To see the other types of publications on this topic, follow the link: Message losses.

Journal articles on the topic 'Message losses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Message losses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Moon J., and Hannah Kang. "Designing Skin Cancer Prevention Messages: Should We Emphasize Gains or Losses? Message Framing, Risk Type, and Prior Experience." American Journal of Health Promotion 32, no. 4 (September 25, 2017): 939–48. http://dx.doi.org/10.1177/0890117117729584.

Full text
Abstract:
Purpose: To test whether message framing (ie, gain vs. loss) and risk type (ie, health vs appearance risk) in skin cancer prevention messages interact with one’s prior experience. Design: Two experiments with a 2 (message framing: gain vs loss) × 2 (risk type: health vs appearance risk) factorial design were conducted. Setting: The participants were given a URL to the experiment website via e-mail. On the first page of the website, the participants were told that they would be asked to evaluate a skin cancer print public service announcement (PSA): Online experiments. Participants: A total of 397 individuals participated (236 for experiment 1 and 161 for experiment 2). Apparatus: Four versions of the skin cancer print PSAs were developed. Four PSAs were identical except for the 2 manipulated components: message framing and risk type. Measures: Measures were adopted from Cho and Boster (message framing), Jones and Leary and Kiene et al. (risk type), De Vries, Mesters, van’t Riet, Willems, and Reubsaet and Knight, Kirincich, Farmer, and Hood (prior experience), and Hammond, Fong, Zanna, Thrasher, and Borland and Hoffner and Ye (behavioral intent). Analysis: General linear models were used to test hypotheses. Results: Three-way interactions among message framing, risk type, and prior experience were found: When the intent of the message was to encourage sunscreen use, the effects of message framing and risk type were shown to be the exact opposite directions from when the intent was to discourage indoor/outdoor tanning. Conclusion: To discourage tanning among those with prior experience, messages emphasizing losses in terms of one’s health will work better. For those with no prior experience, messages emphasizing potential appearance losses will work better for discouraging tanning while messages emphasizing gains like improving appearance will do a better job in encouraging sunscreen use.
APA, Harvard, Vancouver, ISO, and other styles
2

Ishii, Hideaki. "control with limited communication and message losses." Systems & Control Letters 57, no. 4 (April 2008): 322–31. http://dx.doi.org/10.1016/j.sysconle.2007.09.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shahariar, Rezvi, and Abu Naser. "Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node." Dhaka University Journal of Science 62, no. 2 (February 8, 2015): 141–45. http://dx.doi.org/10.3329/dujs.v62i2.21979.

Full text
Abstract:
In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node’s total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node’s energy level reduces to critical energy level. DOI: http://dx.doi.org/10.3329/dujs.v62i2.21979 Dhaka Univ. J. Sci. 62(2): 141-145, 2014 (July)
APA, Harvard, Vancouver, ISO, and other styles
4

Carfora, Valentina, Maria Morandi, and Patrizia Catellani. "The Influence of Message Framing on Consumers’ Selection of Local Food." Foods 11, no. 9 (April 27, 2022): 1268. http://dx.doi.org/10.3390/foods11091268.

Full text
Abstract:
Although local food purchasing provides several benefits to both consumers and producers, research on what recommendation messages can effectively promote the purchase of local food is still lacking. In the present study, 410 participants were involved in a 2-week intervention relying on prefactual (i.e., “If … then”) messages promoting the purchase of local food. All messages were sent through a research app to participants’ mobile phones and were focused on environmental consequences of purchasing (or not purchasing) local food. Four experimental conditions involving messages differing as to outcome sensitivity framing (i.e., gain, non-loss, non-gain and loss) were compared to a control condition. To test the effectiveness of the messages, before and after the 2-week intervention participants were involved in a choice task. They were asked to choose among fruits with different provenience, that is, from the participants’ municipality of residence or abroad. Results showed that all message frames increased the selection of local food, compared to control. Furthermore, pro-environmental consumers were more persuaded by messages formulated in terms of gains and non-gains, whereas healthy consumers were more persuaded by messages formulated in terms of losses or non-losses. Discussion focuses on the advantages of tailored communication to promote the purchase of local food.
APA, Harvard, Vancouver, ISO, and other styles
5

Ermakova, Nadezhda, Aleksandr Trofimov, and Evgeniy Semenov. "Investigation of SMS Traffic Transmission in Communication Network." NBI Technologies, no. 1 (March 2022): 10–14. http://dx.doi.org/10.15688/nbit.jvolsu.2022.1.2.

Full text
Abstract:
The article explores the features and methods of sending SMS traffic using the API (Application Programming Interface), discusses the parameters and API functions for sending Short Message Service (SMS) messages, also analyzes of causes of the loss of the traffic and the options for subsequent prevention of this loss. The scheme of the interaction between the Short Message Service Center (SMSC) and ordinary subscribers is considered. The popular protocol Short Message Peer-to-Peer (SMPP) was used as the protocol under study, capable of transmitting any type of messages, and is an open protocol in the telecommunications industry, which is designed specifically to provide a flexible interface for exchanging SMS messages between SMS applications, platforms, routers and short message service centers. The analysis of the captured traffic was carried out using special software – Wireshark, that allows to apply filters to track the protocols that are used for SMS transmission. Various types of losses in telecommunication networks are considered and a correlation is established with the factors which affect the communication channel. The results obtained can be used to develop an algorithm for searching for lost packets that occur when traffic passes through switching nodes. This model is able to improve the quality of service for telecom operators.
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Zhengxiang, Tingting Guo, and Baoku Li. "Message framing's role in encouraging idle item recycling." Asia Pacific Journal of Marketing and Logistics 33, no. 8 (February 1, 2021): 1758–75. http://dx.doi.org/10.1108/apjml-03-2020-0135.

Full text
Abstract:
PurposeThe purpose of this paper is to investigate the effect of framing idle item recycling appeals as gains or losses on influencing consumers' idle item recycling intention by assessing the mediating role of perceived impact and the moderating role of product attachment.Design/methodology/approachIn total, three experiments were conducted to gather data. The assumed hypotheses were verified using analysis of variance (ANOVA) and bootstrap analysis.FindingsStudy 1 illustrated that loss-framed messages are more persuasive than gain-framed messages for less-involved consumers in idle item recycling, whereas message framing shows no significant difference in more-involved consumers' intention. Study 2 suggested that perceived impact tends to increase less-involved consumers' recycling intention when the message is framed as loss. Study 3 demonstrated that less-involved consumers would react to idle item recycling messages when they are strongly attached to a product. Further, gain-framed messages are more efficacious than loss-framed messages in influencing more-involved consumers' recycling intention when they are strongly attached to a product.Originality/valuePrevious research focuses on promoting waste recycling behavior initiated by local, city or national governments. This study provides some of the first evidence on the influence mechanism of message framing on consumers' idle item recycling intention and offers insights into companies to develop effective advertising strategies for idle item recycling management.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmad, Farhan, Asma Adnane, Virginia Franqueira, Fatih Kurugollu, and Lu Liu. "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies." Sensors 18, no. 11 (November 20, 2018): 4040. http://dx.doi.org/10.3390/s18114040.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses.
APA, Harvard, Vancouver, ISO, and other styles
8

Xiao, Guangbing, Haibo Zhang, Ning Sun, Yong Chen, Jiamin Shi, and Yong Zhang. "Cooperative Bargain for the Autonomous Separation of Traffic Flows in Smart Reversible Lanes." Complexity 2019 (October 30, 2019): 1–12. http://dx.doi.org/10.1155/2019/2893732.

