975 resultados para Promotional messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an Image Based Visual Servo control design for Fixed Wing Unmanned Aerial Vehicles tracking locally linear infrastructure in the presence of wind using a body fixed imaging sensor. Visual servoing offers improved data collection by posing the tracking task as one of controlling a feature as viewed by the inspection sensor, although is complicated by the introduction of wind as aircraft heading and course angle no longer align. In this work it is shown that the effects of wind alter the desired line angle required for continuous tracking to equal the wind correction angle as would be calculated to set a desired course. A control solution is then sort by linearizing the interaction matrix about the new feature pose such that kinematics of the feature can be augmented with the lateral dynamics of the aircraft, from which a state feedback control design is developed. Simulation results are presented comparing no compensation, integral control and the proposed controller using the wind correction angle, followed by an assessment of response to atmospheric disturbances in the form of turbulence and wind gusts

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports the results of a mixed method approach to answer: what are the cultural values that impact on e-service use in Saudi Arabia? Cultural theories, dimensions, and models previously identified in the literature, in addition to individual interviews and focus groups, test the current identified uncovered elements of Saudi culture. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used and present the questionnaire findings. All of the tested hypotheses were found consistent with their predicted outcomes except hypotheses 4 and 8 were partially consistent. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of social and organisational aspects of e-society research and practices, by deeply understanding them as of the influntials to e-service implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the problem of automatically estimating the relative pose between a push-broom LIDAR and a camera without the need for artificial calibration targets or other human intervention. Further we do not require the sensors to have an overlapping field of view, it is enough that they observe the same scene but at different times from a moving platform. Matching between sensor modalities is achieved without feature extraction. We present results from field trials which suggest that this new approach achieves an extrinsic calibration accuracy of millimeters in translation and deci-degrees in rotation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This text explores the area of advertising and promotion practice. It shows how real organisations coordinate the various elements of the promotional mix with other marketing activities."--Provided by publisher

