975 resultados para Promotional messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Art activism uses visual and performance art to promote social and environmental agendas. In this paper, I explore attempts to raise awareness of sanitation issues at the global, local and personal level using scatological art. I focus on the successes of the open-air public art exhibition set up in the Brisbane (Queensland, Australia) central business district to celebrate World Toilet Day in 2008. The art in this exhibition featured included one hundred toilets decorated to raise awareness of global sanitation issues and the distribution of promotional materials featuring scatological images including postcards and stickers. Given the subject matter and intent, the toilet art and promotional materials presented at the One Hundred Toilet exhibition can be seen as an example of scatological art employed for the purposes of social and environmental activism. Through the One Hundred Toilet exhibition, I consider the political aims and activist potential of using scatological art to progress social and environmental agendas and consider how this kind of ‘shit on show’ approach can contribute to the construction of the shitting citizen; one who is simultaneously responsible for and responsive to managing the waste that they produce and recognising and responding to broader sanitation issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bioacoustic data can provide an important base for environmental monitoring. To explore a large amount of field recordings collected, an automated similarity search algorithm is presented in this paper. A region of an audio defined by frequency and time bounds is provided by a user; the content of the region is used to construct a query. In the retrieving process, our algorithm will automatically scan through recordings to search for similar regions. In detail, we present a feature extraction approach based on the visual content of vocalisations – in this case ridges, and develop a generic regional representation of vocalisations for indexing. Our feature extraction method works best for bird vocalisations showing ridge characteristics. The regional representation method allows the content of an arbitrary region of a continuous recording to be described in a compressed format.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Women with young children (under 5 years) are a key population group for physical activity intervention. Previous evidence highlights the need for individually tailored programs with flexible delivery mechanisms for this group. Our previous pilot study suggested that an intervention primarily delivered via mobile phone text messaging (MobileMums) increased self-reported physical activity in women with young children. An improved version of the MobileMums program is being compared with a minimal contact control group in a large randomised controlled trial (RCT). Methods/design: This RCT will evaluate the efficacy, feasibility and acceptability, cost-effectiveness, mediators and moderators of the MobileMums program. Primary (moderate-vigorous physical activity) and secondary (intervention implementation data, health service use costs, intervention costs, health benefits, theoretical constructs) outcomes are assessed at baseline, 3-months (end of intervention) and 9-months (following 6-month no contact: maintenance period). The trial is registered with the Australian New Zealand Clinical Trials Registry (ACTRN12611000481976; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=336109).The intervention commences with a face-to-face session with a behavioural counsellor to initiate rapport and gather information for tailoring the 12-week text message program. During the program participants also have access to a: MobileMums Participant Handbook, MobileMums refrigerator magnet, MobileMums Facebook(C) group, and a MobileMums website with a searchable, on-line exercise directory. A nominated support person also receives text messages for 12-weeks encouraging them to offer their MobileMum social support for physical activity. Discussion: Results of this trial will determine the efficacy and cost-effectiveness of the MobileMums program, and the feasibility of delivering it in a community setting. It will inform the broader literature of physical activity interventions for women with young children and determine whether further investment in the translation of the program is warranted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food is a multidimensional construct. It has social, cultural, economic, psychological, emotional, biological, and political dimensions. It is both a material object and a catalyst for a range of social and cultural action. Richly implicated in the social and cultural milieu, food is a central marker of culture and society. Yet little is known about the messages and knowledges in the school curriculum about food. Popular debates around food in schools are largely connected with biomedical issues of obesity, exercise and nutrition. This is a study of the sociological dimensions of food-related messages, practices and knowledge formations in the primary school curriculum. It uses an exploratory, qualitative case study methodology to identify and examine the food activities of a Year 5 class in a Queensland school. Data was gathered over a twoyear period using observation, documentation and interviews methods. Food was found to be an integral part of the primary school's activity. It had economic, symbolic, pedagogic, and instrumental value. Messages about food were found in the official, enacted and hidden curricular which were framed by a food governance framework of legislation, procedures and norms. In the school studied, food knowledge was commodified as a part of a political economy that centred on an 'eat more' message. Certain foods