short messages
Recently Published Documents


TOTAL DOCUMENTS

180
(FIVE YEARS 35)

H-INDEX

11
(FIVE YEARS 2)

2021 ◽  
Vol 3 (1) ◽  
pp. 11-19
Author(s):  
Muhammad Akbar Fhad Syahril

Short messages in the form of advertisements are increasingly being accepted by the public through their cell phones. The public never specifically gave the phone number to the party sending the advertising message. This is considered to be even more annoying because the short message advertisement violates the principles of consumer protection. This study aims to determine and analyze the extent of privacy violations against the spread of spam information via short messages. This study uses the empirical normative method, namely research conducted with the approach of legal norms or substances, legal principles, legal postulates, and legal comparisons, using a conceptual approach. The results show that short messages in the form of offers that are not directly related to the services used by cellular subscribers must be a concern for customer convenience.


2021 ◽  
Vol 12 ◽  
Author(s):  
Ewa Leśniak ◽  
Szczepan J. Grzybowski

The study explored how well-dyslexic youth deals with written messages in an environment simulating popular social network communication system. The messaging systems, present more and more in pandemic and post-pandemic online world, are rich in nonverbal aspects of communicating, namely, the emoticons. The pertinent question was whether the presence of emoticons in written messages of emotional and non-emotional content changes the comprehension of the messages. Thirty-two pupils aged 11–15 took part in the study, 16 had a school-approved diagnosis of dyslexia and were included in the experimental group. Sixteen controls had no diagnosed disabilities. Both groups viewed short messages of four types (each including seven communicates): verbal-informative (without emoticons and emotional verbal content), verbal-emotive (without emoticons, with emotional verbal content), emoticon-informative (including emoticon-like small pictures, but without emotional content either verbal or nonverbal), and emoticon-emotive (with standard emoticons and including verbal-emotional content). The participants had to answer short questions after quick presentation of each message that tested their comprehension of the content. RTs and accuracy of the answers were analyzed. Students without dyslexia had shorter response times to the questions regarding all types of messages than the dyslexic participants. The answers of the experimental group to the questions about the emoticon-informative messages were less correct. The study pointed tentatively to the beneficial role of emoticons (especially the nonstandard, i.e., of non-emotional kind) in reading short messages with understanding.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-25
Author(s):  
Guangrong Zhao ◽  
Bowen Du ◽  
Yiran Shen ◽  
Zhenyu Lao ◽  
Lizhen Cui ◽  
...  

In this article, we propose, LeaD , a new vibration-based communication protocol to Lea rn the unique patterns of vibration to D ecode the short messages transmitted to smart IoT devices. Unlike the existing vibration-based communication protocols that decode the short messages symbol-wise, either in binary or multi-ary, the message recipient in LeaD receives vibration signals corresponding to bits-groups. Each group consists of multiple symbols sent in a burst and the receiver decodes the group of symbols as a whole via machine learning-based approach. The fundamental behind LeaD is different combinations of symbols (1 s or 0 s) in a group will produce unique and reproducible patterns of vibration. Therefore, decoding in vibration-based communication can be modeled as a pattern classification problem. We design and implement a number of different machine learning models as the core engine of the decoding algorithm of LeaD to learn and recognize the vibration patterns. Through the intensive evaluations on large amount of datasets collected, the Convolutional Neural Network (CNN)-based model achieves the highest accuracy of decoding (i.e., lowest error rate), which is up to 97% at relatively high bits rate of 40 bits/s. While its competing vibration-based communication protocols can only achieve transmission rate of 10 bits/s and 20 bits/s with similar decoding accuracy. Furthermore, we evaluate its performance under different challenging practical settings and the results show that LeaD with CNN engine is robust to poses, distances (within valid range), and types of devices, therefore, a CNN model can be generally trained beforehand and widely applicable for different IoT devices under different circumstances. Finally, we implement LeaD on both off-the-shelf smartphone and smart watch to measure the detailed resources consumption on smart devices. The computation time and energy consumption of its different components show that LeaD is lightweight and can run in situ on low-cost smart IoT devices, e.g., smartwatches, without accumulated delay and introduces only marginal system overhead.