Full text
Abstract:
Spacer bars in the smart reversible lanes make periodically broadcast of messages to share their local observed traffic information with each other. This aims to help other spacer bars acquire the global traffic information and make consistent movement when separating the flows. However, radio interference and vehicles in the traffic may degrade the qualities of wireless communication links and cause frequent message losses in the broadcast. Existing solutions tend to use data forwarding to enhance the message dissemination, which may cause imbalanced load in the spacer bars. For instance, the nodes close to the sink have to forward more messages, whereas the ones far away from the sink have fewer messages for forwarding. The unbalanced distribution of network load has a high risk of blocking the wireless communication links and yield inconsistent movement in the reversible lanes. In this paper, we propose a Cooperative Bargain (CoB) scheme where each spacer bar carries some received messages to help other spacer bars recover their lost messages. Since the spacer bars can only acquire the local information, we formulate a cooperative bargain game to negotiate how to allocate the task of message recovery with a balanced network load until a consensus is achieved. CoB is evaluated with the real-world Wi-Fi communication traces in Isti/rural. Simulation results show that CoB can recover an average of 98.6% messages within 100 milliseconds in a 50-node network. CoB does not require the global network information but it can still achieve a comparable performance to other broadcast schemes.
APA, Harvard, Vancouver, ISO, and other styles
9

Davis, Joel J. "The Effects of Message Framing on Response to Environmental Communications." Journalism & Mass Communication Quarterly 72, no. 2 (June 1995): 285–99. http://dx.doi.org/10.1177/107769909507200203.

Full text
Abstract:
This research explores how the framing of environmental communication influences attitudes and environmentally responsible behaviors, such as recycling. Communications were framed in terms of the definition of the problem (gains and losses), the target (current and future generations), and recommended activities (“taking less,” as in conservation, or “doing more,” as in recycling). The communication that discussed losses to the current generation gave rise to the most positive responses to the communication and the highest levels of intent to participate in environmentally-responsible behaviors. Activity framing did not exert any influence on attitudes or behavioral intentions.
APA, Harvard, Vancouver, ISO, and other styles
10

Khalifa, Mohamed K. S. "دراسة أداء مُصنِّف مـقـترح لخوارزمية هجينة لإكتشاف التصيد الاحتيالي عبر البريد الإلكتروني." International Science and Technology Journal 36, no. 1 (January 1, 2025): 1–28. https://doi.org/10.62341/mksk1904.

Full text
Abstract:
This research aims to study the effectiveness and performance of the proposed classifier to detect phishing emails, because there is an urgent need to develop information security systems that are accurately and proactively able to recognize phishing messages due to their increasing number and diversity of fraudulent capabilities. Since this type of phishing message manipulates human emotions leading to fears and creates a situation of urgency by claiming that the recipient must take immediate and swift action, which may lead to financial losses or significant data leakage losses. In order to overcome the human weakness in detecting and recognizing phishing emails, this study was conducted because we need to continuously enhance and improve the accuracy and effectiveness of automated and automatic phishing detection algorithms and methods. The proposed classification model utilizes a hybrid algorithm that combines deep learning (DL) multi-layer perceptron (MLP) neural network algorithms and natural language processing (NLP) methods on the body of the received email. This paper highlights the importance of examining the textual features of the body of a mail message for phishing detection, using multi-layer perceptron (MLP) neural networks to analyze the accuracy of detecting phishing through the message text, and because text features represent a relatively new direction of study in the field of email phishing detection. The proposed model was tested on a balanced and labeled dataset of 8579 different messages, and the results showed an improvement in classification accuracy and performance compared to other deep learning methods. The proposed classifier model was evaluated using the following metrics: (Recall, Accuracy, Precision, and F-measure), and the results were obtained - 98.3%, 98.2%, 98.5%, and 98.55%, respectively. The model also showed good performance and took a short time to detect; to produce an overall accuracy rate of over 98.1% and a low false positive rate (FPR) of 0.015. Keywords: Phishing Email detection, MultiLayer Perceptron (MLP) Neural Network, Deep learning (DL), Natural language processing (NLP), Algorithms, Information security
APA, Harvard, Vancouver, ISO, and other styles
11

Abdul-Barik, Alhassan, Issah Mubasir, and Alhassan Salamudeen. "Fast Implementation of the Rivest-Shamir-Adleman (RSA) Algorithm with Robust Packet Data Loss Detection Function." Asian Journal of Engineering and Applied Technology 10, no. 2 (November 5, 2021): 19–24. http://dx.doi.org/10.51983/ajeat-2021.10.2.3058.

Full text
Abstract:
Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travels over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art schemes.
APA, Harvard, Vancouver, ISO, and other styles
12

Redondo, Ignacio, and Diana Serrano. "Incentivizing Video-on-Demand Subscription Intention Through Tiered Discounts and Anti-Piracy Messages." Journal of Theoretical and Applied Electronic Commerce Research 20, no. 1 (January 10, 2025): 9. https://doi.org/10.3390/jtaer20010009.

Full text
Abstract:
Subscription video-on-demand (SVOD) platforms face high churn rates and substantial revenue losses from SVOD content piracy, all of which limit their ability to invest in acquiring/creating content compelling enough to win and retain subscribers. Based on social exchange theory, this study argues that platforms can improve relationships with SVOD content users by offering tiered discounts in exchange for advertising/loyalty and by promoting anti-piracy messages with a prosocial (threatening) approach that emphasizes harm to filmmakers (punishment for pirates). We hypothesize that these incentives enhance subscription intention when the incentive specifications (advertising levels, loyalty levels, message approach, and message credibility) match the public’s heterogeneous dispositions (advertising attitude, loyalty attitude, justice sensitivity, and fear of punishment). In a survey on the intention to subscribe to a hypothetical new platform, we confirmed the hypothesized interactions for advertising-based discounts, loyalty-based discounts, and prosocial messages, but did not find support for threatening messages. Further exploration showed that the evaluation of platform content was much more influential than any other incentive and that tiered loyalty discounts had a remarkable capacity to enhance subscription intention. This study’s findings may help shape incentives that are more satisfying to users and ultimately more profitable for platforms.
APA, Harvard, Vancouver, ISO, and other styles
13

Altunay, Hakan Can, and Zafer Albayrak. "SMS Spam Detection System Based on Deep Learning Architectures for Turkish and English Messages." Applied Sciences 14, no. 24 (December 17, 2024): 11804. https://doi.org/10.3390/app142411804.

Full text
Abstract:
Short Message Service (SMS) still continues its existence despite the emergence of different messaging services. It plays a part in our lives as a communication service. Companies use SMS for advertisement purposes due to the fact that e-mail filtering systems have rooted, short message systems are being undersold by the operators, and spam detection and blocking systems used for short messages are ineffective. Individuals falling victim to SMS spam messages sent by malevolent persons incur pecuniary and non-pecuniary losses. The aim of this study is to present a hybrid model proposal with the intention of detecting SMS spam messages. This detection model uses a gated recurrent unit (GRU) and convolutional neural network (CNN) as two deep learning methods. However, the fact that both algorithms require high memory capacities is a limitation. The design for this model was laid out by using two different datasets containing combined text messages written in the Turkish and English languages. The datasets used in the study are TurkishSMSCollection and the SMS Spam dataset from the UCI database. The testing process was performed on the dataset through benchmarking as well as other machine learning algorithms. It was revealed in the study that the hybrid CNN + GRU approach attained an accuracy of 99.07% by demonstrating a better performance compared to the other algorithms.
APA, Harvard, Vancouver, ISO, and other styles
14

Neil, Jordan M., Yuchiao Chang, Brett Goshe, Nancy Rigotti, Irina Gonzalez, Saif Hawari, Lauren Ballini, et al. "A Web-Based Intervention to Increase Smokers’ Intentions to Participate in a Cessation Study Offered at the Point of Lung Screening: Factorial Randomized Trial." JMIR Formative Research 5, no. 6 (June 30, 2021): e28952. http://dx.doi.org/10.2196/28952.

