%). General attitudes regarding opioid use included positive sentiment (52, 27%), comments on others peoples opioid use (57, 30%), and messages containing public health information or links (48, 25%). In a sample of social media messages mentioning opioid medications, the most common theme amongst English users related to various forms of opioid misuse. Social media can provide insights into the types of misuse of opioids that might aid public health efforts to reduce non-medical opioid use.
Proposal: A Hybrid Dictionary Modelling Approach for Malay Tweet Normalization
NASA Astrophysics Data System (ADS)
Muhamad, Nor Azlizawati Binti; Idris, Norisma; Arshi Saloot, Mohammad
2017-02-01
Malay Twitter message presents a special deviation from the original language. Malay Tweet widely used currently by Twitter users, especially at Malaya archipelago. Thus, it is important to make a normalization system which can translated Malay Tweet language into the standard Malay language. Some researchers have conducted in natural language processing which mainly focuses on normalizing English Twitter messages, while few studies have been done for normalize Malay Tweets. This paper proposes an approach to normalize Malay Twitter messages based on hybrid dictionary modelling methods. This approach normalizes noisy Malay twitter messages such as colloquially language, novel words, and interjections into standard Malay language. This research will be used Language Model and N-grams model.
How can Steganography BE AN Interpretation of the Redundancy in Pre-Mrna Ribbon?
NASA Astrophysics Data System (ADS)
Regoli, Massimo
2013-01-01
In the past years we have developed a new symmetric encryption algorithm based on a new interpretation of the biological phenomenon of the presence of redundant sequences inside pre-mRNA (the introns apparently junk DNA) from a `science of information' point of view. For the first, we have shown the flow of the algorithm by creating a parallel between the various biological aspects of the phenomenon of redundancy and the corresponding agents in our encryption algorithm. Then we set a strict mathematical terminology identifying spaces and mathematical operators for the correct application and interpretation of the algorithm. Finally, last year, we proved that our algorithm has excellent statistics behavior being able to exceed the standard static tests. This year we will try to add a new operator (agent) that is capable of allowing the introduction of a mechanisms like a steganographic sub message (sub ribbon of mRNA) inside the original message (mRNA ribbon).
Mobile Phone Interventions for the Secondary Prevention of Cardiovascular Disease.
Park, Linda G; Beatty, Alexis; Stafford, Zoey; Whooley, Mary A
2016-01-01
Mobile health in the form of text messaging and mobile applications provides an innovative and effective approach to promote prevention and management of cardiovascular disease (CVD); however, the magnitude of these effects is unclear. Through a comprehensive search of databases from 2002-2016, we conducted a quantitative systematic review. The selected studies were critically evaluated to extract and summarize pertinent characteristics and outcomes. A large majority of studies (22 of 28, 79%) demonstrated text messaging, mobile applications, and telemonitoring via mobile phones were effective in improving outcomes. Some key factors associated with successful interventions included personalized messages with tailored advice, greater engagement (2-way text messaging, higher frequency of messages), and use of multiple modalities. Overall, text messaging appears more effective than smartphone-based interventions. Incorporating principles of behavioral activation will help promote and sustain healthy lifestyle behaviors in patients with CVD that result in improved clinical outcomes. Copyright © 2016 Elsevier Inc. All rights reserved.
Mobile Phone Interventions for the Secondary Prevention of Cardiovascular Disease
Park, Linda G.; Beatty, Alexis; Stafford, Zoey; Whooley, Mary A.
2016-01-01
Mobile health in the form of text messaging and mobile applications provides an innovative and effective approach to promote prevention and management of cardiovascular disease (CVD); however, the magnitude of these effects is unclear. Through a comprehensive search of databases from 2002–2016, we conducted a quantitative systematic review. The selected studies were critically evaluated to extract and summarize pertinent characteristics and outcomes. A large majority of studies (22 of 28, 79%) demonstrated text messaging, mobile applications, and telemonitoring via mobile phones were effective in improving outcomes. Some key factors associated with successful interventions included personalized messages with tailored advice, greater engagement (2-way text messaging, higher frequency of messages), and use of multiple modalities. Overall, text messaging appears more effective than smartphone-based interventions. Incorporating principles of behavioral activation will help promote and sustain healthy lifestyle behaviors in patients with CVD that result in improved clinical outcomes. PMID:27001245
E-mail to Promote Colorectal Cancer Screening Within Social Networks: Acceptability and Content
CUTRONA, SARAH L.; WAGNER, JOANN; ROBLIN, DOUGLAS W.; GAGLIO, BRIDGET; WILLIAMS, ANDREW; TORRES-STONE, ROSALIE; MAZOR, KATHLEEN M.
2016-01-01
Effective techniques to encourage colorectal cancer (CRC) screening in underscreened populations have included social support interventions and email reminders from physicians. Personalized email messages to promote CRC screening within social networks could be even more effective, but have not been studied. We interviewed 387 email users, aged 42-73 years in Massachusetts, Hawaii, and Georgia. Participants were asked to edit a sample message in which the sender shares a recent colonoscopy experience and urges the recipient to discuss CRC screening with a doctor. For those reporting willingness to send this message, changes to the message and suggested subject lines were recorded. Edited text was analyzed for content and concordance with original message. The majority of participants (74.4%) were willing to email a modifiable message. Of those willing, 63.5% edited the message. Common edits included deletion (17.7%) or modification (17.4%) of a negatively framed sentence on colon cancer risks and addition or modification of personalizing words (15.6%). Few edits changed the meaning of the message (5.6%) and even fewer introduced factual inaccuracies (1.7%). Modifiable email messages offer a way for screened individuals to promote CRC screening to social network members. Accuracy and impact of such messages should be further studied. PMID:25839968
Characteristics of the Unexpected Message Queue of MPI applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keller, Rainer; Graham, Richard L
2010-01-01
High Performance Computing systems are used on a regular basis to run a myriad of application codes, yet a surprising dearth of information exists with respect to communications characteristics. Even less information is available on the low-level communication libraries, such as the length of MPI Unexpected Message Queues (UMQs) and the length of time such messages spend in these queues. Such information is vital to developing appropriate strategies for handling such data at the library and system level. In this paper we present data on the communication characteristics of three applications GTC, LSMS, and S3D. We present data on themore » size of their UMQ, the time spend searching the UMQ and the length of time such messages spend in these queues. We find that for the particular inputs used, these applications have widely varying characteristics with regard to UMQ length and show patterns for specific applications which persist over various scales.« less
NASA Astrophysics Data System (ADS)
Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd
2008-11-01
SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.
ERIC Educational Resources Information Center
Buzzanell, Patrice M.; And Others
1996-01-01
Explores whether telephone callers converge to structural and relational message aspects found in recorded answering machine messages. Finds that callers exhibited greater convergence to relational than to structural aspects, and that both female and male callers converged with levels of immediacy in answering machine messages. Outlines…
Network oriented radiological and medical archive
NASA Astrophysics Data System (ADS)
Ferraris, M.; Frixione, P.; Squarcia, S.
2001-10-01
In this paper the basic ideas of NORMA (Network Oriented Radiological and Medical Archive) are discussed. NORMA is an original project built by a team of physicists in collaboration with radiologists in order to select the best Treatment Planning in radiotherapy. It allows physicians and health physicists, working in different places, to discuss on interesting clinical cases visualizing the same diagnostic images, at the same time, and highlighting zones of interest (tumors and organs at risk). NORMA has a client/server architecture in order to be platform independent. Applying World Wide Web technologies, it can be easily used by people with no specific computer knowledge providing a verbose help to guide the user through the right steps of execution. The client side is an applet while the server side is a Java application. In order to optimize execution the project also includes a proprietary protocol, lying over TCP/IP suite, that organizes data exchanges and control messages. Diagnostic images are retrieved from a relational database or from a standard DICOM (Digital Images and COmmunications in Medicine) PACS through the DICOM-WWW gateway allowing connection of the usual Web browsers, used by the NORMA system, to DICOM applications via the HTTP protocol. Browser requests are sent to the gateway from the Web server through CGI (Common Gateway Interface). DICOM software translates the requests in DICOM messages and organizes the communication with the remote DICOM Application.
PyPanda: a Python package for gene regulatory network reconstruction
van IJzendoorn, David G.P.; Glass, Kimberly; Quackenbush, John; Kuijjer, Marieke L.
2016-01-01
Summary: PANDA (Passing Attributes between Networks for Data Assimilation) is a gene regulatory network inference method that uses message-passing to integrate multiple sources of ‘omics data. PANDA was originally coded in C ++. In this application note we describe PyPanda, the Python version of PANDA. PyPanda runs considerably faster than the C ++ version and includes additional features for network analysis. Availability and implementation: The open source PyPanda Python package is freely available at http://github.com/davidvi/pypanda. Contact: mkuijjer@jimmy.harvard.edu or d.g.p.van_ijzendoorn@lumc.nl PMID:27402905
PyPanda: a Python package for gene regulatory network reconstruction.
van IJzendoorn, David G P; Glass, Kimberly; Quackenbush, John; Kuijjer, Marieke L
2016-11-01
PANDA (Passing Attributes between Networks for Data Assimilation) is a gene regulatory network inference method that uses message-passing to integrate multiple sources of 'omics data. PANDA was originally coded in C ++. In this application note we describe PyPanda, the Python version of PANDA. PyPanda runs considerably faster than the C ++ version and includes additional features for network analysis. The open source PyPanda Python package is freely available at http://github.com/davidvi/pypanda CONTACT: mkuijjer@jimmy.harvard.edu or d.g.p.van_ijzendoorn@lumc.nl. © The Author 2016. Published by Oxford University Press.
Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation
NASA Astrophysics Data System (ADS)
Shi, Ronghua; Ding, Wanting; Shi, Jinjing
2018-03-01
A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.
Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation
NASA Astrophysics Data System (ADS)
Shi, Ronghua; Ding, Wanting; Shi, Jinjing
2018-07-01
A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.
An evaluation of diet and physical activity messaging in African American churches.
Harmon, Brook E; Blake, Christine E; Thrasher, James F; Hébert, James R
2014-04-01
The use of faith-based organizations as sites to deliver diet and physical activity interventions is increasing. Methods to assess the messaging environment within churches are limited. Our research aimed to develop and test an objective assessment methodology to characterize health messages, particularly those related to diet and physical activity, within a sample of African American churches. Written messages (bulletins, brochures, magazines) were systematically collected over 1 year and analyzed with a coding scheme that had high interrater reliability (average κ = .77). Within all health messages (n = 1109), diet and physical activity messages were prevalent (47% and 32%, respectively). Consistent with prior qualitative research, messages related to meals and to providing food to people in need were frequently found (54% and 25% of diet messages, respectively). Contrary to past research, sports and physical activity as praise (e.g., praise dancing) were the most prevalent physical activity messages (36% and 31% of physical activity messages, respectively). Bulletins, flyers, and brochures were the media in which diet and physical activity messages were most frequently found (14%, 33%, and 24%, respectively), and the church was the most frequent source (41%). Only diet and physical activity messages focused on disease prevention were more likely to originate from national health organizations than from the church (26% vs. 16%). Churches varied in the topics, media types, and sources of health messages, an important factor to consider when planning and implementing health promotion research. Future research should determine whether the enhancement of church messaging environments can produce behavioral change.
Vehicle Information Exchange Needs for Mobility Applications
DOT National Transportation Integrated Search
2012-02-13
Connected Vehicle to Vehicle (V2V) safety applications heavily rely on the BSM, which is one of the messages defined in the Society of Automotive standard J2735, Dedicated Short Range Communications (DSRC) Message Set Dictionary, November 2009. The B...
Automated Generation of Message-Passing Programs: An Evaluation Using CAPTools
NASA Technical Reports Server (NTRS)
Hribar, Michelle R.; Jin, Haoqiang; Yan, Jerry C.; Saini, Subhash (Technical Monitor)
1998-01-01
Scientists at NASA Ames Research Center have been developing computational aeroscience applications on highly parallel architectures over the past ten years. During that same time period, a steady transition of hardware and system software also occurred, forcing us to expend great efforts into migrating and re-coding our applications. As applications and machine architectures become increasingly complex, the cost and time required for this process will become prohibitive. In this paper, we present the first set of results in our evaluation of interactive parallelization tools. In particular, we evaluate CAPTool's ability to parallelize computational aeroscience applications. CAPTools was tested on serial versions of the NAS Parallel Benchmarks and ARC3D, a computational fluid dynamics application, on two platforms: the SGI Origin 2000 and the Cray T3E. This evaluation includes performance, amount of user interaction required, limitations and portability. Based on these results, a discussion on the feasibility of computer aided parallelization of aerospace applications is presented along with suggestions for future work.
Use of One Time Pad Algorithm for Bit Plane Security Improvement
NASA Astrophysics Data System (ADS)
Suhardi; Suwilo, Saib; Budhiarti Nababan, Erna
2017-12-01
BPCS (Bit-Plane Complexity Segmentation) which is one of the steganography techniques that utilizes the human vision characteristics that cannot see the change in binary patterns that occur in the image. This technique performs message insertion by making a switch to a high-complexity bit-plane or noise-like regions with bits of secret messages. Bit messages that were previously stored precisely result the message extraction process to be done easily by rearranging a set of previously stored characters in noise-like region in the image. Therefore the secret message becomes easily known by others. In this research, the process of replacing bit plane with message bits is modified by utilizing One Time Pad cryptography technique which aims to increase security in bit plane. In the tests performed, the combination of One Time Pad cryptographic algorithm to the steganography technique of BPCS works well in the insertion of messages into the vessel image, although in insertion into low-dimensional images is poor. The comparison of the original image with the stegoimage looks identical and produces a good quality image with a mean value of PSNR above 30db when using a largedimensional image as the cover messages.
Incidental experiences of affective coherence and incoherence influence persuasion.
Huntsinger, Jeffrey R
2013-06-01
When affective experiences are inconsistent with activated evaluative concepts, people experience what is called affective incoherence; when affective experiences are consistent with activated evaluative concepts, people experience affective coherence. The present research asked whether incidental feelings of affective coherence and incoherence would regulate persuasion. Experiences of affective coherence and incoherence were predicted and found to influence the processing of persuasive messages when evoked prior to receipt of such messages (Experiments 1 and 3), and to influence the confidence with which thoughts generated by persuasive messages were held when evoked after presentation of such messages (Experiments 2 and 3). These results extend research on affective coherence and incoherence by showing that they exert a broader impact on cognitive activity than originally assumed.
Langford, Linda; Litts, David; Pearson, Jane L
2013-01-01
Concern about suicide in US military and veteran populations has prompted efforts to identify more effective prevention measures. Recent expert panel reports have recommended public communications as one component of a comprehensive effort. Messaging about military and veteran suicide originates from many sources and often does not support suicide prevention goals or adhere to principles for developing effective communications. There is an urgent need for strategic, science-based, consistent messaging guidance in this area. Although literature on the effectiveness of suicide prevention communications for these populations is lacking, this article summarizes key findings from several bodies of research that offer lessons for creating safe and effective messages that support and enhance military and veteran suicide prevention efforts.
Chan, Brian; Lopez, Andrea; Sarkar, Urmimala
2015-01-01
Objective Non-medical prescription opioid use is a growing public health concern. Social media is an emerging tool to understand health attitudes, beliefs, and behaviors. Methods We retrieved a sample of publicly available Twitter messages in early 2014, using common opioid medication names and slang search terms. We used content analysis to code messages by user, context of message (personal vs general experiences), and key content themes. Results We reviewed 540 messages, of which 375 (69%) messages were related to opioid behaviors. Of these, 316 (84%) originated from individual user accounts; 125 messages expressed personal experience with opioids. The majority of personal messages referenced using opioids to obtain a “high”, use for sleep, or other non-intended use (87,70%). General attitudes regarding opioid use included positive sentiment (52, 27%), comments on others peoples opioid use (57, 30%), and messages containing public health information or links (48, 25%). Conclusions In a sample of social media messages mentioning opioid medications, the most common theme amongst English users related to various forms of opioid misuse. Social media can provide insights into the types of misuse of opioids that might aid public health efforts to reduce non-medical opioid use. PMID:26252774
Vehicle Information Exchange Needs for Mobility Applications : Version 2.0
DOT National Transportation Integrated Search
2012-08-01
Connected Vehicle to Vehicle (V2V) safety applications heavily rely on the BSM, which is one of the messages defined in the Society of Automotive standard J2735, Dedicated Short Range Communications (DSRC) Message Set Dictionary, November 2009. The B...
WhatsApp Goes to School: Mobile Instant Messaging between Teachers and Students
ERIC Educational Resources Information Center
Bouhnik, Dan; Deshen, Mor
2014-01-01
WhatsApp is a Smartphone application for instant messaging. Lately the application's popularity has risen. One of the unique features of the application is its ability to enhance communication within a group. Classroom communication between teaching faculty and high school students using WhatsApp has not yet, to our knowledge, been researched…
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks
NASA Astrophysics Data System (ADS)
Li, Celia; Wang, Zhuang; Yang, Cungang
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L
2017-10-01
Existing measures of tobacco marketing and messaging exposure are limited, relying on recall, recognition, or proxy measures. This study aimed to determine the feasibility and reliability of a mobile application for the measurement of tobacco and e-cigarette marketing and message exposure using ecological momentary assessment (EMA). Young adults from Austin, TX (n=181, ages 18-29) were instructed to use a mobile application to record all sightings of marketing or social media related to tobacco (including e-cigarettes) in real-time for 28days (Event EMAs). Tobacco product use and recall of message encounters were assessed daily using an app-initiated EMA (Daily EMAs). The mobile app was a feasible and acceptable method to measure exposure to tobacco messages. The majority of messages (45.0%) were seen on the Internet, and many were user-generated. Thirty-day recall of messages at baseline was poorly correlated with messages reported via Event EMA during the study period; however, the correlation between post-study 30-day recall and Event EMA was much stronger (r=0.603 for industry-sponsored messages, r=0.599 for user-generated messages). Correlations between Daily EMAs and 30-day recall of message exposure (baseline and post-study) were small (baseline: r=0.329-0.389) to large (post-study: r=0.656-0.766). These findings suggest that EMA is a feasible and reliable method for measuring tobacco message exposure, especially given the prevalence of messages encountered online and on social media. Recall measures are limited in their ability to accurately represent marketing exposure, but might be improved by a period of priming or clearer response categories. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Lupton, W. F.; Conrad, A. R.
1992-01-01
KTL is a set of routines which eases the job of writing applications which must interact with a variety of underlying sub-systems (known as services). A typical application is an X Window user interface coordinating telescope and instruments. In order to connect to a service, application code specifies a service name--typically an instrument name--and a style, which defines the way in which the application will interact with the service. Two styles are currently supported: keyword, where the application reads and writes named keywords and the resulting inter-task message traffic is hidden; and message, where the application deals directly with messages. The keyword style is intended mainly for user interfaces, and the message style is intended mainly for lower-level applications. KTL applications are event driven: a typical application first connects to all its desired services, then expresses interest in specified events. The application then enters an event dispatch loop in which it waits for events and calls the appropriate service's event-handling routine. Each event is associated with a call-back routine which is invoked when the event occurs. Call-back routines may (and typically do) interact with other sub-systems and KTL provides the means of doing so without blocking the application (vital for X Window user interfaces). This approach is a marriage of ideas culled from the X window, ADAM, Keck instrument, and Keck telescope control systems. A novel feature of KTL is that it knows nothing about any services or styles. Instead it defines a generic set of routines which must be implemented by all services and styles (essentially open(), ioctl(), read(), write(), event(), and close()) and activates sharable libraries at run-time. Services have been implemented (in both keyword and message styles) for HIRES (the Keck high resolution echelle spectrograph built by Lick Observatory), LWS (the Keck long wavelength spectrometer built by UC San Diego), and the Keck telescope. Each of these implementations uses different underlying message systems: the Lick MUSIC system, RPC's, and direct sockets (respectively). Services for the remaining three front-line Keck instruments will be implemented over the next few months.
Organization model for Mobile Wireless Sensor Networks inspired in Artificial Bee Colony
NASA Astrophysics Data System (ADS)
Freire Roberto, Guilherme; Castilho Maschi, Luis Fernando; Pigatto, Daniel Fernando; Jaquie Castelo Branco, Kalinka Regina Lucas; Alves Neves, Leandro; Montez, Carlos; Sandro Roschildt Pinto, Alex
2015-01-01
The purpose of this study is to find a self-organizing model for MWSN based on bee colonies in order to reduce the number of messages transmitted among nodes, and thus reduce the overall consumption energy while maintaining the efficiency of message delivery. The results obtained in this article are originated from simulations carried out with SINALGO software, which demonstrates the effectiveness of the proposed approach. The BeeAODV (Bee Ad-Hoc On Demand Distance Vector) proposed in this paper allows to considerably reduce message exchanges whether compared to AODV (Ad-Hoc On Demand Distance Vector).
Evans, William D; Mays, Darren
2016-12-22
Although skin cancer is largely preventable, it affects nearly 1 of 5 US adults. There is a need for research on how to optimally design persuasive public health indoor tanning prevention messages. The objective of our study was to examine whether framed messages on indoor tanning behavioral intentions delivered through short message service (SMS) text messaging would produce (1) positive responses to the messages, including message receptivity and emotional response; (2) indoor tanning efficacy beliefs, including response efficacy and self-efficacy; and (3) indoor tanning risk beliefs. We conducted a pilot study of indoor tanning prevention messages delivered via mobile phone text messaging in a sample of 21 young adult women who indoor tan. Participants completed baseline measures, were randomly assigned to receive gain-, loss-, or balanced-framed text messages, and completed postexposure outcome measures on indoor tanning cognitions and behaviors. Participants received daily mobile phone indoor tanning prevention text messages for 1 week and completed the same postexposure measures as at baseline. Over the 1-week period there were trends or significant changes after receipt of the text messages, including increased perceived susceptibility (P<.001), response efficacy beliefs (P<.001), and message receptivity (P=.03). Ordinary least squares stepwise linear regression models showed an effect of text message exposure on self-efficacy to quit indoor tanning (t 6 =-2.475, P<.02). Ordinary least squares linear regression including all measured scales showed a marginal effect of SMS texts on self-efficacy (t 20 =1.905, P=.08). Participants endorsed highly favorable views toward the text messaging protocol. This study supports this use of mobile text messaging as an indoor tanning prevention strategy. Given the nature of skin cancer risk perceptions, the addition of multimedia messaging service is another area of potential innovation for disseminating indoor tanning prevention messages. ©William Evans, Darren Mays. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 22.12.2016.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perry, Marcia; Agarwal, Deb
2003-03-17
The PCCEServer application is a server that should be used in conjunction with the LBNLSecureMessaging user interface to enable secure synchronous and asynchronous messaging. It provides authentication and authorization services for members of a collaboration group via PKI/SSL and maintains an access control list. Members of collaboration groups using the LBNLSecureMessaging client must register identifying information. including usemame and password and an optional X.509 certificate, with the PCCEServer. This registration not only restricts access to instant messaging, but augments the LBNLSecureMessaging's IRC-based chat facility with persistence. Users register permanent unique user ids by which they are knowTl to other usersmore » in the system and create permanent venues intended for group conversations on a tong-term or continuous basis. In addition, the PCCEServer enhances instant messaging with presence and awareness information such as user availability, and it allows users to leave notes asynchronously for other users who are online or offline. Written in Java, it is a standalone application that can run on any platform that supports a Java Virtual Machine.« less
Collective operations in a file system based execution model
Shinde, Pravin; Van Hensbergen, Eric
2013-02-12
A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.
Collective operations in a file system based execution model
Shinde, Pravin; Van Hensbergen, Eric
2013-02-19
A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.
MPF: A portable message passing facility for shared memory multiprocessors
NASA Technical Reports Server (NTRS)
Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.
1987-01-01
The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.
A Customized Workflow-Driven Instant Messaging System Support Team Communication in the Hospital.
Lee, Ying-Li; Chien, Tsai-Feng; Chen, Hsiu-Chin
2016-01-01
Effective communication among the healthcare team is a very important skill to support team resource management (TRM). However, we take too much effort to connect with other team members by using traditional telephone communication. In this study, we developed an instant messaging system embedded in the original hospital information system and evaluated the preliminary outcome and the usage of the system.
Telemetry Standards, RCC Standard 106-17. Chapter 26. TmNSDataMessage Transfer Protocol
2017-07-01
Channel (RTSPDataChannel) ............................................ 26-13 26.4.3 Reliability Critical (RC) Delivery Protocol...error status code specified in RFC 2326 for "Request-URI Too Large" is 虮". 26.4.1.5 Request Types RTSPDataSources shall return valid ...to the following requirements. • Valid TmNSDataMessages shall be delivered containing the original Packages matching the requested
NASA Technical Reports Server (NTRS)
Becker, Jeffrey C.
1995-01-01
The Thinking Machines CM-5 platform was designed to run single program, multiple data (SPMD) applications, i.e., to run a single binary across all nodes of a partition, with each node possibly operating on different data. Certain classes of applications, such as multi-disciplinary computational fluid dynamics codes, are facilitated by the ability to have subsets of the partition nodes running different binaries. In order to extend the CM-5 system software to permit such applications, a multi-program loader was developed. This system is based on the dld loader which was originally developed for workstations. This paper provides a high level description of dld, and describes how it was ported to the CM-5 to provide support for multi-binary applications. Finally, it elaborates how the loader has been used to implement the CM-5 version of MPIRUN, a portable facility for running multi-disciplinary/multi-zonal MPI (Message-Passing Interface Standard) codes.
Seeman, Neil; Seeman, Bob
2017-01-01
Reaching the recipient of online health messages is necessary to Web-based health promotion applications. To measure willingness to adhere to a health-related Web message, we explored the frequency with which more than 13 million Web users ignored or opted to receive a random inbound message. The findings suggest declining curiosity among Web users about online messages, and that certain days may be more propitious than others for communicating with users. This approach can be modified to gather more granular insights into how messages, including timing and design features, can be tailored to promote improved public health messaging.
Litts, David; Pearson, Jane L.
2013-01-01
Concern about suicide in US military and veteran populations has prompted efforts to identify more effective prevention measures. Recent expert panel reports have recommended public communications as one component of a comprehensive effort. Messaging about military and veteran suicide originates from many sources and often does not support suicide prevention goals or adhere to principles for developing effective communications. There is an urgent need for strategic, science-based, consistent messaging guidance in this area. Although literature on the effectiveness of suicide prevention communications for these populations is lacking, this article summarizes key findings from several bodies of research that offer lessons for creating safe and effective messages that support and enhance military and veteran suicide prevention efforts. PMID:23153130
Asynchronous Message Service Reference Implementation
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.
An Application of Discrete Mathematics to Coding Theory.
ERIC Educational Resources Information Center
Donohoe, L. Joyce
1992-01-01
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
An implementation and performance measurement of the progressive retry technique
NASA Technical Reports Server (NTRS)
Suri, Gaurav; Huang, Yennun; Wang, Yi-Min; Fuchs, W. Kent; Kintala, Chandra
1995-01-01
This paper describes a recovery technique called progressive retry for bypassing software faults in message-passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. the results presented show that the technique is helpful in reducing the total recovery time for message-passing applications.
Characterizing MPI matching via trace-based simulation
Ferreira, Kurt Brian; Levy, Scott Larson Nicoll; Pedretti, Kevin; ...
2017-01-01
With the increased scale expected on future leadership-class systems, detailed information about the resource usage and performance of MPI message matching provides important insights into how to maintain application performance on next-generation systems. However, obtaining MPI message matching performance data is often not possible without significant effort. A common approach is to instrument an MPI implementation to collect relevant statistics. While this approach can provide important data, collecting matching data at runtime perturbs the application's execution, including its matching performance, and is highly dependent on the MPI library's matchlist implementation. In this paper, we introduce a trace-based simulation approach tomore » obtain detailed MPI message matching performance data for MPI applications without perturbing their execution. Using a number of key parallel workloads, we demonstrate that this simulator approach can rapidly and accurately characterize matching behavior. Specifically, we use our simulator to collect several important statistics about the operation of the MPI posted and unexpected queues. For example, we present data about search lengths and the duration that messages spend in the queues waiting to be matched. Here, data gathered using this simulation-based approach have significant potential to aid hardware designers in determining resource allocation for MPI matching functions and provide application and middleware developers with insight into the scalability issues associated with MPI message matching.« less
A cryptographic hash function based on chaotic network automata
NASA Astrophysics Data System (ADS)
Machicao, Jeaneth; Bruno, Odemir M.
2017-12-01
Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). Cryptographic hash functions (CHF) are commonly used to check data integrity. CHF “compress” arbitrary long messages (input) into much smaller representations called hash values or message digest (output), designed to prevent the ability to reverse the hash values into the original message. This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. Here, we propose an hybrid model that combines CA and networks, called network automata (CNA), whose chaotic spatio-temporal outputs are used to compute a hash value. Following the Merkle and Damgård model of construction, a portion of the message is entered as the initial condition of the network automata, so that the rest parts of messages are iteratively entered to perturb the system. The chaotic network automata shuffles the message using flexible control parameters, so that the generated hash value is highly sensitive to the message. As demonstrated in our experiments, the proposed model has excellent pseudo-randomness and sensitivity properties with acceptable performance when compared to conventional hash functions.
Prevention of sexually transmitted infections using mobile devices and ubiquitous computing.
Besoain, Felipe; Perez-Navarro, Antoni; Caylà, Joan A; Aviñó, Constanza Jacques; de Olalla, Patricia García
2015-05-03
Advances in the development of information and communication technologies have facilitated social interrelationships, but also sexual contacts without appropriate preventive measures. In this paper, we will focus on situations in which people use applications to meet sexual partners nearby, which could increase their chance of exposure to sexually transmitted infections (STI). How can we encourage users to adopt preventive measures without violating their privacy or infringing on the character of the application? To achieve the goal of preventing STI, we have used the design and creation methodology and have developed a prototype software package. This prototype follows the RESTful services principles and has two parts: an Android OS application with emphasis on ubiquitous computing and designed according to General Responsibility Assignment Software Patterns (GRASP), and a server with a web page. To choose the preventive messages, we performed a test in 17 men who have sex with men (MSM). Our software sends preventive notifications to users when it detects situations such as the activation of particular applications on their smartphones, or their proximity to areas with a high probability of intercourse (hot zones). The underlying idea is the same as that for warning messages on cigarette packets, since users read the message just when they are going to smoke. The messages used have been selected from a list that has been rated by the users themselves. The most popular message is "Enjoy sex and enjoy life. Do not expose yourself to HIV". The user is unaware of the software, which runs in the background. Ubiquitous computing may be useful for alerting users with preventive and educational messages. The proposed application is non-intrusive because: 1) the users themselves decide to install it and, therefore, users' privacy rights are preserved; 2) it sends a message that helps users think about taking appropriate preventive measures; and 3) it works in the background without interfering with users unless a trigger situation is detected. Thus, this type of application could become an important tool in the complex task of STI prevention.
Message communications of particular message types between compute nodes using DMA shadow buffers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blocksome, Michael A.; Parker, Jeffrey J.
Message communications of particular message types between compute nodes using DMA shadow buffers includes: receiving a buffer identifier specifying an application buffer having a message of a particular type for transmission to a target compute node through a network; selecting one of a plurality of shadow buffers for a DMA engine on the compute node for storing the message, each shadow buffer corresponding to a slot of an injection FIFO buffer maintained by the DMA engine; storing the message in the selected shadow buffer; creating a data descriptor for the message stored in the selected shadow buffer; injecting the datamore » descriptor into the slot of the injection FIFO buffer corresponding to the selected shadow buffer; selecting the data descriptor from the injection FIFO buffer; and transmitting the message specified by the selected data descriptor through the data communications network to the target compute node.« less
Portable Parallel Programming for the Dynamic Load Balancing of Unstructured Grid Applications
NASA Technical Reports Server (NTRS)
Biswas, Rupak; Das, Sajal K.; Harvey, Daniel; Oliker, Leonid
1999-01-01
The ability to dynamically adapt an unstructured -rid (or mesh) is a powerful tool for solving computational problems with evolving physical features; however, an efficient parallel implementation is rather difficult, particularly from the view point of portability on various multiprocessor platforms We address this problem by developing PLUM, tin automatic anti architecture-independent framework for adaptive numerical computations in a message-passing environment. Portability is demonstrated by comparing performance on an SP2, an Origin2000, and a T3E, without any code modifications. We also present a general-purpose load balancer that utilizes symmetric broadcast networks (SBN) as the underlying communication pattern, with a goal to providing a global view of system loads across processors. Experiments on, an SP2 and an Origin2000 demonstrate the portability of our approach which achieves superb load balance at the cost of minimal extra overhead.
Adolescent HIV Prevention: An Application of the Elaboration Likelihood Model.
ERIC Educational Resources Information Center
Metzler, April E.; Weiskotten, David; Morgen, Keith J.
Ninth grade students (n=298) participated in a study to examine the influence source credibility, message, quality, and personal relevance on HIV prevention message efficacy. A pilot study with adolescent focus groups created the high and low quality messages, as well as the high (HIV+) and low (worried parent) credibility sources. Participants…
HYDRA : High-speed simulation architecture for precision spacecraft formation simulation
NASA Technical Reports Server (NTRS)
Martin, Bryan J.; Sohl, Garett.
2003-01-01
e Hierarchical Distributed Reconfigurable Architecture- is a scalable simulation architecture that provides flexibility and ease-of-use which take advantage of modern computation and communication hardware. It also provides the ability to implement distributed - or workstation - based simulations and high-fidelity real-time simulation from a common core. Originally designed to serve as a research platform for examining fundamental challenges in formation flying simulation for future space missions, it is also finding use in other missions and applications, all of which can take advantage of the underlying Object-Oriented structure to easily produce distributed simulations. Hydra automates the process of connecting disparate simulation components (Hydra Clients) through a client server architecture that uses high-level descriptions of data associated with each client to find and forge desirable connections (Hydra Services) at run time. Services communicate through the use of Connectors, which abstract messaging to provide single-interface access to any desired communication protocol, such as from shared-memory message passing to TCP/IP to ACE and COBRA. Hydra shares many features with the HLA, although providing more flexibility in connectivity services and behavior overriding.
ERIC Educational Resources Information Center
Winter, Paul A.
1996-01-01
Applicant evaluations of job messages conveyed through formal position advertisements were studied with 136 role-playing teachers. Findings indicate that administrators can maximize advertisement attractiveness to women by using intrinsic job attributes and placing them first, and maximize attractiveness to men by using extrinsic attributes and…
Checking for Circular Dependencies in Distributed Stream Programs
2011-08-29
extensions to express new complexities more conve- nient. Teleport messaging ( TMG ) in the StreamIt language [30] is an example. 1.1 StreamIt Language...dynamicities to an FIR computation Thies et al. in [30] give a TMG model for distributed stream pro- grams. TMG is a mechanism that implements control...messages for stream graphs. The TMG mechanism is designed not to interfere with original dataflow graphs’ structures and scheduling, therefore a key
Nonlinear Detection, Estimation, and Control for Free-Space Optical Communication
2008-08-17
original message. The promising features of this communication scheme such as high-bandwidth, power efficiency, and security, render it a viable means...bandwidth, power efficiency, and security, render it a viable means for high data rate point-to-point communication. In this dissertation, we adopt a...Department of Electrical and Computer Engineering In free-space optical communication, the intensity of a laser beam is modulated by a message, the beam
An Application of Epidemiological Modeling to Information Diffusion
NASA Astrophysics Data System (ADS)
McCormack, Robert; Salter, William
Messages often spread within a population through unofficial - particularly web-based - media. Such ideas have been termed "memes." To impede the flow of terrorist messages and to promote counter messages within a population, intelligence analysts must understand how messages spread. We used statistical language processing technologies to operationalize "memes" as latent topics in electronic text and applied epidemiological techniques to describe and analyze patterns of message propagation. We developed our methods and applied them to English-language newspapers and blogs in the Arab world. We found that a relatively simple epidemiological model can reproduce some dynamics of observed empirical relationships.
A Messaging Infrastructure for WLCG
NASA Astrophysics Data System (ADS)
Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin
2011-12-01
During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.
ERIC Educational Resources Information Center
Pagano, Todd; Quinsland, L. K.
2007-01-01
For deaf and hard-of-hearing individuals, the emergence of Instant Messaging technology and digital pagers has been perhaps one of the greatest liberating communication technological breakthroughs since the advent of the TTY. Instant Messaging has evolved into an everyday socially compelling, portable, and "real time" communication mode…
Instant Messaging for Creating Interactive and Collaborative m-Learning Environments
ERIC Educational Resources Information Center
Kadirire, James
2007-01-01
"Instant Messaging" (IM) and "Presence," which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of…
Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan
2018-01-01
Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.
Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan
2018-01-01
Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio. PMID:29438438
Analysis of the origin of predictability in human communications
NASA Astrophysics Data System (ADS)
Zhang, Lin; Liu, Yani; Wu, Ye; Xiao, Jinghua
2014-01-01
Human behaviors in daily life can be traced by their communications via electronic devices. E-mails, short messages and cell-phone calls can be used to investigate the predictability of communication partners’ patterns, because these three are the most representative and common behaviors in daily communications. In this paper, we show that all the three manners have apparent predictability in partners’ patterns, and moreover, the short message users’ sequences have the highest predictability among the three. We also reveal that people with fewer communication partners have higher predictability. Finally, we investigate the origin of predictability, which comes from two aspects: one is the intrinsic pattern in the partners sequence, that is, people have the preference of communicating with a fixed partner after another fixed one. The other aspect is the burst, which is communicating with the same partner several times in a row. The high burst in short message communication pattern is one of the main reasons for its high predictability, the intrinsic pattern in e-mail partners sequence is the main reason for its predictability, and the predictability of cell-phone call partners sequence comes from both aspects.
Dust Dynamics in Protoplanetary Disks: Parallel Computing with PVM
NASA Astrophysics Data System (ADS)
de La Fuente Marcos, Carlos; Barge, Pierre; de La Fuente Marcos, Raúl
2002-03-01
We describe a parallel version of our high-order-accuracy particle-mesh code for the simulation of collisionless protoplanetary disks. We use this code to carry out a massively parallel, two-dimensional, time-dependent, numerical simulation, which includes dust particles, to study the potential role of large-scale, gaseous vortices in protoplanetary disks. This noncollisional problem is easy to parallelize on message-passing multicomputer architectures. We performed the simulations on a cache-coherent nonuniform memory access Origin 2000 machine, using both the parallel virtual machine (PVM) and message-passing interface (MPI) message-passing libraries. Our performance analysis suggests that, for our problem, PVM is about 25% faster than MPI. Using PVM and MPI made it possible to reduce CPU time and increase code performance. This allows for simulations with a large number of particles (N ~ 105-106) in reasonable CPU times. The performances of our implementation of the pa! rallel code on an Origin 2000 supercomputer are presented and discussed. They exhibit very good speedup behavior and low load unbalancing. Our results confirm that giant gaseous vortices can play a dominant role in giant planet formation.
47 CFR 74.790 - Permissible service of digital TV translator and LPTV stations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... locally originated visual and/or aural messages limited to emergency warnings of imminent danger, to local... following modes of service: (1) For the retransmission of programming of a TV broadcast or DTV broadcast... the origination of programming and commercial matter as defined in § 74.701(l). (3) Whenever operating...
ANDERSEN, PETER A.; BULLER, DAVID B.; WALKOSZ, BARBARA J.; MALOY, JULIE; SCOTT, MICHAEL D.; CUTTER, GARY R.; DIGNAN, MARK B.
2010-01-01
The epidemic of preventable skin cancer in the United States creates an urgent need for health communication campaigns to improve sun protection. Go Sun Smart (GSS), a theory-driven multichannel health communication campaign showed positive effects on sun safety behaviors of employees and guests in a randomized trial at high-altitude ski areas. In this article we report findings from the North American GSS campaign for guests at ski areas that comprosed the original control-group resorts, replicating the results of the original guest intervention. Results showed that after GSS was deployed, guests at the original control group ski areas increased sun protection and reported greater recall of sun safety messages. Conversely, GSS had no effect on sunburning attitudes or self-efficacy beliefs. Like the original GSS guest intervention, the present study found that greater exposure to GSS messages was associated with greater use of sunscreen, sunscreen lip balm, and face covering, but not gloves or overall sun protection. There was no evidence that GSS decreased sunburning or attitudes and self-efficacy beliefs regarding sun safety. PMID:19466647
Message framing and credibility: application in dental services.
Arora, R
2000-01-01
This study uses an experimental approach to test the influence of message framing and credibility on the attitude toward a dental exam and consumers' intention to use the dental office. The findings indicate a strong effect of credibility on attitude as well as intention. The influence of framing is also statistically significant. Implications for marketers in terms of message strategy are discussed.
Text Messaging, Pragmatic Competence, and Affective Facilitation in the EFL Context: A Pilot Study
ERIC Educational Resources Information Center
Haggan, Madeline
2010-01-01
Since text messaging is a widely popular method of communication among young people, the paper tries to investigate whether it might have some practical application in the EFL classroom. Kuwaiti EFL students asked to render a mixture of text messages written by their peers and native English speakers into Standard English produced a large number…
ERIC Educational Resources Information Center
Klein, Amarolinda Zanela; da Silva Freitas, José Carlos, Jr.; da Silva, Juliana Vitória Vieira Mattiello Mattiello; Barbosa, Jorge Luis Victória; Baldasso, Lucas
2018-01-01
The popularity of Mobile Instant Messaging (MIM) has prompted educators to integrate it in teaching and learning in higher education. WhatsApp® is a multi-platform instant messaging application widely used worldwide, however, there is still little applied research on its use as a platform for educational activities in management higher education.…
ERIC Educational Resources Information Center
Camenga, Deepa R.; Hieftje, Kimberly D.; Fiellin, Lynn E.; Edelman, E. Jennifer; Rosenthal, Marjorie S.; Duncan, Lindsay R.
2014-01-01
Few studies have explored the application of message framing to promote health behaviors in adolescents. In this exploratory study, we examined young adolescents' selection of gain- versus loss-framed images and messages when designing an HIV-prevention intervention to promote delayed sexual initiation. Twenty-six adolescents (aged 10-14 years)…
New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm
NASA Astrophysics Data System (ADS)
Hoomod, Haider K.; Radi, A. M.
