scholarly journals Take Out Your Cell Phones - Class is Starting

Author(s):  
Jason Bazylak ◽  
Susan Mccahan ◽  
Peter Wiess ◽  
Phil Anderson

Traditionally, cell phones have been considered disruptive to classroom learning. Two years ago, a survey of students in a large first year design course indicated that 88% of students possessed cell phones in the classroom. Instead of trying to enforce acell phone ban, and fight a losing battle, we decided to use the cell phones to our pedagogical advantage. Previously, student interaction in the classroom was a challenge, due to a large class of students in a singlelecture theater. A primary issue was the inability of all except a few students with booming voices to ask questions. Informed primarily by a student design team (from the very course being discussed), we implemented a simple and inexpensive system that allowed students to use their cell phones in the classroom to send questions via Short Message Service (SMS), commonly referred to as “text messages”, to the instructor at the front of the classroom This system has been piloted through its first year of full implementation. Quantitative data on the usage of the system, student and instructor impressions of the system, and future work will be discussed.

2020 ◽  
Vol 7 (3) ◽  
pp. 398
Author(s):  
Nurainun Hasanah Sinaga ◽  
Muhammad Syahrizal

SMS (Short Message Service) is a popular communication technology revolution. The development of computerized technology has been very advanced. SMS is very vulnerable to data theft or theft by irresponsible parties. For the sake of maintaining the security of SMS can be done by using cryptographic techniques. Cryptographic techniques can encode text messages by encrypting them into passwords that are not understood. Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security for the ultrasound image because it can encode it into a form of cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the Mars algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This study describes the process of securing SMS by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of SMS


2002 ◽  
Vol 14 (03) ◽  
pp. 109-114 ◽  
Author(s):  
REN-GUEY LEE ◽  
KUANG-CHIUNG CHANG

This paper presents an SMS based design in the GSM system for a portable, light weighted, and small sized TeleAlarm device. The device is composed of a transmitter and a controller. When an emergent situation such as a stroke or a fall occurs, the user only needs to push a button to trigger the controller. The controller automatically sends text messages stored in its database through the transmitter to specified mobile phone numbers for help. The SMS uses only the control channels in the GSM system to transfer the message, which enables the receiving-end user to receive it even during a call. An experimental test shows that a complete message transmission only needs 2.949 seconds in average. The design is convenient to elderly people who may live alone.


2013 ◽  
Vol 24 (02) ◽  
pp. 1350002 ◽  
Author(s):  
JOSEPHINE JILL T. CABATBAT ◽  
GIOVANNI A. TAPANG

We identify the different styles of texting in Filipino short message service (SMS) texts and analyze the change in unigram and bigram frequencies due to these styles. Style preference vectors for sample texts were calculated and used to identify the style combination used by an average individual. The change in Shannon entropy of the SMS text is explained in light of a coding process.


2011 ◽  
pp. 179-202
Author(s):  
Maizatul A. Ismail ◽  
Rafidah Md-Noor ◽  
Mazliza Othman

The use of short message service (SMS) has grown tremendously in the past few years. Billions of users use this service to send text messages. Various applications have been introduced by service providers, e.g., mobile banking, summons checkpoint, SMS chat, etc., all of which have become a huge success. This chapter gives an overview of how this service is provided and discusses various SMS applications offered to the user. We explore the reasons behind its success and the issues that must be addressed to provide these applications. We also examine future trends and the challenges that must be overcome in order to enhance this service. We hope that this chapter gives a better understanding of how SMS applications are provided and what may be expected in future applications given the enhancement on the current SMS and technology advancement.


Pragmatics ◽  
2009 ◽  
Vol 19 (3) ◽  
pp. 393-412 ◽  
Author(s):  
Tereza Spilioti

The aim of this study is to investigate the choice of alphabetical encoding in Greek text-messaging (or Short Message Service, SMS). The analysis will be based on a corpus of 447 text-messages exchanged among participants who belong to the age group of ‘youth’ (15-25 years old) and live in Athens (Greece). The data analysis will show that the standard practice of writing with Greek characters represents the norm in Greek SMS. The script norm will be discussed in relation to the medium’s technological affordances and the participants’ stance towards new media. The analysis will then focus on non-standard graphemic choices, such as the use of both, Greek and Roman, alphabets in the encoding of single messages. It will be demonstrated that such marked choices are employed as a means of indexing the participants’ affiliation with global popular cultures and enhancing expressivity in a medium of reduced paralinguistic cues.


