249 resultados para Message
Resumo:
Limited research is available on how well visual cues integrate with auditory cues to improve speech intelligibility in persons with visual impairments, such as cataracts. We investigated whether simulated cataracts interfered with participants’ ability to use visual cues to help disambiguate a spoken message in the presence of spoken background noise. We tested 21 young adults with normal visual acuity and hearing sensitivity. Speech intelligibility was tested under three conditions: auditory only with no visual input, auditory-visual with normal viewing, and auditory-visual with simulated cataracts. Central Institute for the Deaf (CID) Everyday Speech Sentences were spoken by a live talker, mimicking a pre-recorded audio track, in the presence of pre-recorded four-person background babble at a signal-to-noise ratio (SNR) of -13 dB. The talker was masked to the experimental conditions to control for experimenter bias. Relative to the normal vision condition, speech intelligibility was significantly poorer, [t (20) = 4.17, p < .01, Cohen’s d =1.0], in the simulated cataract condition. These results suggest that cataracts can interfere with speech perception, which may occur through a reduction in visual cues, less effective integration or a combination of the two effects. These novel findings contribute to our understanding of the association between two common sensory problems in adults: reduced contrast sensitivity associated with cataracts and reduced face-to-face communication in noise.
Resumo:
For decades the prevailing idea in B2B marketing has been that buyers are motivated by product/service specifications. Sellers are put on approved supplier lists, invited to respond to RFPs, and are selected on the basis of superior products, at the right price, delivered on time. The history of B2B advertising is filled with the advice “provide product specifications” and your advertising will be noticed, lead to sales inquiries, and eventually result in higher sales. Advertising filled with abstractions might work in the B2C market, but the B2B marketplace is about being literal. What we know about advertising — and particularly the message component of advertising — is based on a combination of experience, unproven ideas and a bit of social science. Over the years, advertising guidelines produced by the predecessors of BMA (National Industrial Advertising Association, Association of Industrial Advertising, and the Business/Professional Advertising Association) stressed emphasizing product features and tangible benefits. The major publishers of B2B magazines, e.g., McGraw-Hill, Penton Publishing, et al. had similar recommendations. Also, B2B marketing books recommend advertising that focuses on specific product features (Kotler and Pfoertsch, 2006; Lamons, 2005). In more recent times, abstraction in advertising messages has penetrated the B2B marketplace. Even though such advertising legends as David Ogilvy (1963, 1985) frequently recommended advertising based on hard-core information, we’ve seen the growing use of emotional appeals, including humor, fear, parental affection, etc. Beyond the use of emotion, marketers attempt to build a stronger connection between their brands and buyers through the use of abstraction and symbolism. Below are two examples of B2B advertisements — Figure 1A is high in literalism and Figure 1B is high in symbolism. Which approach — a “left-brain” (literal) or “right brain” (symbolic) is more effective in B2B advertising? Are the advertising message creation guidelines from the history of B2B advertising accurate? Are the foundations of B2B message creation (experience and unproven ideas) sound?
Resumo:
A basic element in advertising strategy is the choice of an appeal. Many researchers have studied communication message form and specifically forms of literalism and symbolism, or some variation. The motives for such study are grounded in increasing the effectiveness of commercial communication messages, especially advertising messages. Advertising research studies typically use forms of literalism (e.g. informativeness) or symbolism (e.g. metaphoric, tropes, schemes figures of speech, and rhetorical figures) as independent variables and compare these against one or more of the traditional advertising effectiveness measures as dependent variable(s). The main challenge in assessing the effectiveness of literalism or symbolism in message content is the discreet identification of the construct. However, no standard, empirically-tested measure was located in the literature.
Resumo:
Noncompliance with speed limits is one of the major safety concerns in roadwork zones. Although numerous studies have attempted to evaluate the effectiveness of safety measures on speed limit compliance, many report inconsistent findings. This paper aims to review the effectiveness of four categories of roadwork zone speed control measures: Informational, Physical, Enforcement, and Educational measures. While informational measures (static signage, variable message signage) evidently have small to moderate effects on speed reduction, physical measures (rumble strips, optical speed bars) are found ineffective for transient and moving work zones. Enforcement measures (speed camera, police presence) have the greatest effects, while educational measures also have significant potential to improve public awareness of roadworker safety and to encourage slower speeds in work zones. Inadequate public understanding of roadwork risks and hazards, failure to notice signs, and poor appreciation of safety measures are the major causes of noncompliance with speed limits.