2018-05-01
The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.
NASA Astrophysics Data System (ADS)
Ristau, Henry
Many tasks in smart environments can be implemented using message based communication paradigms that decouple applications in time, space, synchronization and semantics. Current solutions for decoupled message based communication either do not support message processing and thus semantic decoupling or rely on clearly defined network structures. In this paper we present ASP, a novel concept for such communication that can directly operate on neighbor relations between brokers and does not rely on a homogeneous addressing scheme or anymore than simple link layer communication. We show by simulation that ASP performs well in a heterogeneous scenario with mobile nodes and decreases network or processor load significantly compared to message flooding.
Gray, John
2017-01-01
Machine-to-machine (M2M) communication is a key enabling technology for industrial internet of things (IIoT)-empowered industrial networks, where machines communicate with one another for collaborative automation and intelligent optimisation. This new industrial computing paradigm features high-quality connectivity, ubiquitous messaging, and interoperable interactions between machines. However, manufacturing IIoT applications have specificities that distinguish them from many other internet of things (IoT) scenarios in machine communications. By highlighting the key requirements and the major technical gaps of M2M in industrial applications, this article describes a collaboration-oriented M2M (CoM2M) messaging mechanism focusing on flexible connectivity and discovery, ubiquitous messaging, and semantic interoperability that are well suited for the production line-scale interoperability of manufacturing applications. The designs toward machine collaboration and data interoperability at both the communication and semantic level are presented. Then, the application scenarios of the presented methods are illustrated with a proof-of-concept implementation in the PicknPack food packaging line. Eventually, the advantages and some potential issues are discussed based on the PicknPack practice. PMID:29165347
2016-03-01
Representational state transfer Java messaging service Java application programming interface (API) Internet relay chat (IRC)/extensible messaging and...JBoss application server or an Apache Tomcat servlet container instance. The relational database management system can be either PostgreSQL or MySQL ... Java library called direct web remoting. This library has been part of the core CACE architecture for quite some time; however, there have not been
Reynolds, Renee; Sutherland, Rachel; Nathan, Nicole; Janssen, Lisa; Lecathelinais, Christophe; Reilly, Kathryn; Walton, Alison; Wolfenden, Luke
2018-03-12
This study aimed to assess the feasibility and acceptability of using an existing school-based mobile communication application to deliver messages to parents on how to pack a healthy lunchbox. A telephone survey was conducted with 196 primary school principals within the Hunter New England region of New South Wales, Australia, in 2016. Almost two thirds of primary schools (59%) currently use a school-based mobile communication application to communicate with parents. Most principals (91%) agreed school lunchboxes need improving, of which 80% agree it is a school's role to provide information and guidelines to parents. However, only 50% of principals reported currently providing such information. The provision of lunchbox messages to parents by a third party appeared an acceptable model of delivery by principals. Larger schools and schools in urban and lower socio-economic localities were more likely to have used a school-based mobile communication application. The majority of principals recognise student lunchboxes need improving. The use of school-based mobile communication applications appears to be feasible and acceptable by principals as a method of communicating lunchbox messages to parents. SO WHAT?: Use of school-based mobile communication applications may be an effective method for delivering health information at a population level. Future research should assess the potential efficacy of disseminating health interventions via this modality. © 2018 Australian Health Promotion Association.
Simulation of Controller Pilot Data Link Communications over VHF Digital Link Mode 3
NASA Technical Reports Server (NTRS)
Bretmersky, Steven C.; Murawski, Robert; Nguyen, Thanh C.; Raghavan, Rajesh S.
2004-01-01
The Federal Aviation Administration (FAA) has established an operational plan for the future Air Traffic Management (ATM) system, in which the Controller Pilot Data Link Communications (CPDLC) is envisioned to evolve into digital messaging that will take on an ever increasing role in controller to pilot communications, significantly changing the way the National Airspace System (NAS) is operating. According to FAA, CPDLC represents the first phase of the transition from the current analog voice system to an International Civil Aviation Organization (ICAO) compliant system in which digital communication becomes the alternate and perhaps primary method of routine communication. The CPDLC application is an Air Traffic Service (ATS) application in which pilots and controllers exchange messages via an addressed data link. CPDLC includes a set of clearance, information, and request message elements that correspond to existing phraseology employed by current Air Traffic Control (ATC) procedures. These message elements encompass altitude assignments, crossing constraints, lateral deviations, route changes and clearances, speed assignments, radio frequency assignments, and various requests for information. The pilot is provided with the capability to respond to messages, to request clearances and information, to report information, and to declare/rescind an emergency. A 'free text' capability is also provided to exchange information not conforming to defined formats. This paper presents simulated results of the aeronautical telecommunication application Controller Pilot Data Link Communications over VHF Digital Link Mode 3 (VDL Mode 3). The objective of this simulation study was to determine the impact of CPDLC traffic loads, in terms of timely message delivery and capacity of the VDL Mode 3 subnetwork. The traffic model is based on and is used for generating air/ground messages with different priorities. Communication is modeled for the en route domain of the Cleveland Center air traffic (ZOB ARTCC).
Latimer, Amy E; Rench, Tara A; Rivers, Susan E; Katulak, Nicole A; Materese, Stephanie A; Cadmus, Lisa; Hicks, Althea; Keany Hodorowski, Julie; Salovey, Peter
2008-11-01
Messages designed to motivate participation in physical activity usually emphasize the benefits of physical activity (gain-framed) as well as the costs of inactivity (loss-framed). The framing implications of prospect theory suggest that the effectiveness of these messages could be enhanced by providing gain-framed information only. We compared the effectiveness of gain-, loss-, and mixed-framed messages for promoting moderate to vigorous physical activity. Randomized trial. Sedentary, healthy callers to the US National Cancer Institute's Cancer Information Service (N=322) received gain-, loss-, or mixed-framed messages on three occasions (baseline, Week 1, and Week 5). Social cognitive variables and self-reported physical activity were assessed at baseline, Week 2, and Week 9. Separate regression analyses were conducted to examine message effects at each assessment point. At Week 2, gain- and mixed-framed messages resulted in stronger intentions and greater self-efficacy than loss-framed messages. At Week 9, gain-framed messages resulted in greater physical activity participation than loss- or mixed-framed messages. Social cognitive variables at Week 2 did not mediate the Week 9 framing effects on physical activity participation. Using gain-framed messages exclusively may be a means of increasing the efficacy of physical activity materials.
NASA Astrophysics Data System (ADS)
Liang, Haijun; Ren, Jialong; Song, Tao
2017-05-01
Operating requirement of air traffic control system, the multi-platform real-time message-oriented middleware was studied and realized, which is composed of CDCC and CDCS. The former provides application process interface, while the latter realizes data synchronism of CDCC and data exchange. MQM, as one important part of it, provides message queue management and, encrypt and compress data during transmitting procedure. The practical system application verifies that the middleware can simplify the development of air traffic control system, enhance its stability, improve its systematic function and make it convenient for maintenance and reuse.
Boehmert, Christoph; Wiedemann, Peter; Croft, Rodney
2016-10-09
Many radiation health agencies communicate precautionary measures regarding the use of mobile communication devices, e.g. the use of a headset while talking on the phone. These precautionary messages have, however, been shown to unintentionally increase risk perceptions about radiofrequency electromagnetic fields (RF-EMFs). The current study tested two potential ways of amending precautionary messages in order to minimise this unintentional effect. Firstly, the messages' potential to be perceived as inconsistent and thereby raise suspicions was addressed; secondly, the effectiveness of the precautions was explained. An experimental design was applied in which a quota sample of 1717 Australian residents was randomly assigned to one of six message conditions. Three different risk perception measures served as dependent variables, two of them are conditional measures. The original effect of precautionary messages to amplify risk perceptions could not be replicated. Furthermore, amending precautionary messages in favour of more consistency had no effect, while explaining the effectiveness of the precautions increased conditional risk perception under the condition that no precautions are taken. This was contrary to our assumptions. We infer from these results that changing precautionary messages in terms of consistency and effectiveness in order to reduce risk perception is hardly possible. The use of conditional risk perception measures seems fruitful for studies looking at the effects of precautionary or protective messages, given that previous studies have only investigated effects on unconditional risk perception. However, the present results should not be over-interpreted as the measures' validity in the EMF context still needs further investigation.
Kaiser, Lucia; Martinez, Judith; Horowitz, Marcel; Lamp, Catherine; Johns, Margaret; Espinoza, Dorina; Byrnes, Michele; Gomez, Mayra Muñoz; Aguilera, Alberto; de la Torre, Adela
2015-05-14
Latino children experience higher rates of obesity than do non-Latino white children. Family-centered nutrition interventions can slow the rate of weight gain in this population. Niños Sanos, Familia Sana (Healthy Children, Healthy Family) is a 5-year, community-based, participatory research study that targets rural Mexican-origin farmworker families with children aged 2 to 8 years in California's Central Valley. Adaptation of a culturally relevant obesity prevention program involved qualitative research to tailor key obesity prevention messages, pilot testing and implementation of key messages and activities at family nights, and continual modification to incorporate culturally innovative elements. Of the 238 families enrolled, 53% (125) attended the recommended minimum of 5 (of 10 possible) classes during the first year. A university and community partnership can guide development of a culturally tailored obesity prevention program that is suitable for reaching a high-risk Mexican-origin audience through cooperative extension and other public health programs.
Martinez, Judith; Horowitz, Marcel; Lamp, Catherine; Johns, Margaret; Espinoza, Dorina; Byrnes, Michele; Gomez, Mayra Muñoz; Aguilera, Alberto; de la Torre, Adela
2015-01-01
Latino children experience higher rates of obesity than do non-Latino white children. Family-centered nutrition interventions can slow the rate of weight gain in this population. Niños Sanos, Familia Sana (Healthy Children, Healthy Family) is a 5-year, community-based, participatory research study that targets rural Mexican-origin farmworker families with children aged 2 to 8 years in California’s Central Valley. Adaptation of a culturally relevant obesity prevention program involved qualitative research to tailor key obesity prevention messages, pilot testing and implementation of key messages and activities at family nights, and continual modification to incorporate culturally innovative elements. Of the 238 families enrolled, 53% (125) attended the recommended minimum of 5 (of 10 possible) classes during the first year. A university and community partnership can guide development of a culturally tailored obesity prevention program that is suitable for reaching a high-risk Mexican-origin audience through cooperative extension and other public health programs. PMID:25974142
System and method for transferring telemetry data between a ground station and a control center
NASA Technical Reports Server (NTRS)
Ray, Timothy J. (Inventor); Ly, Vuong T. (Inventor)
2012-01-01
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for coordinating communications between a ground station, a control center, and a spacecraft. The method receives a call to a simple, unified application programmer interface implementing communications protocols related to outer space, when instruction relates to receiving a command at the control center for the ground station generate an abstract message by agreeing upon a format for each type of abstract message with the ground station and using a set of message definitions to configure the command in the agreed upon format, encode the abstract message to generate an encoded message, and transfer the encoded message to the ground station, and perform similar actions when the instruction relates to receiving a second command as a second encoded message at the ground station from the control center and when the determined instruction type relates to transmitting information to the control center.
Using Text Message Surveys to Evaluate a Mobile Sexual Health Question-and-Answer Service.
Willoughby, Jessica Fitts; L'Engle, Kelly Ladin; Jackson, Kennon; Brickman, Jared
2018-01-01
Text message programs for sexual health are becoming increasingly popular as practitioners aim to meet youth on media they use frequently. Two-way mobile health (mHealth) interventions allow for feedback solicitation from participants. This study explores the use of a text message survey to assess demographics and program feedback from users of an adolescent sexual health text message question-and-answer service. Development and feasibility of the short-message service survey are discussed. The text message survey achieved a 43.9% response rate, which is comparable to response rates of surveys conducted via other methods. When compared to respondents who used the service and completed an online in-school questionnaire, text survey respondents were more likely to be female and older. They also reported higher service satisfaction. Results have implications for text message service providers and researchers. This article examines a community application of a new intervention strategy and research methodology.
The WLCG Messaging Service and its Future
NASA Astrophysics Data System (ADS)
Cons, Lionel; Paladin, Massimo
2012-12-01
Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.
Remote Asynchronous Message Service Gateway
NASA Technical Reports Server (NTRS)
Wang, Shin-Ywan; Burleigh, Scott C.
2011-01-01
The Remote Asynchronous Message Service (RAMS) gateway is a special-purpose AMS application node that enables exchange of AMS messages between nodes residing in different AMS "continua," notionally in different geographical locations. JPL s implementation of RAMS gateway functionality is integrated with the ION (Interplanetary Overlay Network) implementation of the DTN (Delay-Tolerant Networking) bundle protocol, and with JPL s implementation of AMS itself. RAMS protocol data units are encapsulated in ION bundles and are forwarded to the neighboring RAMS gateways identified in the source gateway s AMS management information base. Each RAMS gateway has interfaces in two communication environments: the AMS message space it serves, and the RAMS network - the grid or tree of mutually aware RAMS gateways - that enables AMS messages produced in one message space to be forwarded to other message spaces of the same venture. Each gateway opens persistent, private RAMS network communication channels to the RAMS gateways of other message spaces for the same venture, in other continua. The interconnected RAMS gateways use these communication channels to forward message petition assertions and cancellations among themselves. Each RAMS gateway subscribes locally to all subjects that are of interest in any of the linked message spaces. On receiving its copy of a message on any of these subjects, the RAMS gateway node uses the RAMS network to forward the message to every other RAMS gateway whose message space contains at least one node that has subscribed to messages on that subject. On receiving a message via the RAMS network from some other RAMS gateway, the RAMS gateway node forwards the message to all subscribers in its own message space.
Packet Fragmentation and Reassembly in Molecular Communication.
Furubayashi, Taro; Nakano, Tadashi; Eckford, Andrew; Okaie, Yutaka; Yomo, Tetsuya
2016-04-01
This paper describes packet fragmentation and reassembly to achieve reliable molecular communication among bionanomachines. In the molecular communication described in this paper, a sender bionanomachine performs packet fragmentation, dividing a large molecular message into smaller pieces and embedding into smaller molecular packets, so that molecular packets have higher diffusivity to reach the receiver bionanomachine. The receiver bionanomachine then performs packet reassembly to retrieve the original molecular message from a set of molecular packets that it receives. To examine the effect of packet fragmentation and reassembly, we develop analytical models and conduct numerical experiments. Numerical results show that packet fragmentation and reassembly can improve the message delivery performance. Numerical results also indicate that packet fragmentation and reassembly may degrade the performance in the presence of drift in the environment.
A Novel Quantum Proxy Blind Signature Scheme
NASA Astrophysics Data System (ADS)
Guo, Wei; Xie, Shu-Cui; Zhang, Jian-Zhong
2017-05-01
A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie's delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.
Shahani, Shaun; Korenblit, Pearl; Thomas, Pauline; Passannante, Marian R; Carr, Richard; Davis, Lynn
2018-03-05
Studies show that combining nicotine replacement therapy (NRT) with tobacco treatment counseling is most effective for smoking cessation. However, tobacco treatment counseling has been underutilized across the nation. A secure email message sent to patients already taking NRT was hypothesized to increase the utilization of tobacco treatment counseling among Veterans in New Jersey. Secure messaging for communication between patients and providers was implemented through a web-based password-protected, secure messaging account, where veterans get notified through their personal email when they have a message awaiting them. The main objective of this project was to determine if there was a significant increase in adoption of tobacco treatment counseling among Veterans who received a secure message describing the options for tobacco treatment counseling available to them. Secondary objectives were to demographically characterize Veterans who were and were not enrolled in secure messaging, as well as those who opened or did not open a message. Finally, because the language and content of the messages were changed across project phases, this project also sought to determine (by analysis of response rates) the type of language that was most effective at eliciting a response. Over two phases, messages were sent to two samples of Veterans prescribed NRT within the prior 90 days of each phase. In phase 1, one message was sent in December 2015 (message 1). In phase 2, one message was sent in July 2016 (message 2) and the same message (message 3) was resent in August 2016 to persons who did not open message 2. Messages 2 and 3 were more directive than message 1. Response rates to message 1 versus message 2 were compared. A logistic regression analysis determined effect of age and gender on enrollment in secure messaging across both phases. The effectiveness of each phase at increasing tobacco treatment counseling was analyzed using a McNemar test. Message 2, sent to 423 Veterans, had a significantly higher response rate than message 1, sent to 348 Veterans (18%, 17/93 vs 8%, 6/78, P=.04). Phase 2 (ie, messages 2 and 3) significantly increased utilization of tobacco treatment counseling (net increase of six tobacco treatment counseling adopters, P=.04), whereas phase 1 (ie, message 1) did not (net increase of two tobacco treatment counseling adopters, P=.48). Women (odds ratio [OR] 1.6, 95% CI 1.1-2.3) and those aged 30 to 49 years (compared to other age groups) were more likely to be enrolled in secure messaging. Gender and age were not significant predictors of opening or replying to either message. Although the effect was small, secure messaging was a useful modality to increase tobacco treatment counseling. Directive content with a follow-up message appeared useful. Female Veterans and/or Veterans aged between 30 and 49 years are more likely to use secure messaging. ©Shaun Shahani, Pearl Korenblit, Pauline Thomas, Marian R Passannante, Richard Carr, Lynn Davis. Originally published in JMIR Mental Health (http://mental.jmir.org), 05.03.2018.
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
2014-04-01
technologies. To facilitate efficient information exchange, wireless networks have been proposed to be widely used in the smart grid. However, the jamming...attack that constantly broadcasts radio interference is a primary security threat to prevent the deployment of wireless networks in the smart grid. Hence... wireless communications, while at the same time providing latency guarantee for control messages. An open question is how to minimize message delay for
NASA Astrophysics Data System (ADS)
Kasim, Shahreen; Hafit, Hanayanti; Leong, Tan Hua; Hashim, Rathiah; Ruslai, Husni; Jahidin, Kamaruzzaman; Syafwan Arshad, Mohammad
2016-11-01
Nowadays, some people facing the problem to wake up in the morning. This was result to absence of the classes, meetings, and even exams. The aim of this project is to develop an android application that can force the user to wake up. The method used in this application are pedometer and Short Message Service (SMS) function. This application need the user to take their smartphone and walk about 10 steps to disable it, when the alarm clock is activated. After that, when the alarm clock was rang, this alarm application has automatically send a message to the users’ friends or parents phone to wake them up.
2013-01-01
Background Few validated guidelines exist for developing messages in health promotion practice. In clinical practice, the Appraisal of Guidelines, Research, and Evaluation II (AGREE II) Instrument is the international gold standard for guideline assessment, development, and reporting. In a case study format, this paper describes the application of the AGREE II principles to guide the development of health promotion guidelines for constructing messages to supplement the new Canadian Physical Activity Guidelines (CPAG) released in 2011. Methods The AGREE II items were modified to suit the objectives of developing messages that (1) clarify key components of the new CPAG and (2) motivate Canadians to meet the CPAG. The adapted AGREE II Instrument was used as a systematic guide for the recommendation development process. Over a two-day meeting, five workgroups (one for each CPAG – child, youth, adult, older adult – and one overarching group) of five to six experts (including behavior change, messaging, and exercise physiology researchers, key stakeholders, and end users) reviewed and discussed evidence for creating and targeting messages to supplement the new CPAG. Recommendations were summarized and reviewed by workgroup experts. The recommendations were pilot tested among end users and then finalized by the workgroup. Results The AGREE II was a useful tool in guiding the development of evidence-based specific recommendations for constructing and disseminating messages that supplement and increase awareness of the new CPAG (child, youth, adults, and older adults). The process also led to the development of sample messages and provision of a rationale alongside the recommendations. Conclusions To our knowledge, these are the first set of evidence-informed recommendations for constructing and disseminating messages supplementing physical activity guidelines. This project also represents the first application of international standards for guideline development (i.e., AGREE II) to the creation of practical recommendations specifically aimed to inform health promotion and public health practice. The messaging recommendations have the potential to increase the public health impact of evidence-based guidelines. PMID:23634998
Bury, Belinda; Tiggemann, Marika; Slater, Amy
2017-04-01
The study aimed to investigate whether a message informing readers about digital alteration read before exposure to thin ideal advertisements would enhance the effectiveness of disclaimer labels. Participants were 280 female undergraduate students who viewed eleven thin ideal fashion magazine advertisements. Half viewed the advertisements in their original format, and half viewed the same advertisements with a digital alteration disclaimer label. Prior to viewing the advertisements, participants read either a brief message informing them that advertisements are commonly digitally altered, or a control message. Irrespective of experimental condition, exposure to the thin ideal advertisements led to increased body dissatisfaction, with social comparison predicting this increase. Neither the disclaimer label nor the pre-exposure message, nor their combination, led to reductions in perceived realism, social comparison, or body dissatisfaction. However, trait appearance comparison moderated the effect of pre-exposure message on perceived realism, such that women high on trait appearance comparison in the digital alteration pre-exposure message condition rated the models as relatively more realistic than did women low on this trait. It was concluded that more research is needed to identify brief and easy-to-implement universal prevention strategies that can reduce the negative effects of thin ideal media imagery on women's body image. Copyright © 2016 Elsevier Ltd. All rights reserved.
Sandi, Giselle; Ingram, Diana; Welch, Mary Jane; Ocampo, Edith V
2015-01-01
Background Hispanic adults in the United States are at particular risk for diabetes and inadequate blood pressure control. Physical activity improves these health problems; however Hispanic adults also have a low rate of recommended aerobic physical activity. To address improving physical inactivity, one area of rapidly growing technology that can be utilized is text messaging (short message service, SMS). A physical activity research team, Text4Walking, had previously developed an initial database of motivational physical activity text messages in English that could be used for physical activity text messaging interventions. However, the team needed to translate these existing English physical activity text messages into Spanish in order to have culturally meaningful and useful text messages for those adults within the Hispanic population who would prefer to receive text messages in Spanish. Objective The aim of this study was to translate a database of English motivational physical activity messages into Spanish and review these text messages with a group of Spanish speaking adults to inform the use of these text messages in an intervention study. Methods The consent form and study documents, including the existing English physical activity text messages, were translated from English into Spanish, and received translation certification as well as Institutional Review Board approval. The translated text messages were placed into PowerPoint, accompanied by a set of culturally appropriate photos depicting barriers to walking, as well as walking scenarios. At the focus group, eligibility criteria for this study included being an adult between 30 to 65 years old who spoke Spanish as their primary language. After a general group introduction, participants were placed into smaller groups of two or three. Each small group was asked to review a segment of the translated text messages for accuracy and meaningfulness. After the break out, the group was brought back together to review the text messages. Results A translation confirmation group met at a church site in an urban community with a large population of Hispanics. Spanish speaking adults (N=8), with a mean age of 40 (SD 6.3), participated in the study. Participants were engaged in the group and viewed the text messages as culturally appropriate. They also thought that text messages could motivate them to walk more. Twenty-two new text messages were added to the original database of 246 translated text messages. While the text messages were generally understood, specific word preferences were seen related to personal preference, dialect, and level of formality which resulted in minor revisions to four text messages. Conclusions The English text messages were successfully translated into Spanish by a bilingual research staff and reviewed by Hispanic participants in order to inform the use of these text messages for future intervention studies. These Spanish text messages were recently used in a Text4Walking intervention study. PMID:25947953
Performance Analysis of a Hybrid Overset Multi-Block Application on Multiple Architectures
NASA Technical Reports Server (NTRS)
Djomehri, M. Jahed; Biswas, Rupak
2003-01-01
This paper presents a detailed performance analysis of a multi-block overset grid compu- tational fluid dynamics app!ication on multiple state-of-the-art computer architectures. The application is implemented using a hybrid MPI+OpenMP programming paradigm that exploits both coarse and fine-grain parallelism; the former via MPI message passing and the latter via OpenMP directives. The hybrid model also extends the applicability of multi-block programs to large clusters of SNIP nodes by overcoming the restriction that the number of processors be less than the number of grid blocks. A key kernel of the application, namely the LU-SGS linear solver, had to be modified to enhance the performance of the hybrid approach on the target machines. Investigations were conducted on cacheless Cray SX6 vector processors, cache-based IBM Power3 and Power4 architectures, and single system image SGI Origin3000 platforms. Overall results for complex vortex dynamics simulations demonstrate that the SX6 achieves the highest performance and outperforms the RISC-based architectures; however, the best scaling performance was achieved on the Power3.
Neural effects of environmental advertising: An fMRI analysis of voice age and temporal framing.
Casado-Aranda, Luis-Alberto; Martínez-Fiestas, Myriam; Sánchez-Fernández, Juan
2018-01-15
Ecological information offered to society through advertising enhances awareness of environmental issues, encourages development of sustainable attitudes and intentions, and can even alter behavior. This paper, by means of functional Magnetic Resonance Imaging (fMRI) and self-reports, explores the underlying mechanisms of processing ecological messages. The study specifically examines brain and behavioral responses to persuasive ecological messages that differ in temporal framing and in the age of the voice pronouncing them. The findings reveal that attitudes are more positive toward future-framed messages presented by young voices. The whole-brain analysis reveals that future-framed (FF) ecological messages trigger activation in brain areas related to imagery, prospective memories and episodic events, thus reflecting the involvement of past behaviors in future ecological actions. Past-framed messages (PF), in turn, elicit brain activations within the episodic system. Young voices (YV), in addition to triggering stronger activation in areas involved with the processing of high-timbre, high-pitched and high-intensity voices, are perceived as more emotional and motivational than old voices (OV) as activations in anterior cingulate cortex and amygdala. Messages expressed by older voices, in turn, exhibit stronger activation in areas formerly linked to low-pitched voices and voice gender perception. Interestingly, a link is identified between neural and self-report responses indicating that certain brain activations in response to future-framed messages and young voices predicted higher attitudes toward future-framed and young voice advertisements, respectively. The results of this study provide invaluable insight into the unconscious origin of attitudes toward environmental messages and indicate which voice and temporal frame of a message generate the greatest subconscious value. Copyright © 2017 Elsevier Ltd. All rights reserved.
Mobile-Based Applications and Functionalities for Self-Management of People Living with HIV.
Mehraeen, Esmaeil; Safdari, Reza; Mohammadzadeh, Niloofar; Seyedalinaghi, Seyed Ahmad; Forootan, Siavash; Mohraz, Minoo
2018-01-01
Due to the chronicity of HIV/AIDS and the increased number of people living with HIV (PLWH), these people need the innovative and practical approaches to take advantage of high-quality healthcare services. The objectives of this scoping review were to identify the mobile-based applications and functionalities for self-management of people living with HIV. We conducted a comprehensive search of PubMed, Scopus, Science direct, Web of Science and Embase databases for literature published from 2010 to 2017. Screening, data abstraction, and methodological quality assessment were done in duplicate. Our search identified 10 common mobile-based applications and 8 functionalities of these applications for self-management of people living with HIV. According to the findings, "text-messaging" and "reminder" applications were more addressed in reviewed articles. Moreover, the results indicated that "medication adherence" was the common functionality of mobile-based applications for PLWH. Inclusive evidence supports the use of text messaging as a mobile-based functionality to improve medication adherence and motivational messaging. Future mobile-based applications in the healthcare industry should address additional practices such as online chatting, social conversations, physical activity intervention, and supply chain management.
A framework for implementing data services in multi-service mobile satellite systems
NASA Technical Reports Server (NTRS)
Ali, Mohammed O.; Leung, Victor C. M.; Spolsky, Andrew I.
1988-01-01
Mobile satellite systems being planned for introduction in the early 1990s are expected to be invariably of the multi-service type. Mobile Telephone Service (MTS), Mobile Radio Service (MRS), and Mobile Data Service (MDS) are the major classifications used to categorize the many user applications to be supported. The MTS and MRS services encompass circuit-switched voice communication applications, and may be efficiently implemented using a centralized Demand-Assigned Multiple Access (DAMA) scheme. Applications under the MDS category are, on the other hand, message-oriented and expected to vary widely in characteristics; from simplex mode short messaging applications to long duration, full-duplex interactive data communication and large file transfer applications. For some applications under this service category, the conventional circuit-based DAMA scheme may prove highly inefficient due to the long time required to set up and establish communication links relative to the actual message transmission time. It is proposed that by defining a set of basic bearer services to be supported in MDS and optimizing their transmission and access schemes independent of the MTS and MRS services, the MDS applications can be more efficiently integrated into the multi-service design of mobile satellite systems.
A framework for implementing data services in multi-service mobile satellite systems
NASA Astrophysics Data System (ADS)
Ali, Mohammed O.; Leung, Victor C. M.; Spolsky, Andrew I.
1988-05-01
Mobile satellite systems being planned for introduction in the early 1990s are expected to be invariably of the multi-service type. Mobile Telephone Service (MTS), Mobile Radio Service (MRS), and Mobile Data Service (MDS) are the major classifications used to categorize the many user applications to be supported. The MTS and MRS services encompass circuit-switched voice communication applications, and may be efficiently implemented using a centralized Demand-Assigned Multiple Access (DAMA) scheme. Applications under the MDS category are, on the other hand, message-oriented and expected to vary widely in characteristics; from simplex mode short messaging applications to long duration, full-duplex interactive data communication and large file transfer applications. For some applications under this service category, the conventional circuit-based DAMA scheme may prove highly inefficient due to the long time required to set up and establish communication links relative to the actual message transmission time. It is proposed that by defining a set of basic bearer services to be supported in MDS and optimizing their transmission and access schemes independent of the MTS and MRS services, the MDS applications can be more efficiently integrated into the multi-service design of mobile satellite systems.
X.400: The Standard for Message Handling Systems.
ERIC Educational Resources Information Center
Swain, Leigh; Tallim, Paula
1990-01-01
Profiles X.400, the Open Systems Interconnection (OSI) Application layer standard that supports interpersonal electronic mail services, facsimile transfer, electronic data interchange, electronic funds transfer, electronic publishing, and electronic invoicing. Also discussed are an electronic directory to support message handling, compatibility…
Applying secret sharing for HIS backup exchange.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi
2013-01-01
To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.
Vetter, Jeffrey S.
2005-02-01
The method and system described herein presents a technique for performance analysis that helps users understand the communication behavior of their message passing applications. The method and system described herein may automatically classifies individual communication operations and reveal the cause of communication inefficiencies in the application. This classification allows the developer to quickly focus on the culprits of truly inefficient behavior, rather than manually foraging through massive amounts of performance data. Specifically, the method and system described herein trace the message operations of Message Passing Interface (MPI) applications and then classify each individual communication event using a supervised learning technique: decision tree classification. The decision tree may be trained using microbenchmarks that demonstrate both efficient and inefficient communication. Since the method and system described herein adapt to the target system's configuration through these microbenchmarks, they simultaneously automate the performance analysis process and improve classification accuracy. The method and system described herein may improve the accuracy of performance analysis and dramatically reduce the amount of data that users must encounter.
Boehmert, Christoph; Wiedemann, Peter; Croft, Rodney
2016-01-01
Many radiation health agencies communicate precautionary measures regarding the use of mobile communication devices, e.g. the use of a headset while talking on the phone. These precautionary messages have, however, been shown to unintentionally increase risk perceptions about radiofrequency electromagnetic fields (RF-EMFs). The current study tested two potential ways of amending precautionary messages in order to minimise this unintentional effect. Firstly, the messages’ potential to be perceived as inconsistent and thereby raise suspicions was addressed; secondly, the effectiveness of the precautions was explained. An experimental design was applied in which a quota sample of 1717 Australian residents was randomly assigned to one of six message conditions. Three different risk perception measures served as dependent variables, two of them are conditional measures. The original effect of precautionary messages to amplify risk perceptions could not be replicated. Furthermore, amending precautionary messages in favour of more consistency had no effect, while explaining the effectiveness of the precautions increased conditional risk perception under the condition that no precautions are taken. This was contrary to our assumptions. We infer from these results that changing precautionary messages in terms of consistency and effectiveness in order to reduce risk perception is hardly possible. The use of conditional risk perception measures seems fruitful for studies looking at the effects of precautionary or protective messages, given that previous studies have only investigated effects on unconditional risk perception. However, the present results should not be over-interpreted as the measures’ validity in the EMF context still needs further investigation. PMID:27735851
Compiled MPI: Cost-Effective Exascale Applications Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bronevetsky, G; Quinlan, D; Lumsdaine, A
2012-04-10
The complexity of petascale and exascale machines makes it increasingly difficult to develop applications that can take advantage of them. Future systems are expected to feature billion-way parallelism, complex heterogeneous compute nodes and poor availability of memory (Peter Kogge, 2008). This new challenge for application development is motivating a significant amount of research and development on new programming models and runtime systems designed to simplify large-scale application development. Unfortunately, DoE has significant multi-decadal investment in a large family of mission-critical scientific applications. Scaling these applications to exascale machines will require a significant investment that will dwarf the costs of hardwaremore » procurement. A key reason for the difficulty in transitioning today's applications to exascale hardware is their reliance on explicit programming techniques, such as the Message Passing Interface (MPI) programming model to enable parallelism. MPI provides a portable and high performance message-passing system that enables scalable performance on a wide variety of platforms. However, it also forces developers to lock the details of parallelization together with application logic, making it very difficult to adapt the application to significant changes in the underlying system. Further, MPI's explicit interface makes it difficult to separate the application's synchronization and communication structure, reducing the amount of support that can be provided by compiler and run-time tools. This is in contrast to the recent research on more implicit parallel programming models such as Chapel, OpenMP and OpenCL, which promise to provide significantly more flexibility at the cost of reimplementing significant portions of the application. We are developing CoMPI, a novel compiler-driven approach to enable existing MPI applications to scale to exascale systems with minimal modifications that can be made incrementally over the application's lifetime. It includes: (1) New set of source code annotations, inserted either manually or automatically, that will clarify the application's use of MPI to the compiler infrastructure, enabling greater accuracy where needed; (2) A compiler transformation framework that leverages these annotations to transform the original MPI source code to improve its performance and scalability; (3) Novel MPI runtime implementation techniques that will provide a rich set of functionality extensions to be used by applications that have been transformed by our compiler; and (4) A novel compiler analysis that leverages simple user annotations to automatically extract the application's communication structure and synthesize most complex code annotations.« less
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Amalia; Chayanie, N. I.
2018-03-01
Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.
Time and frequency for digital telecommunications
NASA Technical Reports Server (NTRS)
Folts, H. C.
1972-01-01
Time and frequency (T and F) are fundamental and pervasive parameters of telecommunication technology. Advancing development of digital communications using data modulation rates above 2400 baud and time-division multiplex in complex network configurations is now requiring more accurate and precise T and F reference information for efficient operation of telecommunication systems. A schematic diagram of a general communication system is shown. This diagram is very general and can depict any type of communication. The information source selects a specific message which is encoded and sent through a communication channel. Enroute, the signal is subjected to perturbations from environmental noise. The received signal is then decoded and delivered to its destination. Through the process, the message may undergo many spurious changes, resulting in a loss of information content in the delivered message as compared to the original selected message. In digital telecommunication systems, loss of information content of the signals can be attributed to noise, distortion of waveshape, and loss of synchronization.
Long-range AIS message analysis based on the TianTuo-3 micro satellite
NASA Astrophysics Data System (ADS)
Li, Shiyou; Chen, Lihu; Chen, Xiaoqian; Zhao, Yong; Bai, Yuzhu
2017-07-01
The "Type-27 AIS message" is the long-range AIS broadcast message, which is primarily intended for the long-range detection of AIS typically by satellite. The TT3-AIS uses a four-frequency receiver scheme which includes two frequency channels conventionally applied by the AIS system and two new frequency channels allocated to the long-range AIS broadcast message. To the end of April 2016, the TT3-AIS has already received more than 11,400 packets of Type-27 AIS messages. In this paper, a detailed analysis of the Type-27 AIS messages is performed. Firstly, an eavesdropper diagram of the space-borne AIS received from the worldwide vessels is obtained. Secondly, the analysis to the trend of the number and the ratio of the new-type vessels is performed based on the Type-27 AIS message. The detection probability of the new-type vessels is also discussed. The result would be helpful on the usage of the long-range AIS message both for data application and for the improvement in designing the next space-based AIS receiver.
Xu, Lei; Jeavons, Peter
2015-11-01
Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.
Steganography: Past, Present, Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Judge, J C
Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
2004-06-01
Situation Understanding) Common Operational Pictures Planning & Decision Support Capabilities Message & Order Processing Common Operational...Pictures Planning & Decision Support Capabilities Message & Order Processing Common Languages & Data Models Modeling & Simulation Domain
Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages
NASA Astrophysics Data System (ADS)
Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.
2013-12-01
In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.
Job, Jennifer R; Spark, Lauren C; Fjeldsoe, Brianna S; Eakin, Elizabeth G; Reeves, Marina M
2017-02-27
Extending contact with participants after the end of an initial weight loss intervention has been shown to lead to maintained weight loss and related behavioral change. Mobile phone text messaging (short message service, SMS) offers a low-cost and efficacious method to deliver extended contact. In this rapidly developing area, formative work is required to understand user perspectives of text message technology. An extended contact intervention delivered by text messages following an initial telephone-delivered weight loss intervention in breast cancer survivors provided this opportunity. The aim of this study was to qualitatively explore women's perceptions of participation in an extended contact intervention using text messaging to support long-term weight loss, physical activity, and dietary behavioral change. Following the end of an initial 6-month randomized controlled trial of a telephone-delivered weight loss intervention (versus usual care), participants received a 6-month extended contact intervention via tailored text messages. Participant perceptions of the different types of text messages, the content, tailoring, timing, and frequency of the text messages, and the length of the intervention were assessed through semistructured interviews conducted after the extended contact intervention. The interviews were transcribed verbatim and analyzed with key themes identified. Participants (n=27) were a mean age of 56.0 years (SD 7.8) and mean body mass index of 30.4 kg/m2 (SD 4.2) and were at a mean of 16.1 months (SD 3.1) postdiagnosis at study baseline. Participants perceived the text messages to be useful behavioral prompts and felt the messages kept them accountable to their behavioral change goals. The individual tailoring of the text message content and schedules was a key to the acceptability of the messages; however, some women preferred the support and real-time discussion via telephone calls (during the initial intervention) compared with the text messages (during the extended contact intervention). Text message support was perceived as acceptable for the majority of women as a way of extending intervention contact for weight loss and behavioral maintenance. Text messages supported the maintenance of healthy behaviors established in the intervention phase and kept the women accountable to their goals. A combination of telephone calls and text message support was suggested as a more acceptable option for some of the women for an extended contact intervention. ©Jennifer R Job, Lauren C Spark, Brianna S Fjeldsoe, Elizabeth G Eakin, Marina M Reeves. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 27.02.2017.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Message Passing vs. Shared Address Space on a Cluster of SMPs
NASA Technical Reports Server (NTRS)
Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak
2000-01-01
The convergence of scalable computer architectures using clusters of PCs (or PC-SMPs) with commodity networking has become an attractive platform for high end scientific computing. Currently, message-passing and shared address space (SAS) are the two leading programming paradigms for these systems. Message-passing has been standardized with MPI, and is the most common and mature programming approach. However message-passing code development can be extremely difficult, especially for irregular structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality, and high protocol overhead. In this paper, we compare the performance of and programming effort, required for six applications under both programming models on a 32 CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit high efficiency under shared memory programming. due to their high communication to computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications: however, on certain classes of problems SAS performance is competitive with MPI. We also present new algorithms for improving the PC cluster performance of MPI collective operations.
Key paediatric messages from Amsterdam
Barben, Jürg; Bohlin, Kajsa; Everard, Mark L.; Hall, Graham; Pijnenburg, Mariëlle; Priftis, Kostas N.; Rusconi, Franca; Midulla, Fabio
2016-01-01
The Paediatric Assembly of the European Respiratory Society (ERS) maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress. PMID:27730186
Using Sphinx to Improve Onion Routing Circuit Construction
NASA Astrophysics Data System (ADS)
Kate, Aniket; Goldberg, Ian
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing, and certificateless onion routing. Our new circuit constructions are also secure in the universal composability framework, a property that was missing from the original constructions. Further, we compare the performance of our schemes with their older counterparts as well as with each other.
Why some messages speak better: child immunization in the news and on the internet.
Rundblad, Gabriella
2015-01-01
Modern health protection generally affords vaccination against infectious diseases along with other environmental health threats. However, with the increase both in development of new vaccines and in making more and more vaccines available to the general public comes an increase in health scares, mainly in the media. In the wake of health scares, we often find government and health organizations launching campaigns to restore faith in current vaccine policies. But health scares are hard to quell and seem to have messages that "speak better" to those unconvinced about the safety of vaccines. This paper seeks to review recent studies on the health messages prevalent in various news outlets and on the internet. Equal focus has been given to messages originating from government and health organizations as well as those that stem from lay organizations, such as parent communities and anti-vaccination groups. Particular emphasis was placed on studies that did not simply look at the content of the message, but which explored the rhetoric of the message. This review revealed that there is a shortage of studies, and that a comprehensive study of health messages and communication outlets across a much wider range of vaccines is urgently warranted. Based on current research, lay-based/lay-oriented dissemination approaches seem to have a greater effect on lay perceptions of vaccines, and potentially parent behavior. In terms of content, these approaches rely heavily on parent stories around adverse effects, and in terms of rhetoric, the language used tends towards dread words.
Ellanti, Prasad; Moriarty, Andrew; Coughlan, Fionn; McCarthy, Thomas
2017-02-18
Effective and timely communication is important for any surgical specialty to function. The use of smartphones is prevalent amongst doctors. Numerous smartphone applications offer the potential for fast and cost-effective communication. WhatsApp is a commonly used application that is free, easy to use, and capable of text and multimedia messaging. We report on the use of WhatsApp over a six month period in our unit. WhatsApp communication between non-consultant members of an orthopaedic team over a six-month period was analysed. Both the phones and the WhatsApp application were password-protected, and patient details were anonymised. A series of 20 communications using the hospital pager system and the telephone system were also analysed. A total of 5,492 messages were sent during the six-month period and were part of 1,916 separate communication events. The vast majority of messages, 5,090, were related to patient care. A total of 195 multimedia messages were sent and these included images of radiographs and wounds. When using the hospital telephones, the length of time spent on a communication averaged 5.78 minutes and using the hospital pager system averaged 7.45 minutes. Using the WhatsApp messaging system has potentially saved up to 7,664 minutes over the study period. All participants found WhatsApp easy to use and found it to be more efficient than the traditional pager system Conclusion: Compared to the traditional pager systems, the use of WhatsApp is easy, inexpensive, and reliable and can help improve the efficiency of communication within a surgical team.
