933 resultados para Alarm messages
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ, σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 2^64 hash operations. As a step towards an analysis of the full function, we present the results of our experiments on Hamming weights of expanded messages for different variants of the message expansion and show that there exist low-weight expanded messages for XOR-linearised variants.
Resumo:
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.
Resumo:
The quick detection of an abrupt unknown change in the conditional distribution of a dependent stochastic process has numerous applications. In this paper, we pose a minimax robust quickest change detection problem for cases where there is uncertainty about the post-change conditional distribution. Our minimax robust formulation is based on the popular Lorden criteria of optimal quickest change detection. Under a condition on the set of possible post-change distributions, we show that the widely known cumulative sum (CUSUM) rule is asymptotically minimax robust under our Lorden minimax robust formulation as a false alarm constraint becomes more strict. We also establish general asymptotic bounds on the detection delay of misspecified CUSUM rules (i.e. CUSUM rules that are designed with post- change distributions that differ from those of the observed sequence). We exploit these bounds to compare the delay performance of asymptotically minimax robust, asymptotically optimal, and other misspecified CUSUM rules. In simulation examples, we illustrate that asymptotically minimax robust CUSUM rules can provide better detection delay performance at greatly reduced computation effort compared to competing generalised likelihood ratio procedures.
Resumo:
Weaving sections, a common design of motorways, require extensive lane-change manoeuvres. Numerous studies have found that drivers tend to make their lane changes as soon as they enter the weaving section, as the traffic volume increases. Congestion builds up as a result of this high lane-changing concentration. Importantly, such congestion also limits the use of existing infrastructure, the weaving section downstream. This behaviour thus affects both safety and operational aspects. The potential tool for managing motorways effectively and efficiently is cooperative intelligent transport systems (C-ITS). This research investigates a lane-change distribution advisory application based on C-ITS for weaving vehicles in weaving sections. The objective of this research is to alleviate the lane-changing concentration problem by coordinating weaving vehicles to ensure that such lane-changing activities are evenly distributed over the existing weaving length. This is achieved by sending individual messages to drivers based on their location to advise them when to start their lane change. The research applied a microscopic simulation in AIMSUN to evaluate the proposed strategy’s effectiveness in a one-sided ramp weave. The proposed strategy was evaluated using different weaving advisory proportions, traffic demands and penetration rates. The evaluation revealed that the proposed lane-changing advisory has the potential to significantly improve delay.
Resumo:
Safety at railway level crossings (RLX) is one part of a wider picture of safety within the whole transport system. Governments, the rail industry and road organisations have used a variety of countermeasures for many years to improve RLX safety. New types of interventions are required in order to reduce the number of crashes and associated social costs at railway crossings. This paper presents the results of a large research program which aimed to assess the effectiveness of emerging Intelligent Transport Systems (ITS) interventions, both on-road and in-vehicle based, to improve the safety of car drivers at RLXs in Australia. The three most promising technologies selected from the literature review and focus groups were tested in an advanced driving simulator to provide a detailed assessment of their effects on driver behaviour. The three interventions were: (i) in-vehicle visual warning using a GPS/smartphone navigation-like system, (ii) in-vehicle audio warning and; (iii) on-road intervention known as valet system (warning lights on the road surface activated as a train approaches). The effects of these technologies on 57 participants were assessed in a systematic approach focusing on the safety of the intervention, effects on the road traffic around the crossings and driver’s acceptance of the technology. Given that the ITS interventions were likely to provide a benefit by improving the driver’s awareness of the crossing status in low visibility conditions, such conditions were investigated through curves in the track before arriving at the crossing. ITS interventions were also expected to improve driver behaviour at crossings with high traffic (blocking back issue), which were also investigated at active crossings. The key findings are: (i) interventions at passive crossings are likely to provide safety benefits; (ii) the benefits of ITS interventions on driver behaviour at active crossings are limited; (iii) the trialled ITS interventions did not show any issues in terms of driver distraction, driver acceptance or traffic delays; (iv) these interventions are easy to use, do not increase driver workload substantially; (v) participants’ intention to use the technology is high and; (vi) participants saw most value in succinct messages about approaching trains as opposed to knowing the RLX locations or the imminence of a collision with a train.
Resumo:
Child sexual abuse is a serious problem that has received increased attention in recent years. From an ecological perspective, in which social problems are viewed in the context of characteristics of individuals, families, and broader societal systems (Prilleltensky, Peirson, & Nelson, 2001), preventing child sexual abuse involves strengthening capacity to intervene at individual, family/relationship, school, and community levels. School-based education programs have been developed in efforts to prevent child sexual abuse before it happens and to provide children who may already be experiencing it with help seeking information. Use of these programs must be based on evidence rather than ideology. Evaluations of these programs have demonstrated that sexual abuse prevention education can provide children with improved knowledge and skills for responding to and reporting potential sexual abuse. However, this learning does not seem to be maintained over time which means further attention should be given to repeated learning, opportunities for concept reinforcement and integration with other topics. School-based programs typically present information to children by presenting a series of core concepts and messages which are delivered using engaging pedagogical strategies such as multi-media technologies, animations, theatre and songs, puppets, picture books, and games. This chapter will outline the key characteristics of effective child sexual abuse prevention programs, and will provide directions for future research and practice.
