To see the other types of publications on this topic, follow the link: Message processing.

Journal articles on the topic 'Message processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Message processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rhodes, Nancy. "Fear-Appeal Messages: Message Processing and Affective Attitudes." Communication Research 44, no. 7 (January 11, 2015): 952–75. http://dx.doi.org/10.1177/0093650214565916.

Full text
Abstract:
Theories of fear appeals suggest that fear-inducing messages can be effective, but public service announcements (PSAs) that emphasize fear do not always lead to desired change in behavior. To better understand how fear-inducing PSAs are processed, an experiment testing the effects of exposure to safe-driving messages is reported. College students ( N = 108) viewed PSAs of varying message sensation value (MSV). Results indicated that messages with medium MSV resulted in intentions to drive more slowly than messages with low or high MSV. Measures of affective attitudes indicated that medium MSV messages resulted in fast driving being rated as less fun and exciting than those of either high or low MSV. These affective evaluations mediated the effect of message exposure on driving intention. Message derogation was not related to message intensity. Production of message-related thoughts decreased, and emotional thoughts increased with message intensity. This decrease in processing of message content suggested a limited capacity explanation for the effect of highly intense fear appeals.
APA, Harvard, Vancouver, ISO, and other styles
2

Hong, Cheng, and Cong Li. "The Effect of “Anonymous Reviewer”: A Study of Anonymity, Affect Intensity, and Message Valence in the Cyberspace." Journal of Language and Social Psychology 36, no. 5 (March 1, 2017): 504–24. http://dx.doi.org/10.1177/0261927x17697358.

Full text
Abstract:
This study aims to illustrate how anonymity, together with affect intensity and message valence, affects message receivers’ responses. A 2 (anonymous vs. revealed identity) × 2 (low vs. high affect intensity) × 2 (positive vs. negative valence) between-subjects experiment was conducted. It was found that when message affect intensity was low, an anonymous message was more effective in generating trust toward the message and message processing depth than a message with an identified sender. However, such a difference was insignificant when affect intensity was high. Moreover, a significant interaction effect between affect intensity and message valence was found on message processing depth. When affect intensity was high, a positive message elicited more message processing. When affect intensity was low, there was no significant difference between positive and negative messages.
APA, Harvard, Vancouver, ISO, and other styles
3

Donné, Lennie, John Hoeks, and Carel Jansen. "Talking about health messages." Dutch Journal of Applied Linguistics 5, no. 2 (December 31, 2016): 126–44. http://dx.doi.org/10.1075/dujal.5.2.02don.

Full text
Abstract:
Interpersonal communication has been shown to influence health campaign outcomes, but little is known about ways in which conversations can actually be elicited. In this correlational study, we tested the assumption that perceived complexity of the message can be a predictor of interpersonal communication. Forty participants were exposed to six different health messages varying in perceived complexity. The results show that the more the message was perceived as complex, the longer it took to understand it. Longer message processing times, in turn, were associated with higher intentions to talk, but only about messages that were of low personal relevance. When messages had a high personal relevance, longer processing times were associated with lower intentions to talk. Apparently, if a message is clearly relevant, longer processing due to perceived complexity is detrimental to the occurrence of interpersonal communication.
APA, Harvard, Vancouver, ISO, and other styles
4

Fahrudin, Tora, Kastaman Kastaman, Sherin Nadya Meideni, Padma Edhitya Chairunnisafa Priyono, Muhammad Galang Fathirkina, and Samira Samira. "Smart Dissemination by Using Natural Language Processing Technology." Journal of Information Systems Engineering and Business Intelligence 6, no. 2 (October 27, 2020): 133. http://dx.doi.org/10.20473/jisebi.6.2.133-142.

Full text
Abstract:
Background: Recently, WhatsApp has become the world's most popular text and voice messaging application with 1.5 billion users. A lot of WhatsApp Application Programming Interface (API) has also been established to be connected to other applications. On the other hand, the development of natural language processing (NLP) for WhatsApp messages has snowballed. There are extensive studies on the dissemination information using WhatsApp but the study on NLP involving data from WhatsApp is lacking.Objective: This study aims to implement NLP in smart dissemination applications by using WhatsApp API.Methods: We build a framework that embeds an intelligent system based on the NLP in WhatsApp API to disseminate a dynamic message. Some of the sentences are used to evaluate the accuracy of this application.Results: Smart dissemination consists of dynamic filter and dynamic content. Dynamic filter was conducted by using the POS tagger and clause statement. Meanwhile, dynamic content was built by using the replace MySQL function. There are twofold limitation: the application could not transform a message that matches rule <3> with conjunction “dan”; has the same attribute before and after <CC> tag; and the maximum of the logical operator is one type for coordinating conjunction (AND/OR) in one sentence.Conclusion: Our framework can be used for dynamic dissemination of messages using dynamic message content and dynamic message recipient with an accuracy of 95% from twenty sample messages.
APA, Harvard, Vancouver, ISO, and other styles
5

Volkov, Andrey Anatol’evich, and Sergey Vladimirovich Antonov. "Algorithm of restoring unambiguity in the system of distance emergency alerts from persons with disabilities." Vestnik MGSU, no. 11 (November 2015): 186–92. http://dx.doi.org/10.22227/1997-0935.2015.11.186-192.