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an alternative approach to image segmentation by using the spatial distribution of edge pixels as opposed to pixel intensities. The segmentation is achieved by a multi-layered approach and is intended to find suitable landing areas for an aircraft emergency landing. We combine standard techniques (edge detectors) with novel developed algorithms (line expansion and geometry test) to design an original segmentation algorithm. Our approach removes the dependency on environmental factors that traditionally influence lighting conditions, which in turn have negative impact on pixel-based segmentation techniques. We present test outcomes on realistic visual data collected from an aircraft, reporting on preliminary feedback about the performance of the detection. We demonstrate consistent performances over 97% detection rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a recursive strategy for online detection of actuator faults on a unmanned aerial system (UAS) subjected to accidental actuator faults. The proposed detection algorithm aims to provide a UAS with the capability of identifying and determining characteristics of actuator faults, offering necessary flight information for the design of fault-tolerant mechanism to compensate for the resultant side-effect when faults occur. The proposed fault detection strategy consists of a bank of unscented Kalman filters (UKFs) with each one detecting a specific type of actuator faults and estimating correspond- ing velocity and attitude information. Performance of the proposed method is evaluated using a typical nonlinear UAS model and it is demonstrated in simulations that our method is able to detect representative faults with a sufficient accuracy and acceptable time delay, and can be applied to the design of fault-tolerant flight control systems of UASs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research reported here addresses the problem of athlete off-field behaviours as they influence sports’ sponsors, particularly the achievement of sponsorship objectives. The question arises because of incidents of sponsorship contract cancellation following news-media reporting of athletes’ off-field behaviours. Two studies are used to investigate the research question; the first establishes the content of news-media reports, and the second tests the effects of news’ reports on athlete, team and sponsor evaluations using an experimental design. Key assumptions of the research are that sponsorship objectives are principally consumer-based and mediated. Models of sponsorship argue that sponsors aim to reach and influence consumers through sponsees. Assuming this pathway exists is central to sponsorship activities. A corollary is that other mediators, in this case the news-media, may also communicate (uncontrollable) messages such that a consumer audience may be told of negative news that may then be associated with the sponsor. When sponsors cancel contracts it is assumed that their goal is to control the links between their brand and a negative referent. Balance theory is used to discuss the potential effects of negative off-field behaviours of athletes on sponsor’s objectives. Heider’s balance theory (1958) explains that individuals prefer to evaluate linked individuals or entities consistently. In the sponsorship context this presents the possibility that a negative evaluation of the athlete’s behaviour will contribute to correspondingly negative evaluations of the athlete’s team and sponsors. A content analysis (Study 1) was used to survey the types of athlete off-field behaviours commonly reported in a newspaper. In order to provide a local context for the research, articles from the Courier Mail were sampled and teams in the National Rugby League (NRL) competition were the focus of the research. The study identified nearly 2000 articles referring to the NRL competition; 258 of those refer to off-field incidents involving athletes. The various types of behaviours reported include assault, sexual assault allegations, driving under the influence of alcohol, illicit drug use, breaches of club rules, and positive off-field activities (i.e., charitable activities). An experiment (Study 2) tested three news’ article stimuli developed from the behaviours identified in Study 1 in a between-subjects design. A measure of Identification with the Team was used as a covariate variable in the Multivariate Analysis of Covariance analysis. Social identity theory suggests that when an individual identifies with a group, their attitudes and behaviours towards both in- and out-group members are modified. Use of Identification with the Team as a covariate acknowledges that respondents will evaluate behaviours differently according to the attribution of those behaviours to an in- or out-group member. Findings of the research suggest that the news’ article stimuli have significant, large effects on evaluations of athlete off-field behaviour and athlete Likability. Consistent with pretest results, charitable fundraising is regarded as extremely positive; the athlete, correspondingly, is likable. Assault is evaluated as extremely negative, and the athlete as unlikable. DUI scores reveal that the athlete’s behaviour is very negative; however, the athlete’s likability was evaluated as neutral. Treatment group does not produce any significant effects on team or sponsor variables. This research also finds that Identification with the Team has significant, large effects on team variables (Attitude toward the Brand and Corporate Image). Identification also has a significant large effect on athlete Likability, but not on Attitude toward the Act. Identification with the Team does not produce any significant effects on sponsor variables. The results of this research suggest that sponsor’s consumer-based objectives are not threatened by newspaper reports linking athlete off-field behaviour with their brand. Evaluations of sponsor variables (Attitude toward the Sponsor’s Brand and Corporate Image) were consistently positive. Variance in that data, however, cannot be attributed to experimental stimuli or Identification with the Team. These results argue that respondents may regard sponsorships, in principle, as good. Although it is good news for sponsors that negative evaluations of athletes will not produce correspondingly negative evaluations of consumer-based sponsorship objectives, the results indicate problems for sponsorship managers. The failure of Identification with the Team to explain sponsor variable variance indicates that the sponsor has not been evaluated as a linked entity in a relationship with the sporting team and athlete in this research. This result argues that the sponsee-mediated affective communication path that sponsors aim use to communicate with desirable publics