Full text
Abstract:
Background Screen ASSIST is a cessation trial offered to current smokers at the point of lung cancer screening. Because of the unique position of promoting a prevention behavior (smoking cessation) within the context of a detection behavior (lung cancer screening), this study employed prospect theory to design and formatively evaluate a targeted recruitment video prior to trial launch. Objective The aim of this study was to identify which message frames were most effective at promoting intent to participate in a smoking cessation study. Methods Participants were recruited from a proprietary opt-in online panel company and randomized to a 2 (benefits of quitting vs risks of continuing to smoke at the time of lung screening; BvR) × 2 (gains of participating vs losses of not participating in a cessation study; GvL) message design experiment (N=314). The primary outcome was self-assessed intent to participate in a smoking cessation study. Message effectiveness and lung cancer risk perception measures were also collected. Analysis of variance examined the main effect of the 2 message factors and a least absolute shrinkage and selection operator (LASSO) approach identified predictors of intent to participate in a multivariable model. A mediation analysis was conducted to determine the direct and indirect effects of message factors on intent to participate in a cessation study. Results A total of 296 participants completed the intervention. There were no significant differences in intent to participate in a smoking cessation study between message frames (P=.12 and P=.61). In the multivariable model, quit importance (P<.001), perceived message relevance (P<.001), and affective risk response (ie, worry about developing lung cancer; P<.001) were significant predictors of intent to participate. The benefits of quitting frame significantly increased affective risk response (Meanbenefits 2.60 vs Meanrisk 2.40; P=.03), which mediated the relationship between message frame and intent to participate (b=0.24; 95% CI 0.01-0.47; P=.03). Conclusions This study provides theoretical and practical guidance on how to design and evaluate proactive recruitment messages for a cessation trial. Based on our findings, we conclude that heavy smokers are more responsive to recruitment messages that frame the benefits of quitting as it increased affective risk response, which predicted greater intention to participate in a smoking cessation study.
APA, Harvard, Vancouver, ISO, and other styles
15

Brandt, A., and H. Sulanke. "A Queueing Network Model for a Communication System with Channel Allocation." Probability in the Engineering and Informational Sciences 5, no. 2 (April 1991): 171–83. http://dx.doi.org/10.1017/s026996480000200x.

Full text
Abstract:
A communication system of n stations is studied. Poisson arrival streams of messages enter the stations and require transmission to a destination station. Each station is equipped with k channels and has a waiting room for messages. For transmission of a message, one channel is needed both at the arrival and at the destination station. The transmission time is exponentially distributed. Messages are lost (possibly after a waiting time) if, at the destination station, all channels are busy. The queueing network model is of the nonproduct type. Sufficient conditions for the existence of an equilibrium distribution are given. For determining the losses at the n stations, a heuristical approximation that requires us to solve a system of nonlinear equations is developed. For this, an efficient iterative numerical algorithm is given. Simulation studies show that the approximation is accurate enough for larger n.
APA, Harvard, Vancouver, ISO, and other styles
16

Ghostine, Rony, Jean-Marc Thiriet, and Jean-François Aubry. "Variable delays and message losses: Influence on the reliability of a control loop." Reliability Engineering & System Safety 96, no. 1 (January 2011): 160–71. http://dx.doi.org/10.1016/j.ress.2010.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hajisheykhi, Reza, Ling Zhu, Mahesh Arumugam, Murat Demirbas, and Sandeep Kulkarni. "“Slow is Fast” for wireless sensor networks in the presence of message losses." Journal of Parallel and Distributed Computing 77 (March 2015): 41–57. http://dx.doi.org/10.1016/j.jpdc.2014.11.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ishii, Hideaki, and Shinji Hara. "A subband coding approach to control under limited data rates and message losses." Automatica 44, no. 4 (April 2008): 1141–48. http://dx.doi.org/10.1016/j.automatica.2007.09.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rizky, Muhammad Fajar, Muhammad Syahrizal, and Soeb Aripin. "Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat." Journal of Computer System and Informatics (JoSYC) 2, no. 4 (August 31, 2021): 288–94. http://dx.doi.org/10.47065/josyc.v2i4.819.

Full text
Abstract:
In securing voice messages, information sent through the internet network must be authenticated for its authenticity, data content, delivery time, and so on. To prevent data manipulation by irresponsible parties, the creation of a data leak that has a negative impact. The occurrence of data leaks that most users are still not aware of. This can happen due to the lack of security of the message itself which results in problems that arise and also losses by certain authoritarian parties. The solution in securing voice messages using modern cryptographic techniques that have been combined with NRZI encoding and the Feistel network by Pisanc Cipher, is a way to maintain the authenticity and accuracy of data or authentication in voice messages. It is useful to look for the characteristics of good encryption, namely confusion and diffusion. This results in a higher level of security. By using the Pisanc Cipher method to secure voice messages, it can generate security and authenticate data to prevent data leakage. In addition, another benefit of using the Pisanc Cipher method is to maintain the authenticity of voice messages.
APA, Harvard, Vancouver, ISO, and other styles
20

Fauzan Muhammad, Rizqi, and Mirzai Baidawi. "PPA Preventive Fire System." Eduvest - Journal of Universal Studies 4, no. 3 (March 20, 2024): 1123–29. http://dx.doi.org/10.59188/eduvest.v4i3.1106.

Full text
Abstract:
Fire incidents are something that every company must be aware of, because they can cause material and non-material losses. To deal with fires, a fire prevention and control system is needed. This system emphasizes preparation to prevent fires and can handle fires. However, the existence of a fire prevention and control system does not guarantee that a fire will not occur unless the fire prevention and control system is implemented well. Fire prevention program from PT PPA is a very important program to maintain the security, safety and successful operation of company facilities. Companies in the fuel storage area. The PPA preventive fire system is a digitalization program for detecting early indication of a series of fires. In principle, the PPA preventive fire system takes temperature readings in the fuel storage area which can then provide notifications or alerts to stakeholders in the fuel storage area using a certain algorithm so that they can provide messages via SMS (Short Message Service), WhatsApp Message and E-Mail. . Implementation of this system is an important step in mining work areas as the first preventive measure in the event of a fire.
APA, Harvard, Vancouver, ISO, and other styles
21

Cabral, Pedro Henrique Diehl, Patrícia Pain, Márcia Bianchi, and Romina Batista de Lucena de Souza. "IMPRESSION MANAGEMENT THROUGH THE ASSERTIVENESS OF FINANCIAL ANALYSTS’ FORECASTS." RINTERPAP - Revista Interdisciplinar de Pesquisas Aplicadas 1, no. 2 (January 20, 2023): 72–89. http://dx.doi.org/10.47682/2675-6552.a2022v1n2p72-89.

Full text
Abstract:
Voluntary disclosure of financial accounting information aims to reduce the effects of agency relationship and informational asymmetry. Due to its non-mandatory character, such disclosure is subject to moral hazard, and may become a biased report of management performance. The Management Reports are presented as a space used by managers for voluntary disclosures, instructing the reading of the mandatory statements which they accompany. In this way, the reports become spaces where Impression Management can occur. Thus, the aim of this study was to analyze the relationship of Print Management in management communication with the quality of profit forecasts made by financial analysts of publicly-held companies enrolled in the Associação Brasileira das Companhias Abertas (ABRASCA) Award from 2016 to 2019 and that presented a message to shareholders in their Management Reports. Messages to shareholders were submitted to content analysis to determine the positive and/or negative character of the message phrases. The results obtained contribute to formulators and users of information by indicating that the assertiveness of analysts' forecasts for one year impacts voluntary disclosure in the message from management to shareholders for the following year. Thus, the manager's decision on "what" and "how" to report also takes into account factors external to the companies, using external sources to, in addition to reducing agency problems and informational asymmetry, practice Impression Management, making it clearer the information provided so that the market has an adequate perspective of future gains and losses.
APA, Harvard, Vancouver, ISO, and other styles
22

Kamal, A. H. M. "Steganography: Securing Message in wireless network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 3 (April 30, 2013): 797–801. http://dx.doi.org/10.24297/ijct.v4i3.4200.

Full text
Abstract:
Steganography is the process of hiding a secret message with in a cover medium. However eavesdropper may guess the embedding algorithm like least significant bit (LSB) replacement of Chan et al, 2004; Wang et al, 2001; Wu et al, 2005, LSB matching of Mielikainen, 2006, addition and/or subtraction of Andead wastfield, 2001; F. Huang et al in 2011, Exploiting Modification Direction by Zhang and Wang, 2006, Binary Space Partition by Tsai and Wang, 2007, modulus function of Chin et al, 2011 and thus can apply the respective extraction method to detect the secret message. So challenges lies in the methodologies of embedding message. Capacity, security and robustness are the services to be demanded by users. Again the true-positive rate of secret message detection by eavesdropper should be lessened by applying firm technique. Thirdly operating domain should be less sensitive to the noise, margin level of losses or alteration of data while communicating through unguided medium like wireless network, sensor network and cellular network. This paper will briefly discuss the steganographic methods and their experimental results explained in the survey paper of Niels Provos and Peter Honeyman to hide and seek message. Finally the proposed results and the directions for future works are addressed.
APA, Harvard, Vancouver, ISO, and other styles
23

Abramov, Sergey, Vladimir Roganov, Valeriy Osipov, and German Matveev. "Implementation of the LAMMPS package using T-system with an Open Architecture." Informatics and Automation 20, no. 4 (August 11, 2021): 971–99. http://dx.doi.org/10.15622/ia.20.4.8.