2011 ◽  
Vol 1 (2) ◽  
pp. 145-162
Author(s):  
Raluca Moise

Abstract Starting from the ostentatious presence of the SMS for teenagers, I attempted to identify the values of its appropriation process and to outline the trajectory of SMS within teenage culture. My argument is that the SMS develops two interpenetrating usage trajectories: an individual and a collective line, the later bearing a marked cultural logic. The relation between the object of consumption and the individual is framed by specific values of usage and regulated by cultural practices. In this article, I will present the factors that regulate the individual usage of the SMS, incorporating this form of communication in teens’ universe. Through ethnographic fieldwork in Romania, I have carried out participant observation and interviews in places that are frequented by teenagers and I have collected and analyzed more than 300 text messages, written by teenagers in daily personal journals of communication.


2017 ◽  
Vol 23 (6) ◽  
pp. 905-927 ◽  
Author(s):  
CHRIS GIANNELLA ◽  
RANSOM WINDER ◽  
STACY PETERSEN

AbstractIn written Chinese, personal pronouns are commonly dropped when they can be inferred from context. This practice is particularly common in informal genres like Short Message Service messages sent via cell phones. Restoring dropped personal pronouns can be a useful preprocessing step for information extraction. Dropped personal pronoun recovery can be divided into two subtasks: (1) detecting dropped personal pronoun slots and (2) determining the identity of the pronoun for each slot. We address a simpler version of restoring dropped personal pronouns wherein only the person numbers are identified. After applying a word segmenter, we used a linear-chain conditional random field to predict which words were at the start of an independent clause. Then, using the independent clause start information, as well as lexical and syntactic information, we applied a conditional random field or a maximum-entropy classifier to predict whether a dropped personal pronoun immediately preceded each word and, if so, the person number of the dropped pronoun. We conducted a series of experiments using a manually annotated corpus of Chinese Short Message Service. Our approaches substantially outperformed a rule-based approach based partially on rules developed by Chung and Gildea (2010, Effects of Empty Categories on Machine Translation.Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics. pp. 636–45). Our approaches also outperformed (though by a considerably smaller margin) a machine-learning approach based closely on work by Yang, Liu, and Xue in (2015, Recovering Dropped Pronouns from Chinese Text Messages.Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics (ACL). Association for Computational Linguistics. pp. 309–13). Features derived from parsing largely did not help our approaches. We conclude that, given independent clause start information, the parse information we used was largely superfluous for identifying dropped personal pronouns.


2019 ◽  
Author(s):  
Rebecca J Bartlett Ellis ◽  
James H Hill ◽  
K Denise Kerley ◽  
Arjun Sinha ◽  
Aaron Ganci ◽  
...  

BACKGROUND As many as 50% of people experience medication nonadherence, yet studies for detecting nonadherence and delivering real-time interventions to improve adherence are lacking. Mobile health (mHealth) technologies show promise to track and support medication adherence. OBJECTIVE The study aimed to evaluate the feasibility and acceptability of using an mHealth system for medication adherence tracking and intervention delivery. The mHealth system comprises a smart button device to self-track medication taking, a companion smartphone app, a computer algorithm used to determine adherence and then deliver a standard or tailored SMS (short message service) text message on the basis of timing of medication taking. Standard SMS text messages indicated that the smartphone app registered the button press, whereas tailored SMS text messages encouraged habit formation and systems thinking on the basis of the timing the medications were taken. METHODS A convenience sample of 5 adults with chronic kidney disease (CKD), who were prescribed antihypertensive medication, participated in a 52-day longitudinal study. The study was conducted in 3 phases, with a standard SMS text message sent in phases 1 (study days 1-14) and 3 (study days 46-52) and tailored SMS text messages sent during phase 2 (study days 15-45) in response to participant medication self-tracking. Medication adherence was measured using: (1) the smart button and (2) electronic medication monitoring caps. Concordance between these 2 methods was evaluated using percentage of measurements made on the same day and occurring within ±5 min of one another. Acceptability was evaluated using qualitative feedback from participants. RESULTS A total of 5 patients with CKD, stages 1-4, were enrolled in the study, with the majority being men (60%), white (80%), and Hispanic/Latino (40%) of middle age (52.6 years, SD 22.49; range 20-70). The mHealth system was successfully initiated in the clinic setting for all enrolled participants. Of the expected 260 data points, 36.5% (n=95) were recorded with the smart button and 76.2% (n=198) with electronic monitoring. Concordant events (n=94), in which events were recorded with both the smart button and electronic monitoring, occurred 47% of the time and 58% of these events occurred within ±5 min of one another. Participant comments suggested SMS text messages were encouraging. CONCLUSIONS It was feasible to recruit participants in the clinic setting for an mHealth study, and our system was successfully initiated for all enrolled participants. The smart button is an innovative way to self-report adherence data, including date and timing of medication taking, which were not previously available from measures that rely on recall of adherence. Although the selected smart button had poor concordance with electronic monitoring caps, participants were willing to use it to self-track medication adherence, and they found the mHealth system acceptable to use in most cases.


Sign in / Sign up

Export Citation Format

Share Document