Статті в журналах з теми "Domain message"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Domain message.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Domain message".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Wibisono, Gunawan, Tri Waluyo, and Erik Iman Heri Ujianto. "KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (February 1, 2020): 259–64. http://dx.doi.org/10.33480/jitk.v5i2.1212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper contains a review of the spatial domain steganographic literature. The purpose of this paper is to provide knowledge about techniques or methods that exist in the spatial domain of steganography. Steganography is the science or technique for hiding secret messages in other messages so that the existence of the secret message cannot be accessed by others who do not have authority. There are several popular spatial domains of steganographic techniques, namely LSB (Least Significant Bit), which is mapping secret message bits in the rightmost bit (LSB) of each color pixel and PVD (Pixel Value Differencing) which in this method offers a larger message storage capacity , with better image quality compared to other methods in the spatial domain. Because privacy issues continue to develop along with various digital communication technologies, and increasingly strong security threats, steganography can play a role in society to maintain the confidentiality of both picture, voice and video messages. For this reason it is important for us to be aware of steganographic technology and its implications.
2

El Rezen Purba, Doni, and Desinta Purba. "Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (March 1, 2021): 1–4. http://dx.doi.org/10.54209/infosains.v11i1.18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
3

Kim, Kee Sung. "New Order-Revealing Encryption with Shorter Ciphertexts." Information 11, no. 10 (September 23, 2020): 457. http://dx.doi.org/10.3390/info11100457.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As data outsourcing services have been becoming common recently, developing skills to search over encrypted data has received a lot of attention. Order-revealing encryption (OREnc) enables performing a range of queries on encrypted data through a publicly computable function that outputs the ordering information of the underlying plaintexts. In 2016, Lewi et al. proposed an OREnc scheme that is more secure than the existing practical (stateless and non-interactive) schemes by constructing an ideally-secure OREnc scheme for small domains and a “domain-extension” scheme for obtaining the final OREnc scheme for large domains. They encoded a large message into small message blocks of equal size to apply them to their small-domain scheme, thus their resulting OREnc scheme reveals the index of the first differing message block. In this work, we introduce a new ideally-secure OREnc scheme for small domains with shorter ciphertexts. We also present an alternative message-block encoding technique. Combining the proposed constructions with the domain-extension scheme of Lewi et al., we can obtain a new large-domain OREnc scheme with shorter ciphertexts or with different leakage information, but longer ciphertexts.
4

Short, Kevin M. "Signal Extraction from Chaotic Communications." International Journal of Bifurcation and Chaos 07, no. 07 (July 1997): 1579–97. http://dx.doi.org/10.1142/s0218127497001230.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper will consider the use of nonlinear dynamic (NLD) forecasting to extract messages from chaotic communication systems. Earlier work has shown that one-step prediction methods have sometimes been able to reveal the presence of hidden messages as well as the frequency content of the hidden messages. However, recovery of the actual hidden message usually involved filtering in the frequency domain. In this paper we show that it may be possible to extract the hidden message signal without filtering in the frequency domain. The approaches which will be discussed involve either the use of multi step predictions or a resumming process on the residuals after one-step prediction. For the multi step methods, two related approaches will be used. The first is primarily applicable to periodic signals, and will use the frequency information from one-step predictions to determine a block size to use for multi step predictions. The second will attempt dynamic detection of message signals using a windowed measure of the prediction error. For the resumming approach, it will be shown that even a lowest-order approximation can lead to faithful extraction of the hidden message signal for a ramping message signal that proved difficult in earlier work. These approaches will be applied to simple examples of communication schemes using signal masking and modulated chaos.
5

Geschke, Daniel, Kai Sassenberg, Georg Ruhrmann, and Denise Sommer. "Behavior Speaks Louder than Traits." Zeitschrift für Psychologie / Journal of Psychology 215, no. 4 (January 2007): 248–54. http://dx.doi.org/10.1027/0044-3409.215.4.248.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The impact of message abstractness on recipients is controversial. Research on person perception suggests that abstract messages are more influential, whereas research on communication and its outcomes suggests that concrete, vivid communication has greater impact. It was predicted that the latter also applies to the domain of person perception if the message contains unexpected (i.e., stereotype inconsistent) information. This prediction was tested experimentally. It was found that a message about a target person with unexpected content exerts more influence when it is concrete than when it is abstract. This effect generalized across different sources of communication (mass media and interpersonal communication). In line with earlier findings, messages from the media had a somewhat stronger effect than interpersonal communication. Implications for optimal message composition for the communication of knowledge about people are discussed.
6

Demircioğlu, Emine Dumlu, and Oya Kalipsiz. "API Message-Driven Regression Testing Framework." Electronics 11, no. 17 (August 26, 2022): 2671. http://dx.doi.org/10.3390/electronics11172671.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the increase in the number of APIs and interconnected applications, API testing has become a critical part of the software testing process. Particularly considering the business-critical systems using API messages, the importance of repetitive API tests increases. Successfully performing repetitive manual API testing for a large number of test scenarios in large business enterprise applications becomes even more difficult due to the fact that human errors may prevent performing thousands of human-written tests with high precision every time. Furthermore, the existing API test automation tools used in the market cannot be integrated into all business domains due to their dependence on applications. These tools generally support web APIs over the HTTP protocol. Hence, this study is motivated by the fact that there is a lack of API message-driven regression testing frameworks in a particular area in which API messages are used in client-server communication. This study has been prepared to close the gap in a specific domain which uses business domain APIs, rather than HTTP, in client-server communication. We propose a novel approach based on the use of network packets for regression testing. We developed a proof-of-concept test automation tool implementing our approach and evaluated it in a financial domain. Unlike prior studies, our approach can provide the use of real data packets in software testing. The use of network packets increases the generalization of the framework. Overall, our study reports remarkable reuse capacity and makes a significant impact on a real-world business-critical system by reducing effort and increasing the automation level of API regression testing.
7

Srilakshmi, P., Ch Himabindu, N. Chaitanya, S. V. Muralidhar, M. V. Sumanth, and K. Vinay. "Text embedding using image steganography in spatial domain." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i3.6.14922.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper proposed novel approach of image steganography for text embedding in spatial domain. In the proposed embedding the message is dumped into the image with reference to a random generated key, based on this key the extraction of text is done from the image. So this method is a highly secured from eavesdropping and highly complex to identify the text data in the image and retrieving the text message from the message is also a resilient process. The extraction is only possible when the key is known.
8

