933 resultados para Alarm messages
Resumo:
This paper presents a low-bandwidth multi-robot communication system designed to serve as a backup communication channel in the event a robot suffers a network device fault. While much research has been performed in the area of distributing network communication across multiple robots within a system, individual robots are still susceptible to hardware failure. In the past, such robots would simply be removed from service, and their tasks re-allocated to other members. However, there are times when a faulty robot might be crucial to a mission, or be able to contribute in a less communication intensive area. By allowing robots to encode and decode messages into unique sequences of DTMF symbols, called words, our system is able to facilitate continued low-bandwidth communication between robots without access to network communication. Our results have shown that the system is capable of permitting robots to negotiate task initiation and termination, and is flexible enough to permit a pair of robots to perform a simple turn taking task.
Resumo:
Introduction Australia is contributing to the global problem of antimicrobial resistance with one of the highest rates of antibiotic use amongst OECD countries. Data from the Australian primary healthcare sector suggests unnecessary antibiotics were prescribed for conditions that will resolve without it. If left unchecked, this will result in more resistant micro-organisms, against which antibiotics will be useless. There is a lack of understanding about what is influencing decisions to use antibiotics – what factors influences general practitioners (GPs) to prescribe antibiotics, consumers to seek antibiotics, and pharmacists to fill old antibiotic prescriptions? It is also not clear how these individuals trade-off between the possible benefits that antibiotics may provide in the immediate/short term, against the longer term societal risk of antimicrobial resistance. Method This project will investigate (a) what factors drive decisions to use antibiotics for GPs, pharmacists and consumers, and (b) how these individuals discount the future. Factors will be gleaned from published literature and from a qualitative phase using semi-structured interviews, to inform the development of Discrete Choice Experiments (DCEs). Three DCEs will be constructed – one for each group of interest – to allow investigation of which factors are more important in influencing (a) GPs to prescribe antibiotics, (b) consumers to seek antibiotics, and (c) pharmacists to fill legally valid but old or repeat prescriptions of antibiotics. Regression analysis will be conducted to understand the relative importance of these factors. A Time Trade Off exercise will be developed to investigate how these individuals discount the future, and whether GPs and pharmacists display the same extent of discounting the future, as consumers. Expected Results Findings from the DCEs will provide an insight into which factors are more important in driving decision making in antibiotic use for GPs, pharmacists and consumers. Findings from the Time Trade Off exercise will show what individuals are willing to trade for preserving the miracle of antibiotics. Conclusion The emergence of antibiotic resistance is inevitable. This research will expand on what is currently known about influencing desired behaviour change in antibiotic use, in the fight against antibiotic resistance. Real World Implications Research findings will contribute to existing national programs to bring about a reduction in inappropriate use of antibiotic in Australia. Specifically, influencing (1) how key messages and public health campaigns are crafted to increase health literacy, and (2) clinical education and empowerment of GPs and pharmacists to play a more responsive role as stewards of antibiotic use in the community.
Resumo:
Understandings of male sex workers (MSWs) shift with technological, conceptual, and social changes. Research has historically constructed MSWs as psychologically unstable, desperate, or destitute victims and their clients as socially deviant perverts. These perceptions, however, are no longer supported by contemporary research and changing societal perceptions of the sex industry, challenging how we understand and describe “escorts.” The changing understandings of sexuality and the increasing power of the Internet are both important forces behind recent changes in the structure and organization of MSWs. The growth in the visibility and reach of escorts has created opportunities to form an occupational account of MSWs that better accounts for the dynamic and diverse nature of the MSW experience in the early 21st century. Recent changes in the structure and organization of male sex work have provided visibility to the increasingly diverse geographical distribution of MSW, the commodification of race and racialized desire, new populations of heterosexual men and women as clients, and the successful dissemination of safer sexual messages to MSWs through online channels. This article provides a broad overview of the literature on MSWs, concentrating its focus on studies that have emerged over the past 20 years and identifying areas for future research.