Resumo:
The incidence of all skin cancers, including melanoma, continues to rise. It is well known that ultraviolet (UV) radiation is the main environmental risk factor for skin cancer, and excessive exposure at a young age increases the risk of developing skin cancer. The aim of this study was to determine the acceptability and feasibility of delivering sun protection messages via electronic media such as short message services (SMS) to people 18-40 years, and explore factors associated with their acceptability. Overall, 80% of participants agreed that they would like to receive some form of sun protection advice; of these, 20% prefer to receive it via SMS and 42% via email. Willingness to receive electronic messages about the UV index was associated with being unsure about whether a suntanned person would look healthy and greater use of sun protection in the past. Careful attention to message framing and timing of message delivery and focus on short-term effects of sun exposure such as sunburn and skin ageing should increase the acceptability of such messages to young people. We conclude that sun protection messages delivered to young adults via electronic media appear feasible and acceptable.
Resumo:
This paper outlines the Fulbright Scholar-in-Residence (SIR) program that I undertook at University of Colorado in Denver, USA, in August-December 2010. It explains how the SIR program proved a most enriching experience for me, professionally and personally. One reason for this paper is to encourage other LIS professionals and educators to apply for Fulbrights and other types of scholarships and exchange programs. And also to reinforce the message that research and further study really can open doors and enrich our professional careers.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
BACKGROUND The engineering profession in Australia has failed to attract young women for the last decade or so despite all the effort that have gone into promoting engineering as a preferred career choice for girls. It is a missed opportunity for the profession to flourish as a heterogeneous team. Many traditional initiatives and programs have failed to make much impact or at best incremental improvement into attracting and retaining more women in the profession. The reasons why girls and young women in most parts of the world show little interest in engineering haven't changed, despite all the efforts to address them, the issue proposed here in this paper is with the perceptions of engineering in the community and the confidence to pursue it. This gender imbalance is detrimental for the engineering profession, and hence an action-based intervention strategy was devised by the Women in Engineering Qld Chapter of Engineers Australia in 2012 to change the perceptions of school girls by redesigning the engagement strategy and key messages. As a result, the “Power of Engineering Inc” (PoE) was established as a not-for-profit organisation, and is a collaborative effort between government, schools, universities, and industry. This paper examines a case study in changing the perceptions of year 9 and 10 school girls towards an engineering career. PURPOSE To evaluate and determine the effectiveness of an intervention in changing the perceptions of year 9 and 10 school girls about engineering career options, but specifically, “What were their perceptions of engineering before today and have those perceptions changed?” DESIGN/METHOD The inaugural Power of Engineering (PoE) event was held on International Women’s Day, Thursday 8 March 2012 and was attended by 131 high school female students (year 9 and 10) and their teachers. The key message of the day was “engineering gives you the power to change the world”. A questionnaire was conducted with the participating high school female students, collecting both quantitative and qualitative data. The survey instrument has not been validated. RESULTS The key to the success of the event was as a result of collaboration between all participants involved and the connection created between government, schools, universities and industry. Of the returned surveys (109 of 131), 91% of girls would now consider a career in engineering and 57% who had not considered engineering before the day would now consider a career in engineering. Data collected found significant numbers of negative and varying perceptions about engineering careers prior to the intervention. CONCLUSIONS The evidence in this research suggests that the intervention assisted in changing the perceptions of year 9 and 10 female school students towards engineering as a career option. Whether this intervention translates into actual career selection and study enrolment is to be determined. In saying this, the evidence suggests that there is a critical and urgent need for earlier interventions prior to students selecting their subjects for year 11 and 12. This intervention could also play its part in increasing the overall pool of students engaged in STEM education.
Resumo:
Murine intestinal intraepithelial lymphocytes (IEL) have been shown to contain subsets of alpha/beta TCR+ and gamma/delta TCR+ T cells that spontaneously produce cytokines such as IFN-gamma and IL-5. We have now determined the nature and cell cycle stage of these cytokine-producing T lymphocytes in EIL by using IFN-gamma- and IL-5-specific ELISPOT assay, cytokine-specific mRNA-cDNA dot-blot hybridization and polymerase chain reaction, and flow cytometry (FACS) for DNA analysis. When CD3+ T cells from IEL of normal C3H/HeN mice were separated into low and high density fractions by discontinuous Percoll gradients, IFN-gamma and IL-5 spot-forming cells were only found in the former population. Analysis of mRNA for these cytokines by both IFN-gamma- and IL-5-specific dot-blot hybridization and polymerase chain reaction revealed that higher levels of message for IFN-gamma and IL-5 were also seen in the low density fraction. However, cell cycle analysis of these two fractions by FACS using propidium iodide showed a similar pattern of cell cycle stages in both low and high density populations (G0 + G1 approximately 96 to 98% and S/G2 + M approximately 2 to 4%). Finally, mRNA from gamma/delta TCR+ and alpha/beta TCR+ T cells in both low and high density fractions of IEL were analyzed for IFN-gamma and IL-5 message by polymerase chain reaction. After 35 cycles of amplification, both gamma/delta TCR+ and alpha/beta TCR+ T cells in the low density fraction expressed higher levels of message for these two cytokines when compared with the high density population. These results have now shown that both gamma/delta and alpha/beta TCR+ IEL can be separated into low and high density subsets and both fractions possess a similar stage of cell cycle. However, only the low density cells (in G1 phase) of both gamma/delta and alpha/beta TCR types possess increased cytokine-specific mRNA and produce the cytokines IFN-gamma and IL-5. Our results suggest that alpha/beta TCR+ and gamma/delta TCR+ IEL can produce cytokines without cell proliferation.