Goossen, William T. F., Marcel J. Jonker, Kai U. Heitmann, Irma C. Jongeneel-de Haas, Tom de Jong, Johannes W. van der Slikke, and Bert L. Kabbes. "Electronic patient records: domain message information model perinatology." International Journal of Medical Informatics 70, no. 2-3 (July 2003): 265–76. http://dx.doi.org/10.1016/s1386-5056(03)00054-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Borges, Adilson, and Pierrick Gomez. "How products induce regulatory fit: evidence from the health domain." Journal of Consumer Marketing 32, no. 6 (September 14, 2015): 441–49. http://dx.doi.org/10.1108/jcm-01-2015-1292.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – The purpose of this paper is to test whether the simple exposure to different types of products can trigger different motivational orientation on consumers (prevention vs promotion), which in turn would match message frame and increase persuasion. Design/methodology/approach – Three experiments test whether exposure to product categories can trigger consumer’s regulatory focus orientation. Participants in the pilot study are students, while participants in the two other studies are consumers. Findings – A first pilot study randomly exposed participants to a product that could trigger promotion orientation (e.g. orange juice) versus a product that could trigger prevention orientation (e.g. sunscreen). Participants exposed to promotion (prevention) product suggest more promotion (prevention) strategies to reach a particular goal (preparing for their final exam). Study 2 shows that gain (vs loss)-framed messages using health appeals have better evaluations when featuring promotion (vs prevention) products. Study 3 generalizes these results using another sample and different product categories. Research limitations/implications – The paper uses some product categories and including other categories would increase external validity. Practical implications – The practical implication is to help marketers to choose the right health argument to match the product category they are trying to sell. Originality/value – Theoretically, the results from three studies show that exposure to products can temporarily trigger a consumer’s regulatory focus and that messages using health arguments that are consistent with this regulatory focus are more persuasive than those that are not. Managerially, these results help managers to adapt the right message in function of the product category.
10

Kim, Dongkyun, and Yong-Hwan Kim. "A Network Federation Scheme for Inter-Domain SDN Communications." Webology 19, no. 1 (January 20, 2022): 4515–26. http://dx.doi.org/10.14704/web/v19i1/web19298.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recently, a variety of the integrated service platforms demand the innovative network technologies such as software-defined networking (SDN). However, it is problematic and complicated to provide interconnectivity and reachability between inter-domain SDNs. Thus, this paper proposes a scheme for the inter-SDN federation and communication based on the abstracted network information exchange and automated peer network configuration for the integrated network services. The proposed scheme is implemented and verified over the de-facto wide-area SDN infrastructure (KREONET-S) which is deployed on Korea Research Environment Open Network (KREONET), a representative national research network in Korea. The proposed method is implemented and experimented based on the distributed and layer-2 oriented network architecture by using the abstracted message exchanges between local SDN controllers in order to provide low message overheads and high federation scalability. Our research work contributes to more efficient inter-SDN communications by means of the data modeling abstraction of the local SDN network information and the simplified interactions between individual controllers by the automated configurations through the specific application interfaces. The proposed scheme also contributes to the development of the integrated service platforms which are demanded to provide IoT, Big Data, AI, and cloud services in the tightly coupled manner over the inter-SDN domains.
11

Awad, Ammar. "A Survey of Spatial Domain Techniques in Image Steganography." Journal of Education College Wasit University 1, no. 26 (January 12, 2018): 497–510. http://dx.doi.org/10.31185/eduj.vol1.iss26.105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper presents the most techniques of spatial domain that used in image steganography where it is used to hide confidential message under a cover image. Steganography is a much better way to convey a secret message compared to cryptography. This is because cryptography is outlawed while steganography can avoid such policies to pass message covertly. Steganography is one of the most common techniques of securing information, which insists on concealing the clandestine data within the cover image in a way that nobody suspects to its existence. The challenge of steganography techniques is to make a reasonable balance between the file and the size of data that can be exchanged. Furthermore, the strength of the strategy and the security of the mysterious data are the fact that can't be hidden.
12

Persky, Susan, Rebecca A. Ferrer, William M. P. Klein, Megan R. Goldring, Rachel W. Cohen, William D. Kistler, Haley E. Yaremych, and Sofia Bouhlal. "Effects of Fruit and Vegetable Feeding Messages on Mothers and Fathers: Interactions Between Emotional State and Health Message Framing." Annals of Behavioral Medicine 53, no. 9 (November 3, 2018): 789–800. http://dx.doi.org/10.1093/abm/kay088.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Background There is a pressing need to craft optimal public health messages promoting healthy feeding behaviors among parents. How these messages influence such feeding decisions are affected by multiple interactive factors including emotional states, message framing, and gender, but these factors have not been studied in the domain of parents’ feeding of their children. Purpose To evaluate the role of message framing, emotional state, and parent gender on feeding choices that parents make for their children. Methods In 2016–2017, 190 parents (126 mothers) of 4- to 7-year-old children were randomly assigned to an anger or fear emotion induction and read either a gain- or loss-framed message about the importance of children’s fruit and vegetable (FV) consumption prior to choosing foods for their child from a virtual reality buffet. Results Mothers in an angry state who received a gain-framed message chose relatively more FV for their child in the virtual buffet, F(3, 180) = 4.77, p = .027. However, fathers in this group did not feed more FV, but rather reported greater intention to improve future FV feeding, F(3, 180) = 4.91, p = .028. Conclusions Providing gain-framed messages to parents, particularly mothers, in an anger state may be most effective for motivating healthy dietary choices for children. Clinical Trial information clinicaltrials.gov NCT02622035
13

Journal, Baghdad Science. "Steganography in Audio Using Wavelet and DES." Baghdad Science Journal 12, no. 2 (June 7, 2015): 431–36. http://dx.doi.org/10.21123/bsj.12.2.431-436.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.
14