Moriarty, Andrew; Coughlan, Fionn; McCarthy, Thomas
2017-01-01
Introduction: Effective and timely communication is important for any surgical specialty to function. The use of smartphones is prevalent amongst doctors. Numerous smartphone applications offer the potential for fast and cost-effective communication. WhatsApp is a commonly used application that is free, easy to use, and capable of text and multimedia messaging. We report on the use of WhatsApp over a six month period in our unit. Materials and Methods: WhatsApp communication between non-consultant members of an orthopaedic team over a six-month period was analysed. Both the phones and the WhatsApp application were password-protected, and patient details were anonymised. A series of 20 communications using the hospital pager system and the telephone system were also analysed. Results: A total of 5,492 messages were sent during the six-month period and were part of 1,916 separate communication events. The vast majority of messages, 5,090, were related to patient care. A total of 195 multimedia messages were sent and these included images of radiographs and wounds. When using the hospital telephones, the length of time spent on a communication averaged 5.78 minutes and using the hospital pager system averaged 7.45 minutes. Using the WhatsApp messaging system has potentially saved up to 7,664 minutes over the study period. All participants found WhatsApp easy to use and found it to be more efficient than the traditional pager system Conclusion: Compared to the traditional pager systems, the use of WhatsApp is easy, inexpensive, and reliable and can help improve the efficiency of communication within a surgical team. PMID:28357172
Mobile Delivery of Treatment for Alcohol Use Disorders
Quanbeck, Andrew; Chih, Ming-Yuan; Isham, Andrew; Johnson, Roberta; Gustafson, David
2014-01-01
Several systems for treating alcohol-use disorders (AUDs) exist that operate on mobile phones. These systems are categorized into four groups: text-messaging monitoring and reminder systems, text-messaging intervention systems, comprehensive recovery management systems, and game-based systems. Text-messaging monitoring and reminder systems deliver reminders and prompt reporting of alcohol consumption, enabling continuous monitoring of alcohol use. Text-messaging intervention systems additionally deliver text messages designed to promote abstinence and recovery. Comprehensive recovery management systems use the capabilities of smart-phones to provide a variety of tools and services that can be tailored to individuals, including in-the-moment assessments and access to peer discussion groups. Game-based systems engage the user using video games. Although many commercial applications for treatment of AUDs exist, few (if any) have empirical evidence of effectiveness. The available evidence suggests that although texting-based applications may have beneficial effects, they are probably insufficient as interventions for AUDs. Comprehensive recovery management systems have the strongest theoretical base and have yielded the strongest and longest-lasting effects, but challenges remain, including cost, understanding which features account for effects, and keeping up with technological advances. PMID:26259005
Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita
2014-09-22
Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed bymore » the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.« less
SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other
NASA Astrophysics Data System (ADS)
Taylor, M. B.; Boch, T.; Taylor, J.
2015-06-01
SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.
Abdellaoui, Redhouane; Schück, Stéphane; Texier, Nathalie; Burgun, Anita
2017-06-22
With the increasing popularity of Web 2.0 applications, social media has made it possible for individuals to post messages on adverse drug reactions. In such online conversations, patients discuss their symptoms, medical history, and diseases. These disorders may correspond to adverse drug reactions (ADRs) or any other medical condition. Therefore, methods must be developed to distinguish between false positives and true ADR declarations. The aim of this study was to investigate a method for filtering out disorder terms that did not correspond to adverse events by using the distance (as number of words) between the drug term and the disorder or symptom term in the post. We hypothesized that the shorter the distance between the disorder name and the drug, the higher the probability to be an ADR. We analyzed a corpus of 648 messages corresponding to a total of 1654 (drug and disorder) pairs from 5 French forums using Gaussian mixture models and an expectation-maximization (EM) algorithm . The distribution of the distances between the drug term and the disorder term enabled the filtering of 50.03% (733/1465) of the disorders that were not ADRs. Our filtering strategy achieved a precision of 95.8% and a recall of 50.0%. This study suggests that such distance between terms can be used for identifying false positives, thereby improving ADR detection in social media. ©Redhouane Abdellaoui, Stéphane Schück, Nathalie Texier, Anita Burgun. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 22.06.2017.
Brick, Cameron; McCully, Scout N.; Updegraff, John A.; Ehret, Phillip J.; Areguin, Maira A.; Sherman, David K.
2015-01-01
Background Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically decide on message features to promote adherence to recommended behaviors. We present exposure to United States (U.S.) culture as a moderator of the impact of gain- vs. loss-frame messages. Since U.S. culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to U.S. culture would show these advantages for loss-framed messages. Methods 223 participants viewed a written oral health message in one of three randomized conditions: gain-frame, loss-frame, or no-message control, and were given ten flosses. Cultural exposure was measured with the proportions of life spent and parents born in the U.S. At baseline and one week later, participants completed recall tests and reported recent flossing behavior. Results Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over one week. E.g., those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Limitations Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. Conclusions In healthcare settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. PMID:25654986
Brick, Cameron; McCully, Scout N; Updegraff, John A; Ehret, Phillip J; Areguin, Maira A; Sherman, David K
2016-10-01
Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically choose message features to promote adherence to recommended behaviors. We present exposure to US culture as a moderator of the impact of gain-frame versus loss-frame messages. Since US culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to US culture would show these advantages for loss-framed messages. 223 participants viewed a written oral health message in 1 of 3 randomized conditions-gain-frame, loss-frame, or no-message control-and were given 10 flosses. Cultural exposure was measured with the proportions of life spent and parents born in the US. At baseline and 1 week later, participants completed recall tests and reported recent flossing behavior. Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over 1 week; for example, those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. In health care settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. © The Author(s) 2015.
Building automatic customer complaints filtering application based on Twitter in Bahasa Indonesia
NASA Astrophysics Data System (ADS)
Gunawan, D.; Siregar, R. P.; Rahmat, R. F.; Amalia, A.
2018-03-01
Twitter has become a media to provide communication between a company with its customers. The average number of Twitter active users monthly is 330 million. A lot of companies realize the potential of Twitter to establish good relationship with their customers. Therefore, they usually have one official Twitter account to act as customer care division. In Indonesia, one of the company that utilizes the potential of Twitter to reach their customers is PT Telkom. PT Telkom has an official customer service account (called @TelkomCare) to receive customers’ problem. However, because of this account is open for public, Twitter users might post all kind of messages (not only complaints) to Telkom Care account. This leads to a problem that the Telkom Care account contains not only the customer complaints but also compliment and ordinary message. Furthermore, the complaints should be distributed to relevant division such as “Indihome”, “Telkomsel”, “UseeTV”, and “Telepon” based on the content of the message. This research built the application that automatically filter twitter post messages into several pre-defined categories (based on existing divisions) using Naïve Bayes algorithm. This research is done by collecting Twitter message, data cleaning, data pre-processing, training and testing data, and evaluate the classification result. This research yields 97% accuracy to classify Twitter message into the categories mentioned earlier.
Study on Dissemination Patterns in Location-Aware Gossiping Networks
NASA Astrophysics Data System (ADS)
Kami, Nobuharu; Baba, Teruyuki; Yoshikawa, Takashi; Morikawa, Hiroyuki
We study the properties of information dissemination over location-aware gossiping networks leveraging location-based real-time communication applications. Gossiping is a promising method for quickly disseminating messages in a large-scale system, but in its application to information dissemination for location-aware applications, it is important to consider the network topology and patterns of spatial dissemination over the network in order to achieve effective delivery of messages to potentially interested users. To this end, we propose a continuous-space network model extended from Kleinberg's small-world model applicable to actual location-based applications. Analytical and simulation-based study shows that the proposed network achieves high dissemination efficiency resulting from geographically neutral dissemination patterns as well as selective dissemination to proximate users. We have designed a highly scalable location management method capable of promptly updating the network topology in response to node movement and have implemented a distributed simulator to perform dynamic target pursuit experiments as one example of applications that are the most sensitive to message forwarding delay. The experimental results show that the proposed network surpasses other types of networks in pursuit efficiency and achieves the desirable dissemination patterns.
DOT National Transportation Integrated Search
2013-04-01
Connected Vehicle to Vehicle (V2V) safety applications heavily rely on the BSM, which is one of the messages defined in the Society of Automotive standard J2735, Dedicated Short Range Communications (DSRC) Message Set Dictionary, November 2009. The B...
Guidelines for Effective Selective Listening.
ERIC Educational Resources Information Center
Schendel, Joel D.; Shields, Joyce L.
Defining selective listening as an intelligence gathering technique that depends on an individual's ability to access, monitor, and report oral messages accurately and to give processing priority to messages of possible intelligence value, this report describes one important application of the technique: overhearing the conversations of others…
Message Processing Research from Psychology to Communication.
ERIC Educational Resources Information Center
Basil, Michael D.
Information processing theories have been very useful in psychology. The application of information processing literature to communication, however, requires definitions of audiences and definitions of messages relevant to information-processing theories. In order to establish the relevant aspect of audiences, a multiple-stage model of audiences…
Sanguansak, Thuss; Morley, Katharine E; Morley, Michael G; Thinkhamrop, Kavin; Thuanman, Jaruwan; Agarwal, Isha
2017-12-19
Social media offers a new way to provide education, reminders, and support for patients with a variety of health conditions. Most of these interventions use one-way, provider-patient communication. Incorporating social media tools to improve postoperative (postop) education and follow-up care has only been used in limited situations. The aim of this study was to determine the feasibility and efficacy of two-way social media messaging to deliver reminders and educational information about postop care to cataract patients. A total of 98 patients undergoing their first eye cataract surgery were divided into two groups: a no message group receiving usual pre- and postop care and a message group receiving usual care plus messages in a mobile social media format with standardized content and timing. Each patient in the message group received nine messages about hand and face hygiene, medication and postop visit adherence, and links to patient education videos about postop care. Patients could respond to messages as desired. Main outcome measures included medication adherence, postop visit adherence, clinical outcomes, and patients' subjective assessments of two-way messaging. The number, types, content, and timing of responses by patients to messages were recorded. Medication adherence was better in the message group at postop day 7, with high adherence in 47 patients (96%, 47/49) versus 36 patients (73%, 36/49) in the no message group (P=.004), but no statistically significant differences in medication adherence between the groups were noted at preop and postop day 30. Visit adherence was higher at postop day 30 in the message group (100%, 49/49) versus the no message group (88%, 43/49; P=.03) but was 100% (49/49) in both groups at postop day 1 and 7. Final visual outcomes were similar between groups. A total of 441 standardized messages were sent to the message group. Out of 270 responses generated, 188 (70%) were simple acknowledgments or "thank you," and 82 (30%) responses were questions that were divided into three general categories: administrative, postop care, and clinical issues. Out of the 82 question responses, 31 (11%) were about administrative issues, 28 (10%) about postop care, and 23 (9%) about clinical symptoms. All the messages about symptoms were triaged by nurses or ophthalmologists and only required reassurance or information. Patients expressed satisfaction with messaging. Two-way social media messaging to deliver postop information to cataract patients is feasible and improves early medication compliance. Further design improvements can streamline work flow to optimize efficiency and patient satisfaction. ©Thuss Sanguansak, Katharine E Morley, Michael G Morley, Kavin Thinkhamrop, Jaruwan Thuanman, Isha Agarwal. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 19.12.2017.
Aesthetic properties and message customization: navigating the dark side of web recruitment.
Dineen, Brian R; Ling, Juan; Ash, Steven R; DelVecchio, Devon
2007-03-01
The authors examined recruitment message viewing time, information recall, and attraction in a Web-based context. In particular, they extended theory related to the cognitive processing of recruitment messages and found that the provision of customized information about likely fit related to increased viewing time and recall when good aesthetics were also present. A 3-way interaction among moderate-to low-fitting individuals further indicated that objective fit was most strongly related to attraction when messages included both good aesthetics and customized information. In particular, given this combination, the poorest fitting individuals exhibited lower attraction levels, whereas more moderately fitting individuals exhibited invariant attraction levels across combinations of aesthetics and customized information. The results suggest that, given good aesthetics, customized information exerts effects mostly by causing poorly fitting individuals to be less attracted, which further suggests a means of averting the "dark side" of Web recruitment that occurs when organizations receive too many applications from poorly fitting applicants. (c) 2007 APA, all rights reserved.
Brar Prayaga, Rena; Jeong, Erwin W; Feger, Erin; Noble, Harmony K; Kmiec, Magdalen; Prayaga, Ram S
2018-01-30
Nonadherence is a major concern in the management of chronic conditions such as hypertension, cardiovascular disease, and diabetes where patients may discontinue or interrupt their medication for a variety of reasons. Text message reminders have been used to improve adherence. However, few programs or studies have explored the benefits of text messaging with older populations and at scale. In this paper, we present a program design using tailored and interactive text messaging to improve refill rates of partially adherent or nonadherent Medicare members of a large integrated health plan. The aim of this 3-month program was to gain an understanding of whether tailored interactive text message dialogues could be used to improve medication refills in Medicare patients with one or more chronic diseases. We used the mPulse Mobile interactive text messaging solution with partially adherent and nonadherent Medicare patients (ie, over age 65 years or younger with disabilities) of Kaiser Permanente Southern California (KP), a large integrated health plan, and compared refill rates of the text messaging group (n=12,272) to a group of partially adherent or nonadherent Medicare patients at KP who did not receive text messages (nontext messaging group, n=76,068). Both groups were exposed to other forms of refill and adherence outreach including phone calls, secure emails, and robo-calls from December 2016 to February 2017. The text messaging group and nontext messaging group were compared using an independent samples t test to test difference in group average of refill rates. There was a significant difference in medication refill rates between the 2 groups, with a 14.07 percentage points higher refill rate in the text messaging group (P<.001). The results showed a strong benefit of using this text messaging solution to improve medication refill rates among Medicare patients. These findings also support using interactive text messaging as a cost-effective, convenient, and user-friendly solution for patient engagement. Program outcomes and insights can be used to enhance the design of future text-based solutions to improve health outcomes and promote adherence and long-term behavior change. ©Rena Brar Prayaga, Erwin W Jeong, Erin Feger, Harmony K Noble, Magdalen Kmiec, Ram S Prayaga. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 30.01.2018.
Documenting the information content of images.
Bidgood, W. D.
1997-01-01
A standards-based message and terminology architecture has been specified to enable large-scale open and non-proprietary interchange of imaging-procedure descriptions and image-interpretation reports providing semantically-rich linkage of linguistic and non-linguistic information. The DICOM Structured Reporting Supplement, now available for trial use, embodies this interdependent message/terminology architecture. A DICOM structured report object is a self-describing information structure that can be tailored to support diverse clinical observation reporting applications by utilization of templates and context-dependent terminology from an external message/terminology mapping resource such as the SNOMED DICOM Microglossary (SDM), HL7 Vocabulary, or Terminology Resource for Message Standards (TeRMS). PMID:9357661
Patel, Neha; Siegler, James E; Stromberg, Nathaniel; Ravitz, Neil; Hanson, C William
2016-08-10
In hospitals, effective and efficient communication among care providers is critical to the provision of high-quality patient care. Yet, major problems impede communications including the frequent use of interruptive and one-way communication paradigms. This is especially frustrating for frontline providers given the dynamic nature of hospital care teams in an environment that is in constant flux. We conducted a pre-post evaluation of a commercially available secured messaging mobile application on 4 hospital units at a single institution for over one year. We included care providers on these units: residents, hospitalists, fellows, nurses, social workers, and pharmacists. Utilization metrics and survey responses on clinician perceptions were collected and analyzed using descriptive statistics, the Kruskal-Wallis test, and Mann-Whitney U test where appropriate. Between May 2013 and June 2014, 1,021 providers sent a total of 708,456 messages. About 85.5% of total threads were between two providers and the remaining were group messages. Residents and social workers/clinical resource coordinators were the largest per person users of this communication system, sending 9 (IQR 2-20) and 9 (IQR 2-22) messages per person per day, and receiving 18 (IQR 5-36) and 14 (IQR 5-29) messages per person per day, respectively (p=0.0001). More than half of the messages received by hospitalists, residents, and nurses were read within a minute. Communicating using secured messaging was found to be statistically significantly less disruptive to workflow by both nursing and physician survey respondents (p<0.001 for each comparison). Routine adoption of secured messaging improved perceived efficiency among providers on 4 hospital units. Our study suggests that a mobile application can improve communication and workflow efficiency among providers in a hospital. New technology has the potential to improve communication among care providers in hospitals.
NASA Astrophysics Data System (ADS)
Gregg, C. E.; Sorensen, J. H.; Vogt Sorensen, B.; Whitmore, P.; Johnston, D. M.
2016-12-01
Spurred in part by world-wide interest in improving warning messaging for and response to tsunamis in the wake of several catastrophic tsunamis since 2004 and growing interest at the US National Weather Service (NWS) to integrate social science into their Tsunami Program, the NWS Tsunami Warning Centers in Alaska and Hawaii have made great progress toward enhancing tsunami messages. These include numerous products, among them being Tsunami Warnings, Tsunami Advisories and Tsunami Watches. Beginning in 2010 we have worked with US National Tsunami Hazard Mitigation Program (NTHMP) Warning Coordination and Mitigation and Education Subcommittee members; Tsunami Program administrators; and NWS Weather Forecast Officers to conduct a series of focus group meetings with stakeholders in coastal areas of Alaska, American Samoa, California, Hawaii, North Carolina, Oregon, US Virgin Islands and Washington to understand end-user perceptions of existing messages and their existing needs in message products. We also reviewed research literature on behavioral response to warnings to develop a Tsunami Warning Message Metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order, Formatting, and Receiver Characteristics. A sample message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met, whether the message is a full length or short message. Incrementally, this work contributed to revisions in the format, content and style of message products issued by the National Tsunami Warning Center (NTWC). Since that time, interest in short warning messages has continued to increase and in May 2016 the NTWC began efforts to revise message products to take advantage of recent NWS policy changes allowing use of mixed-case text format and expanded punctuation, a practice which the NWS first started in 2010. Here we describe our application of a modification of the warning message metric to develop new streamlined messages using mixed-case text. These messages reflect current state-of-the-art knowledge on warning message effectiveness.
ERIC Educational Resources Information Center
Guelph Univ. (Ontario).
This 21-paper collection examines various issues in electronic networking and conferencing with computers, including design issues, conferencing in education, electronic messaging, computer conferencing applications, social issues of computer conferencing, and distributed computer conferencing. In addition to a keynote address, "Computer…
EUTELTRACS: The European experience on mobile satellite services
NASA Technical Reports Server (NTRS)
Colcy, Jean-Noel; Steinhaeuser, Rafael
1993-01-01
EUTELTRACS is Europe's first commercially operated Mobile Satellite Service. Under the overall network operation of EUTELSAT, the European Telecommunications Satellite Organization, EUTELTRACS provides an integrated message exchange and position reporting service. This paper describes the EUTELTRACS system architecture, the message exchange and the position reporting services, including the result of recent analysis of message delivery time and positioning accuracy. It also provides an overview of the commercial deployment, the regulatory situation for its operation within Europe and new applications outside its target market, the international road transportation.
Op den Akker, Harm; Cabrita, Miriam; Op den Akker, Rieks; Jones, Valerie M; Hermens, Hermie J
2015-06-01
This paper presents a comprehensive and practical framework for automatic generation of real-time tailored messages in behavior change applications. Basic aspects of motivational messages are time, intention, content and presentation. Tailoring of messages to the individual user may involve all aspects of communication. A linear modular system is presented for generating such messages. It is explained how properties of user and context are taken into account in each of the modules of the system and how they affect the linguistic presentation of the generated messages. The model of motivational messages presented is based on an analysis of existing literature as well as the analysis of a corpus of motivational messages used in previous studies. The model extends existing 'ontology-based' approaches to message generation for real-time coaching systems found in the literature. Practical examples are given on how simple tailoring rules can be implemented throughout the various stages of the framework. Such examples can guide further research by clarifying what it means to use e.g. user targeting to tailor a message. As primary example we look at the issue of promoting daily physical activity. Future work is pointed out in applying the present model and framework, defining efficient ways of evaluating individual tailoring components, and improving effectiveness through the creation of accurate and complete user- and context models. Copyright © 2015 Elsevier Inc. All rights reserved.
Enhancing Mobile Access to Information with the Short Message Service
ERIC Educational Resources Information Center
Brown, Jeff; Vetter, Ron; Saunders-White, Debra
2008-01-01
This article describes the development of interactive text message applications at the University of North Carolina Wilmington. We describe how the university's information technology innovation program led to the formation of a faculty owned company in which the university holds an equity interest. Next, we discuss the collaborative development…
47 CFR 64.3100 - Restrictions on mobile service commercial messages.
Code of Federal Regulations, 2011 CFR
2011-10-01
... advertise or promote a product, service, or Internet website of the person or entity forwarding the message... subscriber; (2) Include a functioning return electronic mail address or other Internet-based mechanism that... communications made to the electronic mail address, other Internet-based mechanism or, if applicable, other...
DOT National Transportation Integrated Search
2013-04-01
Text messaging is no longer limited to manual-entry. There are several mobile applications that aim to assist the driver in sending and receiving text messages by incorporating a voice-to-text component. To date, there has been no published research ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Painter, J.; McCormick, P.; Krogh, M.
This paper presents the ACL (Advanced Computing Lab) Message Passing Library. It is a high throughput, low latency communications library, based on Thinking Machines Corp.`s CMMD, upon which message passing applications can be built. The library has been implemented on the Cray T3D, Thinking Machines CM-5, SGI workstations, and on top of PVM.
Clarifying Prescriptive Messages about HIV: The Case of Long-Term Mutually Monogamous Relationships.
ERIC Educational Resources Information Center
Parrillo, Anthony V.; Clark, Jeffrey K.
1995-01-01
Examines the appropriateness of using the word monogamy in acquired immune deficiency syndrome (AIDS) education, identifying basic concepts within prescriptive messages about human immunodeficiency virus (HIV); reviewing definitions, applications, and interpretations of monogamy in the literature; presenting a content analysis of sexuality and…
Network support for system initiated checkpoints
Chen, Dong; Heidelberger, Philip
2013-01-29
A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.
Abroms, Lorien C; Chiang, Shawn; Macherelli, Laura; Leavitt, Leah; Montgomery, Margaret
2017-10-03
Automated text messages on mobile phones have been found to be effective for smoking cessation in adult smokers. This study aims to test the acceptability and feasibility of SmokefreeMOM, a national smoking cessation text-messaging program for pregnant smokers. Participants were recruited from prenatal care and randomized to receive SmokefreeMOM (n=55), an automated smoking cessation text-messaging program, or a control text message quitline referral (n=44). Participants were surveyed by phone at baseline and at 1 month and 3 months after enrollment. Results indicate that the SmokefreeMOM program was highly rated overall and rated more favorably than the control condition in its helpfulness at 3-month follow-up (P<.01) and in its frequency of messaging at both 1-month and 3-month follow-ups (P<.001, P<.01, respectively). Despite the presence of technical problems, the vast majority of intervention participants read all program messages, and few participants unsubscribed from the program. There were no significant differences between groups on the use of extra treatment resources or on smoking-related outcomes. However, at the 3-month follow-up, some outcomes favored the intervention group. SmokefreeMOM is acceptable for pregnant smokers. It is recommended that SmokefreeMOM be further refined and evaluated. Clinicaltrials.gov NCT02412956; https://clinicaltrials.gov/ct2/show/NCT02412956 (Archived by WebCite at http://www.webcitation.org/6tcmeRnbC). ©Lorien C Abroms, Shawn Chiang, Laura Macherelli, Leah Leavitt, Margaret Montgomery. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 03.10.2017.
[The poster as a communication medium].
Tovar Samanez, C
1987-01-01
The poster as a medium of communication serves to transmit a message by means of a graphical synthesis. It elicits attention by its originality, contrast, and focus on the center of interest. The poster is effective if the images and slogans can be identified easily. Its visual attractiveness is also essential. The understanding of the message is the function of the cultural characteristics of the public with symbols, metaphors, gestures, and detailed description. The appeal of the message allows the public to accept it on sensorial, emotional, social, intellectual, and economical levels. Adverse motivations should not be confused with the positive appeal (prejudice, preconceived ideas, and bias). Confusion and ambiguity can carry conflicting messages, therefore negative examples should be avoided. The force of the message targets the memory carrying conviction and calling to action. The target group and objective must be defined as to age, occupation, location, and sex. The message also has to be defined precisely for the target audience. It is in the analysis of the context whereby the poster is received as to notions of the target topic, alternative attitudes relative to the promotion of the message, obstacles that are encountered in the mentality of the target, and cultural characteristics of the target audience. The text of the slogan must be given before drawing the poster. The designing of the poster should be creative with association of ideas, metaphors and symbols, descriptive images, fusion of symbolic and descriptive forms, humor, the fusion of graphics with letters, and the fusion of letters with images. Completed forms of the poster use illustration, photography, typography, calligraphy, and photo montage.
Asynchronous Messaging and Data Transfer in a Spacecraft: An Implementation
NASA Technical Reports Server (NTRS)
Moholt, Joseph M.
2005-01-01
Data transfer and messaging is an important part of a spacecraft. Creating a standard protocol for messaging that can be used for a variety of applications is an extremely beneficial project at the Jet Propulsion Laboratory (JPL). The Asynchronous Messaging Service (AMS) is a protocol outlining how subsystems initialize and conduct communication between each other. There are currently two implementations of AMS in the works. At JPL, my task is to get a working implementation of AMS onto vxWorks as a proof of concept. An Autocoder, a program used to convert visually created state chart diagrams to C++, has also been created to accomplish a part of the implementation. I was assigned to make the program portable on any Unix type environment. Lastly, I was to develop a program to demonstrate messaging between two FireWire cards running vxworks.
Yoo, Jina H.; Kreuter, Matthew W.; Lai, Choi; Fu, Qiang
2014-01-01
This study tests the processes through which breast cancer narrative messages are effective by taking a functional approach. We explore how discrete negative emotions (i.e., sadness, fear, and anger) induced by breast cancer survivor stories affect African American women’s message processing, recall of message content, and attitudinal outcomes. Structural equation modeling was performed for narrative and informational versions of a breast cancer screening video shown to 409 low-income African American women ages 40 and older. The model was well fitted. Sadness enhanced the persuasive process, while fear inhibited it. Sadness also helped participants recall more message-relevant content, while fear inhibited recall. Anger was not related to the persuasive process. Implications of these findings for narrative research and application are discussed. PMID:24111724
Collaborative Scheduling Using JMS in a Mixed Java and .NET Environment
NASA Technical Reports Server (NTRS)
Wang, Yeou-Fang; Wax, Allan; Lam, Ray; Baldwin, John; Borden, Chet
2006-01-01
A collaborative framework/environment was proto-typed to prove the feasibility of scheduling space flight missions on NASA's Deep Space Network (DSN) in a distributed fashion. In this environment, effective collaboration relies on efficient communications among all flight mission and DSN scheduling users. There-fore, messaging becomes critical to timely event notification and data synchronization. In the prototype, a rapid messaging system using Java Message Service (JMS) in a mixed Java and .NET environment is established. This scheme allows both Java and .NET applications to communicate with each other for data synchronization and schedule negotiation. The JMS approach we used is based on a centralized messaging scheme. With proper use of a high speed messaging system, all users in this collaborative framework can communicate with each other to generate a schedule collaboratively to meet DSN and projects tracking needs.
MessageSpace: a messaging system for health research
NASA Astrophysics Data System (ADS)
Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura
2013-03-01
Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.
Unified messaging solution for biosurveillance and disease surveillance.
Abellera, John P; Srinivasan, Arunkumar; Danos, C Scott; McNabb, Scott; Rhodes, Barry
2007-10-11
Biosurveillance and disease surveillance systems serve different purposes. However, the richness and quality of an existing data stream and infrastructure used in biosurveillance may prove beneficial for any state-based electronic disease surveillance system, especially if an electronic laboratory data feed does not exist between a hospital and state-based system. The use of an Enterprise Application Integration(EAI) engine, such as the BioSense Integrator,will be necessary to map heterogeneous messages into standard representations, then validate and route them [1] to a disparate system. This poster illustrates the use of an existing BioSense Integrator in order to create a unified message to support the exchange of electronic lab messages necessary for reportable disease notification. An evaluation of the infrastructure for data messaging will be examined and presented, along with a cost and benefit analysis between hospital and state-based system.
Low Latency Messages on Distributed Memory Multiprocessors
Rosing, Matt; Saltz, Joel
1995-01-01
This article describes many of the issues in developing an efficient interface for communication on distributed memory machines. Although the hardware component of message latency is less than 1 ws on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 μs. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. This article describes several tests performed and many of the issues involvedmore » in supporting low latency messages on distributed memory machines.« less
Kawamoto, Kensaku; Lobach, David F
2005-01-01
Despite their demonstrated ability to improve care quality, clinical decision support systems are not widely used. In part, this limited use is due to the difficulty of sharing medical knowledge in a machine-executable format. To address this problem, we developed a decision support Web service known as SEBASTIAN. In SEBASTIAN, individual knowledge modules define the data requirements for assessing a patient, the conclusions that can be drawn using that data, and instructions on how to generate those conclusions. Using standards-based XML messages transmitted over HTTP, client decision support applications provide patient data to SEBASTIAN and receive patient-specific assessments and recommendations. SEBASTIAN has been used to implement four distinct decision support systems; an architectural overview is provided for one of these systems. Preliminary assessments indicate that SEBASTIAN fulfills all original design objectives, including the re-use of executable medical knowledge across diverse applications and care settings, the straightforward authoring of knowledge modules, and use of the framework to implement decision support applications with significant clinical utility.
Design of Instant Messaging System of Multi-language E-commerce Platform
NASA Astrophysics Data System (ADS)
Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru
2017-09-01
This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.
NASA Technical Reports Server (NTRS)
Woo, Simon S.; Cheng, Michael K.
2011-01-01
The original Luby Transform (LT) coding scheme is extended to account for data transmissions where some information symbols in a message block are more important than others. Prioritized LT codes provide unequal error protection (UEP) of data on an erasure channel by modifying the original LT encoder. The prioritized algorithm improves high-priority data protection without penalizing low-priority data recovery. Moreover, low-latency decoding is also obtained for high-priority data due to fast encoding. Prioritized LT codes only require a slight change in the original encoding algorithm, and no changes at all at the decoder. Hence, with a small complexity increase in the LT encoder, an improved UEP and low-decoding latency performance for high-priority data can be achieved. LT encoding partitions a data stream into fixed-sized message blocks each with a constant number of information symbols. To generate a code symbol from the information symbols in a message, the Robust-Soliton probability distribution is first applied in order to determine the number of information symbols to be used to compute the code symbol. Then, the specific information symbols are chosen uniform randomly from the message block. Finally, the selected information symbols are XORed to form the code symbol. The Prioritized LT code construction includes an additional restriction that code symbols formed by a relatively small number of XORed information symbols select some of these information symbols from the pool of high-priority data. Once high-priority data are fully covered, encoding continues with the conventional LT approach where code symbols are generated by selecting information symbols from the entire message block including all different priorities. Therefore, if code symbols derived from high-priority data experience an unusual high number of erasures, Prioritized LT codes can still reliably recover both high- and low-priority data. This hybrid approach decides not only "how to encode" but also "what to encode" to achieve UEP. Another advantage of the priority encoding process is that the majority of high-priority data can be decoded sooner since only a small number of code symbols are required to reconstruct high-priority data. This approach increases the likelihood that high-priority data is decoded first over low-priority data. The Prioritized LT code scheme achieves an improvement in high-priority data decoding performance as well as overall information recovery without penalizing the decoding of low-priority data, assuming high-priority data is no more than half of a message block. The cost is in the additional complexity required in the encoder. If extra computation resource is available at the transmitter, image, voice, and video transmission quality in terrestrial and space communications can benefit from accurate use of redundancy in protecting data with varying priorities.
Text Messaging Interventions on Cancer Screening Rates: A Systematic Review.
Uy, Catherine; Lopez, Jennifer; Trinh-Shevrin, Chau; Kwon, Simona C; Sherman, Scott E; Liang, Peter S
2017-08-24
Despite high-quality evidence demonstrating that screening reduces mortality from breast, cervical, colorectal, and lung cancers, a substantial portion of the population remains inadequately screened. There is a critical need to identify interventions that increase the uptake and adoption of evidence-based screening guidelines for preventable cancers at the community practice level. Text messaging (short message service, SMS) has been effective in promoting behavioral change in various clinical settings, but the overall impact and reach of text messaging interventions on cancer screening are unknown. The objective of this systematic review was to assess the effect of text messaging interventions on screening for breast, cervical, colorectal, and lung cancers. We searched multiple databases for studies published between the years 2000 and 2017, including PubMed, EMBASE, and the Cochrane Library, to identify controlled trials that measured the effect of text messaging on screening for breast, cervical, colorectal, or lung cancers. Study quality was evaluated using the Cochrane risk of bias tool. Our search yielded 2238 citations, of which 31 underwent full review and 9 met inclusion criteria. Five studies examined screening for breast cancer, one for cervical cancer, and three for colorectal cancer. No studies were found for lung cancer screening. Absolute screening rates for individuals who received text message interventions were 0.6% to 15.0% higher than for controls. Unadjusted relative screening rates for text message recipients were 4% to 63% higher compared with controls. Text messaging interventions appear to moderately increase screening rates for breast and cervical cancer and may have a small effect on colorectal cancer screening. Benefit was observed in various countries, including resource-poor and non-English-speaking populations. Given the paucity of data, additional research is needed to better quantify the effectiveness of this promising intervention. ©Catherine Uy, Jennifer Lopez, Chau Trinh-Shevrin, Simona C Kwon, Scott E Sherman, Peter S Liang. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 24.08.2017.
Information and the Origin of Qualia
Orpwood, Roger
2017-01-01
This article argues that qualia are a likely outcome of the processing of information in local cortical networks. It uses an information-based approach and makes a distinction between information structures (the physical embodiment of information in the brain, primarily patterns of action potentials), and information messages (the meaning of those structures to the brain, and the basis of qualia). It develops formal relationships between these two kinds of information, showing how information structures can represent messages, and how information messages can be identified from structures. The article applies this perspective to basic processing in cortical networks or ensembles, showing how networks can transform between the two kinds of information. The article argues that an input pattern of firing is identified by a network as an information message, and that the output pattern of firing generated is a representation of that message. If a network is encouraged to develop an attractor state through attention or other re-entrant processes, then the message identified each time physical information is cycled through the network becomes “representation of the previous message”. Using an example of olfactory perception, it is shown how this piggy-backing of messages on top of previous messages could lead to olfactory qualia. The message identified on each pass of information could evolve from inner identity, to inner form, to inner likeness or image. The outcome is an olfactory quale. It is shown that the same outcome could result from information cycled through a hierarchy of networks in a resonant state. The argument for qualia generation is applied to other sensory modalities, showing how, through a process of brain-wide constraint satisfaction, a particular state of consciousness could develop at any given moment. Evidence for some of the key predictions of the theory is presented, using ECoG data and studies of gamma oscillations and attractors, together with an outline of what further evidence is needed to provide support for the theory. PMID:28484376
Montiel-Ishino, Francisco A; Smyth, Joshua M; Murphy, Dennis J; Miranda, Patricia Y; Davis, Lisa A
2016-01-01
Background Farmworkers’ exposures to pesticides are reduced when they wear personal protective equipment (PPE), and mobile health (mHealth) platforms can potentially deliver information to farmworkers to help promote PPE use. However, little is known about the feasibility of using mHealth platforms to promote farmworkers’ use of PPE. Objective The objective of the study was to describe the development and feasibility-testing of Protect Yourself! (¡Protéjase!), an intervention designed to increase PPE use. As the vast majority of farmworkers in the United States are from Mexico, we examined the intervention in a primarily Mexican-origin farmworker population. Methods ¡Protéjase was developed in several steps. First, we performed ethnographic observations to understand what prevents PPE use. Next, we developed program components that met the challenges uncovered in the ethnographic observations, seeking direct feedback from farmworkers on each component. Feasibility was assessed using surveys and focus groups. Material was provided in Spanish or English at the preference of the participant. Finally, we pilot tested each component of the intervention, including: (1) PPE that was provided to each worker for their personal use during the intervention trial, and (2) delivery of an application-based tool that promoted the use of PPE through daily individualized messaging. Results 55 farmworkers enrolled in the study, but only 41 of 55 (75%) completed the entire pilot intervention trial. Results focus on the evaluation of the intervention, and include only those who completed the entire trial. Among farmworkers who completed the entire intervention trial, all but two farmworkers were born in Mexico and were Spanish speaking. Still, all study participants self-identified as Mexican or Mexican-American. When asked what changes were needed in the intervention’s messaging or delivery to increase user satisfaction, 22 out of 41 participants (54%) felt that no changes were needed. However, 16 of 41 participants (39%) suggested small changes to messaging (eg, refer to long pants as pants only) to improve their understanding of the messages. Finally, a small number (3 of 41 participants, 7%) felt that messages were difficult to read, primarily due to low literacy. Conclusions The ¡Protéjase! mHealth program demonstrated very good feasibility, satisfaction, and acceptance; potential improvements (eg, small modifications in messaging to increase farmworkers’ use) were noted. Overall, the PPE provided to workers as well as the mHealth platform were both perceived as useful for promoting PPE use. PMID:27066727
An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution
NASA Astrophysics Data System (ADS)
Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray
2013-09-01
In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when n<=4, because of better PSNR which is achieved by this technique. The final results obtained after steganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.
Liang, Yuhua Jake; Lee, Seungcheol Austin
2016-09-01
Human-robot interaction (HRI) will soon transform and shift the communication landscape such that people exchange messages with robots. However, successful HRI requires people to trust robots, and, in turn, the trust affects the interaction. Although prior research has examined the determinants of human-robot trust (HRT) during HRI, no research has examined the messages that people received before interacting with robots and their effect on HRT. We conceptualize these messages as SMART (Strategic Messages Affecting Robot Trust). Moreover, we posit that SMART can ultimately affect actual HRI outcomes (i.e., robot evaluations, robot credibility, participant mood) by affording the persuasive influences from user-generated content (UGC) on participatory Web sites. In Study 1, participants were assigned to one of two conditions (UGC/control) in an original experiment of HRT. Compared with the control (descriptive information only), results showed that UGC moderated the correlation between HRT and interaction outcomes in a positive direction (average Δr = +0.39) for robots as media and robots as tools. In Study 2, we explored the effect of robot-generated content but did not find similar moderation effects. These findings point to an important empirical potential to employ SMART in future robot deployment.
Hogan, Timothy P; Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G
2018-03-08
As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70.2%, 262/373 vs 82.0%, 277/338), and respectful in nature (25.7%, 96/373 vs 33.4%, 113/338). Secure messages from health care team members sometimes appeared hurried (25.4%, 86/338) but also displayed friendliness or warmth (18.9%, 64/338) and reassurance or encouragement (18.6%, 63/338). Most patient messages involved either providing or seeking information; however, the majority of health care team member messages involved information provision in response to patient questions. This evaluation is an important step toward understanding the content and socioemotional tone that is part of the secure messaging exchanges between patients and health care team members. Our findings were encouraging; however, there are opportunities for improvement. As health care organizations seek to supplement traditional encounters with virtual care, they must reexamine their use of secure messaging, including the patient centeredness of the communication, and the potential for more proactive use by health care team members. ©Timothy P Hogan, Tana M Luger, Julie E Volkman, Mary Rocheleau, Nora Mueller, Anna M Barker, Kim M Nazi, Thomas K Houston, Barbara G Bokhour. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 08.03.2018.
Usage Patterns of Communication Interfaces for Social Support among At-Risk Adolescents
ERIC Educational Resources Information Center
Passig, David
2014-01-01
Social and interpersonal support has mostly been carried out face-to-face. However, the internet was able, in the last couple of decades, to facilitate social interactions through a range of computer-mediated communication (CMC) interfaces--from email applications, chat-rooms, forums, instant messages (IM), short text messages (SMS), social…
Application of a Socio-Ecological Model to Mother-Infant Bed-Sharing
ERIC Educational Resources Information Center
Salm Ward, Trina C.; Doering, Jennifer J.
2014-01-01
Mother-infant bed-sharing has been associated with an increased risk of sleep-related infant deaths, and thus, health messaging has aimed to discourage this behavior. Despite this messaging, bed-sharing remains a common practice in the United States, especially among minority families. Moreover, rates of accidental suffocation and strangulation in…
Text messaging-based smoking cessation intervention: a narrative review.
Kong, Grace; Ells, Daniel M; Camenga, Deepa R; Krishnan-Sarin, Suchitra
2014-05-01
Smoking cessation interventions delivered via text messaging on mobile phones may enhance motivations to quit smoking. The goal of this narrative review is to describe the text messaging interventions' theoretical contents, frequency and duration, treatment outcome, and sample characteristics such as age and motivation to quit, to better inform the future development of this mode of intervention. Studies were included if text messaging was primarily used to deliver smoking cessation intervention and published in English in a peer-reviewed journal. All articles were coded by two independent raters to determine eligibility and to extract data. Twenty-two studies described 15 text messaging interventions. About half of the interventions recruited adults (ages 30-40) and the other half targeted young adults (ages 18-29). Fourteen interventions sent text messages during the quit phase, 10 had a preparation phase and eight had a maintenance phase. The number of text messages and the duration of the intervention varied. All used motivational messages grounded in social cognitive behavioral theories, 11 used behavioral change techniques, and 14 used individually tailored messages. Eleven interventions also offered other smoking cessation tools. Three interventions yielded smoking cessation outcomes greater than the control condition. The proliferation of text messaging in recent years suggests that text messaging interventions may have the potential to improve smoking cessation rates. Detailed summary of the interventions suggests areas for future research and clinical application. More rigorous studies are needed to identify components of the interventions that can enhance their acceptability, feasibility and efficacy. Copyright © 2013. Published by Elsevier Ltd.