Resumo:
Information in the popular media tends to be biased toward promoting the benefits of medicalized birth for low-risk pregnancies. We aimed to assess the effect of communicating the benefits of non-medicalized birth in magazine articles on women’s birth intentions and to identify the mechanisms by which social communication messages affected women’s intentions for birth. A convenience sample of 180 nulliparous Australian women aged 18–35 years were randomly exposed to a magazine article endorsing non-medicalized birth (using either celebrity or non-celebrity endorsement) or organic eating (control) throughout June–July 2011. Magazine articles that endorsed non-medicalized birth targeted perceived risk of birth, expectations for labor and birth, and attitudes toward birth. These variables and intention for birth were assessed by self-report before and after exposure. Exposure to a magazine article that endorsed non-medicalized birth significantly reduced women’s intentions for a medicalized birth, regardless of whether the endorsement was by celebrities or non-celebrities. Changes in perceived risk of birth mediated the effect of magazine article exposure on women’s intentions for a medicalized birth. Persuasive communication that endorses non-medicalized birth could be delivered at the population level and may reduce women’s intentions for a medicalized birth.
Resumo:
Despite ongoing improvements in behaviour change strategies, licensing models and road law enforcement measures young drivers remain significantly over-represented in fatal and non-fatal road related crashes. This paper focuses on the safety of those approaching driving age and identifies both high priority road safety messages and relevant peer-led strategies to guide the development school programs. It summarises the review in a program logic model built around the messages and identified curriculum elements, as they may be best operationalised within the licensing and school contexts in Victoria. This paper summarises a review of common deliberate risk-taking and non-deliberate unsafe driving behaviours among novice drivers, highlighting risks associated with speeding, driving while fatigued, driving while impaired and carrying passengers. Common beliefs of young people that predict risky driving were reviewed, particularly with consideration of those beliefs that can be operationalised in a behaviour change school program. Key components of adolescent risk behaviour change programs were also reviewed, which identified a number of strategies for incorporation in a school based behaviour change program, including: a well-structured theoretical design and delivery, thoughtfully considered peer-selected processes, adequate training and supervision of peer facilitators, a process for monitoring and sustainability, and interactive delivery and participant discussions. The research base is then summarised in a program logic model with further discussion about the quality of the current state of knowledge of evaluation of behaviour change programs and the need for considerable development in program evaluation.
Resumo:
Objective. To test the impact of a theory-based, SMS (text message)-delivered behavioural intervention (Healthy Text) targeting sun protection or skin self-examination behaviours compared to attention-control. Method. Overall, 546 participants aged 18–42 years were randomised using a computer-generated number list to the skin self-examination (N = 176), sun protection (N = 187), or attention-control (N = 183) text messages group. Each group received 21 text messages about their assigned topic over 12 months (12 weekly messages for three months, then monthly messages for the next nine months). Data was collected via telephone survey at baseline, three-, and 12-months across Queensland from January 2012 to August 2013. Results. One year after baseline, the sun protection (mean change 0.12; P = 0.030) and skin self-examination groups (mean change 0.12; P = 0.035) had significantly greater improvement in their sun protection habits (SPH) index compared to the attention-control group (reference mean change 0.02). The increase in the proportion of participants who reported any skin self-examination from baseline to 12 months was significantly greater in the skin self-examination intervention group (103/163; 63%; P < 0.001) than the sun protection (83/173; 48%), or attention-control (65/165; 36%) groups. There was no significant effect of the intervention for participants who self-reported whole-body skin self-examination, sun tanning behaviour, or sunburn behaviours. Conclusion. The Healthy Text intervention was effective in inducing significant improvements in sun protection and any type of skin self-examination behaviours.
Resumo:
This paper discusses the following key messages. Taxonomy is (and taxonomists are) more important than ever in times of global change. Taxonomic endeavour is not occurring fast enough: in 250 years since the creation of the Linnean Systema Naturae, only about 20% of Earth's species have been named. We need fundamental changes to the taxonomic process and paradigm to increase taxonomic productivity by orders of magnitude. Currently, taxonomic productivity is limited principally by the rate at which we capture and manage morphological information to enable species discovery. Many recent (and welcomed) initiatives in managing and delivering biodiversity information and accelerating the taxonomic process do not address this bottleneck. Development of computational image analysis and feature extraction methods is a crucial missing capacity needed to enable taxonomists to overcome the taxonomic impediment in a meaningful time frame. Copyright © 2009 Magnolia Press.