SKARMEAS, NIKOLAOS P., and KEITH L. CLARK. "COMPONENT BASED AGENT CONSTRUCTION." International Journal on Artificial Intelligence Tools 11, no. 01 (March 2002): 139–63. http://dx.doi.org/10.1142/s0218213002000812.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, an agent architecture is proposed that can be used to integrate pre-existing components that provide the domain dependent agent functionality. The key integrating feature of the agent is an active message board that is used for inter-component, hence intra-agent communication. The board is active because it automatically forwards messages to components, they do not have to poll the message board. It does this on the basis of message pattern functions that components place on the board using advertisement messages. These functions can contain component provided semantic tests on the content of the message, they can also communicate with any other component whilst they are being applied. In addition an agent management toolkit, called ALFA, is described which offers a set of agent management services. This toolkit consists of a number of servers for storing the code of the components and symbolic descriptions of what agents regarding their component makeup. A third server uses all this information to facilitate launching new agents. Two prototype systems are also presented where the presented infrastructure has been applied. The one involves an agent based system used to control the environmental conditions in a building and the second is an agent based network management application.
15

Guo, Qinghua, Defeng Huang, Sven Nordholm, Jiangtao Xi, and Yanguang Yu. "Iterative Frequency Domain Equalization With Generalized Approximate Message Passing." IEEE Signal Processing Letters 20, no. 6 (June 2013): 559–62. http://dx.doi.org/10.1109/lsp.2013.2256783.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Andriyanov, Nikita, Anatoliy Buldakovsky, and Kirill Risukhin. "Correlation analysis of voice communications in Russian language in the airspace of the Russian Federation." ITM Web of Conferences 30 (2019): 04001. http://dx.doi.org/10.1051/itmconf/20193004001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The spectral characteristics of audio recordings of typical phrases of radio exchange of air traffic controllers and civil aviation pilots are investigated. Based on the obtained spectral characteristics, experimental covariance functions are constructed that show statistical relationships within a single voice message in the time domain. The main attention is paid to the possibility of describing speech messages using mathematical models of random sequences.
17

Abdulraman, Ladeh S., Sheerko R. Hma Salah, Halgurd S. Maghdid, and Azhin T. Sabir. "A robust way of steganography by using blocks of an image in spatial domain." Innovaciencia Facultad de Ciencias Exactas Físicas y Naturales 7, no. 1 (October 25, 2019): 1–7. http://dx.doi.org/10.15649/2346075x.690.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cover image proposed in spatial domain, the proposed approach divides the host image into blocks of size (8x8) pixels and message bits are embeds into the pixels of a cover image. The 64-pixel values of each block converted to be represented in binary system and compared with corresponding secret data bits for finding the matching and hold 6-pixels. The search process performed by comparing each secret data bit (8-bits) with created binary plane at the cover image, if matching is found the last row of the created binary plane which is (LSB) is modified to indicate the location of the matched bits sequence “which is the secret data” and number of the row, if matching is not found in all 7th rows the secret sequence is copied in to the corresponding 8th row location.The payload of this technique is 6 pixels’ message (48-bits) in each block. In the experiments secret messages are randomly embedded into different images. The quality of the stego-image from which the original text message is extracted is not affected at all. For validation of the presented mechanism, the capacity, the circuit complexity, and the measurement of distortion against steganalysis is evaluated using the peak-signal-to-noise ratio (PSNR) are analyzed.
18

Lin, Jzau Sheng, Mei Wang, Pei Yu Lia, and Ze Jin Li. "An SSVEP-Based BCI System for SMS in a Mobile Phone." Applied Mechanics and Materials 513-517 (February 2014): 412–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.412.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, the purpose is to develop a Short Message Service (SMS) system that can aid the ALS patients to control a mobile phone to send a message by using of the steady state visually evoked potentials (SSVEP) brain computer interface (BCI) to a person who can help him/her. The EEG signals may be detected by electrodes and signal extracting chip. Then these signal can be transmitted to the mobile platforms by using of Bluetooth interface. Finally, the message and phone number can be selected in accordance with the components in frequency domain transferred from time domain. The experimental results had shown that the proposed system can easily send a message from a mobile phone to another.
19

David, G., B. van der Schueren, P. Marynen, J. J. Cassiman, and H. van den Berghe. "Molecular cloning of amphiglycan, a novel integral membrane heparan sulfate proteoglycan expressed by epithelial and fibroblastic cells." Journal of Cell Biology 118, no. 4 (August 15, 1992): 961–69. http://dx.doi.org/10.1083/jcb.118.4.961.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We have synthesized an antisense oligonucleotide primer that matches a supposedly conserved sequence in messages for heparan sulfate proteoglycans with transmembrane orientations. With the aid of this primer we have amplified partial and selected full-length copies of a message from human lung fibroblasts that codes for a novel integral membrane heparan sulfate proteoglycan. The encoded protein is 198 amino-acids long, with discrete cytoplasmic, transmembrane, and amino-terminal extracellular domains. Except for the sequences that represent putative heparan sulfate chain attachment sites, the extracellular domain of this protein has a unique structure. The transmembrane and cytoplasmic domains, in contrast, are highly similar to the corresponding domains of fibroglycan and syndecan, the two cell surface proteoglycans that figured as models for the design of the antisense primer. This similarity includes the conservation of four tyrosine residues, one immediately in front of the stop transfer sequence and three in the cytoplasmic segment, and of the most proximal and most distal cytoplasmic sequences. The cDNA detects a single 2.6-kb message in cultured human lung fibroblasts and in a variety of human epithelial and fibroblastic cell lines. Polyclonal and monoclonal antibodies raised against the encoded peptide after expression as a beta-galactosidase fusion protein react with the 35-kD coreprotein of a cell surface heparan sulfate proteoglycan of human lung fibroblasts and decorate the surface of many cell types. We propose to name this proteoglycan "amphiglycan" (from the Greek words amphi, "around, on both sides of" and amphoo, "both") referring to its domain structure which extends on both sides of the plasmamembrane, and to its localization around cells of both epithelial and fibroblastic origin.
20

Jarrah, Moath, and Bernard Zeigler. "A modeling and simulation-based methodology to support dynamic negotiation for web service applications." SIMULATION 88, no. 3 (November 1, 2010): 315–28. http://dx.doi.org/10.1177/0037549710385744.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Different negotiation engineering domains require the system designer to tailor the negotiation framework according to the domain under which it will be used. This process of system design is timely consuming when supporting different geographically distributed and dynamic environments. Here we show a methodology to design negotiation systems by integrating domain-dependent message structure ontology with domain-independent marketplace architecture. The methodology gives the system designers a powerful modeling tool that can be used to tailor the framework in order to support different negotiation behaviors under different domains. The system entity structure formalism is used to build the domain-dependent ontology while the finite deterministic discrete event system formalism is used to build the marketplace model. The discrete event system with service oriented architecture simulation environment was employed to demonstrate a proof of concept of applicability to web service domains.
21