Resumo:
Adolescent drivers are over-represented in distraction-related motor vehicle crashes. There are a number of potential reasons for such elevated risk with driving inexperience, high adoption of communication technology, increased peer involvement and tendency to take risks, rendering young drivers particularly vulnerable. Major legislative efforts in Graduated Licensing Systems that include passenger restrictions have shown positive effects. Restrictions on cell phone use are also being introduced however enforcement of such regulations is challenging. This paper argues that such contextual, legislative interventions are an essential prevention strategy however there is an unfilled need to introduce behavior change programs that may target adolescents, parents and friends. A theoretical framework is applied in which risk and protective factors are identified from research within community and jurisdiction contexts. In the literature on distraction social context and normative influences are the key elements used to inform program design for adolescent drivers with parental monitoring informing interventions targeting parents. Following from this assessment of the message content assessment, the design of strategies to deliver the messages are reviewed. In the current literature, school-based programs, simulations and web-delivered programs have been evaluated with supplementary strategies delivered by physicians and parents. Such developments are still at an early stage of development and ultimately will need controlled implementation and evaluation studies. There is of course, no likely single approach to prevent adolescent driver distraction and complementary approaches such as the further development of technological interventions to manage phone use are needed. Implications and Contributions The paper describes the intervention design process alongside key research in young driver distraction including selecting target behavior, audience, theoretically-derived strategies and delivery strategies. Currently graduated driver licensing and technology use and acceptance and parent-adolescent and adolescent-peer interactions are opportunities for further research and exploration.
Resumo:
Introduction- This study investigates the prevailing status of Nepalese media portrayal of natural disasters. It is contributing to the development of a disaster management model to improve the effectiveness and efficiency of news production throughout the continuum of prevention, preparedness, response and recovery (PPRR) phases of disaster management. Theoretical framework- Studies of media content often rely on framing as the theoretical underpinning of the study, as it describes how the press crafts the message. However there are additional theoretical perspectives that underline an understanding of the role of the media. This article outlines a conceptual understanding of the role of the media in modern society, the way that this conceptual understanding is used in the crafting of media messages and how those theoretical considerations are applied to the concepts that underpin effective disaster management. (R.M. Entman, 2003; Liu, 2007; Meng & Berger, 2008). Methodology- A qualitative descriptive design is used to analyse the disaster news of Nepal Television (NTV). However, this paper presents the preliminary findings of Nepal Television (a government owned Television station) using qualitative content analysis of 105 natural disaster related news scripts (June 2012-March 2013) based on the framing theory and PPRR cycle. Results- The preliminary results indicate that the media focus while framing natural disasters is dominated by human interest frame followed by responsibility frame. News about response phase was found to be most prominent in terms of PPRR cycle. Limited disaster reporting by NTV has impacted the national disaster management programs and strategies. The findings describe natural disasters are being reported within the limited understanding of the important principles of disaster management and PPRR cycle. Conclusion- This paper describes the current status of the coverage of natural disasters by Nepal Television to identify the frames used in the news content. It contributes to determining the characteristics of effective media reporting of natural disasters in the government owned media outlets, and also leads to including communities and agencies involved in disasters. It suggests the frames which are best suited for news making and how media responds to the different phases of the disaster cycle.
Resumo:
‘The Knowledge’ was part of the Next Wave/Asialink project 'Invisible Structures: Australian artist collectives in Tokyo, Singapore and Yogyakarta' in January 2011. For this project, Brisbane ARI Boxcopy undertook a two-week residency at Post Musuem in Singapore. In this project, the Boxcopy artists Channon Goodwin, Joseph Breikers, Timothy P Kerr, Daniel McKewen, Raymonde Rajkowski, Tim Woodward, attempted to acquire an intimate knowledge of the city of Singapore by forming a free delivery company, The Boxcopy Publics Carriage Office of Singapore (BPCOS), which provided services around the city by foot, bike and public transport. In addition to committing to memory and documenting the streets and sites of Singapore, the BPCOS team also performed tasks such as delivering goods or messages, travel a particular route or visit a site, as requested by the people of Singapore. The project comprised this process of public interaction as well as an exhibition and website.