Resumo:
Objective To explore whether improvements in physical activity following the MobileMums intervention were mediated by changes in Social Cognitive Theory (SCT) constructs targeted in the intervention (barrier self efficacy, goal setting skills, outcome expectancy, social support, and perceived environmental opportunity for exercise). This paper also examined if the mediating constructs differed between initial (baseline to 6 weeks) and overall (baseline to 13 weeks) changes in physical activity. Methods Secondary analysis of data from a randomized controlled trial involving 88 postnatal women (<12 months postpartum). Participants were randomized to receive either the 12-week MobileMums intervention or a minimal-contact control condition. Physical activity and proposed mediators were assessed by self-report at baseline, 6 weeks, and 13 weeks. Walking for Exercise frequency was assessed using the Australian Women's Activity Survey and frequency of moderate-to-vigorous physical activity (MVPA) was assessed using a single-item question. Results Initial improvements in goal-setting skills mediated the relationship between experimental condition and initial changes in MVPA, αβ (95% CI) = 0.23(0.01, 0.59), and Walking for Exercise, αβ (95% CI) = 0.34(0.06, 0.73). Initial improvements in barrier self efficacy mediated the relationship between experimental condition and initial change in MVPA, αβ (95% CI) = 0.36(0.12, 0.65), but not Walking for Exercise. None of the SCT outcomes significantly mediated the relationship between experimental condition and overall (baseline to 13 weeks) change in frequency of MVPA or Walking for Exercise. Conclusion Future interventions with postnatal women using SCT should target barrier self-efficacy and goal setting skills in order to increase physical activity. (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Resumo:
In the 20 years since its inception, the EPPM has attracted much empirical support. Currently, and unsurprisingly given that is a model of fear-based persuasion, the EPPM’s explanatory utility has been based only upon fear-based messages. However, an argument is put forth herein, which draws upon existing evidence, that the EPPM may be an efficacious framework for explaining the persuasive process and outcomes of emotion-based messages more broadly when such messages are addressing serious health topics. For the current study, four different types of emotional appeals were purposefully devised and included a fear, an annoyance/agitation, a pride, and a humour-based message. All messages addressed the serious health issue of road safety, and in particular the risky behaviour of speeding. Participants (N = 551) were exposed to only one of the four messages and subsequently provided responses within a survey. A series of 2 (threat: low, high) x 2 (efficacy: low, high) analysis of variance was conducted for each of the appeals based on the EPPM’s message outcomes of acceptance and rejection. Support was found for the EPPM with a number of main effects of threat and efficacy emerging, reflecting that, irrespective of emotional appeal type, high levels of threat and efficacy enhanced message outcomes via maximising acceptance and minimising rejection. Theoretically, the findings provide support for the explanatory utility of the EPPM for emotion-based health messages more broadly. In an applied sense, the findings highlight the value of adopting the EPPM as a framework when devising and evaluating emotion-based health messages for serious health topics.
Resumo:
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.
Resumo:
In recent years, some models have been proposed for the fault section estimation and state identification of unobserved protective relays (FSE-SIUPR) under the condition of incomplete state information of protective relays. In these models, the temporal alarm information from a faulted power system is not well explored although it is very helpful in compensating the incomplete state information of protective relays, quickly achieving definite fault diagnosis results and evaluating the operating status of protective relays and circuit breakers in complicated fault scenarios. In order to solve this problem, an integrated optimization mathematical model for the FSE-SIUPR, which takes full advantage of the temporal characteristics of alarm messages, is developed in the framework of the well-established temporal constraint network. With this model, the fault evolution procedure can be explained and some states of unobserved protective relays identified. The model is then solved by means of the Tabu search (TS) and finally verified by test results of fault scenarios in a practical power system.
Resumo:
A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.