Purnami, Wening Handri. "RANAH PESAN PADA PAPAN PETUNJUK DI OBJEK WISATA DAERAH ISTIMEWA YOGYAKARTA." Widyaparwa 46, no. 2 (January 23, 2019): 157–67. http://dx.doi.org/10.26499/wdprw.v46i2.205.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study discusses the use of language on sign boardin tourist object of DIY.The language on the sign board is interesting to study based on the message domain because it shows peculiarities in language usage. The study aims to describe the form of the message and the realization of speech acts. The method used in this study is a qualitative descriptive method. The approach is socio-pragmatic, namely registers and pragmatics. The results of the study produce three messages, namely (1) form of'prohibition', (2) form of invitation, and (3) form of suggestion. The three forms of the message have unique vocabularies. Realizations of speech acti imply direct messages and indirect messages.Kajian ini membahas penggunaan bahasa pada papan petunjuk di objek wisata DIY. Bahasa pada papan petunjuk menarik untuk dikaji berdasarkan ranah pesan karena memperlihatkan kekhasan dalam pemakaian bahasa. Kajian bertujuan mendeskripsikan bentuk ranah pesan dan wujud tindak tutur.Metode yang digunakan dalam penelitian ini adalah metode deskriptif kualitatif. Pendekatan bersifat sosiopragmatik, yaitu register dan pragmatik. Hasil dari kajian menghasilkantiga pesan, yaitu (1) bentuk ‘melarang’, (2) bentuk ajakan,dan (3) bentuk menyarankan. Ketiga bentuk pesan tersebut memiliki kekhasan kosakata. Wujud tindak tutur menyiratkan pesan langsung dan pesan tidak langsung.
22

Zhan, Xu, Yue Rong Lei, Ling Yan Du, Hui Ming Zeng, and Jian Ling Chen. "A Grayscale Image Fragile Watermark Authentication System in Spatial-Domain." Applied Mechanics and Materials 380-384 (August 2013): 2920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2920.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. A grayscale image fragile watermark authentication system in spatial-domain is proposed. First it preprocesses the watermark image and resizes it to a quarter of the size of the original image. Then, it generates a random key matrix K and 128bit message authentication code from the original image. It replaces the 128bit message authentication code for the former 128bit of K to obtain a new key matrix KH. Then, it calculates the embedded position P=KHi xor (b7,b6,b5.b4) i MOD 3. b7,b6,b5,b4 are the high 4 bits of the original images pixel. It embeds the watermark image according to P value to the lower 4 bits of the original images pixel. The system is made in experiment. The result shows the system has good imperceptibility.
23

Nandakumar, Nachiketas, Bharadhwaj Sivakumaran, Arti Kalro, and Piyush Sharma. "Threat, efficacy and message framing in consumer healthcare." Marketing Intelligence & Planning 35, no. 4 (May 6, 2017): 442–57. http://dx.doi.org/10.1108/mip-07-2016-0117.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The purpose of this paper is to empirically examine the interactive effects of message framing, perceived threat and efficacy appeals on attitudes/intentions toward consumer healthcare communications, particularly, cataract surgery. Design/methodology/approach This paper develops two conceptual models dealing with threat, efficacy and framing and tests them with data collected from two field experiments. Findings The results reveal that high efficacy messages in combination with high threat or loss-framed messages have a significant positive influence on consumer attitudes and intentions in the consumer healthcare arena. Practical implications The findings have managerial value and public policy implications for healthcare officials in developing effective communications material. Specifically, this paper recommends that high threat, high efficacy and loss-framed efficacy messages be used. Originality/value This research extends previous work by demonstrating the effectiveness of threat appeals and framing on consumer attitudes and intentions to undergo cataract surgery. It also demonstrates the use of communication models in the healthcare domain.
24

Rajan, Raghunandan, Radharamanan Radhakrishnan, and Philip A. Wilsey. "Dynamic Cancellation: Selecting Time Warp Cancellation Strategies at Runtime." VLSI Design 9, no. 3 (January 1, 1999): 237–51. http://dx.doi.org/10.1155/1999/61087.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The performance of Time Warp parallel discrete event simulators can be affected by the cancellation strategy used to send anti-messages. Under aggressive cancellation, antimessage generation occurs immediately after a straggler message is detected. In contrast, lazy cancellation delays the sending of anti-messages until forward processing from a straggler message confirms that the premature computation did indeed generate an incorrect message. Previous studies have shown that neither approach is clearly superior to the other in all cases (even within the same application domain). Furthermore, no strategy exists to make a priori determination of the more favorable cancellation strategy. Most existing Time Warp systems merely provide a switch for the user to select the cancellation strategy employed. This paper explores the use of simulation time decision procedures to select cancellation strategies. The approach is termed Dynamic Cancellation and it assigns the capability for selecting cancellation strategies to the Logical Processes (LPs) in a Time Warp simulation. Thus, within a single parallel simulation both strategies may be employed by distinct LPs and even across the simulation lifetime of an LP. Empirical analysis using several control strategies show that dynamic cancellation always performs with the best static strategy and, in some cases, dynamic cancellation provides some nominal (5–10%) performance gain over the best static strategy.
25

Battikh, Dalia, Safwan El El Assad, Thang Manh Hoang, Bassem Bakhache, Olivier Deforges, and Mohamad Khalil. "Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors." Entropy 21, no. 8 (July 30, 2019): 748. http://dx.doi.org/10.3390/e21080748.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.
26

