23 research outputs found

    Short message service normalization for communication with a health information system

    Get PDF
    Philosophiae Doctor - PhDShort Message Service (SMS) is one of the most popularly used services for communication between mobile phone users. In recent times it has also been proposed as a means for information access. However, there are several challenges to be overcome in order to process an SMS, especially when it is used as a query in an information retrieval system.SMS users often tend deliberately to use compacted and grammatically incorrect writing that makes the message difficult to process with conventional information retrieval systems. To overcome this, a pre-processing step known as normalization is required. In this thesis an investigation of SMS normalization algorithms is carried out. To this end,studies have been conducted into the design of algorithms for translating and normalizing SMS text. Character-based, unsupervised and rule-based techniques are presented. An investigation was also undertaken into the design and development of a system for information access via SMS. A specific system was designed to access information related to a Frequently Asked Questions (FAQ) database in healthcare, using a case study. This study secures SMS communication, especially for healthcare information systems. The proposed technique is to encipher the messages using the secure shell (SSH) protocol

    A Mobile-Health Information Access System

    Get PDF
    Patients using the Mobile-Health Information System can send SMS requests to a Frequently Asked Questions (FAQ) web server with the expectation of receiving an appropriate feedback on issues that relate to their health. The accuracy of such feedback is paramount to the mobile search user. However, automating SMS-based information search and retrieval poses significant challenges because of the inherent noise in SMS communication. First, in this paper an architecture is proposed for the implementation of the retrieval process, and second, an algorithm is developed for the best-ranked question-answer pair retrieval. We present an algorithm that assists in the selection of the best FAQ-query after the ranking of the query-answer pair. Results are generated based on the ranking of the FAQ-query. Our algorithm gives a better result in terms of average precision and recall when compared with the naıve retrieval algorithm.Southern Africa Telecommunication Networks and Applications Conference (SATNAC)Department of HE and Training approved lis

    ASSESSING THE IMPACT OF ARTISTIC ARCHITECTURE ON PERCEIVED USABILITY AND WILLINGNESS TO USE MOBILE COMMERCE APPLICATIONS

    Get PDF
    Creating a useful portable browser or program is a demanding challenge for organisations due to the size constraints of the display area, which additionally is contingent on usability, internet connectivity, efficient backup power and mobility. Users also expect performance equivalent to that of microcomputers. Portable display programmers need to surmount these challenges without compromising users’ concerns for safety and confidentiality. Various works in the past couple of years revealed the ability of a strongly perceived artistic architecture of a mobile website as a push to overcome clients’ reduced  skill. The investigation conducted in this report sought to determine