910 resultados para message rejection
Resumo:
This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms and BLAKE2s for smaller architectures. BLAKE2 can be directly keyed, making it functionally equivalent to a Message Authentication Code (MAC).
Resumo:
Objective: Regular follow-up is essential to successful management of childhood cataract. We sought to assess whether a mobile phone short message service (SMS) for parents of children with cataract could improve follow-up adherence and the proportion of procedures performed in timely fashion. Design: Randomized, controlled trial. This trial is registered with ClinicalTrials.gov, NCT01417819. Participants: We included 258 parent-child pairs involved in the Childhood Cataract Program of the Chinese Ministry of Health. Methods: Participants were randomized (1:1) to a mobile phone SMS intervention or standard follow-up appointments. All participants were scheduled to attend <4 follow-up appointments according to the protocol. Parents in the intervention group received SMS automated reminders before scheduled appointments. The control group parents did not receive SMSs or any alternative reminder of scheduled appointments. Regular ocular examinations and analyses were performed by investigators masked to group allocation; however, study participants and the manager in charge of randomization and sending SMSs were not masked. Main Outcome Measures: Number of follow-up appointments attended, additional surgeries, laser treatments, changes in eyeglasses prescription, and occurrence of secondary ocular hypertension. Results: Among parent-child participants, 135 were randomly assigned to the SMS intervention and 123 to standard appointments. Attendance rates for the SMS group (first visit, 97.8%; second, 91.9%; third, 92.6%; fourth, 83%) were significantly higher than those for the control group (first visit, 87.8%; second, 69.9%; third, 56.9%; fourth, 33.3%). The increase in attendance rate for total number of follow-up visits with SMS reminders was 47.2% (relative risk [RR] for attendance, 1.47; 95% confidence interval [CI], 1.16-1.78; P = 0.003). The number needed to remind (NNR) to gain 1 additional visit by 1 child was 3 (95% CI, 1.8-4.2). A total of 247 clinical interventions were carried out in the SMS group and 134 in the control group (RR, 1.68; 95% CI, 1.37-1.99; P = 0.007). The NNR to result in 1 additional clinical intervention was 5 (95% CI, 3.5-6.5). Conclusions: The SMS reminders significantly improved follow-up adherence in pediatric cataract treatment. Using readily available mobile phone resources may be an effective and economic strategy to improve management of childhood cataract in China. Financial Disclosure(s): The authors have no proprietary or commercial interest in any of the materials discussed in this article. © 2012 American Academy of Ophthalmology.
Resumo:
Public health risk communication during emergencies should be rapid and accurate in order to allow the audience to take steps to prevent adverse outcomes. Delays to official communications may cause unnecessary anxiety due to uncertainty or inaccurate information circulating within the at-risk group. Modern electronic communications present opportunities for rapid, targeted public health risk communication. We present a case report of a cluster of invasive meningococcal disease in a primary school in which we used the school's mass short message service (SMS) text message system to inform parents and guardians of pupils about the incident, to tell them that chemoprophylaxis would be offered to all pupils and staff, and to advise them when to attend the school to obtain further information and antibiotics. Following notification to public health on a Saturday, an incident team met on Sunday, sent the SMS messages that afternoon, and administered chemoprophyaxis to 93% of 404 pupils on Monday. The use of mass SMS messages enabled rapid communication from an official source and greatly aided the public health response to the cluster.
Resumo:
Governor Hayne speaks of the superiority of individual state sovereignty and states’ rights over mandates by the federal government. Hayne’s speech comes after President Andrew Jackson’s Nullification Proclamation that disputed a state’s right to nullify a federal law, in response to South Carolina’s ordinances declaring the tariff acts of 1828 and 1832 unconstitutional.
Resumo:
Governor Henagan gives his message following his assumption as governor after the death of the previous governor. In his message, Governor Henagan addresses the status of agriculture, public education, state finances, and state military operations of South Carolina, as well as South Carolina’s role in the 1840 presidential election.
Resumo:
Governor Moses calls on South Carolinians to endeavor to become a respected member of the United States following the U.S. Civil War. His message addresses the status of the national debt, South Carolina public education, the South Carolina Orphan Asylum, the South Carolina Lunatic Asylum, the state penitentiary, the state’s quarantine of small pox, the revenue-generating phosphate deposits in the state, immigration to the state, the state’s flagship university, current state legislation, and the state militia.
Resumo:
This speech was delivered to by the Governor to give the general assembly information of the condition of the state and give them recommendations to consider measures that the Governor deems necessary or expedient. He provides the information regarding the state debt, taxes, and bonded debt. He describes the financial agent of the state as well as the expenditures of the state government.
Resumo:
This speech was addressed to the people of the Senate and House of Representatives. It was delivered to inform them of the progress over the past year made to place the finances of the state on a firm and healthy basis. He gives a report on all departments and projects funded by the government in the past year.
Resumo:
An adaptive self-calibrating image rejection receiver is described, containing a modified Weaver image rejection mixer and a Digital Image Rejection Processor (DIRP). The blind source-separation-based DIRP eliminates the I/Q errors improving the Image Rejection Ratio (IRR) without the need for trimming or use of power-hungry discrete components. Hardware complexity is minimal, requiring only two complex coefficients; hence it can be easily integrated into the signal processing path of any receiver. Simulation results show that the proposed approach achieves 75-97 dB of IRR.
Resumo:
This paper deals with and details the design and implementation of a low-power; hardware-efficient adaptive self-calibrating image rejection receiver based on blind-source-separation that alleviates the RF analog front-end impairments. Hybrid strength-reduced and re-scheduled data-flow, low-power implementation of the adaptive self-calibration algorithm is developed and its efficiency is demonstrated through simulation case studies. A behavioral and structural model is developed in Matlab as well as a low-level architectural design in VHDL providing valuable test benches for the performance measures undertaken on the detailed algorithms and structures.
Resumo:
This paper deals with and details the design of a power-aware adaptive digital image rejection receiver based on blind-source-separation that alleviates the RF analog front-end impairments. Power-aware system design at the RTL level without having to redesign arithmetic circuits is used to reduce the power consumption in nomadic devices. Power-aware multipliers with configurable precision are used to trade-off the image-rejection-ratio (IRR) performance with power consumption. Results of the simulation case studies demonstrate that the IRR performance of the power-aware system is comparable to that of the normal implementation albeit degraded slightly, but well within the acceptable limits.
Resumo:
A novel, compact and highly selective microstrip bandpass filter with bandwidth reconfigurability for ultra-wideband (UWB) applications is presented. The proposed design uses stepped impedance resonator (SIR) for realization of bandpass filter (BPF) and employs a single varactor diode (BB135-NXP) for the purpose of reconfiguring bandwidth. Additionally, to improve the selectivity between passband edges, a cross-coupling between I/O feed lines is introduced which generated pairs of attenuation poles at each side of the passband. Measurements on a fabricated reconfigurable filter confirm the accuracy of the design procedure. Measured responses show good agreement with simulation. The proposed filter is able to achieve significant size reduction (8.5 mm × 7.1 mm excluding the feeding ports) as compared to the conventional bandpass filters with reconfigurable bandwidth.
Resumo:
This chapter analyses the unfolding of the Cuban missile crisis in the context of the 17th General Assembly of the UN and shows that, contrary to earlier accounts, U Thant was responding to pressures from the non-aligned and the British in his attempts to handle the crisis.
Resumo:
Research on cluster analysis for categorical data continues to develop, new clustering algorithms being proposed. However, in this context, the determination of the number of clusters is rarely addressed. We propose a new approach in which clustering and the estimation of the number of clusters is done simultaneously for categorical data. We assume that the data originate from a finite mixture of multinomial distributions and use a minimum message length criterion (MML) to select the number of clusters (Wallace and Bolton, 1986). For this purpose, we implement an EM-type algorithm (Silvestre et al., 2008) based on the (Figueiredo and Jain, 2002) approach. The novelty of the approach rests on the integration of the model estimation and selection of the number of clusters in a single algorithm, rather than selecting this number based on a set of pre-estimated candidate models. The performance of our approach is compared with the use of Bayesian Information Criterion (BIC) (Schwarz, 1978) and Integrated Completed Likelihood (ICL) (Biernacki et al., 2000) using synthetic data. The obtained results illustrate the capacity of the proposed algorithm to attain the true number of cluster while outperforming BIC and ICL since it is faster, which is especially relevant when dealing with large data sets.