Huang, D. "Stochastic fm models and non-linear time series analysis." Advances in Applied Probability 29, no. 4 (December 1997): 986–1003. http://dx.doi.org/10.2307/1427850.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
An important model in communications is the stochastic FM signal st = A cos , where the message process {mt} is a stochastic process. In this paper, we investigate the linear models and limit distributions of FM signals. Firstly, we show that this non-linear model in the frequency domain can be converted to an ARMA (2, q + 1) model in the time domain when {mt} is a Gaussian MA (q) sequence. The spectral density of {St} can then be solved easily for MA message processes. Also, an error bound is given for an ARMA approximation for more general message processes. Secondly, we show that {St} is asymptotically strictly stationary if {mt} is a Markov chain satisfying a certain condition on its transition kernel. Also, we find the limit distribution of st for some message processes {mt}. These results show that a joint method of probability theory, linear and non-linear time series analysis can yield fruitful results. They also have significance for FM modulation and demodulation in communications.
27

Poehlman, Jon, Jennifer D. Uhrig, Allison Friedman, Monica Scales, Ann Forsythe, and Susan J. Robinson. "Bundling of STDs and HIV in Prevention Messages." Journal of Social Marketing 5, no. 1 (January 5, 2015): 2–20. http://dx.doi.org/10.1108/jsocm-08-2013-0051.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – This study aims to explore peoples cognitive perceptions of HIV and other sexually transmitted diseases (STDs) to inform decisions on message development with regard to message bundling, with limited research on the concept of bundling-related prevention messages and no studies that consider the bundling of HIV and other STD prevention messages. Design/methodology/approach – Individual and small-group interviews were conducted with 158 African American men and women to explore perceptions of STDs and communication preferences. Open-ended questions and a pile-sort exercise were used to elicit individuals’ judgments on similarities of 12 STDs, including HIV. Interview data were coded and analyzed for themes and patterns; pile sort data were analyzed using multidimensional scaling (MDS) and cluster analysis to visualize the set of relations identified from the piles. Findings – STDs and HIV are associated with stigma, risk behaviors and personal responsibility. The card sorting activity revealed two primary dimensions by which people organized STDs: seriousness and curability. Potential clusters of STDs that correspond to participants described sorting strategies were identified and they may have implications for message bundling. Disaggregation of the data by sex and age revealed slight variations in the relationships of HIV and human papillomavirus (HPV) to other STDs. Originality/value – By identifying a set of cognitive attributes people use in organizing the overall semantic domain of STDs, ideas can be generated for how best to combine STD and HIV messages to meet public health communication goals.
28

Shkotin, Alex. "Finite Systems Handling Language (YAFOLL message 1)." Studia Humana 4, no. 4 (December 1, 2015): 3–12. http://dx.doi.org/10.1515/sh-2015-0021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract The concept a finite multi-carrier algebraic system (FMAS) as well as a language for handling systems such as YAFOLL (Yet Another First Order Logic Language) are introduced. The applicability of such systems to building a mathematical model of a part of reality, i.e. a mathematical structure that can be asked questions about the properties of subject domain objects and processes, is demonstrated.
29

K. Jayanthi, S., and K. Sridevi. "Mean Square Error Optimization to Authenticate Multi-Modality Medical Images in Wavelet Domain." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 265. http://dx.doi.org/10.14419/ijet.v7i3.27.17890.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Medical image watermarking which hides patient’s information in the medical image ensures its imperceptibility and at the same time provides robustness to the information that is embedded. Current research scenario embeds the authenticated message as watermark in the frequency domain to get watermarked image which has most of its values as real numbers. Since pixel intensity values must be represented as integers, the watermarked image is converted into spatial domain where the rounding error problem occurs and the embedded message cannot be extracted to prove its authenticity. In proposed work, a new watermarking scheme in Discrete Wavelet Transform (DWT) domain based on Genetic Algorithm (GA) is implemented to ensure correct retrieval of embedded watermark by optimizing Mean Square Error (MSE) measure.
30

Huang, D. "Stochastic fm models and non-linear time series analysis." Advances in Applied Probability 29, no. 04 (December 1997): 986–1003. http://dx.doi.org/10.1017/s0001867800047984.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
An important model in communications is the stochastic FM signal st = A cos , where the message process {m t} is a stochastic process. In this paper, we investigate the linear models and limit distributions of FM signals. Firstly, we show that this non-linear model in the frequency domain can be converted to an ARMA (2, q + 1) model in the time domain when {mt } is a Gaussian MA (q) sequence. The spectral density of {St } can then be solved easily for MA message processes. Also, an error bound is given for an ARMA approximation for more general message processes. Secondly, we show that {St } is asymptotically strictly stationary if {m t } is a Markov chain satisfying a certain condition on its transition kernel. Also, we find the limit distribution of st for some message processes {mt }. These results show that a joint method of probability theory, linear and non-linear time series analysis can yield fruitful results. They also have significance for FM modulation and demodulation in communications.
31

Broda, Martin, Vladimír Hajduk, and Dušan Levický. "Universal statistical steganalytic method." Journal of Electrical Engineering 68, no. 2 (March 28, 2017): 117–24. http://dx.doi.org/10.1515/jee-2017-0016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Novel image steganalytic method used to detection of secret message in static images is introduced in this paper. This method is based on statistical steganalysis (SS), where statistical vector is composed by 285 statistical features (parameters) extracted from DCT (Discrete Cosine Transformation) domain and 46 features extracted mainly from DWT (Discrete Wavelet Transformation) domain. Classification process was realized by Ensemble classifier that was helpful in reduction of computational and time complexity. Proposed steganalytic method was verified by detection of popular image steganographic methods. Novel method was also compared with existing steganalytic methods by overall detection accuracy of a secret message.
32

Hussien, Amar Y. "Image Steganography Based Spatial and Transform Domain Techniques: A Review." Fusion: Practice and Applications 8, no. 1 (2022): 08–15. http://dx.doi.org/10.54216/fpa.080101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The amount of data shared online today is increasing. Data security is therefore cited as a significant problem while processing data exchanges through the Internet. Everyone needs the security of their data during communication processes. The science and art of steganography is the concealment of one audio, message, video, or image by embedding another audio, message, video, or image in its place. It is employed to protect sensitive data against malicious assaults. In order to detect the numerous methods employed with digital steganography, this study seeks to identify the primary image-based mediums. As a result, in the spatial domain of the digital medium, the LSB approach was mostly employed, whereas in the transform domain, DTC and DWT were separated as the primary techniques. Due to its simplicity and large embedding capacity, the spatial domain was the most frequently used domain in digital steganography.
33