is not necessarily a path available to them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nonthermal plasma (NTP) treatment of exhaust gas is a promising technology for both nitrogen oxides (NOX) and particulate matter (PM) reduction by introducing plasma into the exhaust gases. This paper considers the effect of NTP on PM mass reduction, PM size distribution, and PM removal efficiency. The experiments are performed on real exhaust gases from a diesel engine. The NTP is generated by applying high-voltage pulses using a pulsed power supply across a dielectric barrier discharge (DBD) reactor. The effects of the applied high-voltage pulses up to 19.44 kVpp with repetition rate of 10 kHz are investigated. In this paper, it is shown that the PM removal and PM size distribution need to be considered both together, as it is possible to achieve high PM removal efficiency with undesirable increase in the number of small particles. Regarding these two important factors, in this paper, 17 kVpp voltage level is determined to be an optimum point for the given configuration. Moreover, particles deposition on the surface of the DBD reactor is found to be a significant phenomenon, which should be considered in all plasma PM removal tests.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several randomized trials have found behavior change programs delivered via text messaging to be efficacious to improve preventive health behaviors such as physical activity and stopping smoking; however few have assessed its value in skin cancer prevention or early detection. The HealthyTexts study enrolled 678 participants 18–42 years, and assigned them to receive 21 text messages about skin cancer prevention, skin self-examination or physical activity(attention control) over the course of one year. Baseline data have been collected and outcomes will be assessed at three months and twelve months post intervention. The trial aims to increase the mean overall sun protection habits index score from 2.3 to 2.7 with a standard deviation of 0.5 (effect size of 0.5) and the proportion of people who conduct a whole-body skin self-examination by an absolute 10%. This paper describes the study design and participants' baseline characteristics. In addition, participants' goals for their health, and strategies they apply to achieve those goals are summarized.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of intelligent transport systems is proliferating across the Australian road network, particularly on major freeways. New technology allows a greater range of signs and messages to be displayed to drivers. While there has been a long history of human factors analyses of signage, no evaluation has been conducted on this novel, sometimes dynamic, signage or potential interactions when co-located. The purpose of this driving simulator study was to investigate drivers’ behavioural changes and comprehension resulting from the co-location of Lane Use Management Systems with static signs and (Enhanced) Variable Message Signs on Queensland motorways. A section of motorway was simulated, and nine scenarios were developed which presented a combination of signage cases across levels of driving task complexity. Two higher-risk road user groups were targeted for this research on an advanced driving simulator: older (65+ years, N=21) and younger (18-22 years, N=20) drivers. Changes in sign co-location and task complexity had small effect on driver comprehension of the signs and vehicle dynamics variables, including difference with the posted speed limit, headway, standard deviation of lane keeping and brake jerks. However, increasing the amount of information provided to drivers at a given location (by co-locating several signs) increased participants’ gaze duration on the signs. With co-location of signs and without added task complexity, a single gaze was over 2s for more than half of the population tested for both groups, and up to 6 seconds for some individuals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to investigate information communications technologies (ICT)-mediated inclusion and exclusion in terms of sexuality through a study of a commercial social networking web site for gay men. Design/methodology/approach – The paper uses an approach based on technological inscription and the commodification of difference to study Gaydar, a commercial social networking site. Findings – Through the activities, events and interactions offered by Gaydar, the study identifies a series of contrasting identity constructions and market segmentations that are constructed through the cyclic commodification of difference. These are fuelled by a particular series of meanings attached to gay male sexualities which serve to keep gay men positioned as a niche market. Research limitations/implications – The research centres on the study of one, albeit widely used, web site with a very specific set of purposes. The study offers a model for future research on sexuality and ICTs. Originality/value – This study places sexuality centre stage in an ICT-mediated environment and provides insights into the contemporary phenomenon of social networking. As a sexualised object, Gaydar presents a semiosis of politicised messages that question heteronormativity while simultaneously contributing to the definition of an increasingly globalised, commercialised and monolithic form of gay male sexuality defined against ICT

Relevância:

10.00% 10.00%

Publicador:

Resumo:

User interfaces for source code editing are a crucial component in any software development environment, and in many editors visual annotations (overlaid on the textual source code) are used to provide important contextual information to the programmer. This paper focuses on the real-time programming activity of ‘cyberphysical’ programming, and considers the type of visual annotations which may be helpful in this programming context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mechanisms of intervention and the contexts they are used in interact in complex ways. This helps explain why we can’t overgeneralize about what works in respect of models of service designed to prevent or respond to homelessness. This said there are some key messages from the totality of evidence that has been accumulated to date. First homelessness would be a lot easier to prevent for first or subsequent episodes if adequate and appropriate (developmentally/ culturally) housing was available. Second (and often dependent on the first) timely support of a particular character ‘works’ both in a preventive sense and in periods when people experience ongoing challenges which may render them vulnerable to further homelessness. This paper reflects on some of the critical features of how we can generate and use evidence, and how these complement each other in important ways.