Full text
Abstract:
Usually a message on fire or other emergency is sent to operations control by a witness. The situation causes stress. That’s why it may be difficult to understand the meaning of the witness’s text message because of pressing adjacent letters or T9 mistakes. So an operator may take such a message for spam and may not react adequately. Though if the system of “Smart House” is equipped with the module of processing Messages-112, the problem will be solved. The article analyzes the way of processing the messages to Messages-112 from persons with disabilities in the system of “Smart House”. The authors offer a variant of recovering unambiguity of notion sense from messages with errors of T9 and possible accidental pressing of adjacent letters. The system looks for key words, reduces noise, chooses the target rescue services and redirects the message to them.
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Stephen M., and Richard E. Petty. "Message Framing and Persuasion: A Message Processing Analysis." Personality and Social Psychology Bulletin 22, no. 3 (March 1996): 257–68. http://dx.doi.org/10.1177/0146167296223004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brankovic, Marija, and Iris Zezelj. "The effects of matching a persuasive message to a recipient's self-concept on attitude change." Psihologija 43, no. 3 (2010): 233–51. http://dx.doi.org/10.2298/psi1003233b.

Full text
Abstract:
The paper addresses the question of whether matching a persuasive message to a recipient's self-concept can enhance message processing. A large body of experiments within the Elaboration likelihood model proved that framing a message so as to be perceived as selfrelevant led to more careful argument scrutiny. In this research, we matched the messages with previously assessed need for cognition - tendency to engage in and enjoy effortful cognitive tasks. Two possible sources of motivation to process a persuasive message were hereby confronted: dispositional (cognitive style) and situational (matching). Results showed a significant attitude change, but the main hypothesis was not confirmed: matched messages did not produce more argument processing activity than the mismatched. Manipulations did not have any significant effects on message processing of the high need for cognition participants. Contrary to expectations, participants low in their need for cognition elaborated the message more carefully when it was mismatched, that is when the message addressed them as persons inclined to careful thinking. Results can be explained within the framework of self-affirmation theory, which argues that providing people with an opportunity to affirm their sense of selfworth makes them more open to persuasion attempts, as well as more objective. Results are discussed from a wider theoretical and empirical perspective of motivation.
APA, Harvard, Vancouver, ISO, and other styles
8

Mastorakos, George, Aditya Khurana, Ming Huang, Sunyang Fu, Ahmad P. Tafti, Jungwei Fan, and Hongfang Liu. "Probing Patient Messages Enhanced by Natural Language Processing: A Top-Down Message Corpus Analysis." Health Data Science 2021 (June 16, 2021): 1–10. http://dx.doi.org/10.34133/2021/1504854.

Full text
Abstract:
Background. Patients increasingly use asynchronous communication platforms to converse with care teams. Natural language processing (NLP) to classify content and automate triage of these messages has great potential to enhance clinical efficiency. We characterize the contents of a corpus of portal messages generated by patients using NLP methods. We aim to demonstrate descriptive analyses of patient text that can contribute to the development of future sophisticated NLP applications. Methods. We collected approximately 3,000 portal messages from the cardiology, dermatology, and gastroenterology departments at Mayo Clinic. After labeling these messages as either Active Symptom, Logistical, Prescription, or Update, we used NER (named entity recognition) to identify medical concepts based on the UMLS library. We hierarchically analyzed the distribution of these messages in terms of departments, message types, medical concepts, and keywords therewithin. Results. Active Symptom and Logistical content types comprised approximately 67% of the message cohort. The “Findings” medical concept had the largest number of keywords across all groupings of content types and departments. “Anatomical Sites” and “Disorders” keywords were more prevalent in Active Symptom messages, while “Drugs” keywords were most prevalent in Prescription messages. Logistical messages tended to have the lower proportions of “Anatomical Sites,”, “Disorders,”, “Drugs,”, and “Findings” keywords when compared to other message content types. Conclusions. This descriptive corpus analysis sheds light on the content and foci of portal messages. The insight into the content and differences among message themes can inform the development of more robust NLP models.
APA, Harvard, Vancouver, ISO, and other styles
9

Yashchenkov, K. G., K. S. Dymko, N. O. Ukhanov, and A. V. Khnykin. "DEVELOPMENT OF AN ALGORITHM FOR FINDING ANOMALIES IN WEATHER REPORTS TO IMPROVE THE QUALITY OF FORECASTS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 203 (May 2021): 45–52. http://dx.doi.org/10.14489/vkit.2021.05.pp.045-052.

Full text
Abstract:
The issues of using data analysis methods to find and correct errors in the reports issued by meteorologists are considered. The features of processing various types of meteorological messages are studied. The advantages and disadvantages of existing methods of classification of text information are considered. The classification methods are compared in order to identify the optimal method that will be used in the developed algorithm for analyzing meteorological messages. The prospects of using each of the methods in the developed algorithm are described. An algorithm for processing the source data is proposed, which consists in using syntactic and logical analysis to preclean the data from various kinds of noise and determine format errors for each type of message. After preliminary preparation the classification method correlates the received set of message characteristics with the previously trained model to determine the error of the current weather report and output the corresponding message to the operator in real time. The software tools used in the algorithm development and implementation processes are described. A complete description of the process of processing a meteorological message is presented from the moment when the message is entered in a text editor until the message is sent to the international weather message exchange service. The developed software is demonstrated, in which the proposed algorithm is implemented, which allows to improve the quality of messages and, as a result, the quality of meteorological forecasts. The results of the implementation of the new algorithm are described by comparing the number of messages containing various types of errors before the implementation of the algorithm and after the implementation.
APA, Harvard, Vancouver, ISO, and other styles
10

Dyjach, Sebastian, and Małgorzata Plechawska-Wójcik. "Efficiency comparison of message brokers." Journal of Computer Sciences Institute 31 (June 30, 2024): 116–23. http://dx.doi.org/10.35784/jcsi.6084.