Resumo:
This research aims to understand what factors influence consumers' behaviour to subculture marketing and how companies can strategically overcome potential brand alienation. Findings validate cryptic marketing as a strategy for organizations to communicate effectively with their chosen market through the use of cryptic cues, symbols and messages while circumventing negative responses from non-target audiences. The thesis contributes to extending current understanding of marketing communication through the use of covert strategies, employing covert tactics on the non-target, wider market instead of the target, subculture market.
Resumo:
Objectives To address the scarcity of comprehensive, theory-based research in the Australian context, this study, using a theory of planned behaviour (TPB) framework, investigated the role of personal and social norms to identify the key predictors of adult Australians' sun-safe intentions and behaviour. Design The study used a prospective design with two waves of data collection, 1 week apart. Methods Participants were 816 adults (48.2% men) aged between 18 and 88 years recruited from urban, regional, and rural areas of Australia. At baseline, participants completed a questionnaire assessing the standard TPB predictors (attitude, subjective norm, and perceived behavioural control [PBC]), past behaviour, behavioural intention, and additional measures of group norm for the referent groups of friends and family, image norm, personal norm, personal choice/responsibility, and Australian identity. Seventy-one per cent of the participants (n = 577) reported on their sun-safe behaviour in the subsequent week. Results Via path modelling, past behaviour, attitude, group norm (friends), personal norm, and personal choice/responsibility emerged as independent predictors of intentions which, in turn, predicted sun-safe behaviour prospectively. Past behaviour, but not PBC, had direct effects on sun-safe behaviour. The model explained 61.6% and 43.9% of the variance in intention and behaviour, respectively. Conclusions This study provides support for the use of a comprehensive theoretical decision-making model to explain Australian adults' sun-safe intentions and behaviours and identifies viable targets for health-promoting messages in this high-risk context.
Resumo:
Evidence is needed for the acceptability and user preferences of receiving skin cancer-related text messages. We prepared 27 questions to evaluate attitudes, satisfaction with program characteristics such as timing and spacing, and overall satisfaction with the Healthy Text program in young adults. Within this randomised controlled trial (age 18-42 years), 546 participants were assigned to one of three Healthy Text message groups; sun protection, skin self-examination, or attention-control. Over a 12-month period, 21 behaviour-specific text messages were sent to each group. Participants’ preferences were compared between the two interventions and control group at the 12-month follow-up telephone interview. In all three groups, participants reported the messages were easy to understand (98%), provided good suggestions or ideas (88%), and were encouraging (86%) and informative (85%) with little difference between the groups. The timing of the texts was received positively (92%); however, some suggestions for frequency or time of day the messages were received from 8% of participants. Participants in the two intervention groups found their messages more informative, and triggering behaviour change compared to control. Text messages about skin cancer prevention and early detection are novel and acceptable to induce behaviour change in young adults.
Resumo:
Social marketing by Western governments that use fear tactics and threatening information to promote anti-drinking messages has polarized ‘binge drinking’ and ‘moderate drinking’ through a continuum that implies benefits and harms for both individuals and society. With the goal of extending insights into social marketing approaches that promote safer drinking cultures in Australia, we discuss findings from a study that examines alcohol consumers' moderate-drinking intentions. By applying the theory of planned behaviour and emotions theory, we discuss survey results from a sample of alcohol consumers, which demonstrate that positively framed value propositions that evoke happiness and love are more influential in the processing of an alcohol moderation message for alcohol consumers. The key limitations of this study are the cross-sectional nature of the data and the focal-dependent variable being behavioural intentions rather than behaviours. Research insight into the stronger influence of positive emotions on processing an alcohol moderation message establishes an important avenue for future social marketing communications that moves beyond negative, avoidance appeals to promote behaviour change in drinkers. These research findings will benefit professionals involved in developing social change campaigns that promote and reinforce consumers' positive intentions, with messages about the benefits of controlled, moderate drinking.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
Efficient error-Propagating Block Chaining (EPBC) is a block cipher mode intended to simultaneously provide both confidentiality and integrity protection for messages. Mitchell’s analysis pointed out a weakness in the EPBC integrity mechanism that can be used in a forgery attack. This paper identifies and corrects a flaw in Mitchell’s analysis of EPBC, and presents other attacks on the EPBC integrity mechanism.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.