Full text
Abstract:
Supercomputer applications are usually implemented in the C, C++, and Fortran programming languages using different versions of the Message Passing Interface library. The "T-system" project (OpenTS) studies the issues of automatic dynamic parallelization of programs. In practical terms, the implementation of applications in a mixed (hybrid) style is relevant, when one part of the application is written in the paradigm of automatic dynamic parallelization of programs and does not use any primitives of the MPI library, and the other part of it is written using the Message Passing Interface library. In this case, the library is used, which is a part of the T-system and is called DMPI (Dynamic Message Passing Interface). In this way, it is necessary to evaluate the effectiveness of the MPI implementation available in the T-system. The purpose of this work is to examine the effectiveness of DMPI implementation in the T-system. In a classic MPI application, 0% of the code is implemented using automatic dynamic parallelization of programs and 100% of the code is implemented in the form of a regular Message Passing Interface program. For comparative analysis, at the beginning the code is executed on the standard Message Passing Interface, for which it was originally written, and then it is executed using the DMPI library taken from the developed T-system. Сomparing the effectiveness of the approaches, the performance losses and the prospects for using a hybrid programming style are evaluated. As a result of the conducted experimental studies for different types of computational problems, it was possible to make sure that the efficiency losses are negligible. This allowed to formulate the direction of further work on the T-system and the most promising options for building hybrid applications. Thus, this article presents the results of the comparative tests of LAMMPS application using OpenMPI and using OpenTS DMPI. The test results confirm the effectiveness of the DMPI implementation in the OpenTS parallel programming environment
APA, Harvard, Vancouver, ISO, and other styles
24

Kazbaev, A. V., E. E. Kitaeva, and E. V. Gerasimova. "ANALYSIS OF PROVIDING OF INFORMATION EXCHANGE ON SHORTWAVE AND ULTRASHORT WAVE CHANNELS." Issues of radio electronics, no. 12 (December 20, 2018): 14–19. http://dx.doi.org/10.21778/2218-5453-2018-12-14-19.

Full text
Abstract:
The analysis of a possibility of use of two main transport protocols is carried out: Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) for the organization of information exchange for short-wave (SW) and ultrashort-wave (USW) communication channels. Research of dependence of time of delivery of UDP packets of the different size on data transmission rate and value of losses in SW and USW communication systems is conducted. On the basis of data retrieved correlation of time of finishing the guaranteed message and flow capacity of noisy low‑speed communication channels is calculated and constructed, and also influence of quantity of the lost packets for the period of delivery of one message is investigated. During the analysis of transfer of the message with the guaranteed delivery several methods of the organization of information exchange with use of the UDP protocol were considered.
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Mei-Wen, Tsung-Hsun Wu, Wei-Yen Lin, Kun-Chan Lan, Chien-Ming Chou, and Chung-Hsien Hsu. "On the Feasibility of Using 802.11p for Communication of Electronic Toll Collection Systems." ISRN Communications and Networking 2011 (October 11, 2011): 1–11. http://dx.doi.org/10.5402/2011/723814.

Full text
Abstract:
In an 802.11p (the so-called DSRC) network, the WSMP protocol is used for the communication between OBU and RSU. Unlike a wired network, an 802.11p wireless network is prone to fading, shadowing, and interferences, which might result in high error rates. However, there is no reliability mechanism embedded in the WSMP protocol, which can become an important issue for mission-critical ITS applications such as ETC (Electronic Toll Collection). In this work, we develop a protocol on top of WSMP to build a reliable session for the message exchanges between RSU and OBU. Our protocol uses a timer-based mechanism for the message retransmission in the case of message losses. In this paper, we first describe the design of our session protocol and evaluate its performance for ETC communication in simulations. We then discuss the implementation of our protocol on the ITRI WAVE box and evaluate its effectiveness on real roads.
APA, Harvard, Vancouver, ISO, and other styles
26

Petrocchi, Serena, Ramona Ludolph, Nanon H. M. Labrie, and Peter Schulz. "Application of the theory of regulatory fit to promote adherence to evidence-based breast cancer screening recommendations: experimental versus longitudinal evidence." BMJ Open 10, no. 11 (November 2020): e037748. http://dx.doi.org/10.1136/bmjopen-2020-037748.

Full text
Abstract:
ObjectivesTo reduce overtreatment caused by overuse of screening, it is advisable to reduce the demand for mammography screening outside the recommended guidelines among women who are not yet eligible for inclusion in systematic screening programmes. According to principles of regulatory fit theory, people make decisions motivated by either orientation to achieving and maximising gains or avoiding losses. A study developed in two phases investigated whether video messages, explaining the risks and benefits of mammography screening for those not yet eligible, are perceived as persuasiveDesignPhase 1 was an experimental study in which women’s motivation orientation was experimentally induced and then they were exposed to a matching video message about mammography screening. A control group received a neutral stimulus. Phase 2 introduced a longitudinal component to study 1, adding a condition in which the messages did not match with the group’s motivation orientation. Participants’ natural motivation orientation was measured through a validated questionnaireParticipants360 women participated in phase 1 and another 292 in phase 2. Participants’ age ranged from 30 to 45 years, and had no history of breast cancer or known BReast CAncer gene (BRCA) 1/2 mutation.ResultsIn phase 1, a match between participants’ motivation orientation and message content decreased the intention to seek mammography screening outside the recommended guidelines. Phase 2, however, did not show such an effect. Fear of breast cancer and risk perception were significantly related to intention to seek mammography screeningConclusionsPublic health researchers should consider reducing the impact of negative emotions (ie, fear of breast cancer) and risk perception when promoting adherence to evidence-based breast cancer screening recommendations.
APA, Harvard, Vancouver, ISO, and other styles
27

Yu, Tong, Xiaming Chen, Zhuo Xu, and Jianlong Xu. "MP-GCN: A Phishing Nodes Detection Approach via Graph Convolution Network for Ethereum." Applied Sciences 12, no. 14 (July 20, 2022): 7294. http://dx.doi.org/10.3390/app12147294.

Full text
Abstract:
Blockchain is making a big impact in various applications, but it is also attracting a variety of cybercrimes. In blockchain, phishing transfers the victim’s virtual currency to make huge profits through fraud, which poses a threat to the blockchain ecosystem. To avoid greater losses, Ethereum, one of the blockchain platforms, can provide information to detect phishing fraud. In this study, to effectively detect phishing nodes, we propose a phishing node detection approach as message passing based graph convolution network. We first form a transaction network through the transaction records of Ethereum and then extract the information of nodes effectively via message passing. Finally, we use a graph convolution network to classify the normal and phishing nodes. Experiments show that our method is effective and superior to other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
28

Bagye, Wire, Tsurayya Azizah, and Muhammad Fauzi Zulkarnaen. "ALAT PENGAMAN KANDANG BERBASIS MIKROKONTROLER ARDUINO UNO." Jurnal Informatika dan Rekayasa Elektronik 1, no. 2 (November 30, 2018): 62. http://dx.doi.org/10.36595/jire.v1i2.61.

Full text
Abstract:
The occurrence of theft is often in the chicken coop, the impact of this theft is that farmers experience material losses so that the farmer is no longer raising chickens. security system applied by the owner of the cage by way of patrolling at night. even though the patrol has been carried out, there are still frequent thefts because thieves are lurking in patrol activities, theft occurs when the owner of the house is unaware. a tool that is able to provide information that there are people who enter the cage to owners who work indefinitely. The analytical method that will be used in this study is the SWOT method (Strength, Weakness, Opportunity, Threat). This method is used by researchers to collect information and conduct needs analysis. To solve the problem, a safety device with Arduino was built, a pir sensor, an 800L SIM. The enclosure safety device works to detect human body heat with the PIR Motion sensor, if there is a human crossing the Arduino sensor area it gives a signal to the 800L SIM to send a message to the cellphone owner's cellphone. The message informs that there are humans in the chicken coop. results of the test showed that 100% of case can be sent by Alat Pengaman Kandang Ayam Berbasis Mikrokontroler Arduino, namely from 20 attempts to produce 20 messages to cellphone owners with vulnerable time of 3 seconds
APA, Harvard, Vancouver, ISO, and other styles
29

Hamed Albishri, Suhaib Abdullah, Tasnim Hamed Fadhl Alkhaziri, Malath Salim Khalfan AlYahmadi, and Dr Bazeer Ahmed Bagrudeen. "A Comprehensive Web Based Platform for Phishing Message Detection." International Innovative Research Journal of Engineering and Technology 10, no. 1 (September 30, 2024): 1–8. https://doi.org/10.32595/iirjet.org/v9i4.2024.196.