Resumo:
"Information Thru Play: In 2010, responding to the success of The Threshold, Juxt Interactive again asked No Mimes Media, to partner in creating a transmedia experience to entertain and inform Cisco's Global Sales Force. The Hunt put employees at the center of a thriller where characters sent and responded to their emails, left phone messages, communicated through Facebook and Twitter, even asked them to retrieve items from a dead drop and to send them photographs and information. And while helping fictional characters Isabel and Keith escape an ancient secret organization, the sales force also learned about new Cisco technologies coming to market. Cisco had new demands for the 2010 experience. A geographically and culturally dispersed sales force raises challenges when it comes to introducing dozens of new products and technologies each year. Cisco wanted The Hunt to have global reach, to educate, to build collaboration, and to be fun. This demanded new ways of storytelling and new ways of thinking. The Hunt was quick and intense, unfolding in real time in just two weeks. Many experienced players were poised to participate and expectations were high. Many of the mechanics of the previous year's experience were repeated, and the audience ripped through the opening, discovering video clips and websites in minutes. The surprise was discovering Facebook and Twitter accounts, where characters responded to player postings and comments in real time. The Hunt involved audience members from countries around the world, including China, India, Netherlands, Germany, Norway, Pakistan, Japan, the United Kingdom, and the United States. It highlighted new Cisco technologies like Pulse and Mediator, painlessly engaging the audience in what those technologies do and how they work. Players collaborated across silos, creating networks of cross-disciplinary experts. The Hunt pushed the boundaries of storytelling, with events unfolding on Twitter and Facebook, and in the real world where the audience had to use social engineering to find and secure a package with vital information. With thousands of players highly engaged around the world, The Hunt once again proved that transmedia experiences can effectively be used to not only meet the goals of a brand, but entertain their audience as well."
Resumo:
Governments, authorities, and organisations dedicate significant resources to encourage communities to prepare for and respond to natural hazards such as cyclones, earthquakes, floods, and bushfires. However, recent events, media attention, and ongoing academic research continue to highlight cases of non-compliance including swift water rescues. Individuals who fail to comply with instructions issued during natural hazards significantly impede the emergency response because they divert resources to compliance-enforcement and risk the lives of emergency service workers who may be required to assist them. An initial investigation of the field suggests several assumptions or practices that influence emergency management policy, communication strategy, and community behaviours during natural hazards: 1) that community members will comply with instructions issued by governments and agencies that represent the most authoritative voice, 2) that communication campaigns are shaped by intuition rather than evidence-based approaches (Wood et al., 2012), and 3) that emergency communication is linear and directional. This extended abstract represents the first stage of a collaborative research project that integrates industry and cross-disciplinary perspectives to provide evidence-based approaches for emergency and risk communication during the response and recovery phases of a natural hazard. Specifically, this abstract focuses on the approach taken and key elements that will form the development of a typology of compliance-gaining messages during the response phase of natural hazards, which will be the focus of the conference presentation.
Resumo:
Text is the main method of communicating information in the digital age. Messages, blogs, news articles, reviews, and opinionated information abounds on the Internet. People commonly purchase products online and post their opinions about purchased items. This feedback is displayed publicly to assist others with their purchasing decisions, creating the need for a mechanism with which to extract and summarize useful information for enhancing the decision-making process. Our contribution is to improve the accuracy of extraction by combining different techniques from three major areas, named Data Mining, Natural Language Processing techniques and Ontologies. The proposed framework sequentially mines product’s aspects and users’ opinions, groups representative aspects by similarity, and generates an output summary. This paper focuses on the task of extracting product aspects and users’ opinions by extracting all possible aspects and opinions from reviews using natural language, ontology, and frequent “tag” sets. The proposed framework, when compared with an existing baseline model, yielded promising results.
Resumo:
IUCN´s core work involves generating knowledge and tools to influence policy and practice for nature conservation. Whilst it appears that we are collectively making progress in some areas, we acknowledge the need to improve our communication processes and practices to ´move to action´ in this regard. We need to extend the influence of the science and the knowledge beyond the documents to achieve effective impact and action. The training course will focus on the process of getting the conservation messages out to a wider audience. This interactive and participatory training course will develop the skills and knowledge needed to communicate effective conservation messages for a range of IUCN internal and external audiences. The course will cover: • what is communication for conservation? • the communication planning process (developing your communication objectives) • identifying and understanding your target audiences • developing your conservation message • choosing your communication media and • evaluating the effectiveness of your communication strategies. A unique feature of the training course will be the use of Web 2.0 tools in innovative conservation communications e.g. use of social media in concept branding and social marketing. In the spirit of the Forum´s objective of ´Sharing know how´, each participant will bring a current conservation issue to the training course and will leave with their own communication plan. Potentially, the training course adopts a cross-thematic approach as the issues addressed could be drawn from any of the IUCN´s program themes. Primarily though, the training course´s best fit is with the ´Valuing and Conserving Biodiversity´ theme since it will provide concrete and pragmatic solutions to enhancing the implementation of conservation measures through participatory planning and capacity building.
Resumo:
We examine enterprise social network usage data obtained from a community of store managers in a leading Australian retail organization, over a period of fifteen months. Our interest in examining this data is in spatial preferences by the network users, that is, to ascertain who is communicating with whom and where. We offer several contrasting theoretical perspectives for spatial preference patterns and examine these against data collected from over 12,000 messages exchanged between 530 managers in 897 stores. Our findings show that interactions can generally be characterized by individual preferences for local communication but also that two different user communities exist – locals and globals. We develop empirical profiles for these social network user communities and outline implications for theories on spatial influences on communication behaviours on enterprise social networks.