Text Messaging-Based Smoking Cessation Intervention: A Narrative Review
Kong, Grace; Ells, Daniel; Camenga, Deepa R.; Krishnan-Sarin, Suchitra
2014-01-01
Introduction Smoking cessation interventions delivered via text messaging on mobile phones may enhance motivations to quit smoking. The goal of this narrative review is to describe the text messaging interventions’ theoretical contents, frequency and duration, treatment outcome, and sample characteristics such as age and motivation to quit, to better inform the future development of this mode of intervention. Methods Studies were included if text messaging was primarily used to deliver smoking cessation intervention and published in English in a peer-reviewed journal. All articles were coded by two independent raters to determine eligibility and to extract data. Results Twenty-two studies described 15 text messaging interventions. About half of the interventions recruited adults (ages 30-40s) and the other half targeted young adults (ages 18-29). Fourteen interventions sent text messages during the quit phase, 10 had a preparation phase and eight had a maintenance phase. The number of text messages and the duration of the intervention varied. All used motivational messages grounded in social cognitive behavioral theories, 11 used behavioral change techniques, and 14 used individually tailored messages. Eleven interventions also offered other smoking cessation tools. Three interventions yielded smoking cessation outcomes greater than the control condition. Conclusions The proliferation of text messaging in recent years suggests that text messaging interventions may have the potential to improve smoking cessation rates. Detailed summary of the interventions suggest areas for future research and clinical application. More rigorous studies are needed to identify components of the interventions that can enhance their acceptability, feasibility and efficacy. PMID:24462528
Liese, Bruce S; Benau, Erik M; Atchley, Paul; Reed, Derek; Becirevic, Amel; Kaplan, Brent
2018-05-14
Some have suggested that text messaging is an addictive behavior. However, this characterization is uncertain, partly due to lack of well-validated measures of text messaging attitudes and behaviors. One standard instrument for measuring text messaging attitudes and behaviors is the Self-perception of Text-message Dependency Scale (STDS), though the psychometric properties of this scale have only been examined with a sample of Japanese youth. The primary objective of this study was to evaluate the STDS in the United States to determine its utility as a measure of text messaging dependence. We were interested in examining the factor structure and determining the extent to which this scale would correlate with two important outcome measures: motor vehicle accidents (MVAs) and moving violations. We analyzed data from 468 adults (age 18-74; 274 women) recruited via Amazon's Mechanical Turk (mTurk) service. Participants completed the STDS and provided information about their driving-related incidents in the past year. First we performed a confirmatory factor analysis, which supported the instrument's original factor structure. Then we tested the relationship between scores on the STDS and two important variables, MVAs and moving violations. We found that the STDS significantly correlated with both MVAs and moving violations. The present study confirms that the STDS is a potentially useful instrument for studying texting dependence in the United States and with adults of all ages. The instrument may be particularly useful in predicting motor vehicle outcomes.
Shen, Lijiang
2010-01-01
This study investigated whether and how message frames in anti-smoking public service announcements (PSAs) affect individuals' cognition and attitude toward smoking. Individuals in a sample of 315 participants were randomly assigned to one of three experimental framing conditions: (a) health consequence, (b) secondhand smoke, and (c) industry manipulation. Each participant viewed four PSAs in a random order within a particular message frame. The study found strong evidence for the application effect in framing. The accessibility effect in framing was found to be conditional on message frame. Individuals' cognition on health consequence of smoking and on industry manipulation predicted their attitude toward smoking, but not cognition on secondhand smoke. The three frames also led to different patterns of affective responses that can be a basis for persuasion. Implications for message framing effect and anti-smoking campaigns were discussed.
Hall, Michael L
2009-01-01
Persuasive messages for marketing healthcare services in general and coordinated care in particular are more important now for providers, hospitals, and third-party payers than ever before. The combination of measurement-based information and creativity may be among the most critical factors in reaching markets or expanding markets. The research presented here provides an approach to marketing coordinated care services which allows healthcare managers to plan persuasive messages given the market conditions they face. Using market respondents' thinking about product attributes combined with distance measurement between pairs of product attributes, a conceptual marketing map is presented and applied to advertising, message copy, and delivery. The data reported here are representative of the potential caregivers for which the messages are intended. Results are described with implications for application to coordinated care services. Theory building and marketing practice are discussed in the light of findings and methodology.
Implementation of cryptographic hash function SHA256 in C++
NASA Astrophysics Data System (ADS)
Shrivastava, Akash
2012-02-01
This abstract explains the implementation of SHA Secure hash algorithm 256 using C++. The SHA-2 is a strong hashing algorithm used in almost all kinds of security applications. The algorithm consists of 2 phases: Preprocessing and hash computation. Preprocessing involves padding a message, parsing the padded message into m-bits blocks, and setting initialization values to be used in the hash computation. It generates a message schedule from padded message and uses that schedule, along with functions, constants, and word operations to iteratively generate a series of hash values. The final hash value generated by the computation is used to determine the message digest. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits. The algorithm outputs a 256 bits message block with an internal state block of 256 bits and initial block size of 512 bits. Maximum message length in bit is generated is 2^64 -1, over all computed over a series of 64 rounds consisting or several operations such as and, or, Xor, Shr, Rot. The code will provide clear understanding of the hash algorithm and generates hash values to retrieve message digest.
The effect of message framing on self-management of chronic pain: a new perspective on intervention?
Janke, E Amy; Spring, Bonnie; Weaver, Frances
2011-07-01
This study examines framed messages as a novel approach to promote self-management of chronic pain. Primary care patients reporting chronic pain (pain rated ≥ 4 on 0-10 NRS-I for ≥3 months) were randomly assigned to receive a gain- or loss-framed message promoting self-management of pain. Impact of the framed message on behavioural self-management (including communicating with providers, relaxation, activity pacing, pleasant activities and healthy lifestyle) was assessed. Post-message, individuals in the loss-frame condition reported significantly greater interest in and more knowledge gained from the information presented in the message (p≤0.03). Loss-frame participants were significantly more likely to express confidence that they would practice relaxation (p≤0.03). Pain readiness to change, pain self-efficacy and message frame independently influenced motivation to engage in relaxation as a self-management strategy. Across all behaviours assessed, there were no observed interactions between message frame and either pain self-efficacy or pain readiness to change (p>0.05). Framing may be useful to promote pain self-management; larger trials are needed to fully evaluate its potential and to further assess the applicability of framed communication to impact a broader range of chronic conditions. © 2011 Taylor & Francis
Diagnosing the Causes and Severity of One-sided Message Contention
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tallent, Nathan R.; Vishnu, Abhinav; van Dam, Hubertus
Two trends suggest network contention for one-sided messages is poised to become a performance problem that concerns application developers: an increased interest in one-sided programming models and a rising ratio of hardware threads to network injection bandwidth. Unfortunately, it is difficult to reason about network contention and one-sided messages because one-sided tasks can either decrease or increase contention. We present effective and portable techniques for diagnosing the causes and severity of one-sided message contention. To detect that a message is affected by contention, we maintain statistics representing instantaneous (non-local) network resource demand. Using lightweight measurement and modeling, we identify themore » portion of a message's latency that is due to contention and whether contention occurs at the initiator or target. We attribute these metrics to program statements in their full static and dynamic context. We characterize contention for an important computational chemistry benchmark on InfiniBand, Cray Aries, and IBM Blue Gene/Q interconnects. We pinpoint the sources of contention, estimate their severity, and show that when message delivery time deviates from an ideal model, there are other messages contending for the same network links. With a small change to the benchmark, we reduce contention up to 50% and improve total runtime as much as 20%.« less
Dissuasive exit signage for building fire evacuation.
Olander, Joakim; Ronchi, Enrico; Lovreglio, Ruggiero; Nilsson, Daniel
2017-03-01
This work presents the result of a questionnaire study which investigates the design of dissuasive emergency signage, i.e. signage conveying a message of not utilizing a specific exit door. The work analyses and tests a set of key features of dissuasive emergency signage using the Theory of Affordances. The variables having the largest impact on observer preference, interpretation and noticeability of the signage have been identified. Results show that features which clearly negate the exit-message of the original positive exit signage are most effective, for instance a red X-marking placed across the entirety of the exit signage conveys a clear dissuasive message. Other features of note are red flashing lights and alternation of colour. The sense of urgency conveyed by the sign is largely affected by sensory inputs such as red flashing lights or other features which cause the signs to break the tendencies of normalcy. Copyright © 2016 Elsevier Ltd. All rights reserved.
Cremers, Henricus-Paul; Mercken, Liesbeth; Candel, Math; de Vries, Hein; Oenema, Anke
2015-03-09
Smoking prevalence rates among Dutch children increase rapidly after they transit to secondary school, in particular among children with a low socioeconomic status (SES). Web-based, computer-tailored programs supplemented with prompt messages may be able to empower children to prevent them from starting to smoke when they transit to secondary school. The main aim of this study is to evaluate whether computer-tailored feedback messages, with and without prompt messages, are effective in decreasing children's smoking intentions and smoking behavior after 12 and 25 months of follow-up. Data were gathered at baseline (T0), and after 12 months (T1) and 25 months (T2) of follow-up of a smoking prevention intervention program called Fun without Smokes. A total of 162 schools were randomly allocated to a no-intervention control group, an intervention prompt group, or an intervention no-prompt group. A total of 3213 children aged 10 to 12 years old participated in the study and completed a Web-based questionnaire assessing their smoking intention, smoking behavior, and sociocognitive factors, such as attitude, social influence, and self-efficacy, related to smoking. After completion, children in the intervention groups received computer-tailored feedback messages in their own email inbox and those messages could be accessed on the intervention website. Children in the prompt group received prompt messages, via email and short message service (SMS) text messaging, to stimulate them to reuse the intervention website with nonsmoking content. Multilevel logistic regression analyses were performed using multiple imputations to assess the program effects on smoking intention and smoking behavior at T1 and T2. A total of 3213 children participated in the Fun without Smokes study at T0. Between T0 and T1 a total of 1067 children out of the original 3213 (33.21%) dropped out of the study. Between T0 and T2 the number of children that did not participate in the final measurement was 1730 out of the original 3213 (53.84%). No significant program effects were observed for any of the intervention groups compared to the control group at T1 for the intention to engage in smoking-prompt, OR 0.67 (95% CI 0.30-1.50), no-prompt, OR 0.76 (95% CI 0.34-1.67)-or for smoking behavior-prompt, OR 1.13 (95% CI 0.13-9.98), no-prompt, OR 0.50 (95% CI 0.04-5.59). Similar nonsignificant program effects were found at T2 for the intention to start smoking-prompt, OR 0.78 (95% CI 0.26-2.32), no-prompt, OR 1.31 (95% CI 0.45-3.82)-and smoking behavior-prompt, OR 0.53 (95% CI 0.12-2.47), no-prompt, OR 1.01 (95% CI 0.24-4.21). This study showed that the Web-based, computer-tailored feedback messages with and without prompt messages were not effective in modifying children's smoking intentions and smoking behavior as compared to no information. Future smoking prevention interventions are recommended to start closer to the age of actual smoking uptake. Furthermore, future studies on Web-based, computer-tailored smoking prevention programs should focus on assessing and controlling exposure to the educational content and the response to the prompt messages. Netherlands Trial Register NTR3116; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=3116 (Archived by WebCite at http://www.webcitation.org/6O0wQYuPI).
LSB Based Quantum Image Steganography Algorithm
NASA Astrophysics Data System (ADS)
Jiang, Nan; Zhao, Na; Wang, Luo
2016-01-01
Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.
TeleHealth networks: Instant messaging and point-to-point communication over the internet
NASA Astrophysics Data System (ADS)
Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios
2006-12-01
This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.
Ju, Ilwoo; Park, Jin Seong
2015-01-01
This study addresses a void in the literature on direct-to-consumer prescription drug advertising (DTCA) with a theory-based content analysis. The findings indicate that Taylor's communication strategy wheel provides insight into what and how pharmaceutical marketers communicate with consumers by means of DTCA. Major findings are summarized as follows: (a) In most DTC ads, informational and transformational message themes and creative approaches were simultaneously used, indicating a combination strategy; (b) DTCA message themes were associated with creative strategies in alignment with Taylor's framework; and (c) message themes and creative strategies varied across therapeutic categories and DTCA categories with different levels of ad spending. Theoretical and practical implications of the findings are discussed.
Enhancement of Olfactory Discrimination
1976-10-01
messages. Science, 163: 1031-1037. Schneider, D., Kasang, G. and Kaissling, (1968). Bestimmung der Riechshwelle von Bombyx mori MiL Tritium-markiertem... original odorant as the active agent. The failure of o-ionone to alter performance significantly is consistent with this possibility since it is so
Taking the Message to the People.
ERIC Educational Resources Information Center
Zoglin, Mary Lou; Luskin, Bernard J.
1981-01-01
Describes the origination, goals, funding proposal, and implementation of "Project People," a public relations effort conducted by the California Community and Junior College Association. Reveals how the project strengthened the colleges' position through more knowledgeable staff, heightened awareness of college needs within state and…
47 CFR 32.5100 - Long distance message revenue.
Code of Federal Regulations, 2010 CFR
2010-10-01
... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100... terminate beyond the basic service area of the originating wire center and are individually priced. This..., supervisory control, miscellaneous signaling and channels furnished for the purpose of extending customer...
Patient Perspectives on a Text Messaging Program to Support Asthma Management: A Qualitative Study.
Doyle, Reina; Albright, Karen; Hurley, Laura P; Chávez, Catia; Stowell, Melanie; Dircksen, Suzanne; Havranek, Edward P; Anderson, Mark
2018-05-01
This study investigated participants' acceptance of a short messaging service (SMS) intervention designed to support asthma management, including suggestions regarding program delivery and message content. Individual and group interviews were conducted with patients from a safety-net health care system in Denver, Colorado. Eligible participants were English or Spanish speakers between the ages of 13 and 40 years, with diagnosed persistent asthma. All individual and group interviews were digitally recorded, transcribed, translated from Spanish to English (where applicable), and analyzed for thematic content by experienced analysts using established qualitative content techniques. The qualitative software package ATLAS.ti was used for data analysis and management. This study included a total of 43 participants. In general, participants were receptive toward the SMS program and supported the use of tailored and interactive messages. Adolescents supported the idea of enhancing care by sending messages to a support person, such as a parent or guardian. However, adults were less receptive toward this idea. Participants also preferred directive educational messages and cues to action, while general messages reminding them of their asthma diagnosis were viewed less favorably. The results from this study will inform a randomized control trial evaluating the efficacy of the SMS intervention.
Patient perceptions of text-messages, email, and video in dermatologic surgery patients.
Hawkins, Spencer D; Barilla, Steven; Williford, Phillip Williford M; Feldman, Steven R; Pearce, Daniel J
2017-04-14
We developed dermatology patient education videos and a post-operative text message service that could be accessed universally via web based applications. A secondary outcome of the study was to assess patient opinions of text-messages, email, and video in the health care setting which is reported here. An investigator-blinded, randomized, controlled intervention was evaluated in 90 nonmelanoma MMS patients at Wake Forest Baptist Dermatology. Patients were randomized 1:1:1:1 for exposure to: 1) videos with text messages, 2) videos only, 3) text messages-only, or 4) standard of care. Assessment measures were obtained by the use of REDCap survey questions during the follow up visit. 1) 67% would like to receive an email with information about the procedure beforehand 2) 98% of patients reported they would like other doctors to use educational videos as a form of patient education 3) 88% of our patients think it is appropriate for physicians to communicate to patients via text message in certain situations. Nearly all patients desired physicians to use text-messages and video in their practice and the majority of patients preferred to receive an email with information about their procedure beforehand.
Serrano-Castro, P J; Arjona Padillo, A; Guardado Santervás, P
2004-10-01
In recent years, professional mailing-lists (PML) have experienced wide diffusion in the field of the medicine thanks to their educational and academic potential. In neurology and in Spanish, Neurología list belonging to RedIRIS has played the lead in the history of PML. Since the year 1997, it has maintained approximately 200 persons related with neurology in communication and has exceeded more of 7,300 messages. We analyzed retrospectively the activity recorded in the Neurología PML between January and December 2003, recording variables related to the activity and scientific quality of the PML and to the origin and content of the messages. 758 messages were registered (2.07 messages/day; 3.73 messages/subscriber). 93 of 203 subscribers (45.81 %) participated on at least one occasion. 83 % of the messages came from Spain, there being an inverse relationship between the neurologists relative endowment and degree of participation in the PML. The most frequent messages referred to clinical cases followed by debate of topics of management and scientific consultations. The scientific quality of Neurología PML is comparable to other English language based PML analyzed based on the number of publications in Index Medicus and of the impact factor of its subscribers. Neurología PML has reached a level of maturity and enjoys a critical mass and a number of subscribers of high scientific level that assures its immediate future. Besides its educational and consultation functions, it may become an opinion forum for the Spanish neurologists without their losing their independence or Latin-American vocation.
Owens, Christabel; Farrand, Paul; Darvill, Ruth; Emmens, Tobit; Hewis, Elaine; Aitken, Peter
2011-09-01
OBJECTIVE To engage a group of people with relevant lived experience in the development of a text-messaging intervention to reduce repetition of self-harm. BACKGROUND Contact-based interventions, such as follow-up letters, postcards and telephone calls, have shown potential to reduce repetition of self-harm in those who present at Accident and Emergency departments. Text messaging offers a low-cost alternative that has not been tested. We set out to develop a text-based intervention. The process of intervention development is rarely reported and little is known about the impact of service user involvement on intervention design. METHOD We held a series of six participatory workshops and invited service users and clinicians to help us work out how to get the right message to the right person at the right time, and to simulate and test prototypes of an intervention. RESULTS Service users rejected both the idea of a generic, 'one size fits all' approach and that of 'audience segmentation', maintaining that text messages could be safe and effective only if individualized. This led us to abandon our original thinking and develop a way of supporting individuals to author their own self-efficacy messages and store them in a personal message bank for withdrawal at times of crisis. CONCLUSIONS This paper highlights both the challenge and the impact of involving consumers at the development stage. Working with those with lived experience requires openness, flexibility and a readiness to abandon or radically revise initial plans, and may have unexpected consequences for intervention design. © 2010 Blackwell Publishing Ltd.
Owens, Christabel; Farrand, Paul; Darvill, Ruth; Emmens, Tobit; Hewis, Elaine; Aitken, Peter
2010-01-01
Abstract Objective To engage a group of people with relevant lived experience in the development of a text‐messaging intervention to reduce repetition of self‐harm. Background Contact‐based interventions, such as follow‐up letters, postcards and telephone calls, have shown potential to reduce repetition of self‐harm in those who present at Accident and Emergency departments. Text messaging offers a low‐cost alternative that has not been tested. We set out to develop a text‐based intervention. The process of intervention development is rarely reported and little is known about the impact of service user involvement on intervention design. Method We held a series of six participatory workshops and invited service users and clinicians to help us work out how to get the right message to the right person at the right time, and to simulate and test prototypes of an intervention. Results Service users rejected both the idea of a generic, ‘one size fits all’ approach and that of ‘audience segmentation’, maintaining that text messages could be safe and effective only if individualized. This led us to abandon our original thinking and develop a way of supporting individuals to author their own self‐efficacy messages and store them in a personal message bank for withdrawal at times of crisis. Conclusions This paper highlights both the challenge and the impact of involving consumers at the development stage. Working with those with lived experience requires openness, flexibility and a readiness to abandon or radically revise initial plans, and may have unexpected consequences for intervention design. PMID:20860777
LeFevre, Amnesty E; Mohan, Diwakar; Hutchful, David; Jennings, Larissa; Mehl, Garrett; Labrique, Alain; Romano, Karen; Moorthy, Anitha
2017-03-14
Despite the growing use of technology in the health sector, little evidence is available on the technological performance of mobile health programs nor on the willingness of target users to utilize these technologies as intended (behavioral performance). In this case study of the Mobile Technology for Health (MOTECH) program in Ghana, we assess the platform's effectiveness in delivering messages, along with user response across sites in five districts from 2011 to 2014. MOTECH is comprised of "Client Data Application" (CDA) which allows providers to digitize and track service delivery information for women and infants and "Mobile Midwife" (MM) which sends automated educational voice messages to the mobile phones of pregnant and postpartum women. Using a naturalist study design, we draw upon system generated data to evaluate message delivery, client engagement, and provider responsiveness to MOTECH over time and by level of facility. A total of 7,370 women were enrolled in MM during pregnancy and 14,867 women were enrolled postpa1rtum. While providers were able to register and upload patient-level health information using CDA, the majority of these uploads occurred in Community-based facilities versus Health Centers. For MM, 25% or less of expected messages were received by pregnant women, despite the majority (>77%) owning a private mobile phone. While over 80% of messages received by pregnant women were listened to, postpartum rates of listening declined over time. Only 25% of pregnant women received and listened to at least 1 first trimester message. By 6-12 months postpartum, less than 6% of enrolled women were exposed to at least one message. Caution should be exercised in assuming that digital health programs perform as intended. Evaluations should measure the technological, behavioral, health systems, and/or community factors which may lead to breaks in the impact pathway and influence findings on effectiveness. The MOTECH platform's technological limitations in 'pushing' out voice messages highlights the need for more timely use of data to mitigate delivery challenges and improve exposure to health information. Alternative message delivery channels (USSD or SMS) could improve the platform's ability to deliver messages but may not be appropriate for illiterate users. Not applicable.
An approach for message exchange using archetypes.
Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F
2013-01-01
The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.
Scientists are asked to communicate their research for a variety of reasons, including general transparency of science, completing funding/grant applications, or making contributions to the greater body of research supporting public and environmental health. Conveying messages th...
Asbestos: Securing Untrusted Software with Interposition
2005-09-01
consistent intelligible interfaces to different types of resource. Message-based operating systems, such as Accent, Amoeba, Chorus, L4 , Spring...control on self-authenticating capabilities, precluding policies that restrict delegation. L4 uses a strict hierarchy of interpositions, useful for...the OS de- sign space amenable to secure application construction. Similar effects might be possible with message-passing microkernels , or unwieldy
NASA Astrophysics Data System (ADS)
Arkhipkin, D.; Lauret, J.
2017-10-01
One of the STAR experiment’s modular Messaging Interface and Reliable Architecture framework (MIRA) integration goals is to provide seamless and automatic connections with the existing control systems. After an initial proof of concept and operation of the MIRA system as a parallel data collection system for online use and real-time monitoring, the STAR Software and Computing group is now working on the integration of Experimental Physics and Industrial Control System (EPICS) with MIRA’s interfaces. This integration goals are to allow functional interoperability and, later on, to replace the existing/legacy Detector Control System components at the service level. In this report, we describe the evolutionary integration process and, as an example, will discuss the EPICS Alarm Handler conversion. We review the complete upgrade procedure starting with the integration of EPICS-originated alarm signals propagation into MIRA, followed by the replacement of the existing operator interface based on Motif Editor and Display Manager (MEDM) with modern portable web-based Alarm Handler interface. To achieve this aim, we have built an EPICS-to-MQTT [8] bridging service, and recreated the functionality of the original Alarm Handler using low-latency web messaging technologies. The integration of EPICS alarm handling into our messaging framework allowed STAR to improve the DCS alarm awareness of existing STAR DAQ and RTS services, which use MIRA as a primary source of experiment control information.
Supervising simulations with the Prodiguer Messaging Platform
NASA Astrophysics Data System (ADS)
Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien
2015-04-01
At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.
An Evaluation of One-Sided and Two-Sided Communication Paradigms on Relaxed-Ordering Interconnect
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Khaled Z.; Hargrove, Paul H.; Iancu, Costin
The Cray Gemini interconnect hardware provides multiple transfer mechanisms and out-of-order message delivery to improve communication throughput. In this paper we quantify the performance of one-sided and two-sided communication paradigms with respect to: 1) the optimal available hardware transfer mechanism, 2) message ordering constraints, 3) per node and per core message concurrency. In addition to using Cray native communication APIs, we use UPC and MPI micro-benchmarks to capture one- and two-sided semantics respectively. Our results indicate that relaxing the message delivery order can improve performance up to 4.6x when compared with strict ordering. When hardware allows it, high-level one-sided programmingmore » models can already take advantage of message reordering. Enforcing the ordering semantics of two-sided communication comes with a performance penalty. Furthermore, we argue that exposing out-of-order delivery at the application level is required for the next-generation programming models. Any ordering constraints in the language specifications reduce communication performance for small messages and increase the number of active cores required for peak throughput.« less
Evangeli, Michael; Kafaar, Zuhayr; Kagee, Ashraf; Swartz, Leslie; Bullemor-Day, Philippa
2013-01-01
It is vital that enough participants are willing to participate in clinical trials to test HIV vaccines adequately. It is, therefore, necessary to explore what affects peoples' willingness to participate (WTP) in such trials. Studies have only examined individual factors associated with WTP and not the effect of messages about trial participation on potential participants (e.g., whether losses or gains are emphasized, or whether the outcome is certain or uncertain). This study explores whether the effects of message framing on WTP in a hypothetical HIV vaccine trial are consistent with Prospect Theory. This theory suggests that people are fundamentally risk averse and that (1) under conditions of low risk and high certainty, gain-framed messages will be influential (2) under conditions of high risk and low certainty, loss-framed messages will be influential. This cross-sectional study recruited 283 HIV-negative students from a South African university who were given a questionnaire that contained matched certain gain-framed, certain loss-framed, uncertain gain-framed, and uncertain loss-framed statements based on common barriers and facilitators of WTP. Participants were asked to rate how likely each statement was to result in their participation in a hypothetical preventative HIV vaccine trial. Consistent with Prospect Theory predictions, for certain outcomes, gain-framed messages were more likely to result in WTP than loss-framed messages. Inconsistent with predictions, loss-framed message were not more likely to be related to WTP for uncertain outcomes than gain-framed messages. Older students were less likely to express their WTP across the different message frames. Recruitment for HIV vaccine trials should pay attention to how messages about the trial are presented to potential participants.
NASA Astrophysics Data System (ADS)
Lin, Chao; Shen, Xueju; Hua, Binbin; Wang, Zhisong
2015-10-01
We demonstrate the feasibility of three dimensional (3D) polarization multiplexing by optimizing a single vectorial beam using a multiple-signal window multiple-plane (MSW-MP) phase retrieval algorithm. Original messages represented with multiple quick response (QR) codes are first partitioned into a series of subblocks. Then, each subblock is marked with a specific polarization state and randomly distributed in 3D space with both longitudinal and transversal adjustable freedoms. A generalized 3D polarization mapping protocol is established to generate a 3D polarization key. Finally, multiple-QR code is encrypted into one phase only mask and one polarization only mask based on the modified Gerchberg-Saxton (GS) algorithm. We take the polarization mask as the cyphertext and the phase only mask as additional dimension of key. Only when both the phase key and 3D polarization key are correct, original messages can be recovered. We verify our proposal with both simulation and experiment evidences.
Salekin, Randall T; Lester, Whitney S; Sellers, Mary-Kate
2012-08-01
The purpose of the current study was to examine the effect of a motivational intervention on conduct problem youth with psychopathic features. Specifically, the current study examined conduct problem youths' mental set (or theory) regarding intelligence (entity vs. incremental) upon task performance. We assessed 36 juvenile offenders with psychopathic features and tested whether providing them with two different messages regarding intelligence would affect their functioning on a task related to academic performance. The study employed a MANOVA design with two motivational conditions and three outcomes including fluency, flexibility, and originality. Results showed that youth with psychopathic features who were given a message that intelligence grows over time, were more fluent and flexible than youth who were informed that intelligence is static. There were no significant differences between the groups in terms of originality. The implications of these findings are discussed including the possible benefits of interventions for adolescent offenders with conduct problems and psychopathic features. (PsycINFO Database Record (c) 2012 APA, all rights reserved).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Papantoni-Kazakos, P.; Paterakis, M.
1988-07-01
For many communication applications with time constraints (e.g., transmission of packetized voice messages), a critical performance measure is the percentage of messages transmitted within a given amount of time after their generation at the transmitting station. This report presents a random-access algorithm (RAA) suitable for time-constrained applications. Performance analysis demonstrates that significant message-delay improvement is attained at the expense of minimal traffic loss. Also considered is the case of noisy channels. The noise effect appears at erroneously observed channel feedback. Error sensitivity analysis shows that the proposed random-access algorithm is insensitive to feedback channel errors. Window Random-Access Algorithms (RAAs) aremore » considered next. These algorithms constitute an important subclass of Multiple-Access Algorithms (MAAs); they are distributive, and they attain high throughput and low delays by controlling the number of simultaneously transmitting users.« less
Mobile Phone Messaging During Unobserved "Home" Induction to Buprenorphine.
Tofighi, Babak; Grossman, Ellie; Sherman, Scott; Nunes, Edward V; Lee, Joshua D
2016-01-01
The deployment of health information technologies promises to optimize clinical outcomes for populations with substance use disorders. Electronic health records, web-based counseling interventions, and mobile phone applications enhance the delivery of evidence-based behavioral and pharmacological treatments, with minimal burden to clinical personnel, infrastructure, and work flows. This clinical case shares a recent experience utilizing mobile phone text messaging between an office-based buprenorphine provider in a safety net ambulatory clinic and a patient seeking buprenorphine treatment for opioid use disorder. The case highlights the use of text message-based physician-patient communication to facilitate unobserved "home" induction onto buprenorphine.
Valle, Carmina G; Queen, Tara L; Martin, Barbara A; Ribisl, Kurt M; Mayer, Deborah K; Tate, Deborah F
2018-03-01
Health risk assessments with tailored feedback plus health education have been shown to be effective for promoting health behavior change. However, there is limited evidence to guide the development and delivery of online automated tailored feedback. The goal of this study was to optimize tailored feedback messages for an online health risk assessment to promote enhanced user engagement, self-efficacy, and behavioral intentions for engaging in healthy behaviors. We examined the effects of three theory-based message factors used in developing tailored feedback messages on levels of engagement, self-efficacy, and behavioral intentions. We conducted a randomized factorial experiment to test three different components of tailored feedback messages: tailored expectancy priming, autonomy support, and use of an exemplar. Individuals (N=1945) were recruited via Amazon Mechanical Turk and randomly assigned to one of eight different experimental conditions within one of four behavioral assessment and feedback modules (tobacco use, physical activity [PA], eating habits, and weight). Participants reported self-efficacy and behavioral intentions pre- and postcompletion of an online health behavior assessment with tailored feedback. Engagement and message perceptions were assessed at follow-up. For the tobacco module, there was a significant main effect of the exemplar factor (P=.04); participants who received exemplar messages (mean 3.31, SE 0.060) rated their self-efficacy to quit tobacco higher than those who did not receive exemplar messages (mean 3.14, SE 0.057). There was a three-way interaction between the effect of message conditions on self-efficacy to quit tobacco (P=.02), such that messages with tailored priming and an exemplar had the greatest impact on self-efficacy to quit tobacco. Across PA, eating habits, and weight modules, there was a three-way interaction among conditions on self-efficacy (P=.048). The highest self-efficacy scores were reported among those who were in the standard priming condition and received both autonomy supportive and exemplar messages. In the PA module, autonomy supportive messages had a stronger effect on self-efficacy for PA in the standard priming condition. For PA, eating habits, and weight-related behaviors, the main effect of exemplar messages on behavioral intentions was in the hypothesized direction but did not reach statistical significance (P=.08). When comparing the main effects of different message conditions, there were no differences in engagement and message perceptions. Findings suggest that tailored feedback messages that use exemplars helped improve self-efficacy related to tobacco cessation, PA, eating habits, and weight control. Combining standard priming and autonomy supportive message components shows potential for optimizing tailored feedback for tobacco cessation and PA behaviors. ©Carmina G Valle, Tara L Queen, Barbara A Martin, Kurt M Ribisl, Deborah K Mayer, Deborah F Tate. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 01.03.2018.
What is the truth? An application of the Extended Parallel Process Model to televised truth® ads.
Lavoie, Nicole R; Quick, Brian L
2013-01-01
The purpose of this study was to analyze television ads in the truth® campaign using the Extended Parallel Process Model (EPPM) as a framework. Among the ads (n = 86) analyzed, results revealed a heavy reliance on severity messages, modest attention to susceptibility messages, and no inclusion of recommended response messages in the form of self-efficacy and response efficacy. The reliance on emphasizing the health threat, without incorporating recommended response messages, is discussed with respect to the likelihood of galvanizing maladaptive responses such as psychological reactance, denial, and defensive avoidance resulting from exposure to these ads. Additionally, the unintended outcomes for secondary audiences including but not limited to stigma are considered. Implications and suggestions for practitioners and theorists are explored.
Communicating the threat of emerging infections to the public.
Freimuth, V.; Linnan, H. W.; Potter, P.
2000-01-01
Communication theory and techniques, aided by the electronic revolution, provide new opportunities and challenges for the effective transfer of laboratory, epidemiologic, surveillance, and other public health data to the public who funds them. We review the applicability of communication theory, particularly the audience-source-message-channel meta-model, to emerging infectious disease issues. Emergence of new infectious organisms, microbial resistance to therapeutic drugs, and increased emphasis on prevention have expanded the role of communication as a vital component of public health practice. In the absence of cure, as in AIDS and many other public health problems, an effectively crafted and disseminated prevention message is the key control measure. Applying communication theory to disease prevention messages can increase the effectiveness of the messages and improve public health. PMID:10905966
Balancing Contention and Synchronization on the Intel Paragon
NASA Technical Reports Server (NTRS)
Bokhari, Shahid H.; Nicol, David M.
1996-01-01
The Intel Paragon is a mesh-connected distributed memory parallel computer. It uses an oblivious and deterministic message routing algorithm: this permits us to develop highly optimized schedules for frequently needed communication patterns. The complete exchange is one such pattern. Several approaches are available for carrying it out on the mesh. We study an algorithm developed by Scott. This algorithm assumes that a communication link can carry one message at a time and that a node can only transmit one message at a time. It requires global synchronization to enforce a schedule of transmissions. Unfortunately global synchronization has substantial overhead on the Paragon. At the same time the powerful interconnection mechanism of this machine permits 2 or 3 messages to share a communication link with minor overhead. It can also overlap multiple message transmission from the same node to some extent. We develop a generalization of Scott's algorithm that executes complete exchange with a prescribed contention. Schedules that incur greater contention require fewer synchronization steps. This permits us to tradeoff contention against synchronization overhead. We describe the performance of this algorithm and compare it with Scott's original algorithm as well as with a naive algorithm that does not take interconnection structure into account. The Bounded contention algorithm is always better than Scott's algorithm and outperforms the naive algorithm for all but the smallest message sizes. The naive algorithm fails to work on meshes larger than 12 x 12. These results show that due consideration of processor interconnect and machine performance parameters is necessary to obtain peak performance from the Paragon and its successor mesh machines.
Ease of imagination, message framing, and physical activity messages.
Berry, Tanya R; Carson, Valerie
2010-02-01
The purpose of this research was to replicate a study that examined how message framing and ease of imagination interact to influence attitudes towards the prevention of heart disease through physical activity and a healthy diet. Changes were made such that only physical activity behaviour was profiled and assessed as a moderating variable. It was hypothesized that gain-framed messages would positively influence attitudes with hard to imagine symptoms, that loss-framed messages would positively influence attitudes with easy to imagine symptoms and exercise frequency would moderate the findings. This study employed a 2 (easy or hard to imagine symptoms) by 2 (gain- or loss-framed) Solomon square design whereby participants, half of whom completed a pre-test, were randomly assigned to one of four conditions: easy to imagine/gain-framed, hard to imagine/gain-framed, easy to imagine/loss-framed, or hard to imagine/loss-framed. Participants included adults over the age of 55 years (N=57) and undergraduate students (18-22 years; N=118). They were described either hard to imagine or easy to imagine symptoms of heart disease and diabetes and asked to imagine them. Participants then read either a gain- or loss-framed physical activity message followed by post-test questionnaires that assessed attitudes, exercise frequency, and demographics. Regression analyses showed no significant framing effects but significant effects for ease of imagination and exercise frequency as a moderating variable. This study failed to replicate the original research findings but showed that participants who exercised the least and were in the hard to imagine condition had the worst attitudes towards physical activity.
An empirical study of Freud's penis-baby equation.
Jones, R L
1994-03-01
One hypothesis of traditional psychoanalytic theory holds that a cardinal aspect of the "natural" development of femininity involves the woman's substitution of the wish for a baby in place of her original wish for a penis. The current study modified and extended earlier research examining the validity of Freud's this "penis-baby" theory. College-aged women and men were presented with either subliminal or supraliminal auditory messages concerned with either pregnancy or penetration themes. Subjects' written responses to Holtzman ink-blots, obtained both before and after exposure to an auditory message, were content-coded for phallic imagery and sexual imagery. Consistent with Freud's speculations about the phallic significance of pregnancy for women, female subjects who were exposed to the subliminal pregnancy message produced significantly more phallic imagery responses to ink-blots than did women in any of the other experimental conditions (p < .01). The phallic imagery production of males did not vary significantly as a function of message condition. Implications of these findings are discussed in the context of modern revisions to Freud's psychology of women and the current psychoanalytic conceptualization of penis envy as a highly condensed mental product with many layers of meaning.
Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication.
Jagiello, Robert D; Hills, Thomas T
2018-05-29
Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk-involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)-may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposue to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information. © 2018 Society for Risk Analysis.
ERIC Educational Resources Information Center
Premadasa, H. K. Salinda; Meegama, R. Gayan N.
2013-01-01
Purpose: The purpose of this paper is to discuss how to integrate secure, open-source and mobile-based system with the Moodle learning management system (MLMS) then describe the implementation of a campus-wide mobile learning environment with short messaging system (SMS) and how this platform is incorporated with the student's learning…
Cooperative Interference Alignment for the Multiple Access Channel
2015-11-01
Communications. I. INTRODUCTION Conventional wireless networks were previously thought to be interference-limited, where interference is mainly caused by...interference-free capacity for any number of users K at high SNR. This fundamental result showed that wireless networks are not interference-limited as...decoding of the K users’ messages. This is applicable in uplink transmissions in cellular communications, where mobiles transmit independent messages
ERIC Educational Resources Information Center
Cole, Charles; Mandelblatt, Bertie
2000-01-01
Uses Kintsch's proposition-based construction-integration theory of discourse comprehension to detail the user coding operations that occur in each of the three subsystems (Perception, Comprehension, Application) in which users process an information retrieval systems (IRS) message. Describes an IRS device made up of two separate parts that enable…
'Yeast mail': a novel Saccharomyces application (NSA) to encrypt messages.
Rosemeyer, Helmut; Paululat, Achim; Heinisch, Jürgen J
2014-09-01
The universal genetic code is used by all life forms to encode biological information. It can also be used to encrypt semantic messages and convey them within organisms without anyone but the sender and recipient knowing, i.e., as a means of steganography. Several theoretical, but comparatively few experimental, approaches have been dedicated to this subject, so far. Here, we describe an experimental system to stably integrate encrypted messages within the yeast genome using a polymerase chain reaction (PCR)-based, one-step homologous recombination system. Thus, DNA sequences encoding alphabetical and/or numerical information will be inherited by yeast propagation and can be sent in the form of dried yeast. Moreover, due to the availability of triple shuttle vectors, Saccharomyces cerevisiae can also be used as an intermediate construction device for transfer of information to either Drosophila or mammalian cells as steganographic containers. Besides its classical use in alcoholic fermentation and its modern use for heterologous gene expression, we here show that baker's yeast can thus be employed in a novel Saccharomyces application (NSA) as a simple steganographic container to hide and convey messages. Copyright © 2014 Verlag Helvetica Chimica Acta AG, Zürich.
Bail, Christopher Andrew
2016-10-18
Social media sites are rapidly becoming one of the most important forums for public deliberation about advocacy issues. However, social scientists have not explained why some advocacy organizations produce social media messages that inspire far-ranging conversation among social media users, whereas the vast majority of them receive little or no attention. I argue that advocacy organizations are more likely to inspire comments from new social media audiences if they create "cultural bridges," or produce messages that combine conversational themes within an advocacy field that are seldom discussed together. I use natural language processing, network analysis, and a social media application to analyze how cultural bridges shaped public discourse about autism spectrum disorders on Facebook over the course of 1.5 years, controlling for various characteristics of advocacy organizations, their social media audiences, and the broader social context in which they interact. I show that organizations that create substantial cultural bridges provoke 2.52 times more comments about their messages from new social media users than those that do not, controlling for these factors. This study thus offers a theory of cultural messaging and public deliberation and computational techniques for text analysis and application-based survey research.
Responding to Misinformation about Climate Change
ERIC Educational Resources Information Center
Lawrence, Eva K.; Estow, Sarah
2017-01-01
This study examined responses to climate change misinformation and messages designed to counter misinformation. Participants (N = 406) first responded to a social media post denying the existence of global warming and then were randomly assigned to read one of three responses to the original post (correction, collaboration, control). Participants…
Munro, Sarah; Hui, Amber; Salmons, Vanessa; Solomon, Carolyn; Gemmell, Emily; Torabi, Nahal; Janssen, Patricia A
2017-02-07
We engaged Canadian women in the development of a prenatal education program delivered via one-way text messaging called SmartMom. SmartMom is the first peer-reviewed, evidence-based mHealth program for prenatal education in Canada and the first to be endorsed by the Society of Obstetricians and Gynaecologists of Canada. To explore women's preferences for a prenatal education program by text messaging. We conducted a qualitative focus group study in three Canadian communities in the Northern Health Authority. Women completed a demographic questionnaire, participated in a guided discussion about their pregnancy information-seeking behavior, reviewed a printed copy of the SmartMom text messages, and then engaged in a moderated discussion about their perceptions of the usability of the SmartMom program. Open-ended questions explored women's perceptions regarding the message content, acceptability of receiving information by text message, positive health behaviors they might engage in after receiving a message, modifiable program factors, and intention to use the program. Thematic analysis of transcribed audio recordings was undertaken and modifications were made to the SmartMom program based on these findings. A total of 40 women participated in seven focus groups in three rural northern communities. The vast majority had a mobile phone (39/40, 98%), used text messages "all the time" (28/40, 70%), and surfed the Internet on their phone (37/40, 93%). Participants perceived SmartMom to be highly acceptable and relevant. The text message modality reflected how participants currently sought pregnancy-related information and provided them with local information tailored to their gestational age, which they had not received through other pregnancy resources. Women recommended adding the opportunity to receive supplemental streams of messages tailored to their individual needs, for example, depression, pregnancy after previous cesarean, >35 years of age, new immigrants, and harm reduction for smoking and alcohol. This formative qualitative evaluation provides evidence that a prenatal education program by text messaging, SmartMom, is acceptable to the end users. These findings support the usability of the SmartMom program at a population level and the development of an evaluation program exploring the effects of the text messages on adoption of health-promoting behaviors and maternal-child health outcomes. ©Sarah Munro, Amber Hui, Vanessa Salmons, Carolyn Solomon, Emily Gemmell, Nahal Torabi, Patricia A Janssen. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 07.02.2017.