were privileged over others while myths about energy, fruit, fruit juice and sugar shaped student dispositions, values, norms and action. There was little engagement with the cognitive and behavioural dimensions of food and nutrition. The thesis concludes with recommendations for a whole scale reconsideration of food in schools as curricular content and knowledge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a growing awareness worldwide of the significance of social media to communication in times of both natural and human-created disasters and crises. While the media have long been used as a means of broadcasting messages to communities in times of crisis – bushfires, floods, earthquakes etc. – the significance of social media in enabling many-to-many communication through ubiquitous networked computing and mobile media devices is becoming increasingly important in the fields of disaster and emergency management. This paper undertakes an analysis of the uses made of social media during two recent natural disasters: the January 2011 floods in Brisbane and South-East Queensland in Australia, and the February 2011 earthquake in Christchurch, New Zealand. It is part of a wider project being undertaken by a research team based at the Queensland University of Technology in Brisbane, Australia, that is working with the Queensland Department of Community Safety (DCS) and the EIDOS Institute, and funded by the Australian Research Council (ARC) through its Linkages program. The project combines large-scale, quantitative social media tracking and analysis techniques with qualitative cultural analysis of communication efforts by citizens and officials, to enable both emergency management authorities and news media organisations to develop, implement, and evaluate new social media strategies for emergency communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collisions among trains and cars at road/rail level crossings (LXs) can have severe consequences such as high level of fatalities, injuries and significant financial losses. As communication and positioning technologies have significantly advanced, implementing vehicular ad hoc networks (VANETs) in the vicinity of unmanned LXs, generally LXs without barriers, is seen as an efficient and effective approach to mitigate or even eliminate collisions without imposing huge infrastructure costs. VANETs necessitate unique communication strategies, in which routing protocols take a prominent part in their scalability and overall performance, through finding optimised routes quickly and with low bandwidth overheads. This article studies a novel geo-multicast framework that incorporates a set of models for communication, message flow and geo-determination of endangered vehicles with a reliable receiver-based geo-multicast protocol to support cooperative level crossings (CLXs), which provide collision warnings to the endangered motorists facing road/rail LXs without barriers. This framework is designed and studied as part of a $5.5 m Government and industry funded project, entitled 'Intelligent-Transport-Systems to improve safety at road/rail crossings'. Combined simulation and experimental studies of the proposed geo-multicast framework have demonstrated promising outcomes as cooperative awareness messages provide actionable critical information to endangered drivers who are identified by CLXs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research has shown that mobile phone use while driving can increase crash risk fourfold while texting results in 23 times greater crash risk for heavy vehicle drivers. However, mobile phone use has changed in recent years with the functional capabilities of smart phones to now also include a range of other common behaviours while driving such as using Facebook, emailing, the use of ‘apps’, and GPS. Research continues to show performance decrements for many such behaviours while driving, however many Australians still openly admit to illegal mobile phone use while driving despite ongoing enforcement efforts and public awareness campaigns. Of most concern are young drivers. ‘Apps’ available to restrict mobile phone use while in motion do not prevent use while a driver is stopped at traffic lights, so are therefore not a wholly viable solution. Vehicle manufacturers continue to develop in-vehicle technology to minimise distraction, however communication with the ‘outside world’ while driving is also perhaps a strong selling point for vehicles. Hence, the safety message that drivers should focus on the driving task solely and not use communication devices is unlikely to ever be internalised by many drivers. This paper reviews the available literature on the topic and argues that a better understanding of perceptions of mobile phone use while driving and motives for use are required to inform public awareness campaign development for specific road user groups. Additionally, illegal phone use while driving may be reinforced by not being apprehended (punishment avoidance), therefore stronger deterrence-focussed messages may also be beneficial.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The IEC 61850 family of standards for substation communication systems were released in the early 2000s, and include IEC 61850-8-1 and IEC 61850-9-2 that enable Ethernet to be used for process-level connections between transmission substation switchyards and control rooms. This paper presents an investigation of process bus protection performance, as the in-service behavior of multi-function process buses is largely unknown. An experimental approach was adopted that used a Real Time Digital Simulator and 'live' substation automation devices. The effect of sampling synchronization error and network traffic on transformer differential protection performance was assessed and compared to conventional hard-wired connections. Ethernet was used for all sampled value measurements, circuit breaker tripping, transformer tap-changer position reports and Precision Time Protocol synchronization of sampled value merging unit sampling. Test results showed that the protection relay under investigation operated correctly with process bus network traffic approaching 100% capacity. The protection system was not adversely affected by synchronizing errors significantly larger than the standards permit, suggesting these requirements may be overly conservative. This 'closed loop' approach, using substation automation hardware, validated the operation of protection relays under extreme conditions. Digital connections using a single shared Ethernet network outperformed conventional hard-wired solutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Today, the majority of semiconductor fabrication plants (fabs) conduct equipment preventive maintenance based on statistically-derived time- or wafer-count-based intervals. While these practices have had relative success in managing equipment availability and product yield, the cost, both in time and materials, remains high. Condition-based maintenance has been successfully adopted in several industries, where costs associated with equipment downtime range from potential loss of life to unacceptable affects to companies’ bottom lines. In this paper, we present a method for the monitoring of complex systems in the presence of multiple operating regimes. In addition, the new representation of degradation processes will be used to define an optimization procedure that facilitates concurrent maintenance and operational decision-making in a manufacturing system. This decision-making procedure metaheuristically maximizes a customizable cost function that reflects the benefits of production uptime, and the losses incurred due to deficient quality and downtime. The new degradation monitoring method is illustrated through the monitoring of a deposition tool operating over a prolonged period of time in a major fab, while the operational decision-making is demonstrated using simulated operation of a generic cluster tool.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using the belief basis of the theory of planned behavior (TPB), the current study explored the rate of mild reactions reported by donors in relation to their first donation and the intention and beliefs of those donors with regard to returning to donate again. A high proportion of first-time donors indicated that they had experienced a reaction to blood donation. Further, donors who reacted were less likely to intend to return to donate. Regression analyses suggested that targeting different beliefs for those donors who had and had not reacted would yield most benefit in bolstering donors’ intentions to remain donating. The findings provide insight into those messages that could be communicated via the mass media or in targeted communications to retain first-time donors who have experienced a mild vasovagal reaction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the implementation of the Personally Controlled eHealth Records system (PCEHR) in Australia, shared Electronic Health Records (EHR) are now a reality. However, the characteristic implicit in the PCEHR that puts the consumer (i.e. patient) in control of managing his or her health information within the PCEHR prevents healthcare professionals (HCPs) from utilising it as a one-stop-shop for information at point of care decision making as they cannot trust that a complete record of the consumer's health history is available to them through it. As a result, whilst reaching a major milestone in Australia's eHealth journey, the PCEHR does not reap the full benefits that such a shared EHR system can offer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food and non-alcoholic beverage marketing is recognized as an important factor influencing food choices related to non-communicable diseases. The monitoring of populations' exposure to food and non-alcoholic beverage promotions, and the content of these promotions, is necessary to generate evidence to understand the extent of the problem, and to determine appropriate and effective policy responses. A review of studies measuring the nature and extent of exposure to food promotions was conducted to identify approaches to monitoring food promotions via dominant media platforms. A step-wise approach, comprising ‘minimal’, ‘expanded’ and ‘optimal’ monitoring activities, was designed. This approach can be used to assess the frequency and level of exposure of population groups (especially children) to food promotions, the persuasive power of techniques used in promotional communications (power of promotions) and the nutritional composition of promoted food products. Detailed procedures for data sampling, data collection and data analysis for a range of media types are presented, as well as quantifiable measurement indicators for assessing exposure to and power of food and non-alcoholic beverage promotions. The proposed framework supports the development of a consistent system for monitoring food and non-alcoholic beverage promotions for comparison between countries and over time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We finished penning this special issue and sending it to press on martin Luther King Jr. Day. We take pause, honoring Martin Luther King's memory and we are dedicating this project to his profound vision as a public intellectual and world activist for whom two of his breakthrough ideas are particularly relevant to this collection. The guest editors, along with the contributors, are reinforcing his messages for the current and future eras that "leadership is the action of ideas to make change, through the agency of individuals" (p. 74) and that "Injustice anywhere is a threat to justice everywhere" (p. 75) (see Temes 1996).