946 resultados para messages
Resumo:
OBJECTIVE Little research has examined user perceptions of medication warnings about driving. Consumer perceptions of the Australian national approach to medication warnings about driving are examined. The Australian approach to warning presentation is compared with an alternative approach used in France. Visual characteristics of the warnings and overall warning readability are investigated. Risk perceptions and behavioral intentions associated with the warnings are also examined. METHOD Surveys were conducted with 358 public hospital outpatients in Queensland, Australia. Extending this investigation is a supplementary comparison study of French hospital outpatients (n = 75). RESULTS The results suggest that the Australian warning approach of using a combination of visual characteristics is important for consumers but that the use of a pictogram could enhance effects. Significantly higher levels of risk perception were found among the sample for the French highest severity label compared to the analogous mandatory Australian warning, with a similar trend evident in the French study results. The results also indicated that the French label was associated with more cautious behavioral intentions. CONCLUSION The results are potentially important for the Australian approach to medication warnings about driving impairment. The research contributes practical findings that can be used to enhance the effectiveness of warnings and develop countermeasures in this area. Hospital pharmacy patients should include persons with the highest level of likelihood of knowledge and awareness of medication warning labeling. Even in this context it appears that a review of the Australian warning system would be useful particularly in the context of increasing evidence relating to associated driving risks. Reviewing text size and readability of messages including the addition of pictograms, as well as clarifying the importance of potential risk in a general community context, is recommended for consideration and further research.
Resumo:
Background Dietary diversity is recognized as a key element of a high quality diet. However, diets that offer a greater variety of energy-dense foods could increase food intake and body weight. The aim of this study was to explore association of diet diversity with obesity in Sri Lankan adults. Methods Six hundred adults aged > 18 years were randomly selected by using multi-stage stratified sample. Dietary intake assessment was undertaken by a 24 hour dietary recall. Three dietary scores, Dietary Diversity Score (DDS), Dietary Diversity Score with Portions (DDSP) and Food Variety Score (FVS) were calculated. Body mass index (BMI) ≥ 25 kg.m-2 is defined as obese and Asian waist circumference cut-offs were used diagnosed abdominal obesity. Results Mean of DDS for men and women were 6.23 and 6.50 (p=0.06), while DDSP was 3.26 and 3.17 respectively (p=0.24). FVS values were significantly different between men and women 9.55 and 10.24 (p=0.002). Dietary diversity among Sri Lankan adults was significantly associated with gender, residency, ethnicity, education level but not with diabetes status. As dietary scores increased, the percentage consumption was increased in most of food groups except starches. Obese and abdominal obese adults had the highest DDS compared to non obese groups (p<0.05). With increased dietary diversity the level of BMI, waist circumference and energy consumption was significantly increased in this population. Conclusion Our data suggests that dietary diversity is positively associated with several socio-demographic characteristics and obesity among Sri Lankan adults. Although high dietary diversity is widely recommended, public health messages should emphasize to improve dietary diversity in selective food items.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Objective: To develop a system for the automatic classification of pathology reports for Cancer Registry notifications. Method: A two pass approach is proposed to classify whether pathology reports are cancer notifiable or not. The first pass queries pathology HL7 messages for known report types that are received by the Queensland Cancer Registry (QCR), while the second pass aims to analyse the free text reports and identify those that are cancer notifiable. Cancer Registry business rules, natural language processing and symbolic reasoning using the SNOMED CT ontology were adopted in the system. Results: The system was developed on a corpus of 500 histology and cytology reports (with 47% notifiable reports) and evaluated on an independent set of 479 reports (with 52% notifiable reports). Results show that the system can reliably classify cancer notifiable reports with a sensitivity, specificity, and positive predicted value (PPV) of 0.99, 0.95, and 0.95, respectively for the development set, and 0.98, 0.96, and 0.96 for the evaluation set. High sensitivity can be achieved at a slight expense in specificity and PPV. Conclusion: The system demonstrates how medical free-text processing enables the classification of cancer notifiable pathology reports with high reliability for potential use by Cancer Registries and pathology laboratories.
Resumo:
Aims Pathology notification for a Cancer Registry is regarded as the most valid information for the confirmation of a diagnosis of cancer. In view of the importance of pathology data, an automatic medical text analysis system (Medtex) is being developed to perform electronic Cancer Registry data extraction and coding of important clinical information embedded within pathology reports. Methods The system automatically scans HL7 messages received from a Queensland pathology information system and analyses the reports for terms and concepts relevant to a cancer notification. A multitude of data items for cancer notification such as primary site, histological type, stage, and other synoptic data are classified by the system. The underlying extraction and classification technology is based on SNOMED CT1 2. The Queensland Cancer Registry business rules3 and International Classification of Diseases – Oncology – Version 34 have been incorporated. Results The cancer notification services show that the classification of notifiable reports can be achieved with sensitivities of 98% and specificities of 96%5, while the coding of cancer notification items such as basis of diagnosis, histological type and grade, primary site and laterality can be extracted with an overall accuracy of 80%6. In the case of lung cancer staging, the automated stages produced were accurate enough for the purposes of population level research and indicative staging prior to multi-disciplinary team meetings2 7. Medtex also allows for detailed tumour stream synoptic reporting8. Conclusions Medtex demonstrates how medical free-text processing could enable the automation of some Cancer Registry processes. Over 70% of Cancer Registry coding resources are devoted to information acquisition. The development of a clinical decision support system to unlock information from medical free-text could significantly reduce costs arising from duplicated processes and enable improved decision support, enhancing efficiency and timeliness of cancer information for Cancer Registries.