Author(s):  
М.А. БЫХОВСКИЙ

В статье выполнено исследование возможности создания энергетически эффективных систем связи, предназначенных для передачи коротких сообщений длиной 50...1000 бит по каналу связи, в которых применяются ансамбли сигналов с перестановочной модуляцией, а также коды Рида-Соломона. Полученные результаты показали, что рассмотренные системы связи при вероятности ошибки декодирования принятого сообщения, равной Pdec=10-6 , имеют существенный энергетический выигрыш (примерно 2,6 дБ) по сравнению с системами, в которых используются сигналы с модуляцией 2-PSK, коды с малой плотностью проверок на четность (LDPC), турбокоды и др. Кроме того, показано, что системы связи, в которых для передачи коротких сообщений применяются ансамбли сигналов, оптимальных по Шеннону, энергетически эффективнее по сравнению с системами, в которых для этого используются традиционные методы модуляции и помехоустойчивые коды. Применение оптимальных по Шеннону ансамблей позволяет существенно сократить длительность сигналов при передаче такого же количества бит, которое может быть передано по каналу связи традиционными методами. The article investigates the possibility of creating energy-efficient communication systems designed to transmit short messages 50...1000 bits long via a communication channel in which signal ensembles with permutation modulation (PM) are used, as well as Reed-Solomon (RS) codes. The results obtained showed that the considered communication systems with a probability of decoding error of the received message equal to Pdec=10-6 have a significant energy gain (approximately 2.6 dB), in comparison with systems that use signals with 2-PSK and LDPC codes, turbo codes, etc. It is shown that communication systems using Shannon-optimal signal ensembles for short message transmission are more energy efficient than systems using traditional modulation methods and noise-resistant codes. The use of Shannon-optimal ensembles can significantly reduce the duration of signals when transmitting the same number of bits that can be transmitted over the communication channel by traditional methods.


2021 ◽  
Author(s):  
Muh. Akbar Fhad Syahril

Short messages that are advertisements are increasingly being received by the public through their cell phones. In fact, the public has never specifically given the phone number to the party sending the advertising message. This is considered to be increasingly annoying because the short message advertisements violate the principles of consumer protection. This study aims to determine and analyze the extent of privacy violations against the spread of spam information via short messages. This study uses a normative juridical method, namely research conducted with an approach to legal norms or substance, legal principles, legal postulates and legal comparisons, using a conceptual approach. The results showed that short messages in the form of offers that are not directly related to the services used by cellular subscribers should be a concern for the convenience of customers.


Author(s):  
Geetha Kumar ◽  
Saranya Velu ◽  
V. Jaya Prakash ◽  
Shuba Kumar ◽  
Sobha Sivaprasad ◽  
...  

2021 ◽  
Vol 5 (1) ◽  
pp. 1-17
Author(s):  
Noni Hendrita ◽  
Devi Susanti ◽  
Lia Ananda Hartawan ◽  
Widya Nur Khasanah ◽  
Rusman Hadiatma ◽  
...  

WHO in 2015 shows that 1,13 billion people in the world have hypertension, which means 1 out of 3 people in the world are diagnosed with hypertension. Nurses play a role in applying technology such as short message health promotion in health services, to prevent an increase in the incidence of hypertension in society. Patient with hypertension, the purpose of literature review is to find the results of using short messages in health promotion. The research method that used at this article is a literature review based on certain themes that have been determined by the author. The result of ten discussion in literature journals is the use of short messages that have been proven to be effective in monitoring and controlling treatment adherence of hypertensive patients. Health promotion short messages are shown to monitor changes in better hypertension control and have strong potential to bring greater innovation nurse management in health service utilization.  


Author(s):  
Hwigyeom Kim ◽  
Yeongmin Lee ◽  
Jooyoung Lee

A forkcipher is a keyed, tweakable function mapping an n-bit input to a 2nbit output, which is equivalent to concatenating two outputs from two permutations. A forkcipher can be a useful primitive to design authenticated encryption schemes for short messages. A forkcipher is typically designed within the iterate-fork-iterate (IFI) paradigm, while the provable security of such a construction has not been widely explored.In this paper, we propose a method of constructing a forkcipher using public permutations as its building primitives. It can be seen as applying the IFI paradigm to the tweakable Even-Mansour ciphers. So our construction is dubbed the forked tweakable Even-Mansour (FTEM) cipher. Our main result is to prove that a (1, 1)-round FTEM cipher (applying a single-round TEM to a plaintext, followed by two independent copies of a single-round TEM) is secure up to 2 2n/3 queries in the ideal permutation model.


Sign in / Sign up

Export Citation Format

Share Document