Help Me Please!: Designing and Developing Application for Emergencies
NASA Astrophysics Data System (ADS)
Hong, Ng Ken; Hafit, Hanayanti; Wahid, Norfaradilla; Kasim, Shahreen; Yusof, Munirah Mohd
2017-08-01
Help Me Please! Application is an android platform emergency button application that is designed to transmit emergency messages to target receivers with real time information. The purpose of developing this application is to help people to notify any emergency circumstances via Short Message Service (SMS) in android platform. The application will receive the current location from Global Positioning System (GPS), will obtain the current time from the mobile device and send this information to the receivers when user presses the emergency button. Simultaneously, the application will keep sending the emergency alerts to receivers and will update to database based on the time interval set by user until user stop the function. Object-oriented Software Development model is employed to guide the development of this application with the knowledge of Java language and Android Studio. In conclusion, this application plays an important role in rescuing process when emergency circumstances happen. The rescue process will become more effective by notifying the emergency circumstances and send the current location of user to others in the early hours.
Holographic disk with high data transfer rate: its application to an audio response memory.
Kubota, K; Ono, Y; Kondo, M; Sugama, S; Nishida, N; Sakaguchi, M
1980-03-15
This paper describes a memory realized with a high data transfer rate using the holographic parallel-processing function and its application to an audio response system that supplies many audio messages to many terminals simultaneously. Digitalized audio messages are recorded as tiny 1-D Fourier transform holograms on a holographic disk. A hologram recorder and a hologram reader were constructed to test and demonstrate the holographic audio response memory feasibility. Experimental results indicate the potentiality of an audio response system with a 2000-word vocabulary and 250-Mbit/sec bit transfer rate.
Information Interaction Study for DER and DMS Interoperability
NASA Astrophysics Data System (ADS)
Liu, Haitao; Lu, Yiming; Lv, Guangxian; Liu, Peng; Chen, Yu; Zhang, Xinhui
The Common Information Model (CIM) is an abstract data model that can be used to represent the major objects in Distribution Management System (DMS) applications. Because the Common Information Model (CIM) doesn't modeling the Distributed Energy Resources (DERs), it can't meet the requirements of DER operation and management for Distribution Management System (DMS) advanced applications. Modeling of DER were studied based on a system point of view, the article initially proposed a CIM extended information model. By analysis the basic structure of the message interaction between DMS and DER, a bidirectional messaging mapping method based on data exchange was proposed.
Accelerating list management for MPI.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hemmert, K. Scott; Rodrigues, Arun F.; Underwood, Keith Douglas
2005-07-01
The latency and throughput of MPI messages are critically important to a range of parallel scientific applications. In many modern networks, both of these performance characteristics are largely driven by the performance of a processor on the network interface. Because of the semantics of MPI, this embedded processor is forced to traverse a linked list of posted receives each time a message is received. As this list grows long, the latency of message reception grows and the throughput of MPI messages decreases. This paper presents a novel hardware feature to handle list management functions on a network interface. By movingmore » functions such as list insertion, list traversal, and list deletion to the hardware unit, latencies are decreased by up to 20% in the zero length queue case with dramatic improvements in the presence of long queues. Similarly, the throughput is increased by up to 10% in the zero length queue case and by nearly 100% in the presence queues of 30 messages.« less
Lewis, Ioni; Watson, Barry; White, Katherine M
2016-12-01
This paper provides an important and timely overview of a conceptual framework designed to assist with the development of message content, as well as the evaluation, of persuasive health messages. While an earlier version of this framework was presented in a prior publication by the authors in 2009, important refinements to the framework have seen it evolve in recent years, warranting the need for an updated review. This paper outlines the Step approach to Message Design and Testing (or SatMDT) in accordance with the theoretical evidence which underpins, as well as empirical evidence which demonstrates the relevance and feasibility of, each of the framework's steps. The development and testing of the framework have thus far been based exclusively within the road safety advertising context; however, the view expressed herein is that the framework may have broader appeal and application to the health persuasion context. Copyright © 2015 Elsevier Ltd. All rights reserved.
Carter, Nancy; Lavis, John N; MacDonald-Rencz, Sandra
2014-01-01
Disseminating research to decision makers is difficult. Interaction between researchers and decision makers can identify key messages and processes for dissemination. To gain agreement on the key findings from a synthesis on the integration of advanced practice nurses, we used a modified Delphi process. Nursing decision makers contributed ideas via e-mail, discussed and clarified ideas face to face, and then prioritized statements. Sixteen (89%) participated and 14 (77%) completed the final phase. Priority key messages were around access to care and outcomes. The majority identified "NPs increase access to care" and "NPs and CNSs improve patient and system outcomes" as priority messaging statements. Participants agreed policy makers and the public were target audiences for messages. Consulting with policy makers provided the necessary context to develop tailored policy messages and is a helpful approach for research dissemination. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Secure HL7 transactions using Internet mail (Internet draft).
Schadow, Gunther; Tucker, Mark; Rishel, Wes
2002-01-01
The document describes the applicability of the Internet standardisation efforts on secure electronic data interchange (EDI) transactions for Health Level-7 (HL7), an EDI standard for Healthcare used world-wide. The document heavily relies on the work in progress by the IETF EDIINT working group. It is in most parts a restatement of the EDIINTs requirements document and application statement 1 (AS#1) tailored to the needs of the HL7 audience. The authors tried to make the document as self consistent as possible. The goal is to give to the reader who is not a security or Internet standards expert enough foundational and detail information to enable him to build communication software that complies to the Internet standards. Even though the authors rely on and promote the respective Internet standards and drafts, they did not withstand from commenting on and criticising the work where they see upcoming problems in use with HL7 or other EDI protocols that have not been in the initial focus of the EDIINT working group. The authors make suggestions to add parameters to the specification of the MIME type for EDI messages in RFC 1767 in order to enhance functionality. The authors give use cases for a larger subset of disposition types and modifiers of message disposition notifications. One key issue where the document goes beyond the current EDIINT drafts is the concept of non-repudiation of commitment to an EDI transaction. Secure EDI transactions should be regarded as "distributed contracts," i.e. not only the sending and receiving of single messages should be non-refutable but also the connection between messages interchanges. In anticipation of this requirement HL7 usually requires a response message to be sent to acknowledge every transaction. The authors therefore have the requirement to securely couple an EDI response message to its request message. Given the current shape of RFC 1767 this is generally possible only if a response message is coupled with an MDN receipt and the combination of both signed by the responder. The document describes a protocol to bundle MDN and response that uses the MIME multi-part/related content type in RFC 2112.
Landis-Lewis, Zach; Brehaut, Jamie C; Hochheiser, Harry; Douglas, Gerald P; Jacobson, Rebecca S
2015-01-21
Evidence shows that clinical audit and feedback can significantly improve compliance with desired practice, but it is unclear when and how it is effective. Audit and feedback is likely to be more effective when feedback messages can influence barriers to behavior change, but barriers to change differ across individual health-care providers, stemming from differences in providers' individual characteristics. The purpose of this article is to invite debate and direct research attention towards a novel audit and feedback component that could enable interventions to adapt to barriers to behavior change for individual health-care providers: computer-supported tailoring of feedback messages. We argue that, by leveraging available clinical data, theory-informed knowledge about behavior change, and the knowledge of clinical supervisors or peers who deliver feedback messages, a software application that supports feedback message tailoring could improve feedback message relevance for barriers to behavior change, thereby increasing the effectiveness of audit and feedback interventions. We describe a prototype system that supports the provision of tailored feedback messages by generating a menu of graphical and textual messages with associated descriptions of targeted barriers to behavior change. Supervisors could use the menu to select messages based on their awareness of each feedback recipient's specific barriers to behavior change. We anticipate that such a system, if designed appropriately, could guide supervisors towards giving more effective feedback for health-care providers. A foundation of evidence and knowledge in related health research domains supports the development of feedback message tailoring systems for clinical audit and feedback. Creating and evaluating computer-supported feedback tailoring tools is a promising approach to improving the effectiveness of clinical audit and feedback.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
..., corrective advertising is designed to dissipate or correct erroneous beliefs resulting from a false claim... of corrective messages in the realm of consumer directed prescription drug advertising. Design... brand name exposure. Table 1--Design of Phase 1: Original Exposure by Corrective Exposure Exposure to...
Differences between Males and Females Concerning Perceived Electronic Mail Appropriateness
ERIC Educational Resources Information Center
Harper, Vernon B., Jr.
2008-01-01
Electronic mail is one of the most successfully diffused modern communication technologies. Yet, few researchers have investigated whether gender differences exist in perceptions of the types of appropriateness embedded within electronic mail messages. A framework originally created by Wiemann and Backlund (1980) served as the basis for the…
Digynic triploidy: utility and challenges of noninvasive prenatal testing
Fleischer, Julie; Shenoy, Archana; Goetzinger, Katherine; Cottrell, Catherine E; Baldridge, Dustin; White, Frances V; Shinawi, Marwan
2015-01-01
Key Clinical Message Low fraction fetal DNA in noninvasive prenatal testing in the context of fetal growth restriction and multiple congenital anomalies should alert medical professionals to the possibility of digynic triploidy. Single-nucleotide polymorphism microarray can detect the parental origin of triploidy and explain its mechanism. PMID:26185638
Lewis, I; White, K M; Ho, B; Elliott, B; Watson, B
2017-06-01
In Australia, young drivers aged 17-25 years comprise 13% of the population yet account for 22% of all road deaths with young males over-represented in such trauma. Speeding represents a major contributing factor and advertising campaigns have long focused on promoting anti-speeding messages in the effort to reduce drivers' speeds. Positioned within a larger program of research aimed at developing, piloting, and evaluating a range of theoretically-informed anti-speeding messages, the current study reports results relating to the final phase of the research, the evaluation. Six messages were devised in accordance with the guiding framework, the Step approach to Message Design and Testing ([SatMDT]; Lewis et al., 2016) and based on the findings emerging from earlier qualitative and quantitative studies within the program of research. N=938 licensed drivers (n=455 males, 48%) aged 17-62 years completed an online survey. To ensure a controlled test of the persuasiveness of the message content, the messages were presented in an audio-based format and thus were devoid of potential confounds, such as images. The messages sought to address a particular belief (i.e., behavioural, normative, control) and to focus either on emphasising the positive aspects which make speeding less likely or challenging the negative aspects which make speeding more likely. Thus, key to this evaluation was to test the persuasiveness of the message content in terms of the particular belief and focus it was addressing. Participants were randomly assigned to either the Control condition (i.e., no exposure to a message) or the Intervention condition (i.e., exposed to one of the six messages presented as an audio-recorded message within the survey). Persuasiveness was assessed via a range of outcome measures including both direct (i.e., third-person perceptions, message rejection) as well as indirect measures (i.e., intentions, willingness to speed). Age, gender, and message type were independent variables (IVs), together with issue involvement as a covariate (or IV) in the study's analyses. Overall, positive persuasive effects, and a relative absence of any negative, dissuasive effects, were found for two messages, Glass Cars and The Lift. These messages addressed the same salient belief, control beliefs, with the former emphasising the factors which discourage speeding and the latter message challenging those factors which encourage speeding. The implications of the findings are discussed in terms of the insights they offer for the key content of future anti-speeding messages. Copyright © 2017 Elsevier Ltd. All rights reserved.
Roca, Javier; Insa, Beatriz; Tejero, Pilar
2018-05-01
The current research shows the advantage of single-word messages in the particular case of variable message signs (VMSs) with a high aspect ratio. Early studies on traffic sign design proposed that pictorial information would advantage equivalent text messages in static signs. We used a driving simulator to present individually 36 VMSs, showing six words (e.g., "congestion") and six danger signs (e.g., congestion traffic sign). In Experiment 1, 18 drivers read aloud the text or orally identified the pictograms as soon as they could correctly do it. In Experiment 2, a different sample of 18 drivers gave a motor response, according to the meaning of the message. We analyzed the legibility distance and accuracy, driving performance (speed variability), and glance behavior. Our results show that single-word messages were associated with better performance (farther reading distances) and required less visual demands (fewer glances and less glancing times) than pictograms. As typical configurations of VMSs usually have a high aspect ratio, and thus allow large character heights, single-word messages can outperform the legibility of pictograms. However, the final advantage of text or pictorial messages would depend on several factors, such as the driver's knowledge of the language and the pictogram set, the use of single or multiple words, the particular design and size of critical details in letters and pictograms, environmental factors, and driver age. Potential applications include the design of VMSs and other devices aimed at displaying text and/or pictograms with a high aspect ratio.
Weinberger, Edward D
2002-01-01
'Standard' information theory says nothing about the semantic content of information. Nevertheless, applications such as evolutionary theory demand consideration of precisely this aspect of information, a need that has motivated a largely unsuccessful search for a suitable measure of an 'amount of meaning'. This paper represents an attempt to move beyond this impasse, based on the observation that the meaning of a message can only be understood relative to its receiver. Positing that the semantic value of information is its usefulness in making an informed decision, we define pragmatic information as the information gain in the probability distributions of the receiver's actions, both before and after receipt of a message in some pre-defined ensemble. We then prove rigorously that our definition is the only one that satisfies obvious desiderata, such as the additivity of information from logically independent messages. This definition, when applied to the information 'learned' by the time evolution of a process, defies the intuitions of the few previous researchers thinking along these lines by being monotonic in the uncertainty that remains after receipt of the message, but non-monotonic in the Shannon entropy of the input ensemble. It also follows that the pragmatic information of the genetic 'messages' in an evolving population is a global Lyapunov function for Eigen's quasi-species model of biological evolution. A concluding section argues that a theory such as ours must explicitly acknowledge purposeful action, or 'agency', in such diverse fields as evolutionary theory and finance.
Cooperative runtime monitoring
NASA Astrophysics Data System (ADS)
Hallé, Sylvain
2013-11-01
Requirements on message-based interactions can be formalised as an interface contract that specifies constraints on the sequence of possible messages that can be exchanged by multiple parties. At runtime, each peer can monitor incoming messages and check that the contract is correctly being followed by their respective senders. We introduce cooperative runtime monitoring, where a recipient 'delegates' its monitoring task to the sender, which is required to provide evidence that the message it sends complies with the contract. In turn, this evidence can be quickly checked by the recipient, which is then guaranteed of the sender's compliance to the contract without doing the monitoring computation by itself. A particular application of this concept is shown on web services, where service providers can monitor and enforce contract compliance of third-party clients at a small cost on the server side, while avoiding to certify or digitally sign them.
DoD Message Protocol Report. Volume I. Message Protocol Specification.
1981-12-15
26L 2.6 STATUS-REPORTING SERVICES ........................................ 26 2.6.1 Acknowledgements and Processing Status...and data. Envelopes give processing instructions and/or descriptions of their contents. Data are not altered (as regards content) by the CBMS except...tailored to an individual user’s requirements, we view them as application-layer processes . The potential diversity of UAs makes verifi- cation difficult
Daruwalla, Zubin Jimmy; Wong, Keng Lin; Thambiah, Joseph
2014-06-05
The application of telemedicine has been described for its use in medical training and education, management of stroke patients, urologic surgeries, pediatric laparoscopic surgeries, clinical outreach, and the field of orthopedics. However, the usefulness of a secure, mobile telehealth application, and messaging platform has not been well described. A pilot study was conducted to implement a health insurance portability and accountability act (HIPAA) compliant form of communication between doctors in an orthopedic clinical setting and determine their reactions to MyDoc, a secure, mobile telehealth application, and messaging platform. By replacing current methods of communication through various mobile applications and text messaging services with MyDoc over a six week period, we gained feedback and determined user satisfaction with this innovative system from questionnaires handed to the program director, program coordinator, one trauma consultant, all orthopedic residents, and six non-orthopedic residents at the National University Hospital in Singapore. Almost everyone who completed the questionnaire strongly agreed that MyDoc should replace current systems of peer to peer communication in the hospital. The majority also felt that the quality of images, videos, and sound were excellent. Almost everyone agreed that they could communicate easily with each other and would feel comfortable doing so routinely. The majority felt that virtual consults through MyDoc should be made available to inpatients as well as outpatients to potentially lessen clinic loads and provide a secure manner in which patients can communicate with their primary teams any time convenient to both. It was also agreed by most that the potential of telerounding had advantages, especially on weekends as a supplement to normal rounds. Potential uses of MyDoc in an orthopedic clinical setting include HIPAA-compliant peer to peer communication, clinical outreach in the setting of trauma, supervision in the operating room or watching procedures being performed remotely, providing both patient and parent reassurance in pediatric orthopedic patients, and finally in the setting of outpatient clinics. With our pilot study having excellent results in terms of acceptance and satisfaction, the integration of a secure, mobile telehealth application, and messaging platform, not only in the orthopedic department but also the hospital in general, has an exciting and limitless potential. More so in this era where downsizing hospital costs is beneficial, doing so may also be mandatory in order to comply with the soon to be introduced personal data protection act.
Stahl, Ido; Katsman, Alexander; Zaidman, Michael; Keshet, Doron; Sigal, Amit; Eidelman, Mark
2017-07-11
Smartphones have the ability to capture and send images, and their use has become common in the emergency setting for transmitting radiographic images with the intent to consult an off-site specialist. Our objective was to evaluate the reliability of smartphone-based instant messaging applications for the evaluation of various pediatric limb traumas, as compared with the standard method of viewing images of a workstation-based picture archiving and communication system (PACS). X-ray images of 73 representative cases of pediatric limb trauma were captured and transmitted to 5 pediatric orthopedic surgeons by the Whatsapp instant messaging application on an iPhone 6 smartphone. Evaluators were asked to diagnose, classify, and determine the course of treatment for each case over their personal smartphones. Following a 4-week interval, revaluation was conducted using the PACS. Intraobserver agreement was calculated for overall agreement and per fracture site. The overall results indicate "near perfect agreement" between interpretations of the radiographs on smartphones compared with computer-based PACS, with κ of 0.84, 0.82, and 0.89 for diagnosis, classification, and treatment planning, respectively. Looking at the results per fracture site, we also found substantial to near perfect agreement. Smartphone-based instant messaging applications are reliable for evaluation of a wide range of pediatric limb fractures. This method of obtaining an expert opinion from the off-site specialist is immediately accessible and inexpensive, making smartphones a powerful tool for doctors in the emergency department, primary care clinics, or remote medical centers, enabling timely and appropriate treatment for the injured child. This method is not a substitution for evaluation of the images in the standard method over computer-based PACS, which should be performed before final decision-making.
Sivalogan, Kasthuri; Semrau, Katherine E A; Ashigbie, Paul G; Mwangi, Sheila; Herlihy, Julie M; Yeboah-Antwi, Kojo; Banda, Bowen; Grogan, Caroline; Biemba, Godfrey; Hamer, Davidson H
2018-01-01
Identifying and understanding traditional perceptions that influence newborn care practices and care-seeking behavior are crucial to developing sustainable interventions to improve neonatal health. The Zambia Chlorhexidine Application Trial (ZamCAT), a large-scale cluster randomized trial, assessed the impact of 4% chlorhexidine on neonatal mortality and omphalitis in Southern Province, Zambia. The main purpose of this post-ZamCAT qualitative study was to understand the impact of newborn care health messages on care-seeking behavior for neonates and the acceptability, knowledge, and attitudes towards chlorhexidine cord care among community members and health workers in Southern Province. Five focus group discussions and twenty-six in-depth interviews were conducted with mothers and health workers from ten health centers (5 rural and 5 peri-urban/urban). Community perceptions and local realities were identified as fundamental to care-seeking decisions and influenced individual participation in particular health-seeking behaviors. ZamCAT field monitors (data collectors) disseminated health messages at the time of recruitment at the health center and during subsequent home visits. Mothers noted that ZamCAT field monitors were effective in providing lessons and education on newborn care practices and participating mothers were able to share these messages with others in their communities. Although the study found no effect of chlorhexidine cord washes on neonatal mortality, community members had positive views towards chlorhexidine as they perceived that it reduced umbilical cord infections and was a beneficial alternative to traditional cord applications. The acceptability of health initiatives, such as chlorhexidine cord application, in community settings, is dependent on community education, understanding, and engagement. Community-based approaches, such as using community-based cadres of health workers to strengthen referrals, are an acceptable and potentially effective strategy to improve care-seeking behaviors and practices.
Ahn, Ho-Young Anthony; Wu, Lei; Taylor, Ronald E
2013-01-01
Using Taylor's six-segment message strategy wheel as a theoretical framework, this study examines the communication approach (transmission or ritual) and message strategy (ego, social, sensory, routine, acute need, or ration) of cosmetic surgery websites. A content analysis revealed a fairly even division between transmission and ritual approaches. Ration strategy was the exclusive strategy in the websites adopting a transmission approach. No routine or acute need strategies were observed. Websites incorporating the ritual approach used ego, social, and sensory strategies. Human female models and natural objects were incorporated to deliver emotional persuasion. Implications for cosmetic surgery web marketers are discussed.
Security, privacy, and confidentiality issues on the Internet
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559
NASA Astrophysics Data System (ADS)
Bhardwaj, Rupali
2018-03-01
Reversible data hiding means embedding a secret message in a cover image in such a manner, to the point that in the midst of extraction of the secret message, the cover image and, furthermore, the secret message are recovered with no error. The goal of by far most of the reversible data hiding algorithms is to have improved the embedding rate and enhanced visual quality of stego image. An improved encrypted-domain-based reversible data hiding algorithm to embed two binary bits in each gray pixel of original cover image with minimum distortion of stego-pixels is employed in this paper. Highlights of the proposed algorithm are minimum distortion of pixel's value, elimination of underflow and overflow problem, and equivalence of stego image and cover image with a PSNR of ∞ (for Lena, Goldhill, and Barbara image). The experimental outcomes reveal that in terms of average PSNR and embedding rate, for natural images, the proposed algorithm performed better than other conventional ones.
Park, Hyojung; Reber, Bryan H; Chon, Myoung-Gi
2016-01-01
This study examined how major health organizations use Twitter for disseminating health information, building relationships, and encouraging actions to improve health. The sampled organizations were the American Heart Association, American Cancer Society, and American Diabetes Association. A content analysis was conducted on 1,583 tweets to examine these organizations' use of Twitter's interactive features and to understand the message functions and topics of their tweets. The numbers of retweets and favorites were also measured as engagement indicators and compared by different message functions. The results revealed that all of the organizations posted original tweets most, but they differed in the degree to which they used the retweet and reply functions. Hashtags and hyperlinks were the most frequently used interactive tools. The majority of the tweets were about organization-related topics, whereas personal health-related tweets represented a relatively small portion of the sample. Followers were most likely to like and retweet personal health action-based messages.
Security, privacy, and confidentiality issues on the Internet.
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.
Using Text Messaging in Long-Term Arthroplasty Follow-Up: A Pilot Study.
Blocker, Oliver; Bullock, Alison; Morgan-Jones, Rhidian; Ghandour, Adel; Richardson, James
2017-05-16
Patient-reported outcome measures (PROMs) and mobile technology have the potential to change the way patients are monitored following joint replacement surgery. The aim of this study was to determine the feasibility of text messaging to record PROMs in long-term follow-up of hip and knee arthroplasty. Our participants were 17 patients 2-years-plus post hip or knee arthroplasty attending clinic with a mobile telephone number on record. A simple PROM (Oswestry Very Short Form) was texted to the patient. Responses were compared to clinical, radiographic, and existing PROM findings. Patients were interviewed to discover their opinions on this use of texting. A total of 11 patients engaged with the text messaging. Reasons for not engaging included wrong numbers, physical barriers, and lack of understanding. A total of 8 patients attending clinic allowed comparison of text messaging with clinical findings. The average age was 70 years. A total of 4 patient text messaging responses matched clinical and radiographic findings; 3 also matched PROM scores collected in clinic. The 3 patients with mixed responses had abnormal clinical, radiographic, or PROM findings. One patient's text responses conflicted with clinical outcome. Analysis of patients' views showed a generally positive opinion: patients were happy to communicate with surgeons by text. Practical problems, PROM limitations, and trustworthiness of texting were highlighted. Engaging with changing technology creates challenges for patients and health care professionals. Despite this, our results suggest text messaging is a promising way to communicate with arthroplasty patients. Earlier integration of text communication in the patient pathway may be important and needs further research. ©Oliver Blocker, Alison Bullock, Rhidian Morgan-Jones, Adel Ghandour, James Richardson. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 16.05.2017.
Short message service (SMS) applications for disease prevention in developing countries.
Déglise, Carole; Suggs, L Suzanne; Odermatt, Peter
2012-01-12
The last decade has witnessed unprecedented growth in the number of mobile phones in the developing world, thus linking millions of previously unconnected people. The ubiquity of mobile phones, which allow for short message service (SMS), provides new and innovative opportunities for disease prevention efforts. The aim of this review was to describe the characteristics and outcomes of SMS interventions for disease prevention in developing countries and provide recommendations for future work. A systematic search of peer-reviewed and gray literature was performed for papers published in English, French, and German before May 2011 that describe SMS applications for disease prevention in developing countries. A total of 34 SMS applications were described, among which 5 had findings of an evaluation reported. The majority of SMS applications were pilot projects in various levels of sophistication; nearly all came from gray literature sources. Many applications were initiated by the project with modes of intervention varying between one-way or two-way communication, with or without incentives, and with educative games. Evaluated interventions were well accepted by the beneficiaries. The primary barriers identified were language, timing of messages, mobile network fluctuations, lack of financial incentives, data privacy, and mobile phone turnover. This review illustrates that while many SMS applications for disease prevention exist, few have been evaluated. The dearth of peer-reviewed studies and the limited evidence found in this systematic review highlight the need for high-quality efficacy studies examining behavioral, social, and economic outcomes of SMS applications and mobile phone interventions aimed to promote health in developing country contexts.
Short Message Service (SMS) Applications for Disease Prevention in Developing Countries
Suggs, L. Suzanne; Odermatt, Peter
2012-01-01
Background The last decade has witnessed unprecedented growth in the number of mobile phones in the developing world, thus linking millions of previously unconnected people. The ubiquity of mobile phones, which allow for short message service (SMS), provides new and innovative opportunities for disease prevention efforts. Objective The aim of this review was to describe the characteristics and outcomes of SMS interventions for disease prevention in developing countries and provide recommendations for future work. Methods A systematic search of peer-reviewed and gray literature was performed for papers published in English, French, and German before May 2011 that describe SMS applications for disease prevention in developing countries. Results A total of 34 SMS applications were described, among which 5 had findings of an evaluation reported. The majority of SMS applications were pilot projects in various levels of sophistication; nearly all came from gray literature sources. Many applications were initiated by the project with modes of intervention varying between one-way or two-way communication, with or without incentives, and with educative games. Evaluated interventions were well accepted by the beneficiaries. The primary barriers identified were language, timing of messages, mobile network fluctuations, lack of financial incentives, data privacy, and mobile phone turnover. Conclusion This review illustrates that while many SMS applications for disease prevention exist, few have been evaluated. The dearth of peer-reviewed studies and the limited evidence found in this systematic review highlight the need for high-quality efficacy studies examining behavioral, social, and economic outcomes of SMS applications and mobile phone interventions aimed to promote health in developing country contexts. PMID:22262730
Thakkar, Jay; Barry, Tony; Thiagalingam, Aravinda; Redfern, Julie; McEwan, Alistair L; Rodgers, Anthony; Chow, Clara K
2016-11-15
Mobile health (mHealth) has huge potential to deliver preventative health services. However, there is paucity of literature on theoretical constructs, technical, practical, and regulatory considerations that enable delivery of such services. The objective of this study was to outline the key considerations in the development of a text message-based mHealth program; thus providing broad recommendations and guidance to future researchers designing similar programs. We describe the key considerations in designing the intervention with respect to functionality, technical infrastructure, data management, software components, regulatory requirements, and operationalization. We also illustrate some of the potential issues and decision points utilizing our experience of developing text message (short message service, SMS) management systems to support 2 large randomized controlled trials: TEXT messages to improve MEDication adherence & Secondary prevention (TEXTMEDS) and Tobacco, EXercise and dieT MEssages (TEXT ME). The steps identified in the development process were: (1) background research and development of the text message bank based on scientific evidence and disease-specific guidelines, (2) pilot testing with target audience and incorporating feedback, (3) software-hardware customization to enable delivery of complex personalized programs using prespecified algorithms, and (4) legal and regulatory considerations. Additional considerations in developing text message management systems include: balancing the use of customized versus preexisting software systems, the level of automation versus need for human inputs, monitoring, ensuring data security, interface flexibility, and the ability for upscaling. A merging of expertise in clinical and behavioral sciences, health and research data management systems, software engineering, and mobile phone regulatory requirements is essential to develop a platform to deliver and manage support programs to hundreds of participants simultaneously as in TEXT ME and TEXTMEDS trials. This research provides broad principles that may assist other researchers in developing mHealth programs. ©Jay Thakkar, Tony Barry, Aravinda Thiagalingam, Julie Redfern, Alistair L McEwan, Anthony Rodgers, Clara K Chow. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 15.11.2016.
A secure transmission scheme of streaming media based on the encrypted control message
NASA Astrophysics Data System (ADS)
Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li
2007-09-01
As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.
Badawy, Sherif M; Barrera, Leonardo; Sinno, Mohamad G; Kaviany, Saara; O'Dwyer, Linda C; Kuhns, Lisa M
2017-05-15
The number of adolescents with chronic health conditions (CHCs) continues to increase. Medication nonadherence is a global challenge among adolescents across chronic conditions and is associated with poor health outcomes. While there has been growing interest in the use of mHealth technology to improve medication adherence among adolescents with CHCs, particularly text messaging and mobile phone apps, there has been no prior systematic review of their efficacy. The purpose of this review was to systematically evaluate the most recent evidence for the efficacy of text messaging and mobile phone apps as interventions to promote medication adherence among adolescents with CHCs. PubMed, Embase, CENTRAL, PsycINFO, Web of Science, Google Scholar, and additional databases were searched from 1995 until November 2015. An additional hand search of related themes in the Journal of Medical Internet Research was also conducted. The Preferred Reporting Results of Systematic Reviews and Meta-Analyses guidelines were followed. Two reviewers independently screened titles/abstracts, assessed full-text articles, extracted data from included articles, and assessed their quality using Grades of Recommendation, Assessment, Development, and Evaluation criteria. Included studies were described in original research articles that targeted adherence in adolescents with CHCs (12-24 years-old). Of the 1423 records examined, 15 met predefined criteria: text messaging (n=12) and mobile phone apps (n=3). Most studies were performed in the United States (11/15, 73%), were randomized-controlled trials (8/15, 53%), had a sample size <50 (11/15, 73%), and included adherence self-report and/or biomarkers (9/15, 60%). Only four studies were designed based on a theoretical framework. Approaches for text messaging and mobile phone app interventions varied across studies. Seven articles (7/15, 47%) reported significant improvement in adherence with moderate to large standardized mean differences. Most of the included studies were of low or moderate quality. Studies varied in sample size, methods of adherence assessment, and definition of adherence, which prohibited performing a meta-analysis. The use of text messaging and mobile phone app interventions to improve medication adherence among adolescents with CHCs has shown promising feasibility and acceptability, and there is modest evidence to support the efficacy of these interventions. Further evaluation of short- and long-term efficacy and cost-effectiveness of these interventions is warranted given the early and evolving state of the science. ©Sherif M Badawy, Leonardo Barrera, Mohamad G Sinno, Saara Kaviany, Linda C O’Dwyer, Lisa M Kuhns. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 15.05.2017.
A Formalization of HIPAA for a Medical Messaging System
NASA Astrophysics Data System (ADS)
Lam, Peifung E.; Mitchell, John C.; Sundaram, Sharada
The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance systems. We believe that in some applications, it may be practical to support compliance by using formalized portions of applicable laws to regulate business processes that use information systems. In order to explore this possibility, we use a stratified fragment of Prolog with limited use of negation to formalize a portion of the US Health Insurance Portability and Accountability Act (HIPAA). As part of our study, we also explore the deployment of our formalization in a prototype hospital Web portal messaging system.
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
Single Sided Messaging v. 0.6.6
DOE Office of Scientific and Technical Information (OSTI.GOV)
Curry, Matthew Leon; Farmer, Matthew Shane; Hassani, Amin
Single-Sided Messaging (SSM) is a portable, multitransport networking library that enables applications to leverage potential one-sided capabilities of underlying network transports. It also provides desirable semantics that services for highperformance, massively parallel computers can leverage, such as an explicit cancel operation for pending transmissions, as well as enhanced matching semantics favoring large numbers of buffers attached to a single match entry. This release supports TCP/IP, shared memory, and Infiniband.
GOATS 2005 Integrated, Adaptive Autonomous Acoustic Sensing Systems
2008-09-30
the MOOS-Ivp autonomy software suite to support the rapidly growing application community. In addition a structure, nested repository has been...priority. Thus, track messages (when available) are sent most often, but eventually the priority of the status message will grow high enough to get a...data throughput over the old communications stack. 4 Figure 1 Real-time topside display of BTR data transmitted from Unicorn BF21
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies
Uhlemann, Elisabeth
2018-01-01
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676
Using a Smartphone Application to Promote Healthy Dietary Behaviours and Local Food Consumption
Gilliland, Jason; Sadler, Richard; Clark, Andrew; O'Connor, Colleen; Milczarek, Malgorzata; Doherty, Sean
2015-01-01
Smartphone “apps” are a powerful tool for public health promotion, but unidimensional interventions have been ineffective at sustaining behavioural change. Various logistical issues exist in successful app development for health intervention programs and for sustaining behavioural change. This study reports on a smartphone application and messaging service, called “SmartAPPetite,” which uses validated behaviour change techniques and a behavioural economic approach to “nudge” users into healthy dietary behaviours. To help gauge participation in and influence of the program, data were collected using an upfront food survey, message uptake tracking, experience sampling interviews, and a follow-up survey. Logistical and content-based issues in the deployment of the messaging service were subsequently addressed to strengthen the effectiveness of the app in changing dietary behaviours. Challenges included creating relevant food goal categories for participants, providing messaging appropriate to self-reported food literacy and ensuring continued participation in the program. SmartAPPetite was effective at creating a sense of improved awareness and consumption of healthy foods, as well as drawing people to local food vendors with greater frequency. This work serves as a storehouse of methods and best practices for multidimensional local food-based smartphone interventions aimed at improving the “triple bottom line” of health, economy, and environment. PMID:26380298
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.
Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos
2018-03-23
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.
Boguslawski, Bartosz; Gripon, Vincent; Seguin, Fabrice; Heitzmann, Frédéric
2016-02-01
Associative memories are data structures that allow retrieval of previously stored messages given part of their content. They, thus, behave similarly to the human brain's memory that is capable, for instance, of retrieving the end of a song, given its beginning. Among different families of associative memories, sparse ones are known to provide the best efficiency (ratio of the number of bits stored to that of the bits used). Recently, a new family of sparse associative memories achieving almost optimal efficiency has been proposed. Their structure, relying on binary connections and neurons, induces a direct mapping between input messages and stored patterns. Nevertheless, it is well known that nonuniformity of the stored messages can lead to a dramatic decrease in performance. In this paper, we show the impact of nonuniformity on the performance of this recent model, and we exploit the structure of the model to improve its performance in practical applications, where data are not necessarily uniform. In order to approach the performance of networks with uniformly distributed messages presented in theoretical studies, twin neurons are introduced. To assess the adapted model, twin neurons are used with the real-world data to optimize power consumption of electronic circuits in practical test cases.
Using a Smartphone Application to Promote Healthy Dietary Behaviours and Local Food Consumption.
Gilliland, Jason; Sadler, Richard; Clark, Andrew; O'Connor, Colleen; Milczarek, Malgorzata; Doherty, Sean
2015-01-01
Smartphone "apps" are a powerful tool for public health promotion, but unidimensional interventions have been ineffective at sustaining behavioural change. Various logistical issues exist in successful app development for health intervention programs and for sustaining behavioural change. This study reports on a smartphone application and messaging service, called "SmartAPPetite," which uses validated behaviour change techniques and a behavioural economic approach to "nudge" users into healthy dietary behaviours. To help gauge participation in and influence of the program, data were collected using an upfront food survey, message uptake tracking, experience sampling interviews, and a follow-up survey. Logistical and content-based issues in the deployment of the messaging service were subsequently addressed to strengthen the effectiveness of the app in changing dietary behaviours. Challenges included creating relevant food goal categories for participants, providing messaging appropriate to self-reported food literacy and ensuring continued participation in the program. SmartAPPetite was effective at creating a sense of improved awareness and consumption of healthy foods, as well as drawing people to local food vendors with greater frequency. This work serves as a storehouse of methods and best practices for multidimensional local food-based smartphone interventions aimed at improving the "triple bottom line" of health, economy, and environment.
Bail, Christopher Andrew
2016-01-01
Social media sites are rapidly becoming one of the most important forums for public deliberation about advocacy issues. However, social scientists have not explained why some advocacy organizations produce social media messages that inspire far-ranging conversation among social media users, whereas the vast majority of them receive little or no attention. I argue that advocacy organizations are more likely to inspire comments from new social media audiences if they create “cultural bridges,” or produce messages that combine conversational themes within an advocacy field that are seldom discussed together. I use natural language processing, network analysis, and a social media application to analyze how cultural bridges shaped public discourse about autism spectrum disorders on Facebook over the course of 1.5 years, controlling for various characteristics of advocacy organizations, their social media audiences, and the broader social context in which they interact. I show that organizations that create substantial cultural bridges provoke 2.52 times more comments about their messages from new social media users than those that do not, controlling for these factors. This study thus offers a theory of cultural messaging and public deliberation and computational techniques for text analysis and application-based survey research. PMID:27694580
Velásquez-Villada, Carlos; Donoso, Yezid
2016-03-25
Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river's course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas' movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.
Mercken, Liesbeth; Candel, Math; de Vries, Hein; Oenema, Anke
2015-01-01
Background Smoking prevalence rates among Dutch children increase rapidly after they transit to secondary school, in particular among children with a low socioeconomic status (SES). Web-based, computer-tailored programs supplemented with prompt messages may be able to empower children to prevent them from starting to smoke when they transit to secondary school. Objective The main aim of this study is to evaluate whether computer-tailored feedback messages, with and without prompt messages, are effective in decreasing children’s smoking intentions and smoking behavior after 12 and 25 months of follow-up. Methods Data were gathered at baseline (T0), and after 12 months (T1) and 25 months (T2) of follow-up of a smoking prevention intervention program called Fun without Smokes. A total of 162 schools were randomly allocated to a no-intervention control group, an intervention prompt group, or an intervention no-prompt group. A total of 3213 children aged 10 to 12 years old participated in the study and completed a Web-based questionnaire assessing their smoking intention, smoking behavior, and sociocognitive factors, such as attitude, social influence, and self-efficacy, related to smoking. After completion, children in the intervention groups received computer-tailored feedback messages in their own email inbox and those messages could be accessed on the intervention website. Children in the prompt group received prompt messages, via email and short message service (SMS) text messaging, to stimulate them to reuse the intervention website with nonsmoking content. Multilevel logistic regression analyses were performed using multiple imputations to assess the program effects on smoking intention and smoking behavior at T1 and T2. Results A total of 3213 children participated in the Fun without Smokes study at T0. Between T0 and T1 a total of 1067 children out of the original 3213 (33.21%) dropped out of the study. Between T0 and T2 the number of children that did not participate in the final measurement was 1730 out of the original 3213 (53.84%). No significant program effects were observed for any of the intervention groups compared to the control group at T1 for the intention to engage in smoking—prompt, OR 0.67 (95% CI 0.30-1.50), no-prompt, OR 0.76 (95% CI 0.34-1.67)—or for smoking behavior—prompt, OR 1.13 (95% CI 0.13-9.98), no-prompt, OR 0.50 (95% CI 0.04-5.59). Similar nonsignificant program effects were found at T2 for the intention to start smoking—prompt, OR 0.78 (95% CI 0.26-2.32), no-prompt, OR 1.31 (95% CI 0.45-3.82)—and smoking behavior—prompt, OR 0.53 (95% CI 0.12-2.47), no-prompt, OR 1.01 (95% CI 0.24-4.21). Conclusions This study showed that the Web-based, computer-tailored feedback messages with and without prompt messages were not effective in modifying children’s smoking intentions and smoking behavior as compared to no information. Future smoking prevention interventions are recommended to start closer to the age of actual smoking uptake. Furthermore, future studies on Web-based, computer-tailored smoking prevention programs should focus on assessing and controlling exposure to the educational content and the response to the prompt messages. Trial Registration Netherlands Trial Register NTR3116; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=3116 (Archived by WebCite at http://www.webcitation.org/6O0wQYuPI). PMID:25759248
Hébert, Emily T; Stevens, Elise M; Frank, Summer G; Kendzor, Darla E; Wetter, David W; Zvolensky, Michael J; Buckner, Julia D; Businelle, Michael S
2018-03-01
Smartphone apps can provide real-time, tailored interventions for smoking cessation. The current study examines the effectiveness of a smartphone-based smoking cessation application that assessed risk for imminent smoking lapse multiple times per day and provided messages tailored to current smoking lapse risk and specific lapse triggers. Participants (N=59) recruited from a safety-net hospital smoking cessation clinic completed phone-based ecological momentary assessments (EMAs) 5 times/day for 3 consecutive weeks (1week pre-quit, 2weeks post-quit). Risk for smoking lapse was estimated in real-time using a novel weighted lapse risk estimator. With each EMA, participants received messages tailored to current level of risk for imminent smoking lapse and self-reported presence of smoking urge, stress, cigarette availability, and motivation to quit. Generalized linear mixed model analyses determined whether messages tailored to specific lapse risk factors were associated with greater reductions in these triggers than messages not tailored to specific triggers. Overall, messages tailored to smoking urge, cigarette availability, or stress corresponded with greater reductions in those triggers than messages that were not tailored to specific triggers (p's=0.02 to <0.001). Although messages tailored to stress were associated with greater reductions in stress than messages not tailored to stress, the association was non-significant (p=0.892) when only moments of high stress were included in the analysis. Mobile technology can be used to conduct real-time smoking lapse risk assessment and provide tailored treatment content. Findings provide initial evidence that tailored content may impact users' urge to smoke, stress, and cigarette availability. Copyright © 2017 Elsevier Ltd. All rights reserved.
