scholarly journals What’s the Point? A Study of Full-Stop Use in Text Messages in Varying Emotional Contexts

2021 ◽  
Vol 12 (1) ◽  
pp. e202203
Author(s):  
Andrew Albritton
Keyword(s):  
2010 ◽  
Vol 44 (4) ◽  
pp. 48
Author(s):  
SHARON WORCESTER
Keyword(s):  

Crisis ◽  
2010 ◽  
Vol 31 (2) ◽  
pp. 109-112 ◽  
Author(s):  
Hui Chen ◽  
Brian L. Mishara ◽  
Xiao Xian Liu

Background: In China, where follow-up with hospitalized attempters is generally lacking, there is a great need for inexpensive and effective means of maintaining contact and decreasing recidivism. Aims: Our objective was to test whether mobile telephone message contacts after discharge would be feasible and acceptable to suicide attempters in China. Methods: Fifteen participants were recruited from suicide attempters seen in the Emergency Department in Wuhan, China, to participate in a pilot study to receive mobile telephone messages after discharge. All participants have access to a mobile telephone, and there is no charge for the user to receive text messages. Results: Most participants (12) considered the text message contacts an acceptable and useful form of help and would like to continue to receive them for a longer period of time. Conclusions: This suggests that, as a low-cost and quick method of intervention in areas where more intensive follow-up is not practical or available, telephone messages contacts are accessible, feasible, and acceptable to suicide attempters. We hope that this will inspire future research on regular and long-term message interventions to prevent recidivism in suicide attempters.


CCIT Journal ◽  
2015 ◽  
Vol 9 (1) ◽  
pp. 27-32
Author(s):  
Hani Dewi Ariessanti ◽  
Radiyanto Radiyanto ◽  
Afridha Septian Yuswanto

As the development of mobile technology which is not only used as telephone and text messages, but also can be used as a devices for controlling a safe. Such as a smarthphone that contained the computer’s features. So, the technology can be controlled remotely and according to what the user wants. Safe is a tool that is capable for helping human’s high risk work. That is why people make a safe for minimize the risk of crime and for securing, securing the valuable objects. Therefore, a safe’s security is designed by using motor servo as an output of the safe’s door movement,microcontroller as the brain, bluetooth as a communication media to send the data or input from the app, and android smartphone is taking role as a device which is contolling remotely the safe


Diabetes ◽  
2018 ◽  
Vol 67 (Supplement 1) ◽  
pp. 844-P
Author(s):  
ASHBY F. WALKER ◽  
CATHRYN JOHNSON ◽  
CLAUDIA ANEZ-ZABALA ◽  
SARAH R. DORVIL ◽  
MICHAEL J. HALLER ◽  
...  

Vestnik MEI ◽  
2020 ◽  
Vol 5 (5) ◽  
pp. 132-139
Author(s):  
Ivan E. Kurilenko ◽  
◽  
Igor E. Nikonov ◽  

A method for solving the problem of classifying short-text messages in the form of sentences of customers uttered in talking via the telephone line of organizations is considered. To solve this problem, a classifier was developed, which is based on using a combination of two methods: a description of the subject area in the form of a hierarchy of entities and plausible reasoning based on the case-based reasoning approach, which is actively used in artificial intelligence systems. In solving various problems of artificial intelligence-based analysis of data, these methods have shown a high degree of efficiency, scalability, and independence from data structure. As part of using the case-based reasoning approach in the classifier, it is proposed to modify the TF-IDF (Term Frequency - Inverse Document Frequency) measure of assessing the text content taking into account known information about the distribution of documents by topics. The proposed modification makes it possible to improve the classification quality in comparison with classical measures, since it takes into account the information about the distribution of words not only in a separate document or topic, but in the entire database of cases. Experimental results are presented that confirm the effectiveness of the proposed metric and the developed classifier as applied to classification of customer sentences and providing them with the necessary information depending on the classification result. The developed text classification service prototype is used as part of the voice interaction module with the user in the objective of robotizing the telephone call routing system and making a shift from interaction between the user and system by means of buttons to their interaction through voice.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2019 ◽  
Author(s):  
Megan Partch ◽  
Cass Dykeman

Mental health treatment providers seek high-impact and low-cost means of engaging clients in care. As such, text messaging is becoming more frequently utilized as a means of communication between provider and client. Research demonstrates that text message interventions increase treatment session attendance, decrease symptomology, and improve overall functioning. However, research is lacking related to the linguistic make up of provider communications. Text messages were collected from previously published articles related to the treatment of mental health disorders. A corpus of 39 mental health treatment text message interventions was composed totaling 286 words. Using Linguistic Inquiry and Word Count (LIWC) software, messages were analyzed for prevalence of terminology thought to enhance client engagement. Clout, demonstrating the writer’s confidence and expertise, and positive Emotional Tone were found to be at a high level within the corpus. Results demonstrated statistical significance for five linguistic variables. When compared with national blog norms derived from Twitter, Clout, Emotional Tone, and use of Biological terminology were found to be at higher rates than expected. Authenticity and Informal terminology were found at significantly lesser rates.


Sign in / Sign up

Export Citation Format

Share Document