Hoetger, Cosima, Rose S. Bono, Nicole E. Nicksic, Andrew J. Barnes, and Caroline O. Cobb. "Influence of Electronic Cigarette Characteristics on Susceptibility, Perceptions, and Abuse Liability Indices among Combustible Tobacco Cigarette Smokers and Non-Smokers." International Journal of Environmental Research and Public Health 16, no. 10 (May 23, 2019): 1825. http://dx.doi.org/10.3390/ijerph16101825.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study assessed how electronic cigarette (ECIG) characteristics amenable to regulation—namely nicotine content, flavor, and modified risk messages—impact ECIG use susceptibility, harm/addiction perceptions, and abuse liability indices among combustible tobacco cigarette (CTC) smokers and non-smokers. CTC smokers and non-smokers varying in ECIG use recruited via Amazon Mechanical Turk (MTurk) completed an online survey in 2016 (analytic n = 706). Participants were randomly assigned to one of eight conditions differing in ECIG characteristics: nicotine content (no, low, high), flavor (menthol, tobacco, fruit), or modified risk message (reduced harm, reduced carcinogen exposure). Regressions assessed ECIG susceptibility, harm/addiction perceptions, and abuse liability indices (purchase task measures of breakpoint/intensity) within each regulatory domain (nicotine content, flavor, message) and their interactions with CTC/ECIG status. Differential effects on ECIG susceptibility, harm/addiction perceptions, and abuse liability indices were observed by regulatory domain with many effects moderated by CTC/ECIG status. ECIG nicotine content and flavor conditions were the most influential across outcomes. Greater nicotine content, tobacco-flavored and reduced carcinogen exposure ECIGs were more highly preferred by CTC smokers with some differing preferences for non-users. Findings reinforce consideration of discrete ECIG preferences across tobacco use status to improve regulatory efficacy.
34

Garcia, P., T. Gomes, J. Monteiro, A. Tavares, and M. Ekpanyapong. "On-Chip Message Passing Sub-System for Embedded Inter-Domain Communication." IEEE Computer Architecture Letters 15, no. 1 (January 1, 2016): 33–36. http://dx.doi.org/10.1109/lca.2015.2419260.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Zhang, Chuanzong, Carles Navarro Manchon, Zhongyong Wang, and Bernard Henri Fleury. "Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization." IEEE Signal Processing Letters 22, no. 4 (April 2015): 404–7. http://dx.doi.org/10.1109/lsp.2014.2325401.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Tiani, Riris. "Judgement Sebagai Sistem Appraisal dalam Iklan Kecantikan Visual Media Cetak." Nusa: Jurnal Ilmu Bahasa dan Sastra 12, no. 4 (November 1, 2017): 256. http://dx.doi.org/10.14710/nusa.12.4.256-264.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This papper investigated the appraisal system used in the verbal message advertisements visual beauty of each print media. Verbal message visual beauty of each print media were analyzed using appraisal theory which found on domain: attitude. Attitude as negotiating meaning to answer research problems. Judgement as the appraisal which dominate the verbal message advertisement visual beauty of the print media. This study is qualitative and interpretative in which the data analyzed using analysys of appraisal framework to identify categoriez of calusses the establish verbal message advertisement visual beauty of print media. The result showed thet category of clauses that building message advertisement visual beauty of print media dominated by appraisal tool that dominates moral judgement with direct, positive character as a praise and negative character as criticism.
37

Shao, Chen, and Xiaochen Chen. "Deep-Learning-Based Financial Message Sentiment Classification in Business Management." Computational Intelligence and Neuroscience 2022 (July 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/3888675.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A deep-learning-based financial text sentiment classification method is proposed in this paper, which can provide a reference for business management. In the proposed method, domain adaptation is adopted to solve the common problem of insufficient labeled samples in the financial textual domain. Specifically, in the classification process, the seq2seq model is firstly adopted to extract the abstract from the financial message, which can reduce the influence of invalid information and speed up processing. In the process of sentiment classification, a bidirectional LSTM model is adopted for classification, which can more comprehensively make use of context information. Experiments are carried out to testify the proposed method through the open-source data set. It can be seen that the proposed method can effectively transfer from the reduced Amazon data set to the StockTwits financial text data set. Compared with the parameter-frozen-based method and the SDA-based method, the recognition rates have improved by 0.5% and 6.8%, respectively. If the target domain data set can be directly adopted for training, the recognition rate of the proposed method is higher than that of the SVM method and the LSTM method by 8.3% and 4.5%, respectively.
38

Maji, Giridhar, Sharmistha Mandal, and Soumya Sen. "Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 83–101. http://dx.doi.org/10.4018/ijisp.2020040105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the modern digital era, the privacy of personal communication is a serious concern to all netizens. A better way to preserve privacy could be to hide the secret message inside some innocent looking digital object such as image, audio, video, etc., which is known as steganography. A new steganographic scheme using a reference image along with the cover image has been proposed in this article. It enhances the robustness and security by increasing the obscurity of the hidden message. It also employs an additional dictionary-based encoding module to increase the hiding capacity as well as security. Experiments show that bit changes in the reference image are very few and undetectable to human perception, it also evades common statistical tests. Evaluation of standard quality parameters such as MSE, PSNR, UIQI, SSIM along with chi-squared statistics based embedding probability testing has been performed. When dictionary-based encoding is applied it further improves the quality parameters.
39

Shi, Yang Chun, and You Bao Liu. "Interference Suppression for Satellite Navigation Based on Neural Network and Wavelet Packets Transform." Advanced Materials Research 457-458 (January 2012): 1111–17. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.1111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
To suppress the interference in the direct sequence spread spectrum (DSSS) system, a transform domain message data adaptive identify (TISI) algorithm is proposed in this paper, based on two improved algorithms: Power distributing predominance wavelet packets transform (PDP-WPT) and extended BP neural network (EBPNN). Firstly, PDP-WPT is presented to track the interference signal effectively, which improves the convergence rate of TISI. Secondly, the message data can be identified in transform domain by adaptability EBPNN, which has simple structure and enhanced numerical robustness. Simulation results show that TISI can improve the capability of interference suppression by 32% compared with widely used conventional algorithms.
40