Raiman, Lewis; Antbring, Richard; Mahmood, Asad
2017-01-06
Instant messaging applications have the potential to improve and facilitate communication between hospital doctors and students, hence generating and improving learning opportunities. This study aims to demonstrate the feasibility and acceptability of instant messaging communication to supplement medical education for medical students whilst on clinical attachment. A total of 6 WhatsApp Messenger (WhatsApp Inc.) groups were created for medical students on clinical attachment. These were used to provide communication within Problem Based Learning (PBL) groups for a duration of 8 weeks. The frequency and type of communication were recorded. Students' opinions were evaluated through a structured interview process at the end of the study period. A thematic analysis was performed on the content of the instant messaging groups and on the results of the structured interviews. All of the participants were active in their respective messaging groups (19 students and 6 tutors). A total of 582 messages, 22 images and 19 webpage links were sent. Thematic analysis on content of the instant messaging groups identified the following themes: organisational, educational and social. Thematic analysis on the content of interviews identified themes such as the ease of use of instant messaging, benefit of instant messaging to foster understanding and learning, and the ability to access recorded discussions. The findings of this study illustrate a method by which communication within PBL groups can be facilitated by the use of instant messaging. The results indicate the feasibility and acceptability of WhatsApp Messenger in supplementing PBL teaching for medical students, and provides a framework for studies to investigate use amongst larger cohorts of students.
HIV Prevention Messages Targeting Young Latino Immigrant MSM.
Solorio, Rosa; Norton-Shelpuk, Pamela; Forehand, Mark; Martinez, Marcos; Aguirre, Joel
2014-01-01
Young Latino immigrant men who have sex with men (MSM) are at risk for HIV and for delayed diagnosis. A need exists to raise awareness about HIV prevention in this population, including the benefits of timely HIV testing. This project was developed through collaboration between University of WA researchers and Entre Hermanos, a community-based organization serving Latinos. Building from a community-based participatory research approach, the researchers developed a campaign that was executed by Activate Brands, based in Denver, Colorado. The authors (a) describe the development of HIV prevention messages through the integration of previously collected formative data; (b) describe the process of translating these messages into PSAs, including the application of a marketing strategy; (c) describe testing the PSAs within the Latino MSM community; and (c) determine a set of important factors to consider when developing HIV prevention messages for young Latino MSM who do not identify as gay.
NASA Astrophysics Data System (ADS)
Ayu Cyntya Dewi, Dyah; Shaufiah; Asror, Ibnu
2018-03-01
SMS (Short Message Service) is on e of the communication services that still be the main choice, although now the phone grow with various applications. Along with the development of various other communication media, some countries lowered SMS rates to keep the interest of mobile users. It resulted in increased spam SMS that used by several parties, one of them for advertisement. Given the kind of multi-lingual documents in a message SMS, the Web, and others, necessary for effective multilingual or cross-lingual processing techniques is becoming increasingly important. The steps that performed in this research is data / messages first preprocessing then represented into a graph model. Then calculated using GKNN method. From this research we get the maximum accuracy is 98.86 with training data in Indonesian language and testing data in indonesian language with K 10 and threshold 0.001.
Campbell, Rose G; Babrow, Austin S
2004-01-01
This article offers a theoretical analysis of the role of empathy as a key mediator of the suasive effects of health messages, and it discusses the testing of an empirical tool for studying the state of empathy in responses to persuasive messages. It is argued that felt empathy evokes cognitive and emotional processing conducive to important health-promoting responses. This assertion was tested by operationalizing empathy as a response state via a new measure, the Empathy Response Scale (ERS). Two pilot tests and one major study, all set in the challenging area of HIV/AIDS prevention, provided preliminary data supporting the theoretical analysis and the ERS as a measure of the state of empathy. The article concludes with discussions of directions for future tests of the empathy theory and scale, as well as applications of the current framework for developing persuasive messages.
Using the Theory of Planned Behavior to predict intention to comply with a food recall message.
Freberg, Karen
2013-01-01
The Theory of Planned Behavior (TPB) has provided considerable insight into the public's intention to comply with many different health-related messages, but has not been applied previously to intention to comply with food safety recommendations and recalls ( Hallman & Cuite, 2010 ). Because food recalls can differ from other health messages in their urgency, timing, and cessation, the applicability of the TPB in this domain is unknown. The research reported here attempted to address this gap using a nationally representative consumer panel. Results showed that, consistent with the theory's predictions, attitudes and subjective norms were predictive of the intention to comply with a food recall message, with attitudes having a much greater impact on intent to comply than subjective norms. Perceived behavioral control failed to predict intention to comply. Implications of these results for health public relations and crisis communications and recommendations for future research were discussed.
NASA Astrophysics Data System (ADS)
Ollongren, Alexander
2011-02-01
In a sequence of papers on the topic of message construction for interstellar communication by means of a cosmic language, the present author has discussed various significant requirements such a lingua should satisfy. The author's Lingua Cosmica is a (meta) system for annotating contents of possibly large-scale messages for ETI. LINCOS, based on formal constructive logic, was primarily designed for dealing with logic contents of messages but is also applicable for denoting structural properties of more general abstractions embedded in such messages. The present paper explains ways and means for achieving this for a special case: recursive entities. As usual two stages are involved: first the domain of discourse is enriched with suitable representations of the entities concerned, after which properties over them can be dealt with within the system itself. As a representative example the case of Russian dolls (Matrjoshka's) is discussed in some detail and relations with linguistic structures in natural languages are briefly exploited.
NASA Astrophysics Data System (ADS)
Kaveeshwar, Ashok; Rodriguez, Raul
1993-01-01
The STARSYS system is aimed at providing low cost global positioning and messaging by satellite. STARSYS is a data only system using very brief message transmission times. Code Division Multiple Access (CDMA) is used for frequency sharing; it enables transmitted data to be coded for unique user identification and also to employ Doppler and radio ranging to determine the geographical location of a transmitting terminal. The STARSYS system is composed of the field receiver/transmitter, the Low Earth Orbit (LEO) satellite constellation and the ground station elements. Each message transmission is able to contain up to thirty two digital characters. Market applications are numerous: theft control, vehicle and logistic tracking and messaging, personal communications, utility and environmental data acquisition and transfer. Co-primary frequency allocation at WARC-92 accelerated interest for potential customers and investors, although the amount of frequency allocation (less than 1 GHz) is small.
Mattson, Marifran; Basu, Ambar
2010-07-01
The Center for Disease Control's (CDC) Diethylstilbestrol (DES) Update, a campaign to educate people who may have been exposed to the drug DES, is framed on the premises of the social marketing model, namely formative research, audience segmentation, product, price, placement, promotion, and campaign evaluation. More than that, the campaign takes a critical step in extending the social marketing paradigm by highlighting the need to situate the messaging process at the heart of any health communication campaign. This article uses CDC's DES Update as a case study to illustrate an application of a message development tool within social marketing. This tool promotes the operationalization of messaging within health campaigns. Ultimately, the goal of this project is to extend the social marketing model and provide useful theoretical guidance to health campaign practitioners on how to accomplish stellar communication within a social marketing campaign.
HIV Prevention Messages Targeting Young Latino Immigrant MSM
Solorio, Rosa; Forehand, Mark; Aguirre, Joel
2014-01-01
Young Latino immigrant men who have sex with men (MSM) are at risk for HIV and for delayed diagnosis. A need exists to raise awareness about HIV prevention in this population, including the benefits of timely HIV testing. This project was developed through collaboration between University of WA researchers and Entre Hermanos, a community-based organization serving Latinos. Building from a community-based participatory research approach, the researchers developed a campaign that was executed by Activate Brands, based in Denver, Colorado. The authors (a) describe the development of HIV prevention messages through the integration of previously collected formative data; (b) describe the process of translating these messages into PSAs, including the application of a marketing strategy; (c) describe testing the PSAs within the Latino MSM community; and (c) determine a set of important factors to consider when developing HIV prevention messages for young Latino MSM who do not identify as gay. PMID:24864201
The Fourth Gospel as Contextualized by Yucatecan Assemblies of God Pastors
ERIC Educational Resources Information Center
Kazim, Paul S.
2017-01-01
Most of the training material that Assemblies of God educators use in Latin America was originally written in English. Almost without exception nationals or missionaries translated the approved theology texts from English. While everyone contextualizes, the gospel message will not ever be completely at home in the Yucatan until the pastors think…
2015-05-01
Memorandum of Major Danisha L. Morris , JA, Chief, Contract and Fiscal Law (June 29, 2010). SIGAR-15-57-SP Report: $36 Million Command and Control...Facility at Camp Leatherneck, Afghanistan Page 60 EXHIBIT 10 -----Original Message----- From: Mills LtGen Richard P Sent: Tuesday , February 11
Sugar and Spice, Toads and Mice: Gender Issues in Family Therapy Training.
ERIC Educational Resources Information Center
Roberts, Janine McGill
1991-01-01
Presents methods to help family therapy trainees and clinicians articulate how to address gender in families. Describes four experiential exercises (including gender survival messages, gender framed circular questions, and process observation sheets) for training and use with clients. Can examine learnings about gender from families of origin,…
these cooler months. Did you know your body can cool 25 times faster in water than in air? That water Traffic Service began broadcasting Automatic Identification System (AIS) test messages to select test participants in the area via standard AIS channels. These broadcasts-originating from MMSI 003660471-are less
Tone and Style: Developing a Neglected Segment of Business Communication
ERIC Educational Resources Information Center
Kenman, Leon F.
2007-01-01
The importance of tone and style to communication is attested by the longevity of the popularity of "Elements of Style," published originally in 1918, with the fourth edition published in 2000 (Strunk, 1918; Strunk & White, 2000). Communicators in business and academia at all levels need to send messages that are understood pleasantly and…
Social and Religious Factors in Adolescents' Drug Use
ERIC Educational Resources Information Center
Jones, Sandra C.; Rossiter, John R.
2009-01-01
The original purpose of this study was to test several types of anti-cannabis messages. Analysis of the results led to a second, post hoc purpose: to explain why pre-intervention substance usage rates varied so greatly between the sampled schools. Participants were Australian ninth-grade students at a state government high school and a…
ADM guidance-Ceramics: guidance to the use of fractography in failure analysis of brittle materials.
Scherrer, Susanne S; Lohbauer, Ulrich; Della Bona, Alvaro; Vichi, Alessandro; Tholey, Michael J; Kelly, J Robert; van Noort, Richard; Cesar, Paulo Francisco
2017-06-01
To provide background information and guidance as to how to use fractography accurately, a powerful tool for failure analysis of dental ceramic structures. An extended palette of qualitative and quantitative fractography is provided, both for in vivo and in vitro fracture surface analyses. As visual support, this guidance document will provide micrographs of typical critical ceramic processing flaws, differentiating between pre- versus post sintering cracks, grinding damage related failures and occlusal contact wear origins and of failures due to surface degradation. The documentation emphasizes good labeling of crack features, precise indication of the direction of crack propagation (dcp), identification of the fracture origin, the use of fractographic photomontage of critical flaws or flaw labeling on strength data graphics. A compilation of recommendations for specific applications of fractography in Dentistry is also provided. This guidance document will contribute to a more accurate use of fractography and help researchers to better identify, describe and understand the causes of failure, for both clinical and laboratory-scale situations. If adequately performed at a large scale, fractography will assist in optimizing the methods of processing and designing of restorative materials and components. Clinical failures may be better understood and consequently reduced by sending out the correct message regarding the fracture origin in clinical trials. Copyright © 2017 The Academy of Dental Materials. All rights reserved.
Thiha, Phyo; Pisani, Anthony R; Gurditta, Kunali; Cherry, Erin; Peterson, Derick R; Kautz, Henry; Wyman, Peter A
2016-11-09
Equipping members of a target population to deliver effective public health messaging to peers is an established approach in health promotion. The Sources of Strength program has demonstrated the promise of this approach for "upstream" youth suicide prevention. Text messaging is a well-established medium for promoting behavior change and is the dominant communication medium for youth. In order for peer 'opinion leader' programs like Sources of Strength to use scalable, wide-reaching media such as text messaging to spread peer-to-peer messages, they need techniques for assisting peer opinion leaders in creating effective testimonials to engage peers and match program goals. We developed a Web interface, called Stories of Personal Resilience in Managing Emotions (StoryPRIME), which helps peer opinion leaders write effective, short-form messages that can be delivered to the target population in youth suicide prevention program like Sources of Strength. To determine the efficacy of StoryPRIME, a Web-based interface for remotely eliciting high school peer leaders, and helping them produce high-quality, personal testimonials for use in a text messaging extension of an evidence-based, peer-led suicide prevention program. In a double-blind randomized controlled experiment, 36 high school students wrote testimonials with or without eliciting from the StoryPRIME interface. The interface was created in the context of Sources of Strength-an evidence-based youth suicide prevention program-and 24 ninth graders rated these testimonials on relatability, usefulness/relevance, intrigue, and likability. Testimonials written with the StoryPRIME interface were rated as more relatable, useful/relevant, intriguing, and likable than testimonials written without StoryPRIME, P=.054. StoryPRIME is a promising way to elicit high-quality, personal testimonials from youth for prevention programs that draw on members of a target population to spread public health messages. ©Phyo Thiha, Anthony R Pisani, Kunali Gurditta, Erin Cherry, Derick R Peterson, Henry Kautz, Peter A Wyman. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 09.11.2016.
Simulating cloud environment for HIS backup using secret sharing.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto
2013-01-01
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.
Productivity and quality improvements in health care through airboss mobile messaging services.
Shah, P J; Martinez, R; Cooney, E
1997-01-01
The US health care industry is in the midst of revolutionary changes. Under tremendous pressures from third-party payers and managed care programs to control costs while providing high quality medical services, health care entities are now looking at information technologies to help them achieve their goals. These goals typically include improved productivity, efficiency and decision-making capabilities among staff members. Moreover, hospitals and other health care facilities that provide a broad and integrated range of inpatient and outpatient care, wellness and home care services are in the best position to offer comprehensive packages to managed care and private insurers. Many health care providers and administrators are considered mobile employees. This mobility can range from intra-building and intra-campus to multi-site and metropolitan areas. This group often relies on a variety of information technologies such as personal computers, communicating laptops, pagers, cellular phones, wireline phones, cordless phones and fax machines to stay in touch and handle information needs. These health care professionals require mobile information access and messaging tools to improve communications, control accessibility and enhance decision-making capabilities. AirBoss mobile messaging services could address the health care industry's need for improved messaging capabilities for its mobile employees. The AirBoss family of services supports integrated voice services, data messaging, mobile facsimile and customized information delivery. This paper describes overview of the current mobile data networking capability, the AirBoss architecture, the health care-related applications it addresses and long-term benefits. In addition, a prototype application for mobile home health care workers is illustrated. This prototype application provides integrated e-mail, information services, web access, real-time access and update of patient records from wireline or wireless networks, and cross media delivery and notification. It provides seamless wide area access to patient data in a secure environment, thus providing a continuity of care from the hospital to home.
Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick
2014-01-01
Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.
Experimental quantum data locking
NASA Astrophysics Data System (ADS)
Liu, Yang; Cao, Zhu; Wu, Cheng; Fukuda, Daiji; You, Lixing; Zhong, Jiaqiang; Numata, Takayuki; Chen, Sijing; Zhang, Weijun; Shi, Sheng-Cai; Lu, Chao-Yang; Wang, Zhen; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei
2016-08-01
Classical correlation can be locked via quantum means: quantum data locking. With a short secret key, one can lock an exponentially large amount of information in order to make it inaccessible to unauthorized users without the key. Quantum data locking presents a resource-efficient alternative to one-time pad encryption which requires a key no shorter than the message. We report experimental demonstrations of a quantum data locking scheme originally proposed by D. P. DiVincenzo et al. [Phys. Rev. Lett. 92, 067902 (2004), 10.1103/PhysRevLett.92.067902] and a loss-tolerant scheme developed by O. Fawzi et al. [J. ACM 60, 44 (2013), 10.1145/2518131]. We observe that the unlocked amount of information is larger than the key size in both experiments, exhibiting strong violation of the incremental proportionality property of classical information theory. As an application example, we show the successful transmission of a photo over a lossy channel with quantum data (un)locking and error correction.
Ontology-based topic clustering for online discussion data
NASA Astrophysics Data System (ADS)
Wang, Yongheng; Cao, Kening; Zhang, Xiaoming
2013-03-01
With the rapid development of online communities, mining and extracting quality knowledge from online discussions becomes very important for the industrial and marketing sector, as well as for e-commerce applications and government. Most of the existing techniques model a discussion as a social network of users represented by a user-based graph without considering the content of the discussion. In this paper we propose a new multilayered mode to analysis online discussions. The user-based and message-based representation is combined in this model. A novel frequent concept sets based clustering method is used to cluster the original online discussion network into topic space. Domain ontology is used to improve the clustering accuracy. Parallel methods are also used to make the algorithms scalable to very large data sets. Our experimental study shows that the model and algorithms are effective when analyzing large scale online discussion data.
Smartphone Applications in Palliative Homecare
Dhiliwal, Sunil R; Salins, Naveen
2015-01-01
Smartphone applications in healthcare delivery are a novel concept and is rapidly gaining ground in all fields of medicine. The modes of e-communications such as e-mail, short message service (SMS), multimedia messaging service (MMS) and WhatsApp in palliative care provides a means for quick tele-consultation, information sharing, cuts the waiting time and facilitates initiation of the treatment at the earliest. It also forms a means of communication with local general practitioner and local health care provider such that continuity of the care is maintained. It also minimizes needless transport of the patient to hospital, prevents needless hospitalization and investigations and minimizes cost and logistics involved in the care process. The two case studies provided highlights the use of smartphone application like WhatsApp in palliative care practice and demonstrates its utility. PMID:25709195
Smart communication with LabView
NASA Astrophysics Data System (ADS)
Iov, Cǎtǎlin J.; Diaconu, Bogdan; Hnatiuc, Mihaela
2016-12-01
The population alarm systems do not represent a new concept. Since hundreds of years ago the man used either smoke signals generated from certain upper locations, visible from long distance, getting through acoustic systems placed on high buildings, until now when mass-media channels extended the possibilities by the television and radio. However, either one of those mentioned above requested the individual to be located at the alarming moment in the area of action of the alarm. Otherwise, the message has no efficiency. This limitation is currently solved by additional communication channels such as the internet and the mobile networks. Messages are now able to be sent to the mobile screen, and the user can reply to messages either by using the short message service (SMS) or by emailing to someone, to a server, to a center. From the general pattern of alarming the population on certain events, the medical applications represent a very important field. Messages are sent from the patient to a central medical center and back to the patient. This paper focuses on the value that virtual tools developed with LabVIEW brings to us.
Moskowitz, David A; Melton, Dan; Owczarzak, Jill
2009-10-01
In recent years, Internet-based or online counseling has emerged as an effective way to assess psychological disorders and discuss destructive behaviors with individuals or groups of individuals. This study explores the application of online counseling to HIV/STD risk-taking behavior among men who have sex with men (MSM). PowerON, an organization that provides sexual health information to MSM exclusively online, used instant message technology to counsel MSM in real time through computer-mediated means. A sample of 279 transcripts of instant message exchanges between PowerON counselors and Gay.com users were recorded and qualitatively analyzed. Approximately 43% of the instant message sessions discussed information about HIV/STD testing. Risk-taking behaviors were addressed in 39% of the sessions. Information about HIV/STDs and general counseling were given in 23% and 18% of the counseling sessions, respectively. The data showed these instant message sessions to be a potentially feasible forum for HIV/STD counseling. Information ordinarily disseminated at health clinics could be successfully distributed through the Internet to MSM. 2009 Elsevier Ireland Ltd.
Moskowitz, David A.; Melton, Dan; Owczarzak, Jill
2015-01-01
Objective In recent years, Internet-based or online counseling has emerged as an effective way to assess psychological disorders and discuss destructive behaviors with individuals or groups of individuals. This study explores the application of online counseling to HIV/STD risk-taking behavior among men who have sex with men (MSM). Methods PowerON, an organization that provides sexual health information to MSM exclusively online, used instant message technology to counsel MSM in real time through computer-mediated means. A sample of 279 transcripts of instant message exchanges between PowerON counselors and Gay.com users were recorded and qualitatively analyzed. Results Approximately 43% of the instant message sessions discussed information about HIV/STD testing. Risk-taking behaviors were addressed in 39% of the sessions. Information about HIV/STDs and general counseling were given in 23% and 18% of the counseling sessions respectively. Conclusion The data showed these instant message sessions to be a potentially feasible forum for HIV/STD counseling. Practice Implications Information ordinarily disseminated at health clinics could be successfully distributed through the Internet to MSM. PMID:19217742
SDN-enabled hybrid emergency message transmission architecture in internet-of-vehicles
NASA Astrophysics Data System (ADS)
Zhu, Wanting; Gao, Deyun; Zhao, Weicheng; Zhang, Hongke; Chiang, Hua-Pei
2018-04-01
With the increasing number of vehicles connected to the Internet-of-Things (IoT), Internet-of-Vehicles (IoV) is becoming a hot research topic. It can improve traffic safety and efficiency and promote the development of the intelligent transportation that is a very important element in Smart Cities. As an important part of the safety application in IoV, the emergency message transmission is designed to inform all the vehicles in the relevant area timely of the accident information through the multi-hop broadcast communication. In this paper, we propose a hybrid emergency message transmission (HEMT), which introduces the SDN technology into the vehicular network environment and utilizes the flexibility of inter-vehicle communication. By deploying SDN-enabled central controller and RSU switches, we can obtain reliable and fast emergency message dissemination. Moreover, considering the space between the coverages of RSUs caused by the sparse deployment, we also use inter-vehicle multi-hop broadcast communication to improve the message coverage ratio by adding the packet modification module on the RSU switch. Simulation results show the feasibility and effectiveness of our proposed scheme.
Data communications in a parallel active messaging interface of a parallel computer
Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E
2013-11-12
Data communications in a parallel active messaging interface (`PAMI`) of a parallel computer composed of compute nodes that execute a parallel application, each compute node including application processors that execute the parallel application and at least one management processor dedicated to gathering information regarding data communications. The PAMI is composed of data communications endpoints, each endpoint composed of a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications through the PAMI and through data communications resources. Embodiments function by gathering call site statistics describing data communications resulting from execution of data communications instructions and identifying in dependence upon the call cite statistics a data communications algorithm for use in executing a data communications instruction at a call site in the parallel application.
A Novel User Created Message Application Service Design for Bidirectional TPEG
NASA Astrophysics Data System (ADS)
Lee, Sang-Hee; Jo, Kang-Hyun
The T-DMB (Terrestrial-Digital Multimedia Broadcasting) is the national service, currently successful in use in Korea since 2008. Among other services, TPEG (Transport Protocol Experts Group) service has been spotlighted in the aspects of creating earnings. At present, TPEG service is not so popular as it fails to satisfy the user’s demands on various aspects. Thus, the variety of services including bidirectional service is necessary in stage of DMB2.0. In this paper, the limitations of existing TPEG-POI (Point of Interest) application service using the wireless communication network are indicated. To overcome such limitations, we propose a business model for TPEG-UCM (User Created Message) application service which uses individual bidirectional media. The experiment shown in this paper proves the usability and operability of the proposed method, suggesting that the implementation of the proposed method would be overcome a lack of variety and unidirectional of existing TPEG application.
SALUTE Grid Application using Message-Oriented Middleware
NASA Astrophysics Data System (ADS)
Atanassov, E.; Dimitrov, D. Sl.; Gurov, T.
2009-10-01
Stochastic ALgorithms for Ultra-fast Transport in sEmiconductors (SALUTE) is a grid application developed for solving various computationally intensive problems which describe ultra-fast carrier transport in semiconductors. SALUTE studies memory and quantum effects during the relaxation process due to electronphonon interaction in one-band semiconductors or quantum wires. Formally, SALUTE integrates a set of novel Monte Carlo, quasi-Monte Carlo and hybrid algorithms for solving various computationally intensive problems which describe the femtosecond relaxation process of optically excited carriers in one-band semiconductors or quantum wires. In this paper we present application-specific job submission and reservation management tool named a Job Track Server (JTS). It is developed using Message-Oriented middleware to implement robust, versatile job submission and tracing mechanism, which can be tailored to application specific failover and quality of service requirements. Experience from using the JTS for submission of SALUTE jobs is presented.
Simulation studies of a wide area health care network.
McDaniel, J. G.
1994-01-01
There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966
Przybylo, Jennifer A; Wang, Ange; Loftus, Pooja; Evans, Kambria H; Chu, Isabella; Shieh, Lisa
2014-09-01
Though current hospital paging systems are neither efficient (callbacks disrupt workflow), nor secure (pagers are not Health Insurance Portability and Accountability Act [HIPAA]-compliant), they are routinely used to communicate patient information. Smartphone-based text messaging is a potentially more convenient and efficient mobile alternative; however, commercial cellular networks are also not secure. To determine if augmenting one-way pagers with Medigram, a secure, HIPAA-compliant group messaging (HCGM) application for smartphones, could improve hospital team communication. Eight-week prospective, cluster-randomized, controlled trial Stanford Hospital Three inpatient medicine teams used the HCGM application in addition to paging, while two inpatient medicine teams used paging only for intra-team communication. Baseline and post-study surveys were collected from 22 control and 41 HCGM team members. When compared with paging, HCGM was rated significantly (P < 0.05) more effective in: (1) allowing users to communicate thoughts clearly (P = 0.010) and efficiently (P = 0.009) and (2) integrating into workflow during rounds (P = 0.018) and patient discharge (P = 0.012). Overall satisfaction with HCGM was significantly higher (P = 0.003). 85% of HCGM team respondents said they would recommend using an HCGM system on the wards. Smartphone-based, HIPAA-compliant group messaging applications improve provider perception of in-hospital communication, while providing the information security that paging and commercial cellular networks do not. © 2014 The Authors Journal of Hospital Medicine published by Wiley Periodicals, Inc. on behalf of Society of Hospital Medicine.
Lilje, Stina Charlotta; Olander, Ewy; Berglund, Johan; Skillgate, Eva; Anderberg, Peter
2017-03-30
Clinical experience of manual therapy for musculoskeletal pain is that patients often suffer from recurrent pain and disorders, but that they do not continue to perform their physical home exercises when they are free from symptoms. The chance of positive long-term effects of manual therapy would probably increase if patients were reminded that they are to continue to perform their exercises. Mobile phone text messaging (short messaging service, SMS) is increasingly used as an innovative intervention to remind patient to exercise. However, there are only a few studies on such interventions in the field of low back pain (LBP). Qualitative studies of patients' experiences of receiving text messages as reminders of home exercises after manual treatment for recurrent LBP have to the best of our knowledge never been published. The aim of this study was to explore older persons' common experiences of receiving reminders of home exercises through mobile phone text messaging after specialized manual therapy for recurrent LBP. A total of 7 men and 8 women (67-86 years), who had sought specialized manual therapy (Naprapathic manual therapy) for recurrent LBP were included in the study. Individual one-way text messages as reminders of home exercises (to be performed on a daily basis) were sent to each patient every third day for 3 weeks, then once a week for another 2 weeks. Semistructured interviews with 2 broad, open-ended questions were held and data were analyzed with systematic text condensation, based on Giorgi's principles of psychological phenomenological analysis. The participants appreciated the messages, which were perceived as timely and usable, and also stimulated memorizing. The messages made the participants reflect on the aim of the exercise, value of being reminded, and on their improvement in pain. During the interviews, the participants created their own routines for continued adherence to the exercises. It seems plausible that mobile phone text messaging may serve as a useful tool for patient empowerment with regard to recurrent LBP in older persons. Further studies are needed to explore whether future compliance with the exercises will be as large if the participants are not being interviewed. ©Stina Charlotta Lilje, Ewy Olander, Johan Berglund, Eva Skillgate, Peter Anderberg. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 30.03.2017.
Aguilera, Adrian; Bruehlman-Senecal, Emma; Demasi, Orianna; Avila, Patricia
2017-05-08
Cognitive Behavioral Therapy (CBT) for depression is efficacious, but effectiveness is limited when implemented in low-income settings due to engagement difficulties including nonadherence with skill-building homework and early discontinuation of treatment. Automated messaging can be used in clinical settings to increase dosage of depression treatment and encourage sustained engagement with psychotherapy. The aim of this study was to test whether a text messaging adjunct (mood monitoring text messages, treatment-related text messages, and a clinician dashboard to display patient data) increases engagement and improves clinical outcomes in a group CBT treatment for depression. Specifically, we aim to assess whether the text messaging adjunct led to an increase in group therapy sessions attended, an increase in duration of therapy attended, and reductions in Patient Health Questionnaire-9 item (PHQ-9) symptoms compared with the control condition of standard group CBT in a sample of low-income Spanish speaking Latino patients. Patients in an outpatient behavioral health clinic were assigned to standard group CBT for depression (control condition; n=40) or the same treatment with the addition of a text messaging adjunct (n=45). The adjunct consisted of a daily mood monitoring message, a daily message reiterating the theme of that week's content, and medication and appointment reminders. Mood data and qualitative responses were sent to a Web-based platform (HealthySMS) for review by the therapist and displayed in session as a tool for teaching CBT skills. Intent-to-treat analyses on therapy attendance during 16 sessions of weekly therapy found that patients assigned to the text messaging adjunct stayed in therapy significantly longer (median of 13.5 weeks before dropping out) than patients assigned to the control condition (median of 3 weeks before dropping out; Wilcoxon-Mann-Whitney z=-2.21, P=.03). Patients assigned to the text messaging adjunct also generally attended more sessions (median=6 sessions) during this period than patients assigned to the control condition (median =2.5 sessions), but the effect was not significant (Wilcoxon-Mann-Whitney z=-1.65, P=.10). Both patients assigned to the text messaging adjunct (B=-.29, 95% CI -0.38 to -0.19, z=-5.80, P<.001) and patients assigned to the control conditions (B=-.20, 95% CI -0.32 to -0.07, z=-3.12, P=.002) experienced significant decreases in depressive symptom severity over the course of treatment; however, the conditions did not significantly differ in their degree of symptom reduction. This study provides support for automated text messaging as a tool to sustain engagement in CBT for depression over time. There were no differences in depression outcomes between conditions, but this may be influenced by low follow-up rates of patients who dropped out of treatment. ©Adrian Aguilera, Emma Bruehlman-Senecal, Orianna Demasi, Patricia Avila. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 08.05.2017.
The Prodiguer Messaging Platform
NASA Astrophysics Data System (ADS)
Greenslade, Mark; Denvil, Sebastien; Raciazek, Jerome; Carenton, Nicolas; Levavasseur, Guillame
2014-05-01
CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output (data and meta-data) are just some of the complexities that CONVERGENCE aims to resolve. The Institut Pierre Simon Laplace (IPSL) is responsible for running climate simulations upon a set of heterogenous HPC environments within France. With heterogeneity comes added complexity in terms of simulation instrumentation and control. Obtaining a global perspective upon the state of all simulations running upon all HPC environments has hitherto been problematic. In this presentation we detail how, within the context of CONVERGENCE, the implementation of the Prodiguer messaging platform resolves complexity and permits the development of real-time applications such as: 1. a simulation monitoring dashboard; 2. a simulation metrics visualizer; 3. an automated simulation runtime notifier; 4. an automated output data & meta-data publishing pipeline; The Prodiguer messaging platform leverages a widely used open source message broker software called RabbitMQ. RabbitMQ itself implements the Advanced Message Queue Protocol (AMPQ). Hence it will be demonstrated that the Prodiguer messaging platform is built upon both open source and open standards.
Wanyonyi, Kristina L; Themessl-Huber, Markus; Humphris, Gerry; Freeman, Ruth
2011-12-01
To conduct a systematic review of the effect of face-to-face delivered tailored health messages on patient behavior and applications for practice. A systematic literature review and meta-analysis. Systematic searches of a number of electronic databases were conducted and criteria for selection of studies were specified. 6 experimental studies published between 2003 and 2009 were included. The studies were all randomized controlled trials to evaluate the effectiveness of a face-to-face tailored messaging intervention. There were variation in their research design and methods used to randomize. All participants were aged at least 18 years. All of the studies reported positive changes in participants' health behavior with varying degrees of effect size and duration. A meta-analysis of the available data also confirmed an overall positive effect of tailored messaging on participants' health behaviors. The systematic review and the meta-analysis demonstrate a significant and positive effective of face-to-face tailored messaging upon participants' health behaviors. Health practitioners should be encouraged to allot time in their work routines to discover their patients' psycho-social characteristics and felt needs in order that they can provide a tailored health message to enable the patient to adopt health-promoting regimes into their lifestyle. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Neighbourhood-consensus message passing and its potentials in image processing applications
NASA Astrophysics Data System (ADS)
Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried
2011-03-01
In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.
A hazard-independent approach for the standardised multi-channel dissemination of warning messages
NASA Astrophysics Data System (ADS)
Esbri Palomares, M. A.; Hammitzsch, M.; Lendholt, M.
2012-04-01
The tsunami disaster affecting the Indian Ocean region on Christmas 2004 demonstrated very clearly the shortcomings in tsunami detection, public warning processes as well as intergovernmental warning message exchange in the Indian Ocean region. In that regard, early warning systems require that the dissemination of early warning messages has to be executed in way that ensures that the message delivery is timely; the message content is understandable, usable and accurate. To that end, diverse and multiple dissemination channels must be used to increase the chance of the messages reaching all affected persons in a hazard scenario. In addition to this, usage of internationally accepted standards for the warning dissemination such as the Common Alerting Protocol (CAP) and Emergency Data Exchange Language (EDXL) Distribution Element specified by the Organization for the Advancement of Structured Information Standards (OASIS) increase the interoperability among different warning systems enabling thus the concept of system-of-systems proposed by GEOSS. The project Distant Early Warning System (DEWS), co-funded by the European Commission under the 6th Framework Programme, aims at strengthening the early warning capacities by building an innovative generation of interoperable tsunami early warning systems based on the above mentioned concepts following a Service-oriented Architecture (SOA) approach. The project focuses on the downstream part of the hazard information processing where customized, user-tailored warning messages and alerts flow from the warning centre to the responsible authorities and/or the public with their different needs and responsibilities. The information logistics services within DEWS generate tailored EDXL-DE/CAP warning messages for each user that must receive the message according to their preferences, e.g., settings for language, interested areas, dissemination channels, etc.. However, the significant difference in the implementation and capabilities of different dissemination channels such as SMS, email and television, have bearing on the information processing required for delivery and consumption of a DEWS EDXL-DE/CAP message over each dissemination channel. These messages may include additional information in the form of maps, graphs, documents, sensor observations, etc. Therefore, the generated messages are pre-processed by channel adaptors in the information dissemination services converting it into a format that is suitable for end-to-end delivery over the dissemination channels without any semantic distortion. The approach followed by DEWS for disseminating warnings not only relies on traditional communication ways used by the already established early warnings such as the delivery of faxes and phone calls but takes into consideration the use of other broadly used communication channels such as SMS, email, narrowcast and broadcast television, instant messaging, Voice over IP, and radio. It also takes advantage of social media channels like RSS feeds, Facebook, Twitter, etc., enabling a multiplier effect, like in the case of radio and television, and thus allowing to create mash-ups by aggregating other sources of information to the original message. Finally, status information is also important in order to assess and understand whether the process of disseminating the warning to the message consumers has been successfully completed or the process failed at some point of the dissemination chain. To that end, CAP-based messages generated within the information dissemination services provide the semantics for those fields that are of interest within the context of reporting the warning dissemination status in DEWS.
Asynchronous Communication Scheme For Hypercube Computer
NASA Technical Reports Server (NTRS)
Madan, Herb S.
1988-01-01
Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.
Probabilistic Algorithmic Knowledge
2005-12-20
standard possible-worlds sense. Although soundness is not required in the basic definition, it does seem to be useful in many applications. Our interest...think of as describing basic facts about the system, such as “the door is closed” or “agent A sent the message m to B”, more complicated formulas are...messages as long as the adversary knows the decryption key. (The function submsg basically implements the inference rules for ⊢DY .) A DY i (hasi(m
How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets
2014-01-01
Android.Bmaster [4] in China that had infected an estimate of hundreds of thousands of Android phones. As a result, mobile botnets have already become...malware via centralized infrastructures (e.g., using short and multimedia message services [1], [4], [5]). However, The work was sponsored by ARO staff...infrastructures (malware sending its copies using short/ multimedia message services or advertising its applications (APPs) on mobile markets [1], [4
Chen, Bin; Shao, Jian; Liu, Kui; Cai, Gaofeng; Jiang, Zhenggang; Huang, Yuru; Gu, Hua; Jiang, Jianmin
2018-03-29
A hot topic on the relationship between a popular avian-origin food and avian influenza occurred on social media during the outbreak of the emerging avian influenza A (H7N9). The misinformation generated from this topic had caused great confusion and public concern. Our goals were to analyze the trend and contents of the relevant posts during the outbreak. We also aimed to understand the characteristics of the misinformation and to provide suggestions to reduce public misconception on social media during the emerging disease outbreak. The original microblog posts were collected from China's Sina Weibo and Tencent Weibo using a combination of keywords between April 1, 2013 and June 2, 2013. We analyzed the weekly and daily trend of the relevant posts. Content analyses were applied to categorize the posts into 4 types with unified sorting criteria. The posts' characteristics and geographic locations were also analyzed in each category. We conducted further analysis on the top 5 most popular misleading posts. A total of 1680 original microblog posts on the topic were retrieved and 341 (20.30%) of these posts were categorized as misleading messages. The number of relevant posts had not increased much during the first 2 weeks but rose to a high level in the next 2 weeks after the sudden increase in number of reported cases at the beginning of week 3. The posts under "misleading messages" occurred and increased from the beginning of week 3, but their daily posting number decreased when the daily number of posts under "refuting messages" outnumbered them. The microbloggers of the misleading posts had the lowest mean rank of followers and previous posts, but their posts had a highest mean rank of posts. The proportion of "misleading messages" in places with no reported cases was significantly higher than that in the epidemic areas (23.6% vs 13.8%). The popular misleading posts appeared to be short and consisted of personal narratives, which were easily disseminated on social media. Our findings suggested the importance of responding to common questions and misconceptions on social media platforms from the beginning of disease outbreaks. Authorities need to release clear and reliable information related to the popular topics early on. The microbloggers posting correct information should be empowered and their posts could be promoted to clarify false information. Equal importance should be attached to clarify misinformation in both the outbreak and nonoutbreak areas. ©Bin Chen, Jian Shao, Kui Liu, Gaofeng Cai, Zhenggang Jiang, Yuru Huang, Hua Gu, Jianmin Jiang. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 29.03.2018.
Space Flight Middleware: Remote AMS over DTN for Delay-Tolerant Messaging
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2011-01-01
This paper describes a technique for implementing scalable, reliable, multi-source multipoint data distribution in space flight communications -- Delay-Tolerant Reliable Multicast (DTRM) -- that is fully supported by the "Remote AMS" (RAMS) protocol of the Asynchronous Message Service (AMS) proposed for standardization within the Consultative Committee for Space Data Systems (CCSDS). The DTRM architecture enables applications to easily "publish" messages that will be reliably and efficiently delivered to an arbitrary number of "subscribing" applications residing anywhere in the space network, whether in the same subnet or in a subnet on a remote planet or vehicle separated by many light minutes of interplanetary space. The architecture comprises multiple levels of protocol, each included for a specific purpose and allocated specific responsibilities: "application AMS" traffic performs end-system data introduction and delivery subject to access control; underlying "remote AMS" directs this application traffic to populations of recipients at remote locations in a multicast distribution tree, enabling the architecture to scale up to large networks; further underlying Delay-Tolerant Networking (DTN) Bundle Protocol (BP) advances RAMS protocol data units through the distribution tree using delay-tolerant storeand- forward methods; and further underlying reliable "convergence-layer" protocols ensure successful data transfer over each segment of the end-to-end route. The result is scalable, reliable, delay-tolerant multi-source multicast that is largely self-configuring.
DeMarco, Rosanna F; Kendricks, Malkia; Dolmo, Yolani; Looby, Sara E Dolan; Rinne, Kirsti
2009-01-01
The purpose of this study was to examine the effect of gender-sensitive and culturally relevant HIV prevention film messages combined with self-efficacy and skill building exercises on self-reported safe sex behaviors, intentions, attitudes, and self-advocacy over time. A sample of 131 women of mixed ethnicity from inner-city Boston who were living in transitional housing participated in a 4-week pre/postmeasurement design. Results showed that, despite the short duration of the intervention, participants self-reported significantly more use of safe sex behaviors and being prepared for sexual intimacy after the intervention. The study validated use of an approach originally intended for African American women with other women at risk for HIV.
Calzada, Esther; Barajas-Gonzalez, R Gabriela; Huang, Keng-Yen; Brotman, Laurie
2017-01-01
This study examined mother- and teacher-rated internalizing behaviors (i.e., anxiety, depression, and somatization symptoms) among young children using longitudinal data from a community sample of 661 Mexican and Dominican families and tested a conceptual model in which parenting (mother's socialization messages and parenting practices) predicted child internalizing problems 12 months later. Children evidenced elevated levels of mother-rated anxiety at both time points. Findings also supported the validity of the proposed parenting model for both Mexican and Dominican families. Although there were different pathways to child anxiety, depression, and somatization among Mexican and Dominican children, socialization messages and authoritarian parenting were positively associated with internalizing symptoms for both groups.
A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping
NASA Astrophysics Data System (ADS)
Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei
2017-02-01
In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.
Calzada, Esther; Barajas-Gonzalez, R. Gabriela; Huang, Keng-Yen; Brotman, Laurie
2015-01-01
This study examined mother- and teacher-rated internalizing behaviors (i.e., anxiety, depression and somatization symptoms) among young children using longitudinal data from a community sample of 661 Mexican and Dominican families, and tested a conceptual model in which parenting (mother’s socialization messages and parenting practices) predicted child internalizing problems 12 months later. Children evidenced elevated levels of mother-rated anxiety at both time points. Findings also supported the validity of the proposed parenting model for both Mexican and Dominican families. Though there were different pathways to child anxiety, depression and somatization among Mexican and Dominican children, socialization messages and authoritarian parenting were positively associated with internalizing symptoms for both groups. PMID:26042610
New NAS Parallel Benchmarks Results
NASA Technical Reports Server (NTRS)
Yarrow, Maurice; Saphir, William; VanderWijngaart, Rob; Woo, Alex; Kutler, Paul (Technical Monitor)
1997-01-01
NPB2 (NAS (NASA Advanced Supercomputing) Parallel Benchmarks 2) is an implementation, based on Fortran and the MPI (message passing interface) message passing standard, of the original NAS Parallel Benchmark specifications. NPB2 programs are run with little or no tuning, in contrast to NPB vendor implementations, which are highly optimized for specific architectures. NPB2 results complement, rather than replace, NPB results. Because they have not been optimized by vendors, NPB2 implementations approximate the performance a typical user can expect for a portable parallel program on distributed memory parallel computers. Together these results provide an insightful comparison of the real-world performance of high-performance computers. New NPB2 features: New implementation (CG), new workstation class problem sizes, new serial sample versions, more performance statistics.
Using Mobile Phones to Collect Patient Data: Lessons Learned From the SIMPle Study.
Duane, Sinead; Tandan, Meera; Murphy, Andrew W; Vellinga, Akke
2017-04-25
Mobile phones offer new opportunities to efficiently and interactively collect real-time data from patients with acute illnesses, such as urinary tract infections (UTIs). One of the main benefits of using mobile data collection methods is automated data upload, which can reduce the chance of data loss, an issue when using other data collection methods such as paper-based surveys. The aim was to explore differences in collecting data from patients with UTI using text messaging, a mobile phone app (UTI diary), and an online survey. This paper provides lessons learned from integrating mobile data collection into a randomized controlled trial. Participants included UTI patients consulting in general practices that were participating in the Supporting the Improvement and Management of UTI (SIMPle) study. SIMPle was designed to improve prescribing antimicrobial therapies for UTI in the community. Patients were invited to reply to questions regarding their UTI either via a prospective text message survey, a mobile phone app (UTI diary), or a retrospective online survey. Data were collected from 329 patients who opted in to the text message survey, 71 UTI patients through the mobile phone UTI symptom diary app, and 91 online survey participants. The age profile of UTI diary app users was younger than that of the text message and online survey users. The largest dropout for both the text message survey respondents and UTI diary app users was after the initial opt-in message; once the participants completed question 1 of the text message survey or day 2 in the UTI diary app, they were more likely to respond to the remaining questions/days. This feasibility study highlights the potential of using mobile data collection methods to capture patient data. As well as improving the efficiency of data collection, these novel approaches highlight the advantage of collecting data in real time across multiple time points. There was little variation in the number of patients responding between text message survey, UTI diary, and online survey, but more patients participated in the text message survey than the UTI diary app. The choice between designing a text message survey or UTI diary app will depend on the age profile of patients and the type of information the researchers' desire. ClinicalTrials.gov NCT01913860; https://clinicaltrials.gov/ct2/show/NCT01913860 (Archived by WebCite at http://www.webcitation.org/6pfgCztgT). ©Sinead Duane, Meera Tandan, Andrew W Murphy, Akke Vellinga. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 25.04.2017.
Horrey, William J.; Hoffman, Joshua D.
2015-01-01
Objective In this study, we investigated how drivers adapt secondary-task initiation and time-sharing behavior when faced with fluctuating driving demands. Background Reading text while driving is particularly detrimental; however, in real-world driving, drivers actively decide when to perform the task. Method In a test track experiment, participants were free to decide when to read messages while driving along a straight road consisting of an area with increased driving demands (demand zone) followed by an area with low demands. A message was made available shortly before the vehicle entered the demand zone. We manipulated the type of driving demands (baseline, narrow lane, pace clock, combined), message format (no message, paragraph, parsed), and the distance from the demand zone when the message was available (near, far). Results In all conditions, drivers started reading messages (drivers’ first glance to the display) before entering or before leaving the demand zone but tended to wait longer when faced with increased driving demands. While reading messages, drivers looked more or less off road, depending on types of driving demands. Conclusions For task initiation, drivers avoid transitions from low to high demands; however, they are not discouraged when driving demands are already elevated. Drivers adjust time-sharing behavior according to driving demands while performing secondary tasks. Nonetheless, such adjustment may be less effective when total demands are high. Application This study helps us to understand a driver’s role as an active controller in the context of distracted driving and provides insights for developing distraction interventions. PMID:25850162
Non-volatile memory for checkpoint storage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.
A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, themore » non-volatile memory is a pluggable flash memory card.« less
Badawy, Sherif M; Kuhns, Lisa M
2017-04-19
Many preventable behaviors contribute to adolescent mortality and morbidity. Non-adherence to preventive measures represents a challenge and has been associated with worse health outcomes in this population. The widespread use of electronic communication technologies by adolescents, particularly the use of text messaging (short message service, SMS) and mobile phones, presents new opportunities to intervene on risk and preventive risk behavior, but little is known about their efficacy. This study aimed to systematically evaluate evidence for the efficacy of text messaging and mobile phone app interventions to improve adherence to preventive behavior among adolescents and describe intervention approaches to inform intervention development. This review covers literature published between 1995 and 2015. Searches included PubMed, Embase, CENTRAL, PsycINFO, CINAHL, INSPEC, Web of Science, Google Scholar, and additional databases. The search strategy sought articles on text messaging and mobile phone apps combined with adherence or compliance, and adolescents and youth. An additional hand search of related themes in the Journal of Medical Internet Research was also conducted. Two reviewers independently screened titles and abstracts, assessed full-text articles, and extracted data from articles that met inclusion criteria. Included studies reflect original research-experimental or preexperimental designs with text messaging or mobile phone app interventions-targeting adherence to preventive behavior among adolescents (12-24 years old). The preferred reporting items of systematic reviews and meta-analyses (PRISMA) guidelines were followed for reporting results, and findings were critically appraised against the Oxford Centre for Evidence-based Medicine criteria. Of 1454 records, 19 met inclusion criteria, including text messaging (n=15) and mobile phone apps (n=4). Studies targeted clinic attendance, contraceptive use, oral health, physical activity and weight management, sun protection, human papillomavirus (HPV) vaccination, smoking cessation, and sexual health. Most studies were performed in the United States (47%, 9/19), included younger adolescents (63%, 12/19), and had sample size <100 (63%, 12/19). Although most studies were randomized controlled trials (RCTs; 58%, 11/19), only 5 followed an intent-to-treat analysis. Only 6 of 19 studies (32%) incorporated a theoretical framework in their design. Most studies reported good feasibility with high acceptability and satisfaction. About half of the included studies (42%, 8/19) demonstrated significant improvement in preventive behavior with moderate standardized mean differences. As early efforts in this field to establish feasibility and initial efficacy, most studies were low to moderate in quality. Studies varied in sample size and methods of preventive behavior adherence or outcome assessment, which prohibited performing a meta-analysis. Despite the promising feasibility and acceptability of text messaging and mobile phone apps in improving preventive behavior among adolescents, overall findings were modest in terms of efficacy. Further research evaluating the efficacy, effectiveness, and cost-effectiveness of these intervention approaches in promoting preventive behavior among adolescents is needed. ©Sherif M Badawy, Lisa M Kuhns. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 19.04.2017.
Biopsychiatry and Hearing Voices: On the Making and Unmaking of a Child into a Mental Patient.
ERIC Educational Resources Information Center
Breeding, John
1999-01-01
Challenges the message of "biopsychiatry," the belief that all mental illness is biologically based, genetic in origin, and incurable, and can only be treated chemically. Suggests that the epidemic drugging of school-age children is an act of despair. Highlights one family's experience in getting appropriate treatment without medication for their…
Nonverbatim Captioning in Dutch Television Programs: A Text Linguistic Approach
ERIC Educational Resources Information Center
Schilperoord, Joost; de Groot, Vanja; van Son, Nic
2005-01-01
In the Netherlands, as in most other European countries, closed captions for the deaf summarize texts rather than render them verbatim. Caption editors argue that in this way television viewers have enough time to both read the text and watch the program. They also claim that the meaning of the original message is properly conveyed. However, many…
Voices in International School Psychology: Interviews in Honor of Calvin D. Catterall.
ERIC Educational Resources Information Center
Culbertson, Frances M.
Following a brief memorial message and a dedicatory tribute to Calvin D. Catterall, a leader in the field of school psychology, this volume provides a description of the origins of the International School Psychology Association and interviews with five school psychologists: Bram Norwich, University of London, England; Tony Cline, London, England;…
The Image of God and Educational Philosophy: A Biblical Construct?
ERIC Educational Resources Information Center
Paulien, Jon
2001-01-01
Discusses the Seventh-day Adventist educational philosophy, originated in part by founder Ellen White, who believed the basic goal of Adventist education was derived from what she considered a fundamental Biblical message: restoring human beings into the image of God. The paper concludes that this concept is the best source for a vision to drive…
USSR Report, International Affairs
1986-11-21
Materials from foreign- language sources are translated; those from English- language sources are transcribed or reprinted, with the original phrasing...Message at the mediation of Spanish Foreign Minister F. Ordonez, while the new president of Guatemala, Vinicio Cerezo, came out with a proposal to...internacional. Caracteristicas generales y particulares de los procesos revolucionarios. Memorias. La Habana, 1982, p 49.) The Izquierda
The Original Handhelds: Magazines that Teens Can't Resist.
ERIC Educational Resources Information Center
Webber, Carlie
2009-01-01
In a world of instant messages, Twitter, and Facebook, what do magazines have to offer teens? Well, as it turns out, plenty. For starters, they feature celebrity gossip, humor, beauty tips, sports, and even manga. Some magazines offer online content that can only be accessed by using a special code that's available in the print edition. Recently,…
ERIC Educational Resources Information Center
Rodriguez, Lulu; Farnall, Olan; Geske, Joel; Peterson, Jane W.
1998-01-01
A study of 483 Iowa citizens and state legislators found that self-interest had the strongest effect on formation of opinions toward environmental protection; sociotropic and symbolic politics models were also effective. Results indicate that campaign messages must stress the benefits of environmental protection to the individual. (JOW)
Domain specific software architectures: Command and control
NASA Technical Reports Server (NTRS)
Braun, Christine; Hatch, William; Ruegsegger, Theodore; Balzer, Bob; Feather, Martin; Goldman, Neil; Wile, Dave
1992-01-01
GTE is the Command and Control contractor for the Domain Specific Software Architectures program. The objective of this program is to develop and demonstrate an architecture-driven, component-based capability for the automated generation of command and control (C2) applications. Such a capability will significantly reduce the cost of C2 applications development and will lead to improved system quality and reliability through the use of proven architectures and components. A major focus of GTE's approach is the automated generation of application components in particular subdomains. Our initial work in this area has concentrated in the message handling subdomain; we have defined and prototyped an approach that can automate one of the most software-intensive parts of C2 systems development. This paper provides an overview of the GTE team's DSSA approach and then presents our work on automated support for message processing.
Reality Check for the Chinese Microblog Space: A Random Sampling Approach
Fu, King-wa; Chau, Michael
2013-01-01
Chinese microblogs have drawn global attention to this online application’s potential impact on the country’s social and political environment. However, representative and reliable statistics on Chinese microbloggers are limited. Using a random sampling approach, this study collected Chinese microblog data from the service provider, analyzing the profile and the pattern of usage for 29,998 microblog accounts. From our analysis, 57.4% (95% CI 56.9%,58.0%) of the accounts’ timelines were empty. Among the 12,774 non-zero statuses samples, 86.9% (95% CI 86.2%,87.4%) did not make original post in a 7-day study period. By contrast, 0.51% (95% CI 0.4%,0.65%) wrote twenty or more original posts and 0.45% (95% CI 0.35%,0.60%) reposted more than 40 unique messages within the 7-day period. A small group of microbloggers created a majority of contents and drew other users’ attention. About 4.8% (95% CI 4.4%,5.2%) of the 12,774 users contributed more than 80% (95% CI,78.6%,80.3%) of the original posts and about 4.8% (95% CI 4.5%,5.2%) managed to create posts that were reposted or received comments at least once. Moreover, a regression analysis revealed that volume of followers is a key determinant of creating original microblog posts, reposting messages, being reposted, and receiving comments. Volume of friends is found to be linked only with the number of reposts. Gender differences and regional disparities in using microblogs in China are also observed. PMID:23520502
FIM Avionics Operations Manual
NASA Technical Reports Server (NTRS)
Alves, Erin E.
2017-01-01
This document describes the operation and use of the Flight Interval Management (FIM) Application installed on an electronic flight bag (EFB). Specifically, this document includes: 1) screen layouts for each page of the interface; 2) step-by-step instructions for data entry, data verification, and input error correction; 3) algorithm state messages and error condition alerting messages; 4) aircraft speed guidance and deviation indications; and 5) graphical display of the spatial relationships between the Ownship aircraft and the Target aircraft.
Interstellar Message Plaques: Application of White-Light Holography
NASA Astrophysics Data System (ADS)
Matloff, G. L.
2002-01-01
During Spring / Summer 2001, a prototype white-light holographic interstellar-probe message plaque was created under Contract H-29712D of NASA Marshall Spaceflight Center (MSFC), and commercial white-light holograms were tested for space-radiation tolerance at the MSFC Space Environment Facility (SEF) in Huntsville, AL, USA. Artist C Bangs' message plaque was created at the Center for Holographic Arts in Long Island City, NY. The 57.5 X 47.5 cm rainbow hologram was delivered to MSFC after framing by Simon Liu Inc., Brooklyn, NY, USA. The prototype message plaque, which is in the collection of the MSFC Space Transportation Directorate, has six multiplexed 2-D and 3-D images representing humans, the hypothetical interstellar spacecraft, and our position in the galaxy. Consultation with John Caulfield of Fisk University, an expert in holography, revealed that micron-thick holograms not much larger than a sheet of paper could contain hundreds of thousands of images, which opens the me ssage-plaque field considerably so that work of many artists could be included. Tests of commercial holograms at up to 100 MRad of simulated solar-wind radiation were performed at MSFC / SEF. Image-quality deterioriation was monitored using the image-color- histogram of the (trademarked) Adobe Photoshop software package. No significant deterioration occurred, which is in agreement with the literature. Holographic solar sails may be a propulsive application of this technology.
Learning classifier systems for single and multiple mobile robots in unstructured environments
NASA Astrophysics Data System (ADS)
Bay, John S.
1995-12-01
The learning classifier system (LCS) is a learning production system that generates behavioral rules via an underlying discovery mechanism. The LCS architecture operates similarly to a blackboard architecture; i.e., by posted-message communications. But in the LCS, the message board is wiped clean at every time interval, thereby requiring no persistent shared resource. In this paper, we adapt the LCS to the problem of mobile robot navigation in completely unstructured environments. We consider the model of the robot itself, including its sensor and actuator structures, to be part of this environment, in addition to the world-model that includes a goal and obstacles at unknown locations. This requires a robot to learn its own I/O characteristics in addition to solving its navigation problem, but results in a learning controller that is equally applicable, unaltered, in robots with a wide variety of kinematic structures and sensing capabilities. We show the effectiveness of this LCS-based controller through both simulation and experimental trials with a small robot. We then propose a new architecture, the Distributed Learning Classifier System (DLCS), which generalizes the message-passing behavior of the LCS from internal messages within a single agent to broadcast massages among multiple agents. This communications mode requires little bandwidth and is easily implemented with inexpensive, off-the-shelf hardware. The DLCS is shown to have potential application as a learning controller for multiple intelligent agents.
An Analysis of WhatsApp Usage for Communication Between Consulting and Emergency Physicians.
Gulacti, Umut; Lok, Ugur; Hatipoglu, Sinan; Polat, Haci
2016-06-01
The aim of this study was to evaluate WhatsApp messenger usage for communication between consulting and emergency physicians. A retrospective, observational study was conducted in the emergency department (ED) of a tertiary care university hospital between January 2014 and June 2014. A total of 614 consultations requested by using the WhatsApp application were evaluated, and 519 eligible consultations were included in the study. The WhatsApp messages that were transferred to consultant physicians consisted of 510 (98.3%) photographic images, 517 (99.6%) text messages, 59 (11.3%) videos, and 10 (1.9%) voice messages. Consultation was most frequently requested from the orthopedics clinic (n = 160, 30.8%). The majority of requested consultations were terminated only by evaluation via WhatsApp messages. (n = 311, 59.9%). Most of the consulting physicians were outside of the hospital or were mobile at the time of the consultation (n = 292, 56.3%). The outside consultation request rate was significantly higher for night shifts than for day shifts (p = .004), and the majority of outside consultation request were concluded by only WhatsApp application (p < .001). WhatsApp is useful a communication tool between physicians, especially for ED consultants who are outside the hospital, because of the ability to transfer large amounts of clinical and radiological data during a short period of time.
Velásquez-Villada, Carlos; Donoso, Yezid
2016-01-01
Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river’s course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas’ movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols. PMID:27023554
Enhancing Scalability and Efficiency of the TOUGH2_MP for LinuxClusters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Keni; Wu, Yu-Shu
2006-04-17
TOUGH2{_}MP, the parallel version TOUGH2 code, has been enhanced by implementing more efficient communication schemes. This enhancement is achieved through reducing the amount of small-size messages and the volume of large messages. The message exchange speed is further improved by using non-blocking communications for both linear and nonlinear iterations. In addition, we have modified the AZTEC parallel linear-equation solver to nonblocking communication. Through the improvement of code structuring and bug fixing, the new version code is now more stable, while demonstrating similar or even better nonlinear iteration converging speed than the original TOUGH2 code. As a result, the new versionmore » of TOUGH2{_}MP is improved significantly in its efficiency. In this paper, the scalability and efficiency of the parallel code are demonstrated by solving two large-scale problems. The testing results indicate that speedup of the code may depend on both problem size and complexity. In general, the code has excellent scalability in memory requirement as well as computing time.« less
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Aulya, L.
2018-02-01
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.
Gabelmann, Jeffrey M.; Kattner, J. Stephen; Houston, Robert A.
2006-12-19
This invention is an ultra-low frequency electromagnetic telemetry receiver which fuses multiple input receive sources to synthesize a decodable message packet from a noise corrupted telemetry message string. Each block of telemetry data to be sent to the surface receiver from a borehole tool is digitally encoded into a data packet prior to transmission. The data packet is modulated onto the ULF EM carrier wave and transmitted from the borehole to the surface and then are simultaneously detected by multiple receive sensors disbursed within the rig environment. The receive sensors include, but are not limited to, electric field and magnetic field sensors. The spacing of the surface receive elements is such that noise generators are unequally coupled to each receive element due to proximity and/or noise generator type (i.e. electric or magnetic field generators). The receiver utilizes a suite of decision metrics to reconstruct the original, non noise-corrupted data packet from the observation matrix via the estimation of individual data frames. The receiver will continue this estimation process until: 1) the message validates, or 2) a preset "confidence threshold" is reached whereby frames within the observation matrix are no longer "trusted".
van den Heerik, Romy A M; van Hooijdonk, Charlotte M J; Burgers, Christian; Steen, Gerard J
2017-05-01
This article considers co-creation as a new persuasive strategy in health campaigns. Co-creation enables target audience members to become active campaign producers. A recent Dutch anti-smoking campaign applied co-creation, inviting the target audience to complete the slogan "smoking is sóóó . . . " with something outdated on social networking sites (SNSs) like Facebook and Twitter to stress non-smoking as the new social norm. From a corpus-linguistic perspective, we investigated how the slogans from the target audience resonated with or deviated from the campaign's original message. In general, the target audience slogans followed the campaign's approach, but on the SNSs, differences were found regarding the valence, type of utterance, and domain to which smoking was compared. The target audience frequently compared smoking with other (inter)personal social norms. Co-creation thus provides the target audience with an opportunity to disseminate campaign messages from their own perspective, but at the same time a co-creation strategy risks diluting the intended campaign message.
Orangutan pantomime: elaborating the message
Russon, Anne; Andrews, Kristin
2011-01-01
We present an exploratory study of forest-living orangutan pantomiming, i.e. gesturing in which they act out their meaning, focusing on its occurrence, communicative functions, and complexities. Studies show that captive great apes may elaborate messages if communication fails, and isolated reports suggest that great apes occasionally pantomime. We predicted forest-living orangutans would pantomime spontaneously to communicate, especially to elaborate after communication failures. Mining existing databases on free-ranging rehabilitant orangutans' behaviour identified 18 salient pantomimes. These pantomimes most often functioned as elaborations of failed requests, but also as deceptions and declaratives. Complexities identified include multimodality, re-enactments of past events and several features of language (productivity, compositionality, systematicity). These findings confirm that free-ranging rehabilitant orangutans pantomime and use pantomime to elaborate on their messages. Further, they use pantomime for multiple functions and create complex pantomimes that can express propositionally structured content. Thus, orangutan pantomime serves as a medium for communication, not a particular function. Mining cases of complex great ape communication originally reported in functional terms may then yield more evidence of pantomime. PMID:20702451
Rovito, Michael J.; Gordon, Thomas F.; Bass, Sarah B.; DuCette, Joseph; Tierney, Ashley M.; Coles, Nicholas
2015-01-01
Testicular self-examination (TSE) promotional interventions historically operate without a theoretical framework, which negatively influences their effectiveness. As TSE is critical to the early detection of testicular cancer, this behavior is an essential component to improving overall male well-being. To address this need, the Control Identity personality typology was developed to assist in creating more effective TSE promotional interventions. Four outcome control dispositions were defined a priori based on the dimensions of illusions of control and locus of control. An original 41-item survey, the Control Identity Assessment Scale, was used to assess perceived vulnerability, value of health promotion, and health outcome control among a convenience sample of 300 university males aged 18 to 35 years via a cross-sectional research design. Factor and cluster analyses were employed to extract salient factors in the data and to identify subgroups within the sample. A consistent five-factor structure matrix (~70% explained variance) served as the foundation from which a k-means cluster analysis was employed to classify four types of individuals. Significant differences were detected between clusters on primary variables, including behavioral intentions to conduct TSE. The Control Identity typology aims to provide the needed mechanism for health practitioners to create more effective preventive health messaging to promote TSE. Future implications on employing this typology to segment audiences in order to increase overall effectiveness are offered. Application of this typology could ultimately lead to increasing TSE knowledge retention, behavioral intentions, actual performance, and adherence. PMID:26669773
Social marketing: an approach to planned social change.
Kotler, P; Zaltman, G
1971-07-01
This article examines the applicability of marketing concepts to social causes and social change. Social marketing is defined as the design, implementation, and control of programs calculated to influence the acceptability of social ideas and involving considerations of product planning, pricing, communication, distribution and marketing research. Wiebe examined four social advertising campaigns and concluded that their effectiveness depended on the presence of adequate force, direction, adequate and compatible social mechanism, and distance (the "cost" of the new attitude as seen by message's message"s recepient). A marketing planning approach is not a guarantee for the achievement of social objectives; yet, it represents a bridging mechanism linking the knowledge of the behavioral scientist with the socially useful implementation of that knowledge.
Shrier, Lydia A; Spalding, Allegra
2017-02-01
Depressed young women are at increased risk for adverse outcomes related to sexual behavior, including unintended pregnancy, HIV, and other sexually transmitted infections. Brief sexual risk reduction interventions have not targeted depressed young women's specific needs for affect management and impulse control. DESIGN, SETTING, PARTICIPANTS, INTERVENTIONS, AND MAIN OUTCOME MEASURES: We interviewed depressed young women ages 15-23 years engaging in sexual risk behavior about a proposed intervention approach. The approach was described as in-person counseling and cognitive-behavioral skills training, followed by an ecological momentary intervention (EMI) delivered via smartphone application for 4 weeks. The EMI would include reporting multiple times a day on affective states, self-efficacy for safer sex behavior, and sexual behavior, and receiving responsive messages to provide support and prompt use of cognitive-behavioral skills. Participants provided their perspectives on comfort, usability, burden, confidentiality, and potential efficacy of the EMI and recommended message content. Interviews were audio-recorded, transcribed, and analyzed using thematic analysis. Thematic saturation was reached with 16 interviews. Participants expressed positive opinions about the EMI. They believed that reporting at random times would help them to recognize their feelings, receiving the messages would be reassuring, and overall the smartphone application would be experienced as therapeutic. They desired a high degree of personalization of the message quality, style, and voice, and provided a wide variety of message content. Depressed young women believed that a flexible, personalized approach to mobile momentary intervention for addressing the link between their symptoms and behavior would be acceptable, supportive, and effective in reducing sexual risk. Copyright © 2016 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.
Unluturk, Mehmet S
2012-06-01
Nurse call system is an electrically functioning system by which patients can call upon from a bedside station or from a duty station. An intermittent tone shall be heard and a corridor lamp located outside the room starts blinking with a slow or a faster rate depending on the call origination. It is essential to alert nurses on time so that they can offer care and comfort without any delay. There are currently many devices available for a nurse call system to improve communication between nurses and patients such as pagers, RFID (radio frequency identification) badges, wireless phones and so on. To integrate all these devices into an existing nurse call system and make they communicate with each other, we propose software client applications called bridges in this paper. We also propose a window server application called SEE (Supervised Event Executive) that delivers messages among these devices. A single hardware dongle is utilized for authentication and copy protection for SEE. Protecting SEE with securities provided by dongle only is a weak defense against hackers. In this paper, we develop some defense patterns for hackers such as calculating checksums in runtime, making calls to dongle from multiple places in code and handling errors properly by logging them into database.
Foster, Jennifer; Miller, Lindsey; Isbell, Sheila; Shields, Tekesia; Worthy, Natasha; Dunlop, Anne Lang
2015-01-01
The use of mobile phone applications (mHealth) to provide health education and behavioral prompts is 1 of the 12 common mHealth functions identified by the World Health Organization as innovations to strengthen health systems. Among low-income pregnant and parenting women, health education is widely recognized as a way to improve maternal and infant health outcomes, but the efficacy of written health education materials to change knowledge and behavior for this population is questionable. mHealth prompts, in contrast, is a promising alternative. A team of researchers in medicine/epidemiology, anthropology/midwifery, computer science/sensors, and community-based case management created and pilot tested a mHealth application (mHealth app) for African-American women at high risk for adverse birth outcomes. We tested the acceptability and feasibility of the interactive application among women during the reproductive stages of early and late pregnancy, postpartum, and interconception. Interview data from 14 women in the various reproductive stages revealed that most women found the mHealth messages helpful. Also, 62 Ob-Gyn physicians and nurses and 19 Family Medicine residents provided feedback. Women's responses to specific messages trended down over time. Women in the postpartum phase had the highest response rate to particular text messages, followed by those in the pregnancy phase. Responses dropped off dramatically during the interconception period. About 21% of women lost their phones. Unexpected findings were that all participants already had smartphones, women wanted messages about depression, and clinicians wanted the app to link to case management for individualized medical care. Logistical challenges to app management were limitations but are useful for consideration before scale-up. This study corroborates findings in the health literacy literature that women most at risk for adverse birth outcomes need additional face-to-face support with mHealth applications.
Miller, Lindsey; Isbell, Sheila; Shields, Tekesia; Worthy, Natasha; Dunlop, Anne Lang
2015-01-01
Background The use of mobile phone applications (mHealth) to provide health education and behavioral prompts is 1 of the 12 common mHealth functions identified by the World Health Organization as innovations to strengthen health systems. Among low-income pregnant and parenting women, health education is widely recognized as a way to improve maternal and infant health outcomes, but the efficacy of written health education materials to change knowledge and behavior for this population is questionable. mHealth prompts, in contrast, is a promising alternative. Methods A team of researchers in medicine/epidemiology, anthropology/midwifery, computer science/sensors, and community-based case management created and pilot tested a mHealth application (mHealth app) for African-American women at high risk for adverse birth outcomes. We tested the acceptability and feasibility of the interactive application among women during the reproductive stages of early and late pregnancy, postpartum, and interconception. Results Interview data from 14 women in the various reproductive stages revealed that most women found the mHealth messages helpful. Also, 62 Ob-Gyn physicians and nurses and 19 Family Medicine residents provided feedback. Women’s responses to specific messages trended down over time. Women in the postpartum phase had the highest response rate to particular text messages, followed by those in the pregnancy phase. Responses dropped off dramatically during the interconception period. About 21% of women lost their phones. Unexpected findings were that all participants already had smartphones, women wanted messages about depression, and clinicians wanted the app to link to case management for individualized medical care. Conclusions Logistical challenges to app management were limitations but are useful for consideration before scale-up. This study corroborates findings in the health literacy literature that women most at risk for adverse birth outcomes need additional face-to-face support with mHealth applications. PMID:28293578
NASA Astrophysics Data System (ADS)
Stuart, J. A.
2011-12-01
This paper explores the challenges in implementing a message passing interface usable on systems with data-parallel processors, and more specifically GPUs. As a case study, we design and implement the ``DCGN'' API on NVIDIA GPUs that is similar to MPI and allows full access to the underlying architecture. We introduce the notion of data-parallel thread-groups as a way to map resources to MPI ranks. We use a method that also allows the data-parallel processors to run autonomously from user-written CPU code. In order to facilitate communication, we use a sleep-based polling system to store and retrieve messages. Unlike previous systems, our method provides both performance and flexibility. By running a test suite of applications with different communication requirements, we find that a tolerable amount of overhead is incurred, somewhere between one and five percent depending on the application, and indicate the locations where this overhead accumulates. We conclude that with innovations in chipsets and drivers, this overhead will be mitigated and provide similar performance to typical CPU-based MPI implementations while providing fully-dynamic communication.
NASA Technical Reports Server (NTRS)
Smith, Dan
2007-01-01
The Goddard Mission Services Evolution Center, or GMSEC, was started in 2001 to create a new standard approach for managing GSFC missions. Standardized approaches in the past involved selecting and then integrating the most appropriate set of functional tools. Assumptions were made that "one size fits all" and that tool changes would not be necessary for many years. GMSEC took a very different approach and has proven to be very successful. The core of the GMSEC architecture consists of a publish/subscribe message bus, standardized message formats, and an Applications Programming Interface (API). The API supports multiple operating systems, programming languages and messaging middleware products. We use a GMSEC-developed free middleware for low-cost development. A high capacity, robust middleware is used for operations and a messaging system with a very small memory footprint is used for on-board flight software. Software components can use the standard message formats or develop adapters to convert from their native formats to the GMSEC formats. We do not want vendors to modify their core products. Over 50 software components are now available for use with the GMSEC architecture. Most available commercial telemetry and command systems, including the GMV hifly Satellite Control System, have been adapted to run in the GMSEC labs.
A simple hyperbolic model for communication in parallel processing environments
NASA Technical Reports Server (NTRS)
Stoica, Ion; Sultan, Florin; Keyes, David
1994-01-01
We introduce a model for communication costs in parallel processing environments called the 'hyperbolic model,' which generalizes two-parameter dedicated-link models in an analytically simple way. Dedicated interprocessor links parameterized by a latency and a transfer rate that are independent of load are assumed by many existing communication models; such models are unrealistic for workstation networks. The communication system is modeled as a directed communication graph in which terminal nodes represent the application processes that initiate the sending and receiving of the information and in which internal nodes, called communication blocks (CBs), reflect the layered structure of the underlying communication architecture. The direction of graph edges specifies the flow of the information carried through messages. Each CB is characterized by a two-parameter hyperbolic function of the message size that represents the service time needed for processing the message. The parameters are evaluated in the limits of very large and very small messages. Rules are given for reducing a communication graph consisting of many to an equivalent two-parameter form, while maintaining an approximation for the service time that is exact in both large and small limits. The model is validated on a dedicated Ethernet network of workstations by experiments with communication subprograms arising in scientific applications, for which a tight fit of the model predictions with actual measurements of the communication and synchronization time between end processes is demonstrated. The model is then used to evaluate the performance of two simple parallel scientific applications from partial differential equations: domain decomposition and time-parallel multigrid. In an appropriate limit, we also show the compatibility of the hyperbolic model with the recently proposed LogP model.
An Interface Transformation Strategy for AF-IPPS
2012-12-01
Representational State Transfer (REST) and Java Enterprise Edition ( Java EE) to implement a reusable “translation service.” For SOAP and REST protocols, XML and...of best-of-breed open source software. The product baseline is summarized in the following table: Product Function Description Java Language...Compiler & Runtime JBoss Application Server Applications, Messaging, Translation Java EE Application Server Ruby on Rails Applications Ruby Web
NASA Astrophysics Data System (ADS)
Kazarov, A.; Lehmann Miotto, G.; Magnoni, L.
2012-06-01
The Trigger and Data Acquisition (TDAQ) system of the ATLAS experiment at CERN is the infrastructure responsible for collecting and transferring ATLAS experimental data from detectors to the mass storage system. It relies on a large, distributed computing environment, including thousands of computing nodes with thousands of application running concurrently. In such a complex environment, information analysis is fundamental for controlling applications behavior, error reporting and operational monitoring. During data taking runs, streams of messages sent by applications via the message reporting system together with data published from applications via information services are the main sources of knowledge about correctness of running operations. The flow of data produced (with an average rate of O(1-10KHz)) is constantly monitored by experts to detect problem or misbehavior. This requires strong competence and experience in understanding and discovering problems and root causes, and often the meaningful information is not in the single message or update, but in the aggregated behavior in a certain time-line. The AAL project is meant at reducing the man power needs and at assuring a constant high quality of problem detection by automating most of the monitoring tasks and providing real-time correlation of data-taking and system metrics. This project combines technologies coming from different disciplines, in particular it leverages on an Event Driven Architecture to unify the flow of data from the ATLAS infrastructure, on a Complex Event Processing (CEP) engine for correlation of events and on a message oriented architecture for components integration. The project is composed of 2 main components: a core processing engine, responsible for correlation of events through expert-defined queries and a web based front-end to present real-time information and interact with the system. All components works in a loose-coupled event based architecture, with a message broker to centralize all communication between modules. The result is an intelligent system able to extract and compute relevant information from the flow of operational data to provide real-time feedback to human experts who can promptly react when needed. The paper presents the design and implementation of the AAL project, together with the results of its usage as automated monitoring assistant for the ATLAS data taking infrastructure.
Loh, Ivory H; Schwendler, Teresa; Trude, Angela C B; Anderson Steeves, Elizabeth T; Cheskin, Lawrence J; Lange, Sarah; Gittelsohn, Joel
2018-01-01
Social media and text messaging show promise as public health interventions, but little evaluation of implementation exists. The B'more Healthy Communities for Kids (BHCK) was a multilevel, multicomponent (wholesalers, food stores, recreation centers) childhood obesity prevention trial that included social media and text-messaging components. The BHCK was implemented in 28 low-income areas of Baltimore City, Maryland, in 2 waves. The texting intervention targeted 241 low-income African American caregivers (of 283), who received 3 texts/week reinforcing key messages, providing nutrition information, and weekly goals. Regular posting on social media platforms (Facebook, Instagram, Twitter) targeted community members and local stakeholders. High implementation standards were set a priori (57 for social media, 11 for texting), with low implementation defined as <50%, medium as 50% to 99%, high as ≥100% of the high standard for each measure. Reach, dose delivered, and fidelity were assessed via web-based analytic tools. Between waves, social media implementation improved from low-moderate to high reach, dose delivered, and fidelity. Text messaging increased from moderate to high in reach and dose delivered, fidelity decreased from high to moderate. Data were used to monitor and revise the BHCK intervention throughout implementation. Our model for evaluating text messaging-based and social media-based interventions may be applicable to other settings.
Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Wang, Yi-Min
1993-01-01
Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.
The Relevance of Health Literacy to mHealth.
Kreps, Gary L
2017-01-01
This chapter examines the importance of health literacy to the design and use of mobile digital health information technology (mHealth) applications. Over the past two decades mHealth has evolved to become a major health communication channel for delivering health care, promoting health, and tracking health behaviors. Yet, there are serious communication challenges that must be addressed concerning the best way to design and utilize mHealth application to achieve key health promotion goals, including assuring the appropriateness and effectiveness of mHealth messaging for audiences with different communication competencies, styles, and health literacy levels, to ensure that mHealth applications are truly effective tools for health promotion. Health literacy is one of the major communication issues relevant to the effective use of mHealth. To be effective, mHealth applications need to match the messages conveyed via these mobile media to the specific health communication needs, orientations, and competencies of intended audience members. Unfortunately, current evidence suggests that many mHealth applications are difficult for audiences to utilize because they provide health information that is not easy for many consumers to understand and apply. Health literacy refers to the ability of participants within the health care system to accurately interpret and utilize relevant health information and resources to achieve their health goals. Evidence suggests that many consumers possess limited levels of health literacy to adequately understand health information, especially when they are feeling ill, since health literacy is both a trait (limited education, language facility, etc.), and a state condition (based on how their current physical and mental states influence their abilities to communicate effectively). Therefore, it is incumbent upon mHealth developers to design and utilize message systems. Strategies for designing and implementing mHealth applications to meet the health literacy levels of different audiences are described in this chapter.
Design Considerations in Developing a Text Messaging Program Aimed at Smoking Cessation
Holtrop, Jodi Summers; Bağci Bosi, A Tülay; Emri, Salih
2012-01-01
Background Cell phone text messaging is gaining increasing recognition as an important tool that can be harnessed for prevention and intervention programs across a wide variety of health research applications. Despite the growing body of literature reporting positive outcomes, very little is available about the design decisions that scaffold the development of text messaging-based health interventions. What seems to be missing is documentation of the thought process of investigators in the initial stages of protocol and content development. This omission is of particular concern because many researchers seem to view text messaging as the intervention itself instead of simply a delivery mechanism. Certainly, aspects of this technology may increase participant engagement. Like other interventions, however, the content is a central driver of the behavior change. Objective To address this noted gap in the literature, we discuss the protocol decisions and content development for SMS Turkey (or Cebiniz birakin diyor in Turkish), a smoking cessation text messaging program for adult smokers in Turkey. Methods Content was developed in English and translated into Turkish. Efforts were made to ensure that the protocol and content were grounded in evidence-based smoking cessation theory, while also reflective of the cultural aspects of smoking and quitting in Turkey. Results Methodological considerations included whether to provide cell phones and whether to reimburse participants for texting costs; whether to include supplementary intervention resources (eg, personal contact); and whether to utilize unidirectional versus bidirectional messaging. Program design considerations included how messages were tailored to the quitting curve and one’s smoking status after one’s quit date, the number of messages participants received per day, and over what period of time the intervention lasted. Conclusion The content and methods of effective smoking cessation quitline programs were a useful guide in developing SMS Turkey. Proposed guidelines in developing text messaging-based behavior change programs are offered. PMID:22832182
Rico, Timóteo Matthies; Dos Santos Machado, Karina; Fernandes, Vanessa Pellegrini; Madruga, Samanta Winck; Noguez, Patrícia Tuerlinckx; Barcelos, Camila Rose Guadalupe; Santin, Mateus Madail; Petrarca, Cristiane Rios; Dumith, Samuel Carvalho
2017-10-09
Cancer treatment is an extremely stressful life experience that is accompanied by a range of psychological, social, physical, and practical difficulties. Cancer patients need to receive information that helps them to better understand the disease, assists them in decision-making, and helps them deal with treatment. Patients are interested in receiving such information. The degree of satisfaction with the information received has been associated with positive health outcomes, specifically regarding quality of life, severity of side effects, and psychological well-being. This study investigates a method of guiding cancer patients, in relation to outpatient chemotherapy treatment, using SMS (short message service) text messaging. A smartphone application called cHEmotHErApp was developed, and its primary function is to send out SMS text messages with guidance for self-care and emotional support for oncology patients undergoing chemotherapy. Thus, the main objective of this study is to evaluate the acceptance and perception of patients of the receipt of these SMS messages, as well as to evaluate the possible benefits reported by the participants. Adult patients diagnosed with cancer, who started the first outpatient chemotherapy treatment scheme between August and November 2016 at the School Hospital (HE) of the Federal University of Pelotas (UFPel), were invited to participate in this pilot study. In total, 14 cancer patients were adherent to this study. Each of these patients received a daily text message on their cell phone with some guidance on encouraging self-care and emotional support. Patients reported that, because of the SMS text messages they received, they felt more confident in their treatment, felt more supported and encouraged, and that the text messages facilitated self-care. In addition, patients reported that the SMS text messages they received helped them to take better care of themselves and to continue further treatment.
Writing a case report: polishing a gem?
Papanas, N; Lazarides, M K
2008-08-01
Case reports describe patient cases which are of particular interest due to their novelty and their potential message for clinical practice. While there are several types of case reports, originality and clinical implications constitute the main virtues by which case reports are judged. Defining the educational message and choosing the right audience are vital steps in the process of writing. Generally, a case report is structured, its main components being the abstract, the introduction, the case description and the discussion. Guidelines and tips for writing case reports are not enough for making a successful author, but they help, especially less experienced doctors, to exercise and improve their writing. If properly prepared, case reports can still communicate new observations in an interesting and pleasant way, thereby enriching our knowledge, even in the era of evidence-based medicine.
A Worked Example of an Application of the Saint Simulation Program.
1987-09-01
tApprove foX pu bldc L-- -’ -:,=* J Approved for public release. This work is copyright. Apart from any fair dealing for the purpose of study, research...this network are 1. there are three types of incoming messages, 2. the rate of message generation is varied between two limits and is controlled by the...SAINT controlling program, and 3. the whole scenario is run for a fixed period of time itim limit). These features were included on the basis of
A Novel Quantum Blind Signature Scheme with Four-Particle Cluster States
NASA Astrophysics Data System (ADS)
Fan, Ling
2016-03-01
In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by measuring four-particle cluster states and coding. By using the special relationship of four-particle cluster states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.
Tan, Ziying; Liu, Xingyun; Liu, Xiaoqian; Cheng, Qijin; Zhu, Tingshao
2017-12-12
While Web-based interventions can be efficacious, engaging a target population's attention remains challenging. We argue that strategies to draw such a population's attention should be tailored to meet its needs. Increasing user engagement in online suicide intervention development requires feedback from this group to prevent people who have suicide ideation from seeking treatment. The goal of this study was to solicit feedback on the acceptability of the content of messaging from social media users with suicide ideation. To overcome the common concern of lack of engagement in online interventions and to ensure effective learning from the message, this research employs a customized design of both content and length of the message. In study 1, 17 participants suffering from suicide ideation were recruited. The first (n=8) group conversed with a professional suicide intervention doctor about its attitudes and suggestions for a direct message intervention. To ensure the reliability and consistency of the result, an identical interview was conducted for the second group (n=9). Based on the collected data, questionnaires about this intervention were formed. Study 2 recruited 4222 microblog users with suicide ideation via the Internet. The results of the group interviews in study 1 yielded little difference regarding the interview results; this difference may relate to the 2 groups' varied perceptions of direct message design. However, most participants reported that they would be most drawn to an intervention where they knew that the account was reliable. Out of 4222 microblog users, we received responses from 725 with completed questionnaires; 78.62% (570/725) participants were not opposed to online suicide intervention and they valued the link for extra suicide intervention information as long as the account appeared to be trustworthy. Their attitudes toward the intervention and the account were similar to those from study 1, and 3 important elements were found pertaining to the direct message: reliability of account name, brevity of the message, and details of the phone numbers of psychological intervention centers and psychological assessment. This paper proposed strategies for engaging target populations in online suicide interventions. ©Ziying Tan, Xingyun Liu, Xiaoqian Liu, Qijin Cheng, Tingshao Zhu. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 12.12.2017.
Using a Case Study Article on Earwax to Enhance Understanding and Interest in Genetics
ERIC Educational Resources Information Center
Van Hoewyk, Doug
2012-01-01
For four consecutive semesters, students in an Introductory Biology class at Coastal Carolina University were assigned to read a case study article that explores the link between a single gene and earwax type. The case study article, broadly defined as a story with an educational message (Herreid, 2007), was originally published by the "New…
Military Interoperable Digital Hospital Testbed (MIDHT)
2013-01-01
users of the PACS system in terms of viewing images originating from Miners and Meyersdale are Emergency Medicine and Trauma physicians. This...conditions, over the counter/ herbal medications, physician list, and emergency contacts. Through secure messaging with their physician, patients...et al. (1999). Impact of a patient-centered, computer- based health information/support system. American Journal of Preventive Medicine , 16(1), 1- 9
ERIC Educational Resources Information Center
Gfeller, Elisabeth; Robinson, Clinton
African schools rarely present instruction in the students' native languages. The language of instruction tends to be of European origin. What results is a civilized elite which is unsuccessful in bringing knowledge to the vast majority of the population. A project in Cameroon proposes to teach through extensive trilingualism. First, children…
ERIC Educational Resources Information Center
Patterson, Meagan M.; Bigler, Rebecca S.
2006-01-01
This study was designed to examine the effects of adults' labeling and use of social groups on preschool children's intergroup attitudes. Children (N=87, aged 3-5) attending day care were given measures of classification skill and self-esteem and assigned to membership in a novel ("red" or "blue") social group. In experimental classrooms, teachers…
Cheryl Talbert; David. Marshall
2005-01-01
This article reviews major plantation silvicultural practices used in the westside Douglas-fir region of Oregon and Washington: origin, growth and yield impacts, and the region's global competitive status for productivity, tree-growing costs, and returns. Two main messages emerge: (1) there has been great progress in the region to increase wood yield and shorten...
Using Instant Messaging Systems as a Platform for Electronic Voting
NASA Astrophysics Data System (ADS)
Meletiadou, Anastasia; Grimm, Rüdiger
Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.
Administering truncated receive functions in a parallel messaging interface
Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E
2014-12-09
Administering truncated receive functions in a parallel messaging interface (`PMI`) of a parallel computer comprising a plurality of compute nodes coupled for data communications through the PMI and through a data communications network, including: sending, through the PMI on a source compute node, a quantity of data from the source compute node to a destination compute node; specifying, by an application on the destination compute node, a portion of the quantity of data to be received by the application on the destination compute node and a portion of the quantity of data to be discarded; receiving, by the PMI on the destination compute node, all of the quantity of data; providing, by the PMI on the destination compute node to the application on the destination compute node, only the portion of the quantity of data to be received by the application; and discarding, by the PMI on the destination compute node, the portion of the quantity of data to be discarded.
Performance Analysis of Scientific and Engineering Applications Using MPInside and TAU
NASA Technical Reports Server (NTRS)
Saini, Subhash; Mehrotra, Piyush; Taylor, Kenichi Jun Haeng; Shende, Sameer Suresh; Biswas, Rupak
2010-01-01
In this paper, we present performance analysis of two NASA applications using performance tools like Tuning and Analysis Utilities (TAU) and SGI MPInside. MITgcmUV and OVERFLOW are two production-quality applications used extensively by scientists and engineers at NASA. MITgcmUV is a global ocean simulation model, developed by the Estimating the Circulation and Climate of the Ocean (ECCO) Consortium, for solving the fluid equations of motion using the hydrostatic approximation. OVERFLOW is a general-purpose Navier-Stokes solver for computational fluid dynamics (CFD) problems. Using these tools, we analyze the MPI functions (MPI_Sendrecv, MPI_Bcast, MPI_Reduce, MPI_Allreduce, MPI_Barrier, etc.) with respect to message size of each rank, time consumed by each function, and how ranks communicate. MPI communication is further analyzed by studying the performance of MPI functions used in these two applications as a function of message size and number of cores. Finally, we present the compute time, communication time, and I/O time as a function of the number of cores.
Berrouiguet, Sofian; Larsen, Mark Erik; Mesmeur, Catherine; Gravey, Michel; Billot, Romain; Walter, Michel; Lemey, Christophe; Lenca, Philippe
2018-01-10
Research indicates that maintaining contact either via letter or postcard with at-risk adults following discharge from care services after a suicide attempt (SA) can reduce reattempt risk. Pilot studies have demonstrated that interventions using mobile health (mHealth) technologies are feasible in a suicide prevention setting. The aim of this study was to report three cases of patients recruited in the Suicide Intervention Assisted by Messages (SIAM) study to describe how a mobile intervention may influence follow-up. SIAM is a 2-year, multicenter randomized controlled trial conducted by the Brest University Hospital, France. Participants in the intervention group receive SIAM text messages 48 hours after discharge, then at day 8 and day 15, and months 1, 2, 3, 4, 5, and 6. The study includes participants aged 18 years or older, who have attended a participating hospital for an SA, and have been discharged from the emergency department (ED) or a psychiatric unit (PU) for a stay of less than 7 days. Eligible participants are randomized between the SIAM intervention messages and a control group. In this study, we present three cases from the ongoing SIAM study that demonstrate the capability of a mobile-based brief contact intervention for triggering patient-initiated contact with a crisis support team at various time points throughout the mobile-based follow-up period. Out of the 244 patients recruited in the SIAM randomized controlled trial, three cases were selected to illustrate the impact of mHealth on suicide risk management. Participants initiated contact with the emergency crisis support service after receiving text messages up to 6 months following discharge from the hospital. Contact was initiated immediately following receipt of a text message or up to 6 days following a message. This text message-based brief contact intervention has demonstrated the potential to reconnect suicidal individuals with crisis support services while they are experiencing suicidal ideation as well as in a period after receiving messages. As follow-up phone calls over an extended period of time may not be feasible, this intervention has the potential to offer simple technological support for individuals following discharge from the ED. ClinicalTrials.gov NCT02106949; https://clinicaltrials.gov/ct2/show/NCT02106949 (Archived by WebCite at http://www.webcitation.org/6wMtAFL49). ©Sofian Berrouiguet, Mark Erik Larsen, Catherine Mesmeur, Michel Gravey, Romain Billot, Michel Walter, HUGOPSY Network, Christophe Lemey, Philippe Lenca. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 10.01.2018.
Design and Development of a Web-Based Self-Monitoring System to Support Wellness Coaching.
Zarei, Reza; Kuo, Alex
2017-01-01
We analyzed, designed and deployed a web-based, self-monitoring system to support wellness coaching. A wellness coach can plan for clients' exercise and diet through the system and is able to monitor the changes in body dimensions and body composition that the client reports. The system can also visualize the client's data in form of graphs for both the client and the coach. Both parties can also communicate through the messaging feature embedded in the application. A reminder system is also incorporated into the system and sends reminder messages to the clients when their reporting is due. The web-based self-monitoring application uses Oracle 11g XE as the backend database and Application Express 4.2 as user interface development tool. The system allowed users to access, update and modify data through web browser anytime, anywhere, and on any device.
Non-invasive lightweight integration engine for building EHR from autonomous distributed systems.
Angulo, Carlos; Crespo, Pere; Maldonado, José A; Moner, David; Pérez, Daniel; Abad, Irene; Mandingorra, Jesús; Robles, Montserrat
2007-12-01
In this paper we describe Pangea-LE, a message-oriented lightweight data integration engine that allows homogeneous and concurrent access to clinical information from disperse and heterogeneous data sources. The engine extracts the information and passes it to the requesting client applications in a flexible XML format. The XML response message can be formatted on demand by appropriate Extensible Stylesheet Language (XSL) transformations in order to meet the needs of client applications. We also present a real deployment in a hospital where Pangea-LE collects and generates an XML view of all the available patient clinical information. The information is presented to healthcare professionals in an Electronic Health Record (EHR) viewer Web application with patient search and EHR browsing capabilities. Implantation in a real setting has been a success due to the non-invasive nature of Pangea-LE which respects the existing information systems.
Non-invasive light-weight integration engine for building EHR from autonomous distributed systems.
Crespo Molina, Pere; Angulo Fernández, Carlos; Maldonado Segura, José A; Moner Cano, David; Robles Viejo, Montserrat
2006-01-01
Pangea-LE is a message oriented light-weight integration engine, allowing concurrent access to clinical information from disperse and heterogeneous data sources. The engine extracts the information and serves it to the requester client applications in a flexible XML format. This XML response message can be formatted on demand by the appropriate XSL (Extensible Stylesheet Language) transformation in order to fit client application needs. In this article we present a real use case sample where Pangea-LE collects and generates "on the fly" a structured view of all the patient clinical information available in a healthcare organisation. This information is presented to healthcare professionals in an EHR (Electronic Health Record) viewer Web application with patient search and EHR browsing capabilities. Implantation in a real environment has been a notable success due to the non-invasive method which extremely respects the existing information systems.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
... households. If an applicant or petitioner wants to be notified via email and/or text message on their cell phone that their application or petition has been accepted, they are requested to provide their email address and/or cell phone number on the E-Notification of Application/Petition Acceptance, Form G-1145...
A comparison of rule-based and machine learning approaches for classifying patient portal messages.
Cronin, Robert M; Fabbri, Daniel; Denny, Joshua C; Rosenbloom, S Trent; Jackson, Gretchen Purcell
2017-09-01
Secure messaging through patient portals is an increasingly popular way that consumers interact with healthcare providers. The increasing burden of secure messaging can affect clinic staffing and workflows. Manual management of portal messages is costly and time consuming. Automated classification of portal messages could potentially expedite message triage and delivery of care. We developed automated patient portal message classifiers with rule-based and machine learning techniques using bag of words and natural language processing (NLP) approaches. To evaluate classifier performance, we used a gold standard of 3253 portal messages manually categorized using a taxonomy of communication types (i.e., main categories of informational, medical, logistical, social, and other communications, and subcategories including prescriptions, appointments, problems, tests, follow-up, contact information, and acknowledgement). We evaluated our classifiers' accuracies in identifying individual communication types within portal messages with area under the receiver-operator curve (AUC). Portal messages often contain more than one type of communication. To predict all communication types within single messages, we used the Jaccard Index. We extracted the variables of importance for the random forest classifiers. The best performing approaches to classification for the major communication types were: logistic regression for medical communications (AUC: 0.899); basic (rule-based) for informational communications (AUC: 0.842); and random forests for social communications and logistical communications (AUCs: 0.875 and 0.925, respectively). The best performing classification approach of classifiers for individual communication subtypes was random forests for Logistical-Contact Information (AUC: 0.963). The Jaccard Indices by approach were: basic classifier, Jaccard Index: 0.674; Naïve Bayes, Jaccard Index: 0.799; random forests, Jaccard Index: 0.859; and logistic regression, Jaccard Index: 0.861. For medical communications, the most predictive variables were NLP concepts (e.g., Temporal_Concept, which maps to 'morning', 'evening' and Idea_or_Concept which maps to 'appointment' and 'refill'). For logistical communications, the most predictive variables contained similar numbers of NLP variables and words (e.g., Telephone mapping to 'phone', 'insurance'). For social and informational communications, the most predictive variables were words (e.g., social: 'thanks', 'much', informational: 'question', 'mean'). This study applies automated classification methods to the content of patient portal messages and evaluates the application of NLP techniques on consumer communications in patient portal messages. We demonstrated that random forest and logistic regression approaches accurately classified the content of portal messages, although the best approach to classification varied by communication type. Words were the most predictive variables for classification of most communication types, although NLP variables were most predictive for medical communication types. As adoption of patient portals increases, automated techniques could assist in understanding and managing growing volumes of messages. Further work is needed to improve classification performance to potentially support message triage and answering. Copyright © 2017 Elsevier B.V. All rights reserved.
An application for delivering field results to mobile devices
NASA Astrophysics Data System (ADS)
Kanta, A.; Hloupis, G.; Vallianatos, F.; Rust, D.
2009-04-01
Mobile devices (MD) such as personal digital assistants (PDAs) and Smartphones expand the ability of Internet communication between remote users. In particular these devices have the possibility to interact with data centres in order to request and receive information. For field surveys MDs used primarily for controlling instruments (in case of field measurements) or for entering data needed for later processing (e.g damage description after a natural hazard). It is not unusual in areas with high interest combined measurements took place. The results from these measurements usually stored in data servers and their publicity is driven mainly by web-based applications. Here we present a client / server application capable of displaying the results of several measurements for a specific area to a MD. More specific, we develop an application than can present to the screen of the MD the results of existing measurements according to the position of the user. The server side hosted at data centre and uses a relational data base (including the results), a SMS/MMS gateway and a receiver daemon application waiting for messages from MDs. The client side runs on MD and is a simple menu driven application which asks the user to enter the type of requested data and the geographical coordinates. In case of embedded GPS receiver, coordinates automatically derived from the receiver. Then a message is sent to server which responds with the results. In case of absence of Internet communication the application can switched to common Short/Multimedia Messaging Systems: the client request data using SMS and the server responds with MMS. We demonstrate the application using results from TEM, VES and HVSR measurements Acknowledgements Work of authors AK, GH and FV is partially supported by the EU-FP6-SSA in the frame of project "CYCLOPS: CYber-Infrastructure for CiviL protection Operative ProcedureS"
Does Age Impact Text-Message Dependence?
Ferraro, F Richard
2018-01-01
Little research has examined how age impacts texting dependence, despite the increased usage of texting and other social media applications in older adults. In the present study, three age groups (18-29 years of age, n = 135; 30-49 years of age, n = 58; 50-69 years of age, n = 19) were given the Self-Perceptions of Text Messaging Dependency Scale (SPTMDS). This self-report measure examines Emotion Reaction, Excessive Use, Disruption of Relationships with text Messages and Psychological/Behavioral Symptoms Concerning Heavy Usage). Results revealed that (a) texting dependence decreased across the three age groups and (b) that this decrease occurred for all four sub-scales of the SPTMDS (all p's < .01). These results have implications for how one aspect of social media (namely texting) is used and ultimately accepted by older adults.
Culley, Campbell; Evans, Jonathan J
2010-01-01
A single-blind within-subjects trial was used to test the efficacy of sending SMS text messages to patients with a traumatic brain injury as a means of improving their recall of rehabilitation goals. Eleven participants were recruited from two community-based rehabilitation centres and were sent text messages relating to three randomly selected goals from a selection of six current goals three times per day for 14 days. Participants' recall of their rehabilitation goals was assessed at baseline, seven days, and 14 days via free recall and cued recall procedures. Results showed that goals in the "text" condition were recalled better than goals in the "no text" condition. Practical applications and extensions are discussed.
Semantic message oriented middleware for publish/subscribe networks
NASA Astrophysics Data System (ADS)
Li, Han; Jiang, Guofei
2004-09-01
The publish/subscribe paradigm of Message Oriented Middleware provides a loosely coupled communication model between distributed applications. Traditional publish/subscribe middleware uses keywords to match advertisements and subscriptions and does not support deep semantic matching. To this end, we designed and implemented a Semantic Message Oriented Middleware system to provide such capabilities for semantic description and matching. We adopted the DARPA Agent Markup Language and Ontology Inference Layer, a formal knowledge representation language for expressing sophisticated classifications and enabling automated inference, as the topic description language in our middleware system. A simple description logic inference system was implemented to handle the matching process between the subscriptions of subscribers and the advertisements of publishers. Moreover our middleware system also has a security architecture to support secure communication and user privilege control.
A message passing kernel for the hypercluster parallel processing test bed
NASA Technical Reports Server (NTRS)
Blech, Richard A.; Quealy, Angela; Cole, Gary L.
1989-01-01
A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.
NASA Astrophysics Data System (ADS)
Rico, H.; Hauksson, E.; Thomas, E.; Friberg, P.; Given, D.
2002-12-01
The California Integrated Seismic Network (CISN) Display is part of a Web-enabled earthquake notification system alerting users in near real-time of seismicity, and also valuable geophysical information following a large earthquake. It will replace the Caltech/USGS Broadcast of Earthquakes (CUBE) and Rapid Earthquake Data Integration (REDI) Display as the principal means of delivering graphical earthquake information to users at emergency operations centers, and other organizations. Features distinguishing the CISN Display from other GUI tools are a state-full client/server relationship, a scalable message format supporting automated hyperlink creation, and a configurable platform-independent client with a GIS mapping tool; supporting the decision-making activities of critical users. The CISN Display is the front-end of a client/server architecture known as the QuakeWatch system. It is comprised of the CISN Display (and other potential clients), message queues, server, server "feeder" modules, and messaging middleware, schema and generators. It is written in Java, making it platform-independent, and offering the latest in Internet technologies. QuakeWatch's object-oriented design allows components to be easily upgraded through a well-defined set of application programming interfaces (APIs). Central to the CISN Display's role as a gateway to other earthquake products is its comprehensive XML-schema. The message model starts with the CUBE message format, but extends it by provisioning additional attributes for currently available products, and those yet to be considered. The supporting metadata in the XML-message provides the data necessary for the client to create a hyperlink and associate it with a unique event ID. Earthquake products deliverable to the CISN Display are ShakeMap, Ground Displacement, Focal Mechanisms, Rapid Notifications, OES Reports, and Earthquake Commentaries. Leveraging the power of the XML-format, the CISN Display provides prompt access to earthquake information on the Web. The links are automatically created when product generators deliver CUBE formatted packets to a Quake Data Distribution System (QDDS) hub (new distribution methods may be used later). The "feeder" modules tap into the QDDS hub and convert the packets into XML-messages. These messages are forwarded to message queues, and then distributed to clients where URLs are dynamically created for these products and linked to events on the CISN Display map. The products may be downloaded out-of-band; and with the inclusion of a GIS mapping tool users can plot organizational assets on the CISN Display map and overlay them against key spectral data, such as ground accelerations. This gives Emergency Response Managers information useful in allocating limited personnel and resources after a major event. At the heart of the system's robustness is a well-established and reliable set of communication protocols for best-effort delivery of data. For critical users a Common Object Request Broker Architecture (CORBA) state-full connection is used via a dedicated signaling channel. The system employs several CORBA methods that alert users of changes in the link status. Loss of connectivity triggers a strategy that attempts to reconnect through various physical and logical paths. Thus, by building on past application successes and proven Internet advances the CISN Display targets a specific audience by providing enhancements previously not available from other applications.
Service Management Database for DSN Equipment
NASA Technical Reports Server (NTRS)
Zendejas, Silvino; Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Wolgast, Paul; Allen, Christopher; Luong, Ivy; Chang, George; Sadaqathulla, Syed
2009-01-01
This data- and event-driven persistent storage system leverages the use of commercial software provided by Oracle for portability, ease of maintenance, scalability, and ease of integration with embedded, client-server, and multi-tiered applications. In this role, the Service Management Database (SMDB) is a key component of the overall end-to-end process involved in the scheduling, preparation, and configuration of the Deep Space Network (DSN) equipment needed to perform the various telecommunication services the DSN provides to its customers worldwide. SMDB makes efficient use of triggers, stored procedures, queuing functions, e-mail capabilities, data management, and Java integration features provided by the Oracle relational database management system. SMDB uses a third normal form schema design that allows for simple data maintenance procedures and thin layers of integration with client applications. The software provides an integrated event logging system with ability to publish events to a JMS messaging system for synchronous and asynchronous delivery to subscribed applications. It provides a structured classification of events and application-level messages stored in database tables that are accessible by monitoring applications for real-time monitoring or for troubleshooting and analysis over historical archives.
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
Applications of Maple To Algebraic Cryptography.
ERIC Educational Resources Information Center
Sigmon, Neil P.
1997-01-01
Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…
NASA Astrophysics Data System (ADS)
Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui
2016-06-01
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007
Tweet for Behavior Change: Using Social Media for the Dissemination of Public Health Messages.
Gough, Aisling; Hunter, Ruth F; Ajao, Oluwaseun; Jurek, Anna; McKeown, Gary; Hong, Jun; Barrett, Eimear; Ferguson, Marbeth; McElwee, Gerry; McCarthy, Miriam; Kee, Frank
2017-03-23
Social media public health campaigns have the advantage of tailored messaging at low cost and large reach, but little is known about what would determine their feasibility as tools for inducing attitude and behavior change. The aim of this study was to test the feasibility of designing, implementing, and evaluating a social media-enabled intervention for skin cancer prevention. A quasi-experimental feasibility study used social media (Twitter) to disseminate different message "frames" related to care in the sun and cancer prevention. Phase 1 utilized the Northern Ireland cancer charity's Twitter platform (May 1 to July 14, 2015). Following a 2-week "washout" period, Phase 2 commenced (August 1 to September 30, 2015) using a bespoke Twitter platform. Phase 2 also included a Thunderclap, whereby users allowed their social media accounts to automatically post a bespoke message on their behalf. Message frames were categorized into 5 broad categories: humor, shock or disgust, informative, personal stories, and opportunistic. Seed users with a notable following were contacted to be "influencers" in retweeting campaign content. A pre- and postintervention Web-based survey recorded skin cancer prevention knowledge and attitudes in Northern Ireland (population 1.8 million). There were a total of 417,678 tweet impressions, 11,213 engagements, and 1211 retweets related to our campaign. Shocking messages generated the greatest impressions (shock, n=2369; informative, n=2258; humorous, n=1458; story, n=1680), whereas humorous messages generated greater engagement (humorous, n=148; shock, n=147; story, n=117; informative, n=100) and greater engagement rates compared with story tweets. Informative messages, resulted in the greatest number of shares (informative, n=17; humorous, n=10; shock, n=9; story, n=7). The study findings included improved knowledge of skin cancer severity in a pre- and postintervention Web-based survey, with greater awareness that skin cancer is the most common form of cancer (preintervention: 28.4% [95/335] vs postintervention: 39.3% [168/428] answered "True") and that melanoma is most serious (49.1% [165/336] vs 55.5% [238/429]). The results also show improved attitudes toward ultraviolet (UV) exposure and skin cancer with a reduction in agreement that respondents "like to tan" (60.5% [202/334] vs 55.6% [238/428]). Social media-disseminated public health messages reached more than 23% of the Northern Ireland population. A Web-based survey suggested that the campaign might have contributed to improved knowledge and attitudes toward skin cancer among the target population. Findings suggested that shocking and humorous messages generated greatest impressions and engagement, but information-based messages were likely to be shared most. The extent of behavioral change as a result of the campaign remains to be explored, however, the change of attitudes and knowledge is promising. Social media is an inexpensive, effective method for delivering public health messages. However, existing and traditional process evaluation methods may not be suitable for social media. ©Aisling Gough, Ruth F Hunter, Oluwaseun Ajao, Anna Jurek, Gary McKeown, Jun Hong, Eimear Barrett, Marbeth Ferguson, Gerry McElwee, Miriam McCarthy, Frank Kee. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 23.03.2017.
Testing New Programming Paradigms with NAS Parallel Benchmarks
NASA Technical Reports Server (NTRS)
Jin, H.; Frumkin, M.; Schultz, M.; Yan, J.
2000-01-01
Over the past decade, high performance computing has evolved rapidly, not only in hardware architectures but also with increasing complexity of real applications. Technologies have been developing to aim at scaling up to thousands of processors on both distributed and shared memory systems. Development of parallel programs on these computers is always a challenging task. Today, writing parallel programs with message passing (e.g. MPI) is the most popular way of achieving scalability and high performance. However, writing message passing programs is difficult and error prone. Recent years new effort has been made in defining new parallel programming paradigms. The best examples are: HPF (based on data parallelism) and OpenMP (based on shared memory parallelism). Both provide simple and clear extensions to sequential programs, thus greatly simplify the tedious tasks encountered in writing message passing programs. HPF is independent of memory hierarchy, however, due to the immaturity of compiler technology its performance is still questionable. Although use of parallel compiler directives is not new, OpenMP offers a portable solution in the shared-memory domain. Another important development involves the tremendous progress in the internet and its associated technology. Although still in its infancy, Java promisses portability in a heterogeneous environment and offers possibility to "compile once and run anywhere." In light of testing these new technologies, we implemented new parallel versions of the NAS Parallel Benchmarks (NPBs) with HPF and OpenMP directives, and extended the work with Java and Java-threads. The purpose of this study is to examine the effectiveness of alternative programming paradigms. NPBs consist of five kernels and three simulated applications that mimic the computation and data movement of large scale computational fluid dynamics (CFD) applications. We started with the serial version included in NPB2.3. Optimization of memory and cache usage was applied to several benchmarks, noticeably BT and SP, resulting in better sequential performance. In order to overcome the lack of an HPF performance model and guide the development of the HPF codes, we employed an empirical performance model for several primitives found in the benchmarks. We encountered a few limitations of HPF, such as lack of supporting the "REDISTRIBUTION" directive and no easy way to handle irregular computation. The parallelization with OpenMP directives was done at the outer-most loop level to achieve the largest granularity. The performance of six HPF and OpenMP benchmarks is compared with their MPI counterparts for the Class-A problem size in the figure in next page. These results were obtained on an SGI Origin2000 (195MHz) with MIPSpro-f77 compiler 7.2.1 for OpenMP and MPI codes and PGI pghpf-2.4.3 compiler with MPI interface for HPF programs.
A communication-theory based view on telemedical communication.
Schall, Thomas; Roeckelein, Wolfgang; Mohr, Markus; Kampshoff, Joerg; Lange, Tim; Nerlich, Michael
2003-01-01
Communication theory based analysis sheds new light on the use of health telematics. This analysis of structures in electronic medical communication shows communicative structures with special features. Current and evolving telemedical applications are analyzed. The methodology of communicational theory (focusing on linguistic pragmatics) is used to compare it with its conventional counterpart. The semiotic model, the roles of partners, the respective message and their relation are discussed. Channels, sender, addressee, and other structural roles are analyzed for different types of electronic medical communication. The communicative processes are shown as mutual, rational action towards a common goal. The types of communication/texts are analyzed in general. Furthermore the basic communicative structures of medical education via internet are presented with their special features. The analysis shows that electronic medical communication has special features compared to everyday communication: A third participant role often is involved: the patient. Messages often are addressed to an unspecified partner or to an unspecified partner within a group. Addressing in this case is (at least partially) role-based. Communication and message often directly (rather than indirectly) influence actions of the participants. Communication often is heavily regulated including legal implications like liability, and more. The conclusion from the analysis is that the development of telemedical applications so far did not sufficiently take communicative structures into consideration. Based on these results recommendations for future developments of telemedical applications/services are given.
MONET 2009 PC Co-chairs' Message
NASA Astrophysics Data System (ADS)
Grifoni, Patrizia; Ferri, Fernando; Kondratova, Irina; D'Ulizia, Arianna
The research areas of mobile technologies, social networking and mobile services applications are receiving wide interest from private and public companies as well as from academic and research institutions.
75 FR 23227 - Initial Patent Applications
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... subject line of the message. Fax: 571-273-0112, marked to the attention of Susan K. Fawcett. Mail: Susan K... FURTHER INFORMATION CONTACT: Requests for additional information should be directed to the attention of... Compact Disk-Read Only Memory (CD-ROM) or Compact Disk-Recordables (CD-R) to submit patent applications...
Saffari, Mohsen; Ghanizadeh, Ghader; Koenig, Harold G
2014-12-01
Diabetes type 2 is an increasing problem worldwide that may be managed through education. Text-messaging using a cell phone can assist with self-care. The aim of this study was to systematically review the impact of education through mobile text-messaging on glycemic control. The design was a systematic review with meta-analysis. Five electronic databases were searched to access English studies involving a randomized controlled trial design that used text-messaging educational interventions in patients with type 2 diabetes during an 11-year period (2003-2013). Studies were evaluated using a quality assessment scale adapted from Jadad scale and Cochrane handbook. Extraction of data was carried out by two reviewers. A random-effect model with a standardized mean difference and Hedges's g indices was used for conducting the meta-analysis. Subgroup analyses were conducted and a Funnel plot was used to examine publication bias. Ten studies overall were identified that fulfilled inclusion criteria, involving a total of 960 participants. The mean age of the sample was 52.8 years and majority were females. Data were heterogeneous (I(2)=67.6). Analyses suggested a publication bias based on Egger's regression (P<0.05). HbA1c was reduced significantly in experimental groups compared to control groups (P<0.001). The effect size for glycemic control in studies that used text-messaging only was 44%. For studies that used both text-messaging and Internet, the effect size was 86%. Mobile text-messaging for educating Type 2 diabetics appears to be effective on glycemic control. Further investigations on mobile applications to achieve educational goals involving other diseases are recommended. Copyright © 2014 Primary Care Diabetes Europe. Published by Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Nord, David Paul
1984-01-01
It was the evangelical Christian publicists in the tract and Bible societies who first dreamed of genuinely mass media--that is, they proposed to deliver the same printed message to everyone in America. To this end, organizations such as the American Bible Society and the American Tract Society helped to develop, in the very earliest stages, the…
ERIC Educational Resources Information Center
Eichman, Thomas Lee
An adaptation of Heilprin's model of the path of propagation of human messages is used to explore the truism that more experienced academic researchers tend to go directly to the published literature, while less experienced researchers may rely more on such secondary sources as indexes and other library reference and bibliographic services. The…
NASA Technical Reports Server (NTRS)
1980-01-01
Lewis Research Center helped design the complex EMS Communication System, originating from space operated telemetry, including the telemetry link between ambulances and hospitals for advanced life support services. In emergency medical use telemetry links ambulances and hospitals for advanced life support services and allows transmission of physiological data -- an electrocardiogram from an ambulance to a hospital emergency room where a physician reads the telemetered message and prescribes emergency procedures to ambulance attendants.
[News items on human papillomavirus and its vaccine in the Valencian press (2006-2011)].
Tuells, José; Duro Torrijos, José Luis; Chilet Rosell, Elisa; Pastor Villalba, Eliseo; Portero Alonso, Antonio; Navarro Ortiz, Carmen; Galiana de la Villa, Eva María
2013-01-01
The process of introducing the human papillomavirus (HPV) vaccine aimed at teenage girls has not been entirely without controversy in Spain. This vaccine was originally hyped as a preventive measure in the fight against cervical cancer but the resulting euphoria was tempered by a message calling for evidence. During administration of the second dose of the vaccine in February 2009, an unexpected turn of events attracted vast media coverage when two teenagers experienced adverse effects after immunization in Valencia (Spain). This study analyzes the scope and content of news items on HPV, immunization and cervical cancer published between 2006 and 2011 in two widely disseminated regional newspapers in Valencia. We also discuss the extent to which the messages transmitted may have influenced acceptability of the vaccine. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.
Sears, Sharon R; Woodward, Julia T; Twillman, Robert K
2007-12-01
This original empirical study examined effects of a psycho-educational intervention on cancer patients' knowledge, concern, and preferences for cardiopulmonary resuscitation (CPR). We examined message framing as one factor that might impact subsequent decision making. In addition, we examined personality and coping style as predictors and moderators of patients' reactions to an informational intervention. As hypothesized, participants initially underestimated CPR complications and overestimated survival rates. The intervention significantly increased concern, improved knowledge, and decreased preference for CPR, particularly for participants receiving both numerical and descriptive information. Message framing of survival data did not uniquely affect CPR preference. Higher optimism predicted less increase in concern about CPR, and higher hope predicted greater decrease in preference for CPR. More approach coping related to increased concern about CPR and decreased preference for CPR.
Breakthrough Listen - A New Search for Life in the Universe
NASA Astrophysics Data System (ADS)
Worden, Pete
On July 20, 2015 Yuri Milner and Stephen Hawking announced a new set of scientific initiatives - a SETI search called Breakthrough Listen and a contest to devise potential messages in response to a detection entitled Breakthrough Message. These are the first of several privately-funded Breakthrough Initiatives, designed to answer the fundamental science questions surrounding the origin, extent and nature of life in the universe. The initiatives are managed by the Breakthrough Prize Foundation. With Breakthrough Listen, Radio SETI observations have begun at the Green Bank Radio Telescope (GBT) and optical SETI at the Lick Observatory Automated Planet Finder (APF). Observations will soon commence at the CSIRO Parkes Radio Telescope. Other SETI instruments and observations are under consideration. In addition, several other initiatives are under development including an expanded search for life in the universe.
NASA Astrophysics Data System (ADS)
Min, Byungjoon
2018-01-01
Identifying the most influential spreaders is one of outstanding problems in physics of complex systems. So far, many approaches have attempted to rank the influence of nodes but there is still the lack of accuracy to single out influential spreaders. Here, we directly tackle the problem of finding important spreaders by solving analytically the expected size of epidemic outbreaks when spreading originates from a single seed. We derive and validate a theory for calculating the size of epidemic outbreaks with a single seed using a message-passing approach. In addition, we find that the probability to occur epidemic outbreaks is highly dependent on the location of the seed but the size of epidemic outbreaks once it occurs is insensitive to the seed. We also show that our approach can be successfully adapted into weighted networks.
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Siburian, W. S. E.
2018-05-01
On the process of exchanging files, security is indispensable to avoid the theft of data. Cryptography is one of the sciences used to secure the data by way of encoding. Fast Data Encipherment Algorithm (FEAL) is a block cipher symmetric cryptographic algorithms. Therefore, the file which wants to protect is encrypted and decrypted using the algorithm FEAL. To optimize the security of the data, session key that is utilized in the algorithm FEAL encoded with the Goldwasser-Micali algorithm, which is an asymmetric cryptographic algorithm and using probabilistic concept. In the encryption process, the key was converted into binary form. The selection of values of x that randomly causes the results of the cipher key is different for each binary value. The concept of symmetry and asymmetry algorithm merger called Hybrid Cryptosystem. The use of the algorithm FEAL and Goldwasser-Micali can restore the message to its original form and the algorithm FEAL time required for encryption and decryption is directly proportional to the length of the message. However, on Goldwasser- Micali algorithm, the length of the message is not directly proportional to the time of encryption and decryption.
Designing for Dissemination: Lessons in Message Design From “1-2-3 Pap”
Cohen, Elisia L.; Head, Katharine J.; McGladrey, Margaret J.; Hoover, Anna G.; Vanderpool, Robin C.; Bridger, Colleen; Carman, Angela; Crosby, Richard A.; Darling, Elaine; Tucker-McLaughlin, Mary; Winterbauer, Nancy
2016-01-01
Despite a large number of evidence-based health communication interventions tested in private, public, and community health settings, there is a dearth of research on successful secondary dissemination of these interventions to other audiences. This article presents the case study of “1-2-3 Pap,” a health communication intervention to improve human papillomavirus (HPV) vaccination uptake and Pap testing outcomes in Eastern Kentucky, and explores strategies used to disseminate this intervention to other populations in Kentucky, North Carolina, and West Virginia. Through this dissemination project, we identified several health communication intervention design considerations that facilitated our successful dissemination to these other audiences; these intervention design considerations include (a) developing strategies for reaching other potential audiences, (b) identifying intervention message adaptations that might be needed, and (c) determining the most appropriate means or channels by which to reach these potential future audiences. Using “1-2-3 Pap” as an illustrative case study, we describe how careful planning and partnership development early in the intervention development process can improve the potential success of enhancing the reach and effectiveness of an intervention to other audiences beyond the audience for whom the intervention messages were originally designed. PMID:25470444
Fox, Elizabeth L; Pelto, Gretel H; Bar, Haim; Rasmussen, Kathleen M; Young, Sera L; Debrosse, Marie Guerda; Rouzier, Vanessa A; Pape, Jean William; Pelletier, David L
2018-01-01
Abstract Background The cognitive processes involved in individuals’ perceptions and prioritization of information, and how these change with experience or exposure to interventions, are rarely examined in the evaluation of nutrition interventions. Exclusive breastfeeding counseling is a common infant and young-child feeding intervention and is used to promote HIV-free survival in the prevention of mother-to-child transmission programs. However, it is often designed without adequate attention to the changes in mothers’ perceptions over the course of their early breastfeeding experiences. Objective The aim of this study was to identify HIV-infected breastfeeding mothers’ cognitive structure (their organization of messages and ideas) of infant feeding messages and to characterize whether their cognitive organization of infant feeding messages changed from pregnancy through the first 5 mo postpartum. Methods With the use of semistructured interviews and the cognitive mapping technique of pile sorting, we interviewed 30 HIV-infected breastfeeding mothers in Port-au-Prince, Haiti. We asked them to sort and rate 18 infant feeding messages 3 times (during pregnancy, 0- to 1-mo postpartum, and 3- to 5-mo postpartum). We analyzed their responses by using multidimensional scaling, property fitting, and partition analyses. Results At all 3 visits, we found consistency in women's cognitive mapping of messages. For example, mothers consistently differentiated messages pertinent for exclusive breastfeeding compared with those that pertained to other practices. However, subtle variations in mothers’ cognition over time were also evident, particularly at 0- to 1-mo postpartum, when message proximity was tightly clustered compared with the earlier and later periods. Conclusions We conclude that mothers share a common cognitive organization of infant feeding messages and that this organization changes over time. Attention to variations in cognition can support context-sensitive, patient-centered counseling by practitioners and improve the effectiveness of nutrition interventions. Pile sorting is an efficient, systematic technique to examine cognitive processes related to health and nutrition.
Effects of redundancy in the comparison of speech and pictorial displays in the cockpit environment.
Byblow, W D
1990-06-01
Synthesised speech and pictorial displays were compared in a spatially compatible simulated cockpit environment. Messages of high or low levels of redundancy were presented to subjects in both modality conditions. Subjects responded to warnings presented in a warning-only condition and in a dual-task condition, in which a simulated flight task was performed with visual and manual input/output modalities. Because the amount of information presented in most real-world applications and experimental paradigms is quantifiably large with respect to present guidelines for the use of synthesised speech warnings, the low-redundancy condition was hypothesised to allow for better performance. Results showed that subjects respond quicker to messages of low redundancy in both modalities. It is suggested that speech messages with low-redundancy levels were effective in minimising message length and ensuring that messages did not overload the short-term memory required to process and maintain speech in memory. Manipulation of phrase structure was used to optimise message redundancy and enhance the conceptual compatibility of the message without increasing message length or imposing a perceptual cost or memory overload. The results also suggest that system response times were quicker when synthesised speech warnings were used. This result is consistent with predictions from multiple resource theory which states that the resources required for the perception of verbal warnings are different from those for the flight task. It is also suggested that the perception of a pictorial display requires the same resources used for the perception of the primary flight task. An alternative explanation is that pictorial displays impose a visual scanning cost which is responsible for decreased performance. Based on the findings reported here, it is suggested that speech displays be incorporated in a spatially compatible cockpit environment because they allow equal or better performance when compared with pictorial displays. More importantly, the amount of time that the operator must direct his vision away from information vital to the flight task is decreased.
Tough2{_}MP: A parallel version of TOUGH2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Keni; Wu, Yu-Shu; Ding, Chris
2003-04-09
TOUGH2{_}MP is a massively parallel version of TOUGH2. It was developed for running on distributed-memory parallel computers to simulate large simulation problems that may not be solved by the standard, single-CPU TOUGH2 code. The new code implements an efficient massively parallel scheme, while preserving the full capacity and flexibility of the original TOUGH2 code. The new software uses the METIS software package for grid partitioning and AZTEC software package for linear-equation solving. The standard message-passing interface is adopted for communication among processors. Numerical performance of the current version code has been tested on CRAY-T3E and IBM RS/6000 SP platforms. Inmore » addition, the parallel code has been successfully applied to real field problems of multi-million-cell simulations for three-dimensional multiphase and multicomponent fluid and heat flow, as well as solute transport. In this paper, we will review the development of the TOUGH2{_}MP, and discuss the basic features, modules, and their applications.« less
Automation Framework for Flight Dynamics Products Generation
NASA Technical Reports Server (NTRS)
Wiegand, Robert E.; Esposito, Timothy C.; Watson, John S.; Jun, Linda; Shoan, Wendy; Matusow, Carla
2010-01-01
XFDS provides an easily adaptable automation platform. To date it has been used to support flight dynamics operations. It coordinates the execution of other applications such as Satellite TookKit, FreeFlyer, MATLAB, and Perl code. It provides a mechanism for passing messages among a collection of XFDS processes, and allows sending and receiving of GMSEC messages. A unified and consistent graphical user interface (GUI) is used for the various tools. Its automation configuration is stored in text files, and can be edited either directly or using the GUI.