49 resultados para llw (send)

em Queensland University of Technology - ePrints Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

New mobile digital communication technologies present opportunities for advertisers to capitalize on the evolving relationships of consumers with their mobile devices and their desire to access enhanced information services while mobile (m-services). Consumers already use mobile devices (cell phones, personal mobile digital assistants) for traditional phone calls and message handling (e.g., Kalakota and Robinson, 2002; Sullivan Mort and Drennan, 2002). The combination of rapidly developing mobile digital technology and high uptake rates of mobile devices presents enormous potential for delivery of m-services through these devices (Bitner, Brown, and Meuter, 2000). M-services encompass a wide variety of types including the ability to trade stock, to book theater and movie tickets while accessing seating plans online, to send and receive text and pictures, and receive personalized direct advertising such as alerts for shopping bargains. Marketing communications, and specifically advertising, may be delivered as an m-service and termed m-services advertising, forming part of the broader category of m-services. However, advertising research has not yet addressed the area of m-services and needs to do so to be able to take advantage of the advanced interactivity (Yadav and Varadarajan, 2005) of mobile communication devices. Such advertising research is likely to help develop open attitudes and responses to new business models as has been advocated for other new technology such as advanced television (Tauder, 2005). In this article, we model the factors influencing the use of m-services, in the context of consumers' existing relationships with mobile devices. First, we address the value propositions underpinning consumer involvement with mobile devices. Next, we canvass the types of involvement relevant to this consumption domain and argue that involvement, together with personal attributes innovativeness and self-efficacy, will influence use of m-services. Finally, implications for advertising delivered as an m-service are discussed, the potential for m-services advertising as part of m-commerce are canvassed, and directions for future research identified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Improving the performance of a incident detection system was essential to minimize the effect of incidents. A new method of incident detection was brought forward in this paper based on an in-car terminal which consisted of GPS module, GSM module and control module as well as some optional parts such as airbag sensors, mobile phone positioning system (MPPS) module, etc. When a driver or vehicle discovered the freeway incident and initiated an alarm report the incident location information located by GPS, MPPS or both would be automatically send to a transport management center (TMC), then the TMC would confirm the accident with a closed-circuit television (CCTV) or other approaches. In this method, detection rate (DR), time to detect (TTD) and false alarm rate (FAR) were more important performance targets. Finally, some feasible means such as management mode, education mode and suitable accident confirming approaches had been put forward to improve these targets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigates e-mail marketing using data from a survey of 839 Finnish customers of an international cosmetics brand. E-mail marketing involves the use of e-mail to send promotions and information to customers. In this context we address two research questions: (1) What e-mail advertising factors drive visits to a physical (i.e., bricks-and-mortar) company sales outlet? and, (2) Does e-mail advertising influence brand satisfaction? Our findings indicate that useful e-mails can influence customers to visit the store. Further, brand satisfaction is positively influenced if e-mails are interesting and also by the amount of e-mail received by customers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

President’s Report Hello fellow AITPM members, First I would like on behalf of all AITPM members to send our condolences to all who have been affected by February’s tragic bushfires in regional Victoria, and deliver our best wishes to all of those involved in the rebuilding efforts. Over time I expect that the Victorian Government’s Royal Commission will analyse the circumstances and put forward a range of measures which will improve fire safety in vulnerable areas. As transport professionals it will be important for us to consider the findings and look to undertaking any recommendations that relate to the work we do. Not only in Victoria, but nationwide. In particular, the importance of logistics was highlighted following the fire events. Donors across Australia were this time requested to donate money rather than goods, presumably due in part to problems associated with the transport system coping with additional uncoordinated freight load, whilst being needed to support emergency management vehicle and managed freight movements. Notwithstanding, it was wonderful to see otherwise difficult to obtain goods, such as animal feed, being donated from far afield and transported in kind by trucking operators. As stated in last month’s Newsletter, AITPM made a direct cash donation to the Red Cross Bushfire Appeal immediately following the events, and a further donation to the Queensland Premier’s Disaster Relief Fund to support recovery after the North Queensland floods, which claimed seven lives. Again, we will need to monitor how the rebuilding effort unfolds particularly in regional Victoria and centres including Ingham in North Queensland, but I would urge all AITPM members who are in a position to support the restoration of the affected communities to play a part, particularly over time once the initial shock subsides and the steady job of rebuilding is underway. Onto lighter matters, AITPM’s flagship event, the 2009 AITPM National Conference, Traffic Beyond Tomorrow, being held in Adelaide from 5 to 7 August, is fast approaching. www.aitpm.com has all of the details about how to register, sponsor a booth, and so forth. We are looking forward to catching up with our conference “regulars” and meeting with new folks to AITPM, and Australian traffic and transport planning and management. Adelaide is one of my favourite places to visit and I’m looking forward to riding the light rail line extension through town and checking out progress on the road system development. Best regards all, Jon Bunker

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to identify and recommend the emergence of an academic research methodology for Journalism the academic discipline, through reviewing various journalistic methods of research – those making up a key element in such methodology. Its focus is on journalistic styles of work employed in academic contexts especially research on mass media issues. It proposes that channelling such activity into disciplined academic forms will enhance both: allowing the former to provide more durable and deeper outcomes, injecting additional energy and intensity of purpose into the latter. It will briefly consider characteristics of research methodologies and methods, generally; characteristics of the Journalism discipline, and its relationship with mass media industries and professions. The model of journalism used here is the Western liberal stream. A proposition is made, that teaching and research in universities focused on professional preparation of journalists, has developed so that it is a mature academic discipline. Its adherents are for the most part academics with background in journalistic practice, and so able to deploy intellectual skills of journalists, while also accredited with Higher Degrees principally in humanities. Research produced in this discipline area stands to show two characteristics: (a) it employs practices used generally in academic research, e.g. qualitative research methods such as ethnographic studies or participant observation, or review of documents including archived media products, and (b) within such contexts it may use more specifically journalistic techniques, e.g. interviewing styles, reflection on practice of journalism, and in creative practice research, journalistic forms of writing – highlighting journalistic / practitioner capabilities of the author. So the Journalism discipline, as a discipline closely allied to a working profession, is described as one where individual professional skills and background preparation for media work will be applicable to academic research. In this connection the core modus operandi will be the directly research-related practices of: insistent establishment of facts, adept crafting of reportage, and economising well with time. Prospective fields for continuing research are described:- work in new media; closer investigation of relations among media producers and audiences; journalism as creative practice, and general publishing by journalists, e.g. writing histories.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traffic congestion is an increasing problem with high costs in financial, social and personal terms. These costs include psychological and physiological stress, aggressivity and fatigue caused by lengthy delays, and increased likelihood of road crashes. Reliable and accurate traffic information is essential for the development of traffic control and management strategies. Traffic information is mostly gathered from in-road vehicle detectors such as induction loops. Traffic Message Chanel (TMC) service is popular service which wirelessly send traffic information to drivers. Traffic probes have been used in many cities to increase traffic information accuracy. A simulation to estimate the number of probe vehicles required to increase the accuracy of traffic information in Brisbane is proposed. A meso level traffic simulator has been developed to facilitate the identification of the optimal number of probe vehicles required to achieve an acceptable level of traffic reporting accuracy. Our approach to determine the optimal number of probe vehicles required to meet quality of service requirements, is to simulate runs with varying numbers of traffic probes. The simulated traffic represents Brisbane’s typical morning traffic. The road maps used in simulation are Brisbane’s TMC maps complete with speed limits and traffic lights. Experimental results show that that the optimal number of probe vehicles required for providing a useful supplement to TMC (induction loop) data lies between 0.5% and 2.5% of vehicles on the road. With less probes than 0.25%, little additional information is provided, while for more probes than 5%, there is only a negligible affect on accuracy for increasingly many probes on the road. Our findings are consistent with on-going research work on traffic probes, and show the effectiveness of using probe vehicles to supplement induction loops for accurate and timely traffic information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Orissa state, India, the DakNet system supports asynchronous Internet communication between an urban hub and rural nodes. DakNet is noteworthy in many respects, not least in how the system leverages existing transport infrastructure. Wi-Fi transceivers mounted on local buses send and receive user data from roadside kiosks, for later transfer to/from the Internet via wireless protocols. This store-and-forward system allows DakNet to offer asynchronous communication capacity to rural users at low cost. The original ambition of the DakNet system was to provide email and SMS facilities to rural communities. Our 2008 study of the communicative ecology surrounding the DakNet system revealed that this ambition has now evolved – in response to market demand – to the extent that e-shopping (rather than email) has become the primary driver behind the DakNet offer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New media, as a free and universal communication tool, has had an impact on the power of the general public to comment on a variety of issues. As the public can comment favourably or unfavourably on advertisements, such as on Youtube, the advertising industry must start using weblogs to research reaction to their advertising campaigns. This exploratory study examines the responses of some advertising industry practitioners, both advertisers and agencies, on the impact of new media, specifically weblogs, and the use of new media as a source of research on advertising campaigns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of sexual identity is a complex, lifelong process involving the interplay of sex, gender and orientation, occurring within a social framework of heterosexual dominance (Murray 2001). Australia has a richly diverse culture and, at some point in our lives, we will all meet people, who look, think, live, or act differently to ourselves. Through understanding and celebrating the diversity of our culture, we enrich our lives and the lives of others. Schools influence how boys (and girls) see themselves and each other; those of us who work in schools cannot pretend to be outside the process of gender construction. In our daily business we send messages, set boundaries and respond with support, disinterest or censure to the acting out of various masculinities and femininities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyber bullying – or bullying through the use of technology – is a growing phenomenon which is currently most commonly experienced by young people and the consequences manifested in schools. Cyber bullying shares many of the same attributes as face-to-face bullying such as a power imbalance and a sense of helplessness on the part of the target. Not surprisingly, targets of face-to-face bullying are increasingly turning to the law, and it is likely that targets of cyber bullying may also do so in an appropriate case. This article examines the various criminal, civil and vilification laws that may apply to cases of cyber bullying and assesses the likely effectiveness of these laws as a means of redressing that power imbalance between perpetrator and target.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the dangers and illegality, there is a continued prevalence of texting while driving amongst young Australian drivers. The present study tested an extended theory of planned behaviour (TPB) to predict young drivers’ (17 to 24 years) intentions to [1] send and [2] read text messages while driving. Participants (N = 169 university students) completed measures of attitudes, subjective norm, perceived behavioural control, intentions, and the additional social influence measures of group norm and moral norm. One week later, participants reported on the number of texts sent and read while driving in the previous week. Attitude predicted intentions to both send and read texts while driving, and subjective norm and perceived behavioural control determined sending, but not reading, intentions. Further, intention, but not perceptions of control, predicted both texting behaviours 1 week later. In addition, both group norm and moral norm added predictive ability to the model. These findings provide support for the TPB in understanding students’ decisions to text while driving as well as the inclusion of additional normative influences within this context, suggesting that a multi-strategy approach is likely to be useful in attempts to reduce the incidence of these risky driving behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation is primarily an applied statistical modelling investigation, motivated by a case study comprising real data and real questions. Theoretical questions on modelling and computation of normalization constants arose from pursuit of these data analytic questions. The essence of the thesis can be described as follows. Consider binary data observed on a two-dimensional lattice. A common problem with such data is the ambiguity of zeroes recorded. These may represent zero response given some threshold (presence) or that the threshold has not been triggered (absence). Suppose that the researcher wishes to estimate the effects of covariates on the binary responses, whilst taking into account underlying spatial variation, which is itself of some interest. This situation arises in many contexts and the dingo, cypress and toad case studies described in the motivation chapter are examples of this. Two main approaches to modelling and inference are investigated in this thesis. The first is frequentist and based on generalized linear models, with spatial variation modelled by using a block structure or by smoothing the residuals spatially. The EM algorithm can be used to obtain point estimates, coupled with bootstrapping or asymptotic MLE estimates for standard errors. The second approach is Bayesian and based on a three- or four-tier hierarchical model, comprising a logistic regression with covariates for the data layer, a binary Markov Random field (MRF) for the underlying spatial process, and suitable priors for parameters in these main models. The three-parameter autologistic model is a particular MRF of interest. Markov chain Monte Carlo (MCMC) methods comprising hybrid Metropolis/Gibbs samplers is suitable for computation in this situation. Model performance can be gauged by MCMC diagnostics. Model choice can be assessed by incorporating another tier in the modelling hierarchy. This requires evaluation of a normalization constant, a notoriously difficult problem. Difficulty with estimating the normalization constant for the MRF can be overcome by using a path integral approach, although this is a highly computationally intensive method. Different methods of estimating ratios of normalization constants (N Cs) are investigated, including importance sampling Monte Carlo (ISMC), dependent Monte Carlo based on MCMC simulations (MCMC), and reverse logistic regression (RLR). I develop an idea present though not fully developed in the literature, and propose the Integrated mean canonical statistic (IMCS) method for estimating log NC ratios for binary MRFs. The IMCS method falls within the framework of the newly identified path sampling methods of Gelman & Meng (1998) and outperforms ISMC, MCMC and RLR. It also does not rely on simplifying assumptions, such as ignoring spatio-temporal dependence in the process. A thorough investigation is made of the application of IMCS to the three-parameter Autologistic model. This work introduces background computations required for the full implementation of the four-tier model in Chapter 7. Two different extensions of the three-tier model to a four-tier version are investigated. The first extension incorporates temporal dependence in the underlying spatio-temporal process. The second extensions allows the successes and failures in the data layer to depend on time. The MCMC computational method is extended to incorporate the extra layer. A major contribution of the thesis is the development of a fully Bayesian approach to inference for these hierarchical models for the first time. Note: The author of this thesis has agreed to make it open access but invites people downloading the thesis to send her an email via the 'Contact Author' function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.