Full text
Abstract:
The persistent threat of phishing attacks looms large over the digital sphere, posing indiscriminate risks to users and organizations alike, leading to substantial financial losses and data breaches. In response to this growing menace, this paper introduces an innovative web platform engineered specifically to combat the escalating sophistication of phishing messages. At the heart of its design lies the fusion of advanced machine learning algorithms, natural language processing techniques, and behavioural analysis, facilitating the real-time identification and mitigation of phishing attempts. Distinguishing itself from prior solutions, our platform embraces a multifaceted strategy, amalgamating URL analysis, email content scrutiny, and user behaviour tracking to pinpoint malicious messages accurately, thereby fortifying cybersecurity resilience. Through meticulous testing and validation, our platform demonstrates exceptional effectiveness in thwarting phishing assaults, surpassing prevailing methodologies by a significant margin. Featuring an intuitive user interface, the platform equips both individuals and enterprises with the tools to swiftly assess the legitimacy of incoming communications, thereby reducing susceptibility to phishing scams. Our methodology represents a notable departure from traditional approaches, presenting a comprehensive solution adept at countering the evolving tactics employed by cyber adversaries. In sum, this web platform emerges as a pivotal advancement in the battle against phishing threats, fortifying cybersecurity defences in an increasingly precarious online environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Leelawat, Natt, Ampan Laosunthara, Jing Tang, Anawat Suppasri, Anat Ruangrassamee, Prasert Akkharaprathompong, and Fumihiko Imamura. "The 2011 Great East Japan Earthquake and Tsunami: A Message from Japan to Thailand." Journal of Disaster Research 16, no. 6 (September 15, 2021): 908–13. http://dx.doi.org/10.20965/jdr.2021.p0908.

Full text
Abstract:
Thailand was among the countries that suffered losses and damage as a result of the 2004 Indian Ocean tsunami disaster. Ten years have passed since the 2011 Great East Japan earthquake and tsunami. The various lessons learned and research on the 2011 disaster in Japan have reached Thailand. This can be seen in the numerous interactive activities associated to the World Tsunami Awareness Day, as well as several tsunami-related research and development programs applied to the country. This article summarizes those activities and highlights key examples. It also acts as a conduit for related communication between the two countries, Japan and Thailand.
APA, Harvard, Vancouver, ISO, and other styles
31

Singh, Vikram, and Jaspal Ramola. "Secure Communications Over Wireless Broadcast Networks." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (April 30, 2014): 01–05. http://dx.doi.org/10.53555/nneee.v1i4.244.

Full text
Abstract:
Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications. In this paper wireless broadcast network model(WBN) with secrecy constraints is investigated, in which a source node broadcasts confidential message flows to user nodes, with each message intended to be decoded accurately by one user and to be kept secret from all other users. In the existing system we developed, and implemented a compromised router detection protocol (DP) that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses (CPL) that will occur. Each and every packet is encrypted so that to prevent the data from eavesdropping. So the data is much secured.
APA, Harvard, Vancouver, ISO, and other styles
32

Oomen, J., C. Van den Ende, and H. Das. "POS1500-HPR BABS ON A MISSION: AN EXPERIMENTAL STUDY ON THE EFFECTS OF MESSAGE FRAMING AND THE USE OF A PATIENT TESTIMONIAL ON BELIEFS AND INTENTIONS OF OSTEOARTHRITIS PATIENTS." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 1095.2–1096. http://dx.doi.org/10.1136/annrheumdis-2022-eular.2021.

Full text
Abstract:
BackgroundIt is important that patients receive appropriate and reliable information that effectively targets beliefs in order for them to adhere to health behaviors. Framing (focusing on either gains or losses; [1]) is one of the most commonly used techniques in health communication to influence beliefs. In addition, the use of a testimonial in educational material might strengthen effects as intentions to adhere to health behaviors seem to rely strongly on testimonies of other patients. However, little is known about the potential of framing and patient testimonies to impact beliefs and change in health behaviors in osteoarthritis (OA).ObjectivesTo study the effects of 1) message framing and 2) patient testimonies on beliefs about and intentions to be physically active and use pain medication.MethodsWe conducted an experiment consisting of a 2 (gain-frame vs loss-frame) x 2 (testimonial versus informative message) factorial design. Members of a research panel (n=639) with a self-reported diagnosis of knee OA were invited to participate. Participants were randomized into one of four video messages applying framing and the use of either a testimonial or facts. The messages (mean (SD) words 1073 (129)) were audiotaped by the same female speaker, subtitled, and complemented with images (duration of ~10 minutes). The four different combinations were: informative-loss (“If you are not physically active, this can lead to more pain[…].”), informative-gain (“If you are physically active, this can lead to less pain[…].”), testimonial-loss (“When I wasn’t physically active, I experienced more pain[…].”), testimonial-gain (“When I was physically active, I experienced less pain[…].”). After this video, participants filled out a questionnaire on socio-demographic and disease characteristics, and rated 3 statements concerning beliefs on a 7-point Likert scale (completely disagree – completely agree), and one 7-point Likert scale item on intentions (I do not do this now and am not planning doing this – I am doing this already for more than 6 months) each for both physical activity and pain medication based on the Theory of Planned behavior questionnaire [2]. ANOVA was used to assess the main and interaction effects of framing and the use of a testimonial on mean beliefs and intentions.ResultsA total of 154 respondents completed the questionnaire (Table 1). Framing nor the use of a testimonial impacted beliefs and intentions on physical activity. Loss framing resulted in more positive beliefs about pain medication (mean (SD) 5.5 (1.6)) than gain framing (mean (SD) 4.9 (1.9), p=.04, 95% CI [0.0, 0.1]). Within the loss frame, the patient testimonial scored significantly more positive on pain medication beliefs (mean (SD) 5.0 (1.7)) than the informative message (mean (SD) 6.0 (1.1), p=.02, 95% CI [0.1, 1.6]) (Figure 1).Table 1.Characteristics of participants (n=154)Female, n (%)110 (71)Age (in years), mean (SD)62.3 (7.9)BMI, mean [kg/m2], (SD)27.3 (4.4)Daily functioning (KOOSa; 0-100), mean (SD)64.5 (18.0)Pain VAS (0-10), mean (SD)4.6 (2.2)Symptoms for more than five years, n (%)96 (62.3)Presence of OA in other joints, n (%)85 (55.2)Knee replacement, n (%)32 (20.8)Presence of comorbidities, n (%)111 (72.0)Figure 1.Interaction of framing and the use of a patient testimonial on beliefs about pain medicationConclusionThis study showed that stating the disadvantages of nonadherence to pain medication resulted in more positive beliefs about pain medication than stating the advantages of adherence. The use of a patient testimonial within this loss frame strengthened the effect. Our findings indicate that health care providers should be aware of the potential effects of emphasising either gains or losses in educational messages to their patients.References[1]Rothman, A.J. and P. Salovey, Shaping perceptions to motivate healthy behavior: the role of message framing. Psychol Bull, 1997. 121(1): p. 3-19.[2]Ajzen, I., Constructing a Theory of Planned Behavior Questionnaire. 2006. 1-12.Disclosure of InterestsNone declared
APA, Harvard, Vancouver, ISO, and other styles
33

S, Sumaiya Sheerin, and Jayalakshmi V. "Analysis of Clustering Algorithm in Securing VANETs." International Journal of Emerging Research in Management and Technology 6, no. 8 (June 25, 2018): 200. http://dx.doi.org/10.23956/ijermt.v6i8.140.

Full text
Abstract:
Security of wired and wireless networks is the most challengeable in today’s computer world. Computer and the development of network technology and its application cause the decrease in the Security of the system. It improves the attention of the people because once the data has been destroyed; it is a tedious process to recollect the lost data which causes the interrupt in the network and the performance. The main goal of VANET is to disseminate safety messages from Source to destination without negotiating security. The nodes in VANET is rich in mobility henceforth, there are many challenges to route the packets to their final destination. VANETs are themselves vulnerable against attacks that can directlylead to the corruption of networks and then possibly provoke big losses of time, money, and even liveshowever; malicious vehicle may trace the message which causes vulnerability to other vehicles. Clustering is one solution to improve the security against malicious vehicles. In this work, a security mechanism has been incorporated by analysis of clustering Algorithm such as MMV(Monitoring Malicious Vehicle) algorithm and CSMV(Clustering Surveillance Malicious Vehicle)algorithm.
APA, Harvard, Vancouver, ISO, and other styles
34

R, Gokul, and Felix M. Philip. "Phishing Detection." YMER Digital 21, no. 06 (June 15, 2022): 405–12. http://dx.doi.org/10.37896/ymer21.06/39.

Full text
Abstract:
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present. Moreover, phishing emails are growing at an alarming rate in recent years. Therefore, more effective phishing detection technology is needed to curb the threat of phishing emails. So There are many ways to detect these phishing mails nowadays using Machine Learning. so using the phishing mail detector where these links could be tested and then predicted and to detect whether it is a spam or not. Keywords: Phishing mail, Social engineering, Machine learning
APA, Harvard, Vancouver, ISO, and other styles
35

Castelo, Noah, Elizabeth Hardy, Julian House, Nina Mazar, Claire Tsai, and Min Zhao. "Moving citizens online: Using salience & message framing to motivate behavior change." Behavioral Science & Policy 1, no. 2 (October 2015): 57–68. http://dx.doi.org/10.1177/237946151500100207.

Full text
Abstract:
To improve efficiency and reduce costs, government agencies provide more and more services online. Yet, sometimes people do not access these new services. For example, prior to our field experiment intervention, Ontario spent $35 million annually on infrastructure needed for in-person license plate sticker renewals. In Canada's most populous province, only 10% of renewals occurred online. Our intervention tested variations in messaging mailed with sticker renewal forms that encouraged consumers to renew online. We changed text and color on the envelope to try to make the benefits of the online service more salient. In addition, changes to text and color on the renewal form itself emphasized either consumer gains from online renewals or losses associated with in-person renewals. Each intervention increased use of the online service when compared to the unaltered messaging. The combination of salience and gain framing achieved the highest number of online renewals: a 41.7% relative increase.
APA, Harvard, Vancouver, ISO, and other styles
36

Ke, Yi Kuan, Pei Hwa Huang, Chia Yu Hsu, and Bo Yuan Huang. "Study on Communication Protocol Application in Smart Grid." Applied Mechanics and Materials 284-287 (January 2013): 3235–39. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3235.

Full text
Abstract:
The main purpose of this paper is to study the application of IEC61850 in the smart grid. Smart grid is going through significant development due to the inclusion of microgrid in a view to increasing power capability and decreasing power losses and pollution. IEC61850 provides one feasible solution for integrating various functions of intelligent devices in the smart grid. The message interchange via IEC61850 is based on TCP/IP network protocol and the broadcasting mode. It is found that the information communication among Intelligent Electronic Devices (IEDs) can be achieved by the proposed network protocol based on IEC61850 and GOOSE application.
APA, Harvard, Vancouver, ISO, and other styles
37

Segun, Shokenu Emmanuel, Oke Alice Oluwafunke, Ogbewey Leonard Iyase, Elijah Aduragbemi Aransiola, Monsuru Abolade Adeagbo, Bakare Alimat Abisola, and Babatunde Joshua Dada. "An Automatic Traffic Violation Ticketing System Using Radio Frequency Identification (RFID) Technology." Journal of Engineering Research and Reports 25, no. 1 (May 3, 2023): 61–69. http://dx.doi.org/10.9734/jerr/2023/v25i1870.

Full text
Abstract:
Travel convenience is impacted by a number of factors, including the condition of the road, traffic, length of trip, accidents, speed, etc. The daily increase in accident rates poses the biggest concern. These events not only result in fatalities but also increase the nation's financial losses. Traffic congestion is brought on by road users' lack of discipline and sentiments, which may result in traffic offenses. The goals of this research are to curb any traffic infractions as well as reduce corruption and nepotism on the road. This system was developed using an Atmega328 microcontroller, which instructs the system to identify any driver who violates a traffic light and send an SMS message to the violator and the road management of the violation and the location where it was done. This identification is done with the help of a radio frequency identification (RFID) reader, which gets the unique ID of the vehicle and sends back the information to the microcontroller, which now instructs the GSM module to send the SMS message.
APA, Harvard, Vancouver, ISO, and other styles
38

Arnold, Christopher. "Message to the “Journal of Disaster Research”." Journal of Disaster Research 1, no. 1 (August 1, 2006): 4. http://dx.doi.org/10.20965/jdr.2006.p0004.

Full text
Abstract:
Publication of the new “Journal of Disaster Research” is most timely. The last two years have wreaked death and destruction around the world with a savagery that has caused widespread discussion, recrimination and concern for the future. It is clear that, in spite of the great progress in knowledge in the last few decades, much remains to be discovered about the characteristics of nature’s forces and how we can design, construct and retrofit to combat them. This work is the traditional role of scientist and engineers. It is also clear that much of the new found knowledge is not being implemented and our social and economic institutions are ineffective at ensuring that the best information is put to use. Preparing for and responding to nature’s extreme events is a social, economic and political problem and research in these areas must parallel the traditional areas of scientific and engineering research. The expressed viewpoint of the Journal of Disaster Research as multidisciplinary for both technology and social systems is right on target. Neither system can solve the problems on its own: we need true multidisciplinary approaches in which both research and practice are conducted by integrated teams that encompass the whole range of technological, social, economic and political issues. We need to improve communication between the public, the experts, the response officials and workers, the scientists and the politicians. Japan is located in a key position within the Pacific Rim. This region is both a critical area for a wide range of natural disasters, including earthquake, tsunamis, floods and high winds. As such, it is world laboratory for studying the effects of these events and our attempts to respond to them to reduce casualties and economic losses. Japanese researchers and response officials have gathered invaluable information over the last few decades in both the technological and social fields which they have shared at many international conferences, seminars and private discussions. In the United States we have instituted a number of joint research programs with our Japanese colleagues and visited each other’s cities to share information on preparing for and recovering from these inevitable events. The Journal of Disaster Research, with its distinguished board of editors, will be an invaluable resource in sharing our knowledge. The advent of international terrorism has added a new and unwelcome dimension to the disaster scene. The field is still in its infancy and much research is needed. Some of the lessons from combating natural disasters can be used in the terrorism situation, but also many new problems are introduced. We must come to terms with the difference between the deliberate attempts to provoke a disaster compared to nature’s random initiation of disastrous events. Christopher Arnold, Palo Alto, California, USA, June 7, 2006
APA, Harvard, Vancouver, ISO, and other styles
39

Suwarjono, Suwarjono, Izak Habel Wayangkau, Teddy Istanto, Rachmat Rachmat, Marsujitullah Marsujitullah, Hariyanto Hariyanto, Wahyu Caesarendra, Stanislaw Legutko, and Adam Glowacz. "Design of a Home Fire Detection System Using Arduino and SMS Gateway." Knowledge 1, no. 1 (November 10, 2021): 61–74. http://dx.doi.org/10.3390/knowledge1010007.

Full text
Abstract:
Fire is a problem that can happen at any time. Delay in coping with house fires can induce in loss of human life or material. If the fire is not held severely, incidents like house fires can occur and create more significant losses, especially with the increasing number of residents’ settlements in the formation of huddled houses, which will be more challenging to handle in case of a fire. This research aims to build a prototype system that quickly helps house owners and firefighters to detect fires and gas leaks. This home fire detection system is utilized to measure room temperature and gas levels in a room, then the output of this system is sending information of short messages and alarms. The results revealed that the prototype room with a scale of 1:25, 1:50, and 1:75 which uses a temperature sensor and a gas sensor could run as desired. In 10 testing trials, the system works according to the designed plan, which means the system could interpret the temperature and gas leakage of a room, then the system will send a short message and ring the alarm.
APA, Harvard, Vancouver, ISO, and other styles
40

Mohammed Alhaj, Ali Albashir. "An Investigation of Omission and Addition Phenomena in Quranic English Translation of Nessim Joseph Dawood: A Morpho-Syntactic and Ideo-Cultural Analytical Study." Advances in Language and Literary Studies 11, no. 6 (December 31, 2020): 63. http://dx.doi.org/10.7575/aiac.alls.v.11n.6p.63.

Full text
Abstract:
Omission and addition Phenomena in Quranic English Translation are two important issues that grasped the attention of many researchers in translation studies. This study aimed at investigating of omission and addition phenomena in Quranic English Translation of Nessim Joseph Dawood: with special reference to eight selected translated ayah -Surat Yusuf- Ayah-verse (18), Surat Al-Ma’arij, Verse( ayah:17), Surrat Al-Muddathir, ayah (11), Surat Maryam, Ayah (35), Surat Al-Qalam, Ayah (1), Surat Al-Baqarah, Ayah (186), Surat Al’Imran, Ayah:41), and Surrat Al-Jaathiya, Ayah:28).-Qualitative descriptive approach was adopted by the researcher to analyze the data extracted from Nessim Joseph Dawood’s English translation of the aforementioned Surahs. The study revealed losses occurring in translating some morpho-syntactic dimensions such as omitting and admission of important Quranic lexemes. contributed to semantic losses. One kind of such losses is a morph-syntactic loss, which sometimes takes place because of ideo-cultural divergences between the source language and the target language, (that is, Quranic Arabic language and the intended language, English language) This study recommended that omission and addition translation strategies should not be employed by the translators of the Holy Quran to reduce loss in the Quranic translation to maintain the intensity of the Message.
APA, Harvard, Vancouver, ISO, and other styles
41

Roider, Karl A. "The Habsburg Foreign Ministry and Political Reform, 1801–1805." Central European History 22, no. 2 (June 1989): 160–82. http://dx.doi.org/10.1017/s0008938900011481.

Full text
Abstract:
On 6 December 1800, a courier galloped through the gates of Vienna, rushed to the Hofburg, the winter palace of the Habsburgs, and presented to Emperor Francis II a bitter message from Archduke John, the emperor's brother and commander of the Austrian armed forces in Germany. The message read that three days earlier the archduke's troops had engaged the French army under Jean Moreau at Hohenlinden, had suffered serious losses, and were falling back to Salzburg with the officers struggling to maintain order in the ranks while they did so. The news was a crushing blow to Francis. In 1799 the Austrians had begun the War of the Second Coalition with high hopes of reversing the years of defeat at the hands of Revolutionary France. Russia and Britain had agreed to cooperate closely with Austria; France seemed weaker than ever domestically; and Napoleon Bonaparte, who had caused Vienna such grief in 1797, was far away in Egypt trying to inflict damage upon the British Empire. But these hopes turned to ashes. Russia abandoned the Coalition after its army suffered serious losses in Switzerland—indeed, in their wake the Russian ruler, Tsar Paul, had thundered so vehemently against what he saw as Austrian treachery that he had broken relations with Vienna—; Britain had been able to provide much needed funds but not more-needed soldiers; and Bonaparte had returned to work his magic on both the French army and the French people. The result was Hohenlinden, Austrian defeat, and in February 1800 the Treaty of Lunéville that ceded to France primary influence in Germany and Italy.
APA, Harvard, Vancouver, ISO, and other styles
42

N., Bhalaji. "PERFORMANCE EVALUATION OF FLYING WIRELESS NETWORK WITH VANET ROUTING PROTOCOL." Journal of ISMAC 01, no. 01 (June 23, 2016): 56–70. http://dx.doi.org/10.36548/jismac.2019.1.005.

Full text
Abstract:
The growing amount of vehicles on roadway is the key motivating the establishing of the road safety with comfort and undisturbed traffic flowing. Vehicular adhoc network is a trending wireless methodology that enable an unwired connection between the automobiles to have a highly secured driving with comfort. The vehicles connected wirelessly communicates with its nearby vehicle with the help of an on road circuitry and the mobile circuitry inside the automobile, sharing information either as caution preventing from unwanted fatalities or a guidance in travel. These automobile networks are crafted using the vehicles as their motile nodes and are instantaneously framed on the availability of the automobiles without the support of the ground stations may also be noted as flying wireless network due to their high motility. The conveyance between the vehicles is subjected to two strides. As a conveyance between automobile to automobile and the automobile to ground station. These wireless communication are to be pillared by the proper entrenchment of the message path to evade the unnecessary incidents. The prevailing methods of finding the path and to have formal delivery, suffers loss either by delaying incurred or the high bandwidth usage or reduced network life span with message losses. The proposed provides a well-engineered methodology to have enhanced reliable information sharing ensuring an infallible functioning with minimized delay, extended network lifespan, and an unfailing handing over to avoid the information losses provided with the optimized road safety and comfort. The proposed system is evaluated on the grounds of delay, network lifespan, and packet delivery ratio to confirm its well-ordered functioning when compared to the existing methods.
APA, Harvard, Vancouver, ISO, and other styles
43

Burkov, Artem. "Signal power and energy-per-bit optimization problems in systems mMTC." Information and Control Systems, no. 5 (October 26, 2021): 51–58. http://dx.doi.org/10.31799/1684-8853-2021-5-51-58.

Full text
Abstract:
Introduction: Currently, the issues of Internet of Things technology are being actively studied. The operation of a large number of various self-powered sensors is within the framework of a massive machine-type communication scenario, using random access methods. Topical issues in this type of communication are how to reduce the transmission signal power and to increase the device lifetime by reducing the consumed energy per bit. Purpose: Formulation and analysis of the problems of minimizing the transmission power and consumed energy per bit in systems with or without retransmissions in order to obtain the achievability bounds. Results: A model of the system is described, within which four problems are formulated and described, concerning the signal power minimization and energy consumption for given parameters (the number of information bits, the spectral efficiency of the system, and the Packet Delivery Ratio). The numerical results of solving these optimization problems are presented. They make it possible to obtain the achievability bounds for the considered characteristics in systems with or without losses. The lower bounds obtained by the Shannon formula are also presented, assuming that the message length is not limited. The obtained results showed that solving the minimization problem with respect to one of the parameters (signal power or consumed energy per bit) does not minimize the second parameter. This difference is most significant for information messages of a small length, which is common in IoT scenarios. Practical relevance: The results obtained allow you to assess the potential for minimizing the transmission signal power and consumed energy per bit in random multiple access systems with massive machine-type communication scenarios. Discussion: The presented problems were solved without taking into account the average delay of message transmission; the introduction of such a limitation should increase the transmitted signal power and consumed energy per bit.
APA, Harvard, Vancouver, ISO, and other styles
44

Syahwir, Irawati Dewi, Agus Samsi, Vera Firmansyah, Prasetyo Wibowo Yunanto, Renanda Maheswara, and Navieda Putri Anggraeni. "INTERNET OF THINGS OF ELECTRONIC SEAL BASE ON GPRS SHORT MESSAGE SERVICE AND THINGSPEAK." Spektra: Jurnal Fisika dan Aplikasinya 4, no. 3 (December 30, 2019): 125–32. http://dx.doi.org/10.21009/spektra.043.03.

Full text
Abstract:
The field of metrology is mainly legal metrology; seals are closely related to the guarantee or validity of a measuring instrument. Seals are designed so that it is not easy for other parties to open the seal. Seal damage must be identified as soon as possible. The application of the Internet of Things (IoT) is needed in the process of sending data in real-time. IoT technology can be applied to electronic seals to know and record the condition of the measuring device. Broken seals caused by irresponsible parties can cause losses to consumers and owners of measuring instruments. Electronic seals are expected to be able to detect seal damage caused by abuse of authority or fraud. The broken seal will send data to the server as well as SMS (Short Message Service) to the related party. Electronic seals can send damage data via SMS within 20 seconds with a success rate of 92% and sending data through the ThingSpeak web server within 40 seconds with a success rate of 82%.
APA, Harvard, Vancouver, ISO, and other styles
45

Law, Beverly, William Moomaw, Tara Hudiburg, William Schlesinger, John Sterman, and George Woodwell. "Creating Strategic Reserves to Protect Forest Carbon and Reduce Biodiversity Losses in the United States." Land 11, no. 5 (May 11, 2022): 721. http://dx.doi.org/10.3390/land11050721.

Full text
Abstract:
This paper provides a review and comparison of strategies to increase forest carbon, and reduce species losses for climate change mitigation and adaptation in the United States. It compares forest management strategies and actions that are taking place or being proposed to reduce wildfire risk and to increase carbon storage with recent research findings. International agreements state that safeguarding biodiversity and ecosystems is fundamental to climate resilience with respect to climate change impacts on them, and their roles in adaptation and mitigation. The recent Intergovernmental Panel on Climate Change report on impacts, mitigation, and adaptation found, and member countries agreed, that maintaining the resilience of biodiversity and ecosystem services at a global scale is “fundamental” for climate mitigation and adaptation, and requires “effective and equitable conservation of approximately 30 to 50% of Earth’s land, freshwater and ocean areas, including current near-natural ecosystems.” Our key message is that many of the current and proposed forest management actions in the United States are not consistent with climate goals, and that preserving 30 to 50% of lands for their carbon, biodiversity and water is feasible, effective, and necessary for achieving them.
APA, Harvard, Vancouver, ISO, and other styles
46

Gomez, Carles, Juan Carlos Veras, Rafael Vidal, Lluís Casals, and Josep Paradells. "A Sigfox Energy Consumption Model." Sensors 19, no. 3 (February 7, 2019): 681. http://dx.doi.org/10.3390/s19030681.

Full text
Abstract:
Sigfox has become one of the main Low-Power Wide Area Network (LPWAN) technologies, as it has attracted the attention of the industry, academy and standards development organizations in recent years. Sigfox devices, such as sensors or actuators, are expected to run on limited energy sources; therefore, it is crucial to investigate the energy consumption of Sigfox. However, the literature has only focused on this topic to a very limited extent. This paper presents an analytical model that characterizes device current consumption, device lifetime and energy cost of data delivery with Sigfox. In order to capture a realistic behavior, the model has been derived from measurements carried out on a real Sigfox hardware module. The model allows quantifying the impact of relevant Sigfox parameters and mechanisms, as well as frame losses, on Sigfox device energy performance. Among others, evaluation results show that the considered Sigfox device, powered by a 2400 mAh battery, can achieve a theoretical lifetime of 1.5 or 2.5 years while sending one message every 10 min at 100 bit/s or 600 bit/s, respectively, and an asymptotic lifetime of 14.6 years as the message transmission rate decreases.
APA, Harvard, Vancouver, ISO, and other styles
47

Alfian, Muhammad. "Implementation Of Encryption And Hidden Data Using Tiny Encryption Algorithm And End Of File." Journal Basic Science and Technology 10, no. 3 (October 30, 2021): 93–98. http://dx.doi.org/10.35335/jbst.v10i3.1759.

Full text
Abstract:
Security and confidentiality of data is one important aspect of an information system. The information can be misused very large losses in high-profile cases such as vital information confidential corporate, customer data banks and etc. Information security solutions in one of them can be used with cryptography. Cryptographic algorithms used in this study is a tiny encryption algorithm. Cryptographic data security attacks can always wear can occur, with this in mind the authors added security techniques to perform data hiding with the media as a placeholder, this term is called steganography. Steganography is used in this study is the end of the file. These techniques make the process of data hiding which is located at the end of the image, so it does not affect the image quality of the reservoir. In this study, a system built using microsoft visual studio 2010 C#. This system can work well, but has a color image blur caused to the container caused by the inserted message, where the greater the size of the message was inserted then color the image blur that arises will be many more.
APA, Harvard, Vancouver, ISO, and other styles
48

Akhromkin, Ye M., I. V. Zablodska, and A. O. Akhromkin. "PROBLEMS OF ENERGY SAVING IN APARTMENT BUILDINGS: ECONOMIC AND LEGAL ASPECT." Economics and Law, no. 4 (December 15, 2020): 89–94. http://dx.doi.org/10.15407/econlaw.2020.04.089.

Full text
Abstract:
The article highlights the results of a study of the economic and legal aspects of energy saving in associations of co-owners of apartment buildings in Ukraine. It is determined that a large number of apartment buildings inhabitants have already taken advantage of borrowing funds for energy modernization of their homes. The article presents the classification of the main losses of electricity and states that along with the term “losses of electricity”, the term “losses of electricity in electrical networks during its transportation” and “technological losses of electricity” are widely used. Modern electricity losses also include direct thefts of electricity, which are caused by deliberate changes in the circuits of measuring transformers of current, voltage, measuring circuits and electricity meters, as well as data changes in information systems for distortion. It is noted that in recent years the legislative framework of Ukraine has significantly improved, a large number of modern regulations have been developed to stimulate increased conscious electricity consumption by setting clear limits on the responsibility of businesses for the operation of their own utilities (including electricity) by establishing instrumental control on the border of balance ownership of objects. Such changes in the legislative field are dictated by the reorientation of Ukraine to European norms of thinking and management standards, the main message of which is the economic stimulation of the development of the energy sector. The considered normative legal acts regulating the issue of installation of general household commercial electricity meters allowed to come to the conclusion that the state, with the help of the National Commission for State Regulation of Energy and Utilities, consciously takes into account future electricity losses in tariffs for service distribution (transmission) of electricity. This approach is unacceptable due to the violation of the principle of fairness and efficiency. The article emphasizes that energy saving should become not just a priority for Ukraine, but one of the main goals on the way to building the country's economy.
APA, Harvard, Vancouver, ISO, and other styles
49

Rahmawati, Rahmawati. "Perlindungan hukum pemegang kartu kredit yang dirugikan dengan penawaran asuransi menggunakan media elektronik." Jurnal Cakrawala Hukum 13, no. 1 (April 22, 2022): 78–87. http://dx.doi.org/10.26905/idjch.v13i1.7439.

Full text
Abstract:
This research concerns the protection of credit card customers who are harmed by the provider through telemarketing or short messages and other forms of responsibility for credit cardholders. The study of normative law is carried out with a statutory, conceptual, and case approach, as well as the purpose of grammatical, systematic, and theological interpretation. The results of this study indicate that with the Circular of the Financial Services Authority No. 12/SE.07/OJK/2014 regarding the delivery of information related to the marketing of fund products or financial services, preventive measures can be taken. Every financial service actor to stop any business offering their products and services by telephone or short message, Bank Indonesia Regulation Number: 7/6 / PBI / 2005 concerning Calculation of Information Disclosure of Banking Products and Use of Customer Personal Data, as well as the Civil Code. In the form of repressive legal protection against criminal, civil and administrative sanctions. The criminal threat that can be imposed is a maximum imprisonment of (four) years. As well as civil sanctions in the form of compensation for a number of losses suffered by the Customer (cardholder).How to cite item: Rahmawati (2022). Perlindungan hukum pemegang kartu kredit yang dirugikan dengan penawaran asuransi menggunakan media elektronik. Jurnal Cakrawala Hukum, 13(1). doi:10.26905/idjch.v13i1.7439.
APA, Harvard, Vancouver, ISO, and other styles
50

Diédié, Gokou Hervé Fabrice, Koigny Fabrice Kouassi, and Tchimou N’ Takpé. "CFMS: A Cluster-based Convergecast Framework for Dense Multi-Sink Wireless Sensor Networks." International Journal of Wireless & Mobile Networks 15, no. 1 (February 27, 2023): 1–19. http://dx.doi.org/10.5121/ijwmn.2023.15101.

Full text
Abstract:
Convergecast is one of the most challenging tasks in Wireless Sensor Networks (WSNs). Indeed, this data collection process must be conducted while copying with packet collisions, nodes’ congestion or data redundancy. These issues always result in energy waste which is detrimental to network efficiency and lifetime. This paper is aimed to address these problems in large-scale multi-sink WSNs. Inspired by our previous work MSCP, we designed a lightweight protocol stack that seamlessly combines clustering, pathvector routing, sinks’ duty cycling, data aggregation and transmission scheduling in order to minimise message overhead and packet losses. Simulation results show that this solution can mitigate delay while significantly increasing packet delivery and network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography