989 resultados para Fox News Channel
Resumo:
Why are consumers different: Heterogeneity in the way consumers categorise products and services – Snack Food Influenced by the individual needs, personal traits, values and goals – Blood Donation Consumers base their choices on information from external sources and prior experiences stored in memory. Intrinsic – prior experience Extrinsic – advertising, blogs, etc
Resumo:
This paper presents a low-bandwidth multi-robot communication system designed to serve as a backup communication channel in the event a robot suffers a network device fault. While much research has been performed in the area of distributing network communication across multiple robots within a system, individual robots are still susceptible to hardware failure. In the past, such robots would simply be removed from service, and their tasks re-allocated to other members. However, there are times when a faulty robot might be crucial to a mission, or be able to contribute in a less communication intensive area. By allowing robots to encode and decode messages into unique sequences of DTMF symbols, called words, our system is able to facilitate continued low-bandwidth communication between robots without access to network communication. Our results have shown that the system is capable of permitting robots to negotiate task initiation and termination, and is flexible enough to permit a pair of robots to perform a simple turn taking task.
Resumo:
These news items describe: (1) a book award won by Peter Mayo and Leona English (2) the theme of the next issue of 'Postcolonial Directions in Education', and (3) two conference visits made by the author: 'Quality in the classroom', in Kathmandu, Nepal, 2013, and the AERA conference in San Francisco, 2013.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
The Mapping Futures of News research and seminar programme, sponsored by the Institute for Advanced Studies in 2009-10, addressed those questions, as well as the many more immediate issues facing the Scottish news industry, such as how to survive the current period of often traumatic transition. This document summarises that work, and identifies: Mapping Futures for News: Programme Report iii • Where the main Scottish print and broadcast news media are in 2010, in terms of circulation and ratings figures; • the key trends currently impacting on Scottish news media; • the responses up to now of government and regulators to assist the Scottish media through the present problems; • the responses of the news media themselves.
Resumo:
This thesis presents a novel idea for an adaptive prioritized cross-layer design (APCLD) control algorithm to achieve comprehensive channel congestion control for vehicular safety communication based on DSRC technology. An appropriate evaluation metric and two control parameters have been established. Simulation studies have evaluated the DSRC network performance in different traffic scenario and under different channel conditions. The APCLD algorithm is derived from the results of the simulation analysis.
Resumo:
The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.
Resumo:
It is not uncommon to hear a person of interest described by their height, build, and clothing (i.e. type and colour). These semantic descriptions are commonly used by people to describe others, as they are quick to relate and easy to understand. However such queries are not easily utilised within intelligent surveillance systems as they are difficult to transform into a representation that can be searched for automatically in large camera networks. In this paper we propose a novel approach that transforms such a semantic query into an avatar that is searchable within a video stream, and demonstrate state-of-the-art performance for locating a subject in video based on a description.
Resumo:
The debate over the nature and flow of international news has dominated intellectual debate about journalism practice for some time. Developing countries argued there was an imbalance in the nature and amount of international news concerning them. They argued that the Western media rarely reported on developing countries and when they did, reported predominantly negative news about developing countries. The debate led to calls for a New World Information and Communication Order (NWICO). A number of studies examined its arguments, many finding developing countries were indeed disadvantaged by the Western media. This study compared foreign news coverage in The Australian and The Fiji Times, with special attention on news from the Pacific Islands region. It found the coverage of the Pacific Islands was still grossly inadequate in both newspapers. The coverage consisted of only a small number of stories, which were predominantly negative, surprising especially in the case of The Fiji Times.
Resumo:
One of the principal arguments that dominated intellectual debate in the 19805 concerned the imbalance in the quantity and quality of world news, in particular news from developing countries. African delegates at the United Nations Educational, Scientific and Cultural Organisation (UNESCO), supported by other developing countries, argued that most of the news disseminated by the major Western news agencies was unfavourable to developing countries in qualitative and quantitative terms. Not only did Western news media pay little attention to news of developing countries, it was also argued that the few items that made the news tended to focus on negative events such as crises, wars, coups, riots, street demonstrations, diseases, poverty, pestilence, etc. More than 20 years after the intellectual debate received attention in academic journals, this study set out to examine systematically how African newspapers report the world. The researchers investigate the relative degree of balance and imbalance in the coverage of world news by Nigerian and Ghanaian newspapers. The study also examines Nigerian and Ghanaian journalists’ perceptions of world news coverage by local and foreign newspapers.
Resumo:
Parody accounts are prevalent on Twitter, offering irreverent interpretations of public figures, fictional characters and more. These accounts post comments framed within the context of their fictional universes or stereotypes of their subjects, responding in-character to topical events. This article positions parody accounts as a ritualised social media practice, an extension of fan practices and irreverent Internet culture. By providing a typology of parody accounts and analysing the topicality of selected parody accounts’ tweets, the research examines how these accounts contribute to topical discussions. In-character framing of topical comments allows parody accounts to offer original interpretations of breaking news that receive more attention than their other tweets. The presence and longevity of parody accounts underline the importance of humour on social media, including within news and topical coverage.
Resumo:
As news communication speeds up, investigative journalists have an increasing responsibility to minimise the risk of harm to vulnerable news sources. In addition, the increased longevity and instant global search-ability of news coverage and investigative journalism outputs such as documentaries, places upon journalists an increased responsibility for accuracy since online coverage cannot be easily corrected or retracted. This paper will examine how the risks to a news source and her family were considered and mitigated during the production of a radio documentary and newspaper story about an intended victim of child sacrifice. Pre-publication considerations included the possible risks to the mental health of the news source, the potential physical risk to her children and the risk to future family relationships. To hear the ABC Radio National documentary, A living sacrifice, on 360 Documentaries prior to the conference, see http://www.abc.net.au/radionational/programs/360/a-living-sacrifice/5359744. To read the Sunday Mail newspaper coverage of the story see http://www.couriermail.com.au/news/queensland/susannah-birch-talks-about-her-throat-being-slit-by-her-mother-when-she-was-a-baby/story-fnihsrf2-1226881911465.