Full text
Abstract:
The aim of the article is to compare three main brokers used in the development of web applications: RabbitMQ, Apache Kafka and Apache Pulsar. To conduct the research, a custom application was created to compare two key metrics in the context of message queue performance. These metrics are: latency and number of processed messages per second. The conducted experiments showed that in scenarios requiring processing of backlogged messages by the broker and in cases of minimizing the impact of the SSL protocol on broker performance, Apache Pulsar proved to be the best solu­tion. In the scenario examining message delivery delays, RabbitMQ turned out to be the best tool, while in the case of examining the stability of message processing in real-time, the best results were achieved with Apache Kafka.
APA, Harvard, Vancouver, ISO, and other styles
11

Brinker, David L., Yanmengqian Zhou, Michelle L. Acevedo Callejas, and Erina L. MacGeorge. "Increasing Information Seeking About Antibiotic Risks: Testing a Clinical Intervention Message Using the Risk Information Seeking and Processing Model." Science Communication 42, no. 2 (April 2020): 218–43. http://dx.doi.org/10.1177/1075547020914610.

Full text
Abstract:
We employed the risk information seeking and processing (RISP) model to inform the design of antibiotic stewardship messages aiming at influencing intentions to seek or avoid antibiotic risk information. College-age respondents ( N = 400) from a national sample viewed one of three versions of a RISP-informed message or no message (control group). Relative to the control group, all RISP-informed messages increased perceptions of information insufficiency. The most complete version of the RISP-informed message increased severity perceptions and information seeking intention and decreased information avoidance intention. Approaches to designing antibiotic stewardship messages are recommended accordingly.
APA, Harvard, Vancouver, ISO, and other styles
12

El Rezen Purba, Doni, and Desinta Purba. "Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (March 1, 2021): 1–4. http://dx.doi.org/10.54209/infosains.v11i1.18.

Full text
Abstract:
For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
APA, Harvard, Vancouver, ISO, and other styles
13

Amelink, Herman, Anthony M. Forte, and Robert P. Guberman. "Dispatcher Alarm and Message Processing." IEEE Power Engineering Review PER-6, no. 8 (August 1986): 45. http://dx.doi.org/10.1109/mper.1986.5527796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hero, A. "Signal processing identity [President's message]." IEEE Signal Processing Magazine 23, no. 4 (2006): 4. http://dx.doi.org/10.1109/msp.2006.1657808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hero, Alfred. "Signal Processing Education [President's Message]." IEEE Signal Processing Magazine 24, no. 3 (May 2007): 4. http://dx.doi.org/10.1109/msp.2007.361590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kaveh, Mostafa. "Signal Processing Everywhere [President's Message]." IEEE Signal Processing Magazine 28, no. 2 (March 2011): 6. http://dx.doi.org/10.1109/msp.2010.940131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Amelink, Herman, Anthony M. Forte, and Robert P. Guberman. "Dispatcher Alarm and Message Processing." IEEE Transactions on Power Systems 1, no. 3 (1986): 188–94. http://dx.doi.org/10.1109/tpwrs.1986.4334980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Baron, Robert, Henrietta Logan, Jeff Lilly, Mary Inman, and Michael Brennan. "Negative Emotion and Message Processing." Journal of Experimental Social Psychology 30, no. 2 (March 1994): 181–201. http://dx.doi.org/10.1006/jesp.1994.1009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hui, S. C., K. Y. Chan, and G. Y. Qian. "Distributed fax message processing system." Journal of Network and Computer Applications 20, no. 2 (April 1997): 171–90. http://dx.doi.org/10.1006/jnca.1997.0045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Tanygin, M. О., A. V. Plugatarev, S. I. Egorov, and A. P. Loktionov. "Method of Determining the Source of Messages Based on Processing the Time of Their Receipt." Proceedings of the Southwest State University 26, no. 3 (February 21, 2023): 81–97. http://dx.doi.org/10.21869/2223-1560-2022-26-3-81-97.

Full text
Abstract:
Purpose of research is to create a method for determining the source of messages in the receiver, which allows, based on the analysis of the characteristics of the distribution of the time of receipt of messages, to increase the reliability of determining the source.Methods. Authentication of the message source is based on statistical analysis of metadata values, which in this study are the time intervals between messages. The metadata processing model is based on the well-known model of receiving messages from the target source in LoRaWAN networks. At the same time, the source was determined using coding methods in the block coupling mode, which provide higher identification reliability for short-length messages characteristic of the specified type of networks. With the help of numerical modeling, the patterns of changes in the characteristics of the time of receipt of messages in the event of an identification error were determined. The decision-making rule is also formulated in case of impossibility of authentication based on processing the contents of identification fields. Studies have shown the effectiveness of the application of the source detection model in various ranges of parameters for the formation of message sequences.Results. The result of the conducted research is the development of an authentication method based on the analysis of the time of receipt of messages to the receiver, which differs in that it uses the characteristics of the distribution of moments of high orders for a series of time delays as the analyzed data. Its use in combination with coding methods in the message concatenation mode reduces the probability of a single message replacement error in a sequence by 4-6 times, compared with methods that perform identification only based on the results of processing the identifiers of the messages themselves.Conclusion. The result of experimental studies has shown the possibility of using the developed method to increase the reliability of determining the authenticity of the source of messages, the possibility of reducing the number of reinquiries that occur when errors are detected, the possibility of reducing the size of additional identifier fields in each message. The resulting effect will be expressed in a general increase in the bandwidth of the communication channel between remote components of a distributed system.
APA, Harvard, Vancouver, ISO, and other styles
21

Kranzler, Elissa C., Ralf Schmälzle, Rui Pei, Robert C. Hornik, and Emily B. Falk. "Message-Elicited Brain Response Moderates the Relationship Between Opportunities for Exposure to Anti-Smoking Messages and Message Recall." Journal of Communication 69, no. 6 (December 2019): 589–611. http://dx.doi.org/10.1093/joc/jqz035.