Ma, Wen Zhong, Zhi Wang, Yao Rong Li, and Wei Zhang. "Research on Acquisition and Tracing Algorithm of GPS Receiver." Applied Mechanics and Materials 229-231 (November 2012): 1556–59. http://dx.doi.org/10.4028/www.scientific.net/amm.229-231.1556.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
An acquisition and tracing algorithm of GPS receiver is introduced. The shortage of time domain acquisition algorithm is pointed out by analyzing the composition of GPS signal and C/A code’s correlation property. Then the frequency domain acquisition algorithm is discussed. The carrier wave track loop and C/A code track loop are designed and the algorithms of them are determined. Using these two loops can get the navigation message, etc that used for positioning and navigation. The GPS raw intermediate data is processed and the satellites signals are acquired and traced in MATLAB, then obtain the navigation message verified the feasibility and availability of the acquisition and tracing algorithm.
41

Shaukat, Kamran, Ibrahim A Hameed, Suhuai Luo, Imran Javed, Farhat Iqbal, Amber Faisal, Rabia Masood, et al. "Domain Specific Lexicon Generation through Sentiment Analysis." International Journal of Emerging Technologies in Learning (iJET) 15, no. 09 (May 15, 2020): 190. http://dx.doi.org/10.3991/ijet.v15i09.13109.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Sentiment analysis (SA) is used to extract opinions from a huge amount of data and these opinions are comprised of multiple words. Some words have different semantic meanings in different fields and we call them domain specific (DS) words. A domain is defined as a special area in which a collection of queries about a specific topic are held when user do queries in the data regarding the domain appear. But Single word can be interpreted in many ways based on its context-dependency. Demonstrate each word under its domain is extremely important because their meanings differ from each other so much in different domains that a word meaning from A in one context can change into Z in another context or domain. The purpose of this research is to discover the correct sentiment in the message or comment and evaluate it either it is positive, negative or neutral. We collected tweets dataset from different domains and analyze it to extract words that have a different definition in those specific domains as if they are used in other fields of life they would be defined differently. We analyzed 52115 words for finding their DS meaning in seven different domains. Polarity had been given to words of the dataset according to their domains and based on this polarity they have been recognized as positive negative and neutral and evaluated as domain-specific words. The automatic way is used to extract the words of the domain as we integrated and afterward the comparison to identify that either this word differs from other words as far as domain is concerned. This research contribution is a prototype that processes your data and extracts their domain-specific words automatically. This research improved the knowledge about the context-dependency and found the core-specific meanings of words in multiple fields.
42

Sahmi, Imane, Abderrahim Abdellaoui, Tomader Mazri, and Nabil Hmina. "MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4577. http://dx.doi.org/10.11591/ijece.v11i5.pp4577-4586.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.
43

Zhu, Huihu, Han Qiu, Junhu Zhu, and Di Chen. "SMSEI-SDN: A Suppression Method of Security Incident Impact for the Inter-Domain Routing System Based on Software-Defined Networking." Wireless Communications and Mobile Computing 2021 (May 17, 2021): 1–16. http://dx.doi.org/10.1155/2021/5539790.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Security incidents such as natural disasters and power outages can cause inter-domain routing system regional failures, significantly impact the Internet’s safety. Reducing the impact of security incidents is essential for maintaining the stability of the Internet. One of the major impacts of security incidents is that many UPDATE messages will generate, which may easily cause network oscillations. This paper presents the UPDATE messages analysis during the six security incidents and finds that many duplicates and invalid messages are the leading cause of network instability. To effectively process these UPDATE messages, this paper proposes an UPDATE message preprocessing algorithm by analyzing the UPDATE operating mechanism to remove duplicate and invalid messages. Aiming at the problem of slow route search in existing route update methods using software-defined networking (SDN), this paper designs a RIB hierarchical structure for multi-level retrieval and proposes SMSEI-SDN combination with current route update strategies. Experimental results show that when a security incident occurs, by removing duplicate and invalid messages, SMSEI-SDN can reduce the total number of messages by an average of 19% and a maximum of 34.9% within the 60 s of caching time. Besides, SMSEI-SDN can reduce the routing update time by more than 99.98% compared to existing methods. This work provides insights for network operators and researchers interested in security incident impact suppression in the inter-domain routing system.
44

Castiglione, Aniello, Francesco Palmieri, Chin-Ling Chen, and Yao-Chung Chang. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment." International Journal of Data Warehousing and Mining 12, no. 1 (January 2016): 34–48. http://dx.doi.org/10.4018/ijdwm.2016010103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In recent years, Cloud services have become an important part of people's lives, providing them with a large amount of IT resources, available from anywhere and at any time. The access to the services offered is controlled basing on users' identification credentials. As people acquire services from multiple cloud providers, in order to avoid the proliferation of identities associated to a single user, new cross-organization authentication methods, allowing the authorized transfer of users' identification data from one Cloud to another, are emerging. However, since most of these techniques do not protect adequately users' private information, attackers can easily intercept and tamper with confidential identity-related messages. In this paper, the authors use the characteristics of blind signatures to support user verification of the registering provider, to protect the user's identity, and to address known vulnerabilities in these systems. In addition, they use a strong designated verifier signature with message recovery characteristics to strengthen data communication security in the whole process.
45

Lagisetty, Pooja A., Shubadra Priyadarshini, Stephanie Terrell, Mary Hamati, Jessica Landgraf, Vineet Chopra, and Michele Heisler. "Culturally Targeted Strategies for Diabetes Prevention in Minority Population." Diabetes Educator 43, no. 1 (January 24, 2017): 54–77. http://dx.doi.org/10.1177/0145721716683811.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The purpose of this study is to (a) assess the effectiveness of culturally tailored diabetes prevention interventions in minority populations and (b) develop a novel framework to characterize 4 key domains of culturally tailored interventions. Prevention strategies specifically tailored to the culture of ethnic minority patients may help reduce the incidence of diabetes. Methods We searched PubMed, EMBASE, and CINAHL for English-language, randomized controlled trials (RCTs) or quasi-experimental (QE) trials testing culturally tailored interventions to prevent diabetes in minority populations. Two reviewers independently extracted data and assessed risk of bias. Inductive thematic analysis was used to develop a framework with 4 domains (FiLLM: Facilitating [ie, delivering] Interventions Through Language, Location, and Message). The framework was used to assess the overall effectiveness of culturally tailored interventions. Results Thirty-four trials met eligibility criteria. Twelve studies were RCTs, and 22 were QE trials. Twenty-five out of 34 studies (74%) that used cultural tailoring demonstrated significantly improved A1C, fasting glucose, and/or weight loss. Of the 25 successful interventions, 21 (84%) incorporated at least 3 culturally targeted domains. Seven studies used all 4 domains and were all successful. The least utilized domain was delivery (4/34) of the intervention’s key educational message. Conclusions Culturally tailoring interventions across the 4 domains of facilitators, language, location, and messaging can be effective in improving risk factors for progression to diabetes among ethnic minority groups. Future studies should evaluate how specific tailoring approaches work compared to usual care as well as comparative effectiveness of each tailoring domain.
46

Yu, Wenle, Pengfei Wang, Wanyu Du, and Xiaochun Shen. "Researchon Visual Modeling Technology of 3D Mining Engineering Based on Deep Learning." Academic Journal of Science and Technology 2, no. 2 (August 17, 2022): 118–21. http://dx.doi.org/10.54097/ajst.v2i2.1297.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Deep learning is a study hotspot in the domain of man-made intelligence. It is an inevitable trend to use deep learning to support the study work of man-made intelligence, and it has shown its act advantages in the domains of picture, speech and text. Interpretive approach of deep learning is an interdisciplinary study subject of man-made intelligence, machine learning(ML), cognitive psychics, logic and many other disciplines. It has vital abstract study meaning and actual apply worth in message push, medical study, finance, message security and other domains. Deep learning is a new study direction in the domain of ML. By imitating the structure of human brain, it can efficiently course complicated input data, smartly learn divers knowledge, and availably solve many kinds of complicated smart question. In recent years, with the emergence of efficient learning LRUs for deep learning, the ML community has set off an upsurge of studying the theory and apply of deep learning. The rise of 3D modeling technology has promoted the vigorous expand of computer simulation and virtual reality technology, and various 3D modeling software platforms and simulation systemics have emerged as the times require. These platforms and systemics provide powerful design tools and intellectual support. Through the simulation analysis of real scenes, people can directly start with 3D notions and ideas and make visual design schemes and evaluation systemics.
47

Woods, David D., and Glenn Elias. "Significance Messages: An Integrated Display Concept." Proceedings of the Human Factors Society Annual Meeting 32, no. 19 (October 1988): 1350–54. http://dx.doi.org/10.1177/154193128803201909.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper describes one integral display concept — Significance Messages — which communicates the significance of a numerical value of some continuous parameter. The Significance Messages System combines a variety of kinds of raw data using software techniques from artificial intelligence in order to build a qualitative scale that communicates what a numeric value of some parameter means about the state of the application world given the current context. The Significance Messages concept is built as a generic “shell” that knows about different kinds of qualitative states, contextual factors, and heuristics to focus on relevant data. The designer enters domain specific, parameter specific knowledge about alarm setpoints, automatic system setpoints, etc. and about the specific contextual factors that are relevant to the interpretation of that parameter in order to create a particular Significance Message Display for a particular application.
48

Alsisi, Elaf Ali, Ahmed Al-Ashaab, and Wadhah Ahmed Abualfaraa. "The Development of a Smart Health Awareness Message Framework Based on the Use of Social Media: Quantitative Study." Journal of Medical Internet Research 22, no. 7 (July 23, 2020): e16212. http://dx.doi.org/10.2196/16212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background Social media has recently provided a remarkable means of delivering health information broadly and in a cost-effective way. Despite its benefits, some difficulties are encountered in attempting to influence the public to change their behavior in response to social media health messages. Objective This study aimed to explore the factors that affect individuals’ acceptance of using social media as a tool for receiving health awareness messages and adapting such content accordingly by developing a smart health awareness message framework. Methods A quantitative method was adapted to validate the hypotheses and proposed framework through the development of a survey based on the technology acceptance model with the extension of other constructs. The survey was distributed on the web to 701 participants from different countries via Qualtrics software; it generated 391 completed questionnaires, and the response rate was 55.8% (391/701). Results Of the 391 respondents, 121 (30.9%) used social media platforms often during the week, and 27 participants (6.9%) did not use social media. In addition, 24.0% (94/391) of the respondents used these platforms to seek health information. On the basis of the results, perceived usefulness (β=.37; P<.001), gain-framed message (β=.04; P<.001), and loss-framed message (β=.08; P<.001) were seen to positively and significantly influence people’s intention to use social media as a means to spread information about health promotion. The proposed smart health awareness message framework identifies 64.2% of the variance in intention to use, 55.4% of the variance of perceived usefulness, and 26.2% of the variance of perceived ease of use. Conclusions This study sheds light on the factors that are associated with people’s intention to use and adopt social media in the health promotion domain. The findings reveal that the intention of using social media for health awareness purposes is positively impacted by the perception of usefulness of social media and the design of health messages. Future research might seek to explore other factors that relate to people’s behavior. This point of view will assist health organizations in developing their health messages more effectively and to be patient friendly.
49

Mirin, A. A., J. J. Ambrosiano, J. H. Bolstad, A. J. Bourgeois, J. C. Brown, B. Chan, W. P. Dannevik, et al. "Climate system modeling using a domain and task decomposition message-passing approach." Computer Physics Communications 84, no. 1-3 (November 1994): 278–96. http://dx.doi.org/10.1016/0010-4655(94)90215-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Machado, Irene. "Lotman’s scientific investigatory boldness: The semiosphere as a critical theory of communication in culture." Sign Systems Studies 39, no. 1 (June 1, 2011): 81–104. http://dx.doi.org/10.12697/sss.2011.39.1.03.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The main focus of this article is the analysis of the concept of semiosphereas it has emerged from the conception of culture as information — instead of describing the transmission of messages from A to B, it is based on the general process of meaning generation. Following Lotman’s criticism on the paradoxes in communication and its theoretical domain, the article confronts the paradoxical concepts on: (1) the concept of message transmission from the addresser to addressee; (2) the notion of isolated processing systems; (3) the idea that culture speaks a unique language. From the standpoint of the semiosphere, the new object for studying such controversies could be found in the concept of text. When text is taken at the centre of the analysis of culture, nothing appears in an isolated fashion. Lotman’s thinking does not fear the new hypothesis in proposing the conceptual domain of semiosphere to the scientific study of culture.

До бібліографії