Resumo:
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2 x/2. All of these attacks exploit the designers’ choice of an all zero IV. We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8) preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix – we only assume that the distribution of elements is more or less uniform.
Resumo:
In this paper, we present a field trial of a pervasive system called Panorama that is aimed at supporting social awareness in work environments. Panorama is an intelligent situated display in the staff room of an academic department. It artistically represents non-critical user generated content such as images from holidays, conferences and other social gatherings, as well as textual messages on its display. It also captures images and videos from different public spaces of the department and streams them onto the Panorama screen, using appropriate abstraction techniques. We studied the use of Panorama for two weeks and observed how Panorama affected staff members' social awareness and community building. We report that Panorama simulated curiosity and learning, initiated new interactions and provided a mechanism for cherishing old memories.
Resumo:
We present findings from a field trial of CAM (Cooperative Artefact Memory) -- a mobile-tagging based messaging system -- in a design studio environment. CAM allows individuals to collaboratively store relevant information onto their physical design artefacts, such as sketches, collages, story-boards, and physical mock-ups in the form of messages, annotations and external web links. We studied the use of CAM in three student design projects. We observed that CAM facilitated new ways of collaborating in joint design projects. The serendipitous and asynchronous nature of CAM facilitated expressions of design aesthetics, allowed designers to have playful interactions, supported exploration of new design ideas, and supported designers' reflective practices. In general, our results show how CAM transformed mundane design artefacts into "living" artefacts that made the creative and playful side of cooperative design visible.
Resumo:
Physical design objects such as sketches, drawings, collages, storyboards and models play an important role in supporting communication and coordination in design studios. CAM (Cooperative Artefact Memory) is a mobile-tagging based messaging system that allows designers to collaboratively store relevant information onto their design objects in the form of messages, annotations and external web links. We studied the use of CAM in a Product Design studio over three weeks, involving three different design teams. In this paper, we briefly describe CAM and show how it serves as 'object memory'.
Resumo:
In this paper, we report the results of a field trial of a Ubicomp system called CAM that is aimed at supporting and enhancing collaboration in a design studio environment. CAM uses a mobile-tagging application which allows designers to collaboratively store relevant information onto their physical design objects in the form of messages, annotations and external web links. The purpose of our field trial was to explore the role of augmented objects in supporting and enhancing creative work. Our results show that CAM was used not only to support participants' mutual awareness and coordination but also to facilitate designers in appropriating their augmented design objects to be explorative, extendable and playful, supporting creative aspects of design work. In general, our results show how CAM transformed static design objects into 'remarkable' objects that made the creative and playful side of cooperative design visible.
Resumo:
RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.
Resumo:
This case study was conducted to explore the perceptions of health risk messages sent by the Japanese Government following the Fukushima nuclear power plant disaster. The content of health risk messages from the Japanese Government and the Japanese national broadcaster (NHK) were analysed and semi-structured interviews were conducted with a sample of Tokyo residents. Initially, participants trusted these messages but as the crisis unfolded they became sceptical about the messages. Participants felt the messages did not communicate health risk information effectively because the messages were; not supported by evidence, inconsistent, delayed and changed over time. Despite widespread access to the internet, social media and mobile telephones, most participants relied on television news for information about the health risks. The Japanese Government urgently needs to re-build trust by engaging the community in the planning and development phases of health risk communication strategies.
Resumo:
Social media have become crucial tools for political activists and protest movements, providing another channel for promoting messages and garnering support. Twitter, in particular, has been identified as a noteworthy medium for protests in countries including Iran and Egypt to receive global attention. The Occupy movement, originating with protests in, and the physical occupation of, Wall Street, and inspiring similar demonstrations in other U.S. cities and around the world, has been intrinsically linked with social media through location-specific hashtags: #ows for Occupy Wall Street, #occupysf for San Francisco, and so on. While the individual protests have a specific geographical focus-highlighted by the physical occupation of parks, buildings, and other urban areas-Twitter provides a means for these different movements to be linked and promoted through tweets containing multiple hashtags. It also serves as a channel for tactical communications during actions and as a space in which movement debates take place. This paper examines Twitter's use within the Occupy Oakland movement. We use a mixture of ethnographic research through interviews with activists and participant observation of the movements' activities, and a dataset of public tweets containing the #oo hashtag from early 2012. This research methodology allows us to develop a more accurate and nuanced understanding of how movement activists use Twitter by cross-checking trends in the online data with observations and activists' own reported use of Twitter. We also study the connections between a geographically focused movement such as Occupy Oakland and related, but physically distant, protests taking place concurrently in other cities. This study forms part of a wider research project, Mapping Movements, exploring the politics of place, investigating how social movements are composed and sustained, and the uses of online communication within these movements.