Full text
Abstract:
Abstract Campaign success is contingent on adequate exposure; however, exposure opportunities (e.g., ad reach/frequency) are imperfect predictors of message recall. We hypothesized that the exposure-recall relationship would be contingent on message processing. We tested moderation hypotheses using 3 data sets pertinent to “The Real Cost” anti-smoking campaign: past 30-day ad recall from a rolling national survey of adolescents aged 13–17 (n = 5,110); ad-specific target rating points (TRPs), measuring ad reach and frequency; and ad-elicited response in brain regions implicated in social processing and memory encoding, from a separate adolescent sample aged 14–17 (n = 40). Average ad-level brain activation in these regions moderates the relationship between national TRPs and large-scale recall (p &lt; .001), such that the positive exposure-recall relationship is more strongly observed for ads that elicit high levels of social processing and memory encoding in the brain. Findings advance communication theory by demonstrating conditional exposure effects, contingent on social and memory processes in the brain.
APA, Harvard, Vancouver, ISO, and other styles
22

Yang, Chengjun, Jiansheng Peng, Yong Xu, Qingjin Wei, Ling Zhou, and Yuna Tang. "Edge Computing-Based VANETs’ Anonymous Message Authentication." Symmetry 14, no. 12 (December 16, 2022): 2662. http://dx.doi.org/10.3390/sym14122662.

Full text
Abstract:
Vehicular Ad-hoc Networks (VANETs) have high requirements for real-time data processing and security of message authentication. In order to solve the computing power asymmetry between vehicles and road side units (RSUs) in VANETs under high-density traffic, accelerate the processing speed of message authentication, and solve the problems of high computational overhead and long message authentication time caused by the use of bilinear pairing encryption technology in similar message-batch-authentication schemes, we propose introducing the concept of edge computing (EC) into VANETs and using idle nodes’ resources to assist the RSU in quickly authenticating messages to achieve computing power load balancing under multiple traffic flows. We propose introducing the idea of edge computing (EC) into VANETs and using idle nodes’ resources to assist RSUs in quickly authenticating messages. This scheme performs two identity-based message authentications based on the identity signature constructed by elliptic curve cryptography (ECC). One of them is the batch authentication of the vehicle sending messages by the RSU-authenticated vehicles with free resources, as temporary edge computing nodes (TENs), and the other is the authentication of the temporary TEN messages by the fixed-edge-node RSUs. The resources of the TEN are used to reduce the computational burden of RSUs and message authentication time, thereby improving the efficiency of system authentication of messages. We performed a security analysis of the scheme to prove its security properties and compared it with other schemes in terms of performance. The experimental results show that our scheme has a transmission overhead of 2400 bytes when there are four TENs, and the number of verification message requests reaches 20, which outperforms other methods. The gap will be more evident as the numbers of TEN and message verification requests increase.
APA, Harvard, Vancouver, ISO, and other styles
23

Yao, Feng, Qian Tao, Wenyuan Yu, Yanfeng Zhang, Shufeng Gong, Qiange Wang, Ge Yu, and Jingren Zhou. "RAGraph: A Region-Aware Framework for Geo-Distributed Graph Processing." Proceedings of the VLDB Endowment 17, no. 3 (November 2023): 264–77. http://dx.doi.org/10.14778/3632093.3632094.

Full text
Abstract:
In many global businesses of multinational enterprises, graph-structure data is usually geographically distributed in different regions to support low-latency services. Geo-distributed graph processing suffers from the Wide Area Networks (WANs) with scarce and heterogeneous bandwidth, thus essentially differs from traditional distributed graph processing. In this paper, we propose RAGraph, a Region-Aware framework for geo-distributed graph processing. At the core of RAGraph, we design a region-aware graph processing framework that allows advancing inefficient global updates locally and enables sensible coordination-free message interactions. RAGraph also contains an adaptive hierarchical message interaction engine to switch interaction modes adaptively based on network heterogeneity and fluctuation, and a discrepancy-aware message filtering strategy to filter important messages. Finally, the experiments show that RAGraph can achieve 1.69X - 40.53X speedup and 20.9% - 97% WAN cost reduction compared with state-of-the-art systems.
APA, Harvard, Vancouver, ISO, and other styles
24

Chou, Frank Kun-Yueh, Abbott Po-Shun Chen, and Vincent Cheng-Lung Lo. "Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility." Sustainability 13, no. 4 (February 4, 2021): 1651. http://dx.doi.org/10.3390/su13041651.

Full text
Abstract:
Influence-based deceptive messages constantly play a critical role in email phishing attacks. However, the literature lacks adequate understanding about how phishing messages with attractive and coercive influence result in the receivers’ adverse consequences. We therefore take the perspective of mindless response and mindful interpretation to address this issue by examining comprehensive relationships among message influence, cognitive processing, and phishing susceptibility. To accomplish this, a survey approach was adopted after a simulated phishing attack was conducted in campuses. Our empirical evidence shows that both message influence and cognitive processing can lead to people being phished, and a combination of different influences can also trigger cognitive processing. This research makes contributions to the literature of information security, persuading influence, and cognitive psychology.
APA, Harvard, Vancouver, ISO, and other styles
25

Teixeira, Eduardo Henrique, and Aletéia Patrícia Favacho de Araújo. "Middleware for Processing Message Queues with Elasticity Support and Sequential Integrity of Asynchronous Message Processing." Journal of Physics: Conference Series 649 (October 19, 2015): 012005. http://dx.doi.org/10.1088/1742-6596/649/1/012005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hojas-Mazo, Wenny, Francisco Maciá-Pérez, José Vicente Berná Martínez, Mailyn Moreno-Espino, Iren Lorenzo Fonseca, and Juan Pavón. "Framework Based on Simulation of Real-World Message Streams to Evaluate Classification Solutions." Algorithms 17, no. 1 (January 21, 2024): 47. http://dx.doi.org/10.3390/a17010047.

Full text
Abstract:
Analysing message streams in a dynamic environment is challenging. Various methods and metrics are used to evaluate message classification solutions, but often fail to realistically simulate the actual environment. As a result, the evaluation can produce overly optimistic results, rendering current solution evaluations inadequate for real-world environments. This paper proposes a framework based on the simulation of real-world message streams to evaluate classification solutions. The framework consists of four modules: message stream simulation, processing, classification and evaluation. The simulation module uses techniques and queueing theory to replicate a real-world message stream. The processing module refines the input messages for optimal classification. The classification module categorises the generated message stream using existing solutions. The evaluation module evaluates the performance of the classification solutions by measuring accuracy, precision and recall. The framework can model different behaviours from different sources, such as different spammers with different attack strategies, press media or social network sources. Each profile generates a message stream that is combined into the main stream for greater realism. A spam detection case study is developed that demonstrates the implementation of the proposed framework and identifies latency and message body obfuscation as critical classification quality parameters.
APA, Harvard, Vancouver, ISO, and other styles
27

Park, Byungho, and Rachel L. Bailey. "Application of Information Introduced to Dynamic Message Processing and Enjoyment." Journal of Media Psychology 30, no. 4 (October 2018): 196–206. http://dx.doi.org/10.1027/1864-1105/a000195.

Full text
Abstract:
Abstract. In an effort to quantify message complexity in such a way that predictions regarding the moment-to-moment cognitive and emotional processing of viewers would be made, Lang and her colleagues devised the coding system information introduced (or ii). This coding system quantifies the number of structural features that are known to consume cognitive resources and considers it in combination with the number of camera changes (cc) in the video, which supply additional cognitive resources owing to their elicitation of an orienting response. This study further validates ii using psychophysiological responses that index cognitive resource allocation and recognition memory. We also pose two novel hypotheses regarding the confluence of controlled and automatic processing and the effect of cognitive overload on enjoyment of messages. Thirty television advertisements were selected from a pool of 172 (all 20 s in length) based on their ii/cc ratio and ratings for their arousing content. Heart rate change over time showed significant deceleration (indicative of increased cognitive resource allocation) for messages with greater ii/cc ratios. Further, recognition memory worsened as ii/cc increased. It was also found that message complexity increases both automatic and controlled allocations to processing, and that the most complex messages may have created a state of cognitive overload, which was received as enjoyable by the participants in this television context.
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Jing Ya, and Yong Zhen Li. "The Design and Realization of the Single-Block Hash Function for the Short Message." Applied Mechanics and Materials 411-414 (September 2013): 53–59. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.53.

Full text
Abstract:
The paper puts forward a message digest algorithm for processing the short message, the Single-Block Hash function, SBH-256. The message digest algorithm designed is processed by 32-step computation only for the characters whose length is less than 256 bits. The algorithm designed solves the shortages and blemish of these traditional message digests effectively, improves the operating efficiency and the length of its output value is 128 bits at the same time, it guarantees the same security with MD5. The experimental results show that the new message digest algorithm guarantees the security and improves the efficiency of short messages processed greatly and overcomes the shortage of traditional message digest algorithms.
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Stella Juhyun. "The Role of Construal Level in Message Effects Research: A Review and Future Directions." Communication Theory 29, no. 3 (December 12, 2018): 231–50. http://dx.doi.org/10.1093/ct/qty030.

Full text
Abstract:
Abstract Construal level theory is a recent psychological theory that examines the relationship between psychological distance and mental construal. However, the theory’s implications for message effects research requires more attention. Construal level theory can guide new hypotheses that test the persuasiveness of certain combinations of message features and tailoring messages to different individual orientations. This is possible as the theory may reveal underlying similarities across disparate message topics, design elements, and message processing styles. Core principles of construal level theory are explicated, and message effects research areas that may benefit from its propositions are reviewed and elaborated upon. Finally, caveats of applying the theory to message effects research and future directions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
30

Xie, Zaipeng, Cheng Ji, Lifeng Xu, Mingyao Xia, and Hongli Cao. "Towards an Optimized Distributed Message Queue System for AIoT Edge Computing: A Reinforcement Learning Approach." Sensors 23, no. 12 (June 8, 2023): 5447. http://dx.doi.org/10.3390/s23125447.

Full text
Abstract:
The convergence of artificial intelligence and the Internet of Things (IoT) has made remarkable strides in the realm of industry. In the context of AIoT edge computing, where IoT devices collect data from diverse sources and send them for real-time processing at edge servers, existing message queue systems face challenges in adapting to changing system conditions, such as fluctuations in the number of devices, message size, and frequency. This necessitates the development of an approach that can effectively decouple message processing and handle workload variations in the AIoT computing environment. This study presents a distributed message system for AIoT edge computing, specifically designed to address the challenges associated with message ordering in such environments. The system incorporates a novel partition selection algorithm (PSA) to ensure message order, balance the load among broker clusters, and enhance the availability of subscribable messages from AIoT edge devices. Furthermore, this study proposes the distributed message system configuration optimization algorithm (DMSCO), based on DDPG, to optimize the performance of the distributed message system. Experimental evaluations demonstrate that, compared to the genetic algorithm and random searching, the DMSCO algorithm can provide a significant improvement in system throughput to meet the specific demands of high-concurrency AIoT edge computing applications.
APA, Harvard, Vancouver, ISO, and other styles
31

Foss, C. "USAF message processing-A case study." IEEE Communications Magazine 24, no. 9 (September 1986): 12–17. http://dx.doi.org/10.1109/mcom.1986.1093158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Panwar, J. S., and Milan Agnihotri. "Advertising message processing amongst urban children." Asia Pacific Journal of Marketing and Logistics 18, no. 4 (October 2006): 303–27. http://dx.doi.org/10.1108/13555850610703263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Shah, Devavrat. "Message-passing in stochastic processing networks." Surveys in Operations Research and Management Science 16, no. 2 (July 2011): 83–104. http://dx.doi.org/10.1016/j.sorms.2011.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Moura, Jose. "What is signal processing? [President's Message." IEEE Signal Processing Magazine 26, no. 6 (November 2009): 6. http://dx.doi.org/10.1109/msp.2009.934636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Greene, Kathryn, Marina Krcmar, Donald L. Rubin, Lynda Henley Walters, and Jerold L. Hale. "Elaboration in Processing Adolescent Health Messages: the Impact of Egocentrism and Sensation Seeking on Message Processing." Journal of Communication 52, no. 4 (December 1, 2002): 812–31. http://dx.doi.org/10.1111/j.1460-2466.2002.tb02575.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Clark, Jason K., Duane T. Wegener, and Leandre R. Fabrigar. "Attitude accessibility and message processing: The moderating role of message position." Journal of Experimental Social Psychology 44, no. 2 (March 2008): 354–61. http://dx.doi.org/10.1016/j.jesp.2006.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cho, Chul-Young, Jun-Pyo Lee, Cheol-Hee Kwon, and Han-Jun Cho. "A Study on Dynamic Message Processing for KVMF Messages based on KVID." Journal of Korea Information and Communications Society 37, no. 2C (February 29, 2012): 173–80. http://dx.doi.org/10.7840/kics.2012.37c.2.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Saktigamawijaya, Janitra, and Gibbran Prathisara. "The audience’s reception to message in Film Miracle in Cell No. 7." Symposium of Literature, Culture, and Communication (SYLECTION) 2022 3, no. 1 (November 22, 2023): 573. http://dx.doi.org/10.12928/sylection.v3i1.14040.

Full text
Abstract:
Film is a powerful and effective communication medium to convey messages to the audience. Not only as entertainment, in the film there are also messages and life values that can be taken as teachings in everyday life. The movie Miracle in Cell No. 7 is one of the films that contains a message in it. As viewers, we are not only connoisseurs but also can interpret any message contained in the film. This can be referred to as reception analysis. The point of view of each audience in interpreting the message in a film is certainly different, there are three audience positions in the process of receiving messages in Stuart Hall's theory, namely Dominant Hegemonic Position, Negotiated Position, and Oppositional Position. The director has a very important role to make the moral message in a film, but the audience also has the right to have different opinions to interpret the message in the film. In Miracle in Cell No. 7, five informants have succeeded in processing and interpreting moral messages well with their respective points of view, four of whom fully agree in interpreting moral messages which fall into the category of dominant hegemonic position. While one other person does not fully agree with the message conveyed but there is another refutation behind the message conveyed which is categorized as negotiated position. The difference in position is influenced by the background knowledge and experience of each subject.
APA, Harvard, Vancouver, ISO, and other styles
39

Katz, Sherri Jean, Sahara Byrne, and Alyssa Irene Kent. "Mitigating the Perception of Threat to Freedom through Abstraction and Distance." Communication Research 44, no. 7 (May 4, 2016): 1046–69. http://dx.doi.org/10.1177/0093650216647534.

Full text
Abstract:
This study tested theoretical relationships between key concepts in psychological reactance theory and construal level theory. Through a 3 × 2 × 2 experiment ( n = 155), we manipulate (1) how abstractly or concretely participants are processing a message, (2) the psychological distance to the message, and (3) whether or not the message restricts choice. Dependent measures include perceptions of threat to freedom and message effectiveness. Results show that increasing abstraction and/or distance can mitigate the perception of threat to freedom that is experienced when a message restricts choice. Furthermore, this process has a subsequent influence on message effectiveness. As the first study to consider the perception of threat to freedom in the context of construal level theory, this experiment furthers understanding of key theoretical relationships. Strategies for the design of successful persuasive messages are discussed.
APA, Harvard, Vancouver, ISO, and other styles
40

Avant, Lloyd L., Alice A. Thieman, and Michael W. O'Boyle. "The Effect of Related and Unrelated Memory Loads on the Prerecognition Visual Processing of Traffic Signs." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 38, no. 14 (October 1994): 916–19. http://dx.doi.org/10.1177/154193129403801426.

Full text
Abstract:
Prerecognition visual processing of traffic signs was evaluated while subjects maintained one of four different types of memory load: low imageability nouns, traffic sign words, random shapes, or traffic sign shapes. Recall was uniformly high (mean=92%) and did not differ among groups. There was a highly significant interaction among groups (different memory loads), sign messages (Stop, Right, Left, Slow), and sign formats (symbol vs. word). Holding random shapes in memory eliminated prerecognition processing differences among sign messages for symbol format signs. However, for all other memory loads, differences among sign messages were significant. Tests across the memory load conditions for each format of each sign message showed that, for the Stop symbol, the Right symbol, and the Right word signs, the various memory load conditions produced no significant differences. For all other sign messages in both symbol and word format, there were significant differences among memory loads. In summary, these data show that the action message presented in traffic signs is being unconsciously processed within the first few milliseconds of visual processing, and that these operations involve unconscious activation of memory processes that store the meanings of various signs.
APA, Harvard, Vancouver, ISO, and other styles
41

Mustikasari, Ratih Pandu, Dian Hutami Rahmawati, and Heidy Arviani. "The Effect of Jingle Exposure in Television Advertising on Brand Awareness in the Elaboration Likelihood Model." Jurnal Spektrum Komunikasi 11, no. 3 (October 17, 2023): 383–92. http://dx.doi.org/10.37826/spektrum.v11i3.533.

Full text
Abstract:
Message processing is a very important part of the communication process. The Elaboration Likelihood Model (ELM) is a communication theory that is in the sociopsychological tradition and focuses on message processing. ELM sees that messages are processed by individuals through two routes, namely central and peripheral. This theory is used to analyze the information processing of respondents to exposure to Oreo advertising jingles on brand awareness. According to Aaker (in Chernatony, McDonald and Wallace, 2011, p. 455), brand awareness itself has four important indicators, namely brand recognition, brand recall, brand dominance and brand knowledge. This research was conducted by experimental method. The results of the hypothesis test show that there is a significant influence between jingles and brand awareness. The path used by respondents in processing the information in this jingle is the peripheral route.
APA, Harvard, Vancouver, ISO, and other styles
42

Tanygin, M. O., and A. A. Chesnokova. "Segmentation of Tree-Like Data Structures and Their Parallel Processing in Authentication Methods Based on Block Coupling Encoding." Proceedings of the Southwest State University 27, no. 4 (March 1, 2024): 62–78. http://dx.doi.org/10.21869/2223-1560-2023-27-4-62-78.

Full text
Abstract:
Purpose of reseach. In the tasks of authenticating groups of messages encoded in the mode of chaining blocks, there is a need for the formation and processing of specific tree-like structures. The contents of such structures, in addition to information about the placement of data in the internal memory of the calculators, describes the relative location of messages in the data stream between subscribers of a peer-to-peer network. This information is necessary to isolate a structured set from the entire message stream to the receiver, for which its source is uniquely determined. Using approaches to segmentation of tree structures allows you to parallelize the processes of adding elements to it and searching for areas corresponding to an authentication error.Methods. The division of the tree structure into areas subject to modification and areas for analysis is based on a metric dynamically formed from message authentication codes – the position of a specific message in a structured set of messages transmitted from the source to the receiver. The value of this metric determines the distance from the root of the tree, which defines the boundary between the two named areasResults. By isolating the modified and analyzed sections of the tree structure, races of processes implementing independent algorithms for working with it are excluded. The possibility of detecting authentication errors before receiving the last message in a structured set of messages is shown. As a result, there is no need to transmit those group messages that were supposed to be sent after the error was detected. Formulas for estimating the average transmission time of multiple messages with sequential and parallel implementation of procedures for the formation and processing of a tree structure containing descriptors of incoming messages to the receiver are given.Conclusion. The paper shows that the parallel implementation of algorithms for adding elements to the tree structure and the algorithm for searching for areas corresponding to an error reduces the average transmission time of a group of messages by 5-12% compared with the sequential implementation of these algorithms. This reduces the load on the communication channel for the target class of systems using block coupling encoding for authentication.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Hyo Jung. "The Effects of Gender and Gain Versus Loss Frame on Processing Breast Cancer Screening Messages." Communication Research 39, no. 3 (November 15, 2011): 385–412. http://dx.doi.org/10.1177/0093650211427557.

Full text
Abstract:
This current study investigated how the gain versus loss framing effect would be moderated by gender of message recipients in the context of breast cancer screening (BCS) intervention that promotes both men and women to recommend regular BCS to their close women. A 2 (male vs. female) x 2 (gain vs. loss) between-subject experiment was conducted using 128 African American participants (mean age = 45.9). The results showed that men and women processed the BCS messages with a different elaboration depth, and also perceived gain- versus loss-framed messages differently. For instance, compared to gain frame loss frame was more effective for women in increasing their message elaboration and supportive thoughts about BCS. In contrast, gain frame was more effective for men in increasing their memory of the BCS messages than loss frame. The findings provided practical implications for health communication practitioners in how to strategically use gain versus loss framing in accordance with their target population.
APA, Harvard, Vancouver, ISO, and other styles
44

Kayarga, Tanuja, and Ananda Kumar S. "Secure Message Dissemination with QoS Guaranteed Routing in Internet of Vehicles." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (October 7, 2023): 325–32. http://dx.doi.org/10.17762/ijritcc.v11i11s.8159.

Full text
Abstract:
Internet of Vehicles (IoV) is a variant of vehicular adhoc network (VANET) where vehicles can communicate with other vehicles, infrastructure devices, parking lots and even pedestrians. Communication to other entities is facilitates through various services like DSRC, C2C-CC. Fake messages can be propagated by attackers for various selfish needs. Complex authentication procedures can affect the propagation of emergency messages. Thus a light weight mechanism to ensure the trust of messages without affecting the delivery deadlines for emergency messages. Addressing this problem, this work proposes a clustering based network topology for IoV where routing is optimized for message dissemination of various classes using hybrid meta-heuristics. In addition, two stage message authentication technique combining collaborative authentication with Bayesian filtering is proposed to verify the authenticity of message. Through simulation analysis, the proposed solution is found to detect fake messages with an accuracy of 96% with 10% lower processing delay compared to existing works.
APA, Harvard, Vancouver, ISO, and other styles
45

Hunt, James M., Michael F. Smith, and Jerome B. Kernan. "Processing Effects of Expectancy-Discrepant Persuasive Messages." Psychological Reports 65, no. 3_suppl2 (December 1989): 1359–76. http://dx.doi.org/10.2466/pr0.1989.65.3f.1359.

Full text
Abstract:
The effects of expectancy disconfirmation on depth of message processing and persuasion were investigated in two experiments on personal selling. In Exp. 1, subjects read an apocryphal sales presentation containing various arguments, one of which was either expected or unexpected in terms of claimed product superiority. Textual location of this manipulated claim was at the end of the message. Consistent with O'Brien and Myers' (1985) reprocessing effect, results indicate that expectancy disconfirmation promotes deeper levels of message analysis, accompanied by more accurate aided message recall (recognition). In addition, the extent to which postmessage attitudes rely on persuasive argumentation is shown to be greater in the case of expectancy disconfirmation. Results from Exp. 2, where disconfirming text appeared at the beginning of the persuasive message, also show a significant disconfirmation effect. Although the pattern of postmessage attitudes does not parallel exactly that found in Exp. 1, a disconfirmation effect, independent of reprocessing, is suggested by several associated cognitive measures.
APA, Harvard, Vancouver, ISO, and other styles
46

Saha, Petr. "Message to the Japan Society of Polymer Processing Polymer Processing." Seikei-Kakou 20, no. 8 (August 20, 2008): 471–72. http://dx.doi.org/10.4325/seikeikakou.20.471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Putrevu, Sanjay. "Differences in Readers' Response towards Advertising versus Publicity." Psychological Reports 96, no. 1 (February 2005): 207–12. http://dx.doi.org/10.2466/pr0.96.1.207-212.

Full text
Abstract:
Publicity is assumed to have higher credibility than advertising prompting communication specialists to call for its use alongside traditional advertising to achieve overall communication goals. To test the differences in readers' response towards advertisements and publicity, a sample of students ( N = 104; 52 men and 52 women) were shown printed messages identified as advertising or publicity. The publicity format appeared to be associated with deeper processing because participants had higher recall, more message-relevant thoughts, and better discrimination for the publicity message. In addition, participants rated the publicity message higher on Source Credibility, Brand Attitude, and Purchase Intent than a comparable advertisement.
APA, Harvard, Vancouver, ISO, and other styles
48

Kaye, Sherrie-Anne, Melanie J. White, and Ioni Lewis. "The use of neurocognitive methods in assessing health communication messages: A systematic review." Journal of Health Psychology 22, no. 12 (February 22, 2016): 1534–51. http://dx.doi.org/10.1177/1359105316630138.

Full text
Abstract:
We review 20 studies that examined persuasive processing and outcomes of health messages using neurocognitive measures. The results suggest that cognitive processes and neural activity in regions thought to reflect self-related processing may be more prominent in the persuasive process of self-relevant messages. Furthermore, activity in the medial prefrontal cortex, the superior temporal gyrus and the middle frontal gyrus were identified as predictors of message effectiveness, with the medial prefrontal cortex accounting for additional variance in behaviour change beyond that accounted for by self-report measures. Incorporating neurocognitive measures may provide a more comprehensive understanding of the processing and outcomes of health messages.
APA, Harvard, Vancouver, ISO, and other styles
49

Lim, Jongtae, Dowoong Pyun, Dojin Choi, Kyoungsoo Bok, and Jaesoo Yoo. "Efficient Dissemination of Safety Messages in Vehicle Ad Hoc Network Environments." Applied Sciences 13, no. 11 (May 23, 2023): 6391. http://dx.doi.org/10.3390/app13116391.

Full text
Abstract:
The number of people owning vehicles has been steadily growing, resulting in increased numbers of vehicles on the roads, making roads more congested, and increasing the risk of accidents. In addition, heavy rain, snow, and fog have increased due to abnormal weather caused by global warming. These bad weather conditions can also affect the safety of vehicles and drivers. The need to disseminate safety messages on the social Internet of Vehicles due to these problems has been steadily increasing. In this paper, we propose an efficient safety message dissemination scheme that focuses on urban environments with high vehicle density and mobility to address these problems. The proposed scheme reduces packet loss by considering frequent cluster departures and subscriptions through an efficient cluster management technique. In a vehicle-to-vehicle environment, the dissemination of safety messages is divided into intracluster and intercluster emergencies, as well as a general safety message dissemination technique. In a vehicle-to-infrastructure environment, the proposed scheme reduces the number of processing requests and duplicate messages made to roadside units (RSUs) through a request operation process for each vehicle and an RSU scheduling technique. We conducted several performance evaluations of message packet loss and the number of RSU processing requests to demonstrate the superiority of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
50

Swart, Lyle C., and Cynthia L. Morgan. "Effects of Subliminal Backward-Recorded Messages on Attitudes." Perceptual and Motor Skills 75, no. 3_suppl (December 1992): 1107–13. http://dx.doi.org/10.2466/pms.1992.75.3f.1107.

Full text
Abstract:
This study was designed to measure the effects of subliminal backward messages on attitudes. It was hypothesized that subliminal backward-recorded messages would influence the attitudes of listeners. Three subliminal backward-recorded messages from a popular song were used. 82 undergraduates were randomly assigned to one of four conditions: a three-message group heard a tape containing the backward messages recorded three times in succession, a six-message group heard a tape with the same backward messages recorded six times in succession, two control groups heard nonbackward recorded music. No statistically significant differences were found between the groups on a posttape attitude questionnaire. The results are discussed in terms of unconscious processing and the tricomponent theory of attitudes and attitude change.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography