Using Mobile Phones and Short Message Service to Deliver Self-Management Interventions for Chronic Conditions: A Meta-Review

2014 ◽  
Vol 11 (2) ◽  
pp. 81-88 ◽  
Author(s):  
Katherine R. Jones ◽  
Nirmala Lekhak ◽  
Napatsawan Kaewluang
2020 ◽  
Vol 5 (2) ◽  
pp. 57
Author(s):  
Putri Yunita ◽  
Masrizal Masrizal ◽  
Fitri Pratiwi

Short Message Service (SMS) is a technology that provides service for sending and receiving messages between cell phones. Every individual, government, private or educational institution cannot be separated from using SMS as one of the information media. One of them is meeting notification information. But SMS technology can only carry limited data. SMS Gateway is a system that bridges mobile phones with the system that becomes a server with SMS as the information. In the SMS Gateway work system, the user's cellular phone sends an SMS containing the written format to access the information needed through the GSM network. The SMS will be received by the SMS Gateway cellular phone which will then be retrieved by the PC using the mfbus protocol via a data cable. Up to the PC, the text format will be processed by the SMS Gateway application program to produce information that will be sent to the SMS Gateway cellular phone using the mfbus protocol via a data cable. After that the information is sent by the SMS Gateway cellular phone to the user's cellular phone. With the SMS Gateway-based meeting notification application, it can provide detailed and concurrent notification of meeting information so that each meeting member can follow according to his schedule.


Author(s):  
Raesul Azhar ◽  
Kurniawan

Mobile phones and smartphones providing the basic features of SMS (Short Message Service).Messages sent through SMS facility sometimes confidential, so that the necessary mechanisms to protect messages from crime. Mechanism that can be used to protect the message is to use a cryptographic algorithm Rijndael. This algorithm is a cryptographic algorithm chipher 128-bit block that has the ability to protect confidential messages. This research resulted in an application that can be used to protect the SMS message when the message is sent and received by users. Based on research conducted on the length of different messages with the same key length is obtained that the length of the message used computing time takes longer than the length of the message is the same and different key lengths.


ReCALL ◽  
2008 ◽  
Vol 20 (3) ◽  
pp. 315-330 ◽  
Author(s):  
Claire Kennedy ◽  
Mike Levy

AbstractThis article discusses an experiment in sending regular Short Message Service (SMS) messages to support language learning, and vocabulary learning in particular, at beginners' level in Italian at an Australian university. The approach we took built on the initiatives of Thornton and Houser (2005) and Dias (2002b), and was informed by the results of an earlier trial we had conducted with students at high-intermediate level (Levy & Kennedy, 2005). In testing the possibilities for using mobile phones for language learning purposes, we were especially interested in investigating the acceptability of a ‘push’ mode of operation, in which the scheduling of messages is determined by the teachers. While the students appreciated the experience overall, and found the message content often useful or enjoyable, there was a wide range of views on the frequency of messages acceptable. We are therefore planning the further integration of messaging into the course around a flexible arrangement involving options for high or low frequency of pushed messages, as well as messages available on request – in ‘pull’ mode.


2007 ◽  
Vol 10 (1) ◽  
pp. 53-63 ◽  
Author(s):  
Lilia Mironovschi

This study focuses on compliments in Russian language used in electronic communication. 187 examples of compliments sent from mobile phones by means of short message service (SMS) to the participants of a beauty contest that took place in a big west-Russian city were analysed. The language used in the short messages (SM) was similar to the spoken Russian language of young generation and contained incomplete sentences, slang words, etc. However, the compliments made by SMS were more expressive, more ingenious, and longer than the spoken Russian compliments. The cultural specifics of Russian SM and the specific features of SM as a discourse genre, which affect the compliment realization, are accented in the study.


Author(s):  
Satoshi Hasegawa ◽  
Masaru Miyao ◽  
Shohei Matsunuma ◽  
Kazuhiro Fujikake ◽  
Masako Omori

Nowadays, mobile phones are very popular in the world. The use of text email with short message service (SMS) is spreading. In this study, we evaluated the legibility of characters on the liquid crystal displays of mobile phones. When characters are small, younger people assure readability by shortening the viewing distance. However, elderly people find it far more difficult to see small characters. Moreover, legibility deteriorates as the contrast of display becomes lower.


2018 ◽  
Vol 4 (3) ◽  
pp. 110
Author(s):  
Angga Aditya Permana

<p><em>Abstrak</em> - <strong>Perkembangan teknologi khususnya dalam bidang komunikasi antar manusia sudah sangat mudah dilakukan dengan telepon genggam dan fiturnya sangat bervariasi. Pertukaran informasi jarak jauh ini menuntut keamanan terhadap kerahasiaan informasi yang dipertukarkan. Oleh karena itu, metode kriptografi dilakukan untuk mengamankan informasi tersebut. Salah satu metode kriptografi untuk penyandian teks adalah metode Vigenere Cipher. Penelitian ini bertujuan untuk membangun aplikasi kriptografi teks pesan pada smartphone berbasis android dengan metode Vigenere Cipher. Metode ini mengenkripsi teks pesan menjadi pesan rahasia yang kemudian hasilnya diteruskan sebagai teks pesan ke aplikasi pengiriman pesan seperti aplikasi SMS (Short Message Service), Whatsapp, Line, dan sejenisnya untuk selanjutnya didekripsi. Penelitian ini menghasilkan aplikasi berbasis android yang dapat mengirimkan teks pesan terenkripsi menggunakan metode Vigenere Cipher untuk memberikan keamanan lebih pada proses pertukaran informasi.</strong></p><p><em><strong>Kata Kunci</strong> – Cryptography, Vigenere Cipher, Android.</em></p><p><em>Abstract</em> – <strong>Mobile phones and its various features allow humans to communicate in this technology development era. The information secrecy especially during long range information exchange is very noteworthy. So that, those information can be protected by cryptography method. Vigenere Cipher is one of cryptography method for text encoding. The aim of this study is to construct application of text message cryptography on android Smartphone using Vigenere Cipher method. This method encrypted text message into secret message then forwarded this information to other applications like SMS (Short Message Service), Whatsapp, Line and so on then being decrypted. Android based application was resulted which allow to send encrypted text message using Vigenere Cipher to provide more security in the process of information exchange.</strong></p><p><em><strong>Keywords</strong> - Cryptography, Vigenere Cipher, Android.</em></p>


2011 ◽  
Vol 6 (6) ◽  
pp. 379-386 ◽  
Author(s):  
Matthew Magee, MPH ◽  
Alex Isakov, MD, MPH ◽  
Helen Tang Paradise, MD, MPH ◽  
Patrick Sullivan, PhD, DVM

The reading of energy meter is very tedious as well as an expensive job to do. The meter reading is taken manually by an individual to generate the bill, which will then passed into a software to automate billing and payment. A new network communication for the reading of energy meter by short message service (SMS) technology and software system besides the pre-existing energy meters. An Arduino will be integrated with the energy meter to read ad store the usage of energy. Energy meter gives the readings to Arduino and it sends it to the consumer via SMS. This is useful for the consumer to regularly check their power consumption and manage their energy usage according to their need and budget. The user can check their energy usage from anywhere by using their mobile phones an additional feature of load control is also provided to the user.


Sign in / Sign up

Export Citation Format

Share Document