596 resultados para Promotional messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present a field trial of a pervasive system called Panorama that is aimed at supporting social awareness in work environments. Panorama is an intelligent situated display in the staff room of an academic department. It artistically represents non-critical user generated content such as images from holidays, conferences and other social gatherings, as well as textual messages on its display. It also captures images and videos from different public spaces of the department and streams them onto the Panorama screen, using appropriate abstraction techniques. We studied the use of Panorama for two weeks and observed how Panorama affected staff members' social awareness and community building. We report that Panorama simulated curiosity and learning, initiated new interactions and provided a mechanism for cherishing old memories.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present findings from a field trial of CAM (Cooperative Artefact Memory) -- a mobile-tagging based messaging system -- in a design studio environment. CAM allows individuals to collaboratively store relevant information onto their physical design artefacts, such as sketches, collages, story-boards, and physical mock-ups in the form of messages, annotations and external web links. We studied the use of CAM in three student design projects. We observed that CAM facilitated new ways of collaborating in joint design projects. The serendipitous and asynchronous nature of CAM facilitated expressions of design aesthetics, allowed designers to have playful interactions, supported exploration of new design ideas, and supported designers' reflective practices. In general, our results show how CAM transformed mundane design artefacts into "living" artefacts that made the creative and playful side of cooperative design visible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Physical design objects such as sketches, drawings, collages, storyboards and models play an important role in supporting communication and coordination in design studios. CAM (Cooperative Artefact Memory) is a mobile-tagging based messaging system that allows designers to collaboratively store relevant information onto their design objects in the form of messages, annotations and external web links. We studied the use of CAM in a Product Design studio over three weeks, involving three different design teams. In this paper, we briefly describe CAM and show how it serves as 'object memory'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we report the results of a field trial of a Ubicomp system called CAM that is aimed at supporting and enhancing collaboration in a design studio environment. CAM uses a mobile-tagging application which allows designers to collaboratively store relevant information onto their physical design objects in the form of messages, annotations and external web links. The purpose of our field trial was to explore the role of augmented objects in supporting and enhancing creative work. Our results show that CAM was used not only to support participants' mutual awareness and coordination but also to facilitate designers in appropriating their augmented design objects to be explorative, extendable and playful, supporting creative aspects of design work. In general, our results show how CAM transformed static design objects into 'remarkable' objects that made the creative and playful side of cooperative design visible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a novel approach for multi-object detection in aerial videos based on tracking. The proposed method mainly involves three steps. Firstly, the spatial-temporal saliency is employed to detect moving objects. Secondly, the detected objects are tracked by mean shift in the subsequent frames. Finally, the saliency results are fused with the weight map generated by tracking to get refined detection results, and in turn the modified detection results are used to update the tracking models. The proposed algorithm is evaluated on VIVID aerial videos, and the results show that our approach can reliably detect moving objects even in challenging situations. Meanwhile, the proposed method can process videos in real time, without the effect of time delay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This case study was conducted to explore the perceptions of health risk messages sent by the Japanese Government following the Fukushima nuclear power plant disaster. The content of health risk messages from the Japanese Government and the Japanese national broadcaster (NHK) were analysed and semi-structured interviews were conducted with a sample of Tokyo residents. Initially, participants trusted these messages but as the crisis unfolded they became sceptical about the messages. Participants felt the messages did not communicate health risk information effectively because the messages were; not supported by evidence, inconsistent, delayed and changed over time. Despite widespread access to the internet, social media and mobile telephones, most participants relied on television news for information about the health risks. The Japanese Government urgently needs to re-build trust by engaging the community in the planning and development phases of health risk communication strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social media have become crucial tools for political activists and protest movements, providing another channel for promoting messages and garnering support. Twitter, in particular, has been identified as a noteworthy medium for protests in countries including Iran and Egypt to receive global attention. The Occupy movement, originating with protests in, and the physical occupation of, Wall Street, and inspiring similar demonstrations in other U.S. cities and around the world, has been intrinsically linked with social media through location-specific hashtags: #ows for Occupy Wall Street, #occupysf for San Francisco, and so on. While the individual protests have a specific geographical focus-highlighted by the physical occupation of parks, buildings, and other urban areas-Twitter provides a means for these different movements to be linked and promoted through tweets containing multiple hashtags. It also serves as a channel for tactical communications during actions and as a space in which movement debates take place. This paper examines Twitter's use within the Occupy Oakland movement. We use a mixture of ethnographic research through interviews with activists and participant observation of the movements' activities, and a dataset of public tweets containing the #oo hashtag from early 2012. This research methodology allows us to develop a more accurate and nuanced understanding of how movement activists use Twitter by cross-checking trends in the online data with observations and activists' own reported use of Twitter. We also study the connections between a geographically focused movement such as Occupy Oakland and related, but physically distant, protests taking place concurrently in other cities. This study forms part of a wider research project, Mapping Movements, exploring the politics of place, investigating how social movements are composed and sustained, and the uses of online communication within these movements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we provide the results of a field study of a Ubicomp system called CAM (Cooperative Artefact Memory) in a Product Design studio. CAM is a mobile-tagging based messaging system that allows designers to store relevant information onto their design artefacts in the form of messages, annotations and external web links. From our field study results, we observe that the use of CAM adds another shared ‘space’ onto these design artefacts – that are in their natural settings boundary objects themselves. In the paper, we provide several examples from the field illustrating how CAM helps in the design process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Providing culturally appropriate health communication tools at a community level, whilst meeting funding objectives set by Government led initiatives, can be challenging. Literature states that a translational research framework fostering community communication can encourage the development of appropriate communication tools to facilitate transfer of health information between community and researchers. Reflections from initial Need for Feed cooking and nutrition education program trials in remote Indigenous communities across Cape York indicated program resources were neither meeting community nor researchers needs. In response, a translational research framework was modelled with collaborative partnerships formed between researchers and community with the aim of modifying current resources. Local working groups were established to facilitate communication and guide continual remodelling and retrial of resources for successive programs. Feedback from working groups indicated community members wanted resources with more pictures and less words. Partnership with Chronic Disease Resources Online (CDRO) led to the development of pictorial resources including 3 evaluation tools, 27 recipe sets and 10 education support materials. Between June to December 2012 resources were trialled across 4 Cape York communities with 69 school aged children and 4 community elders. Qualitative data has indicated high satisfaction with modified pictorial resources, proving pictorial resources to be an effective and culturally appropriate method to both communicate health messages to community and facilitate flow of evaluation data to researchers. A translational research framework fostering communication between community and researchers can potentially enhance the quality of health communication tools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SINCE THE INVENTION OF recording technologies like the phonograph in the late 1800s, Indigenous music has been performed and recorded across Australia for a wide range of audiences. In the early twentieth century, for instance, music was recorded by anthropologists keen to capture the sounds of a culture that was believed to be in rapid decline (Thomas). Individual performers were not considered important in these recordings; their music was produced for scientific posterity rather than popular pleasure. And even though Aboriginal participation in local music festivals, touring vaudeville shows, and community gatherings was well documented throughout the twentieth century, it was not until the 1950s that Indigenous “pop stars” began to sell records for mass consumption(Dunbar-Hall and Gibson). Yet, with the persistence of recording artists like Jimmy Little over the past sixty years, Indigenous musicians have steadily gained prominence in Australia’s mainstream. This has been particularly true of the past twenty years, especially since the Sydney Olympics, where promotional strategies have brought about a new popular pride in musical achievements, based upon a celebrated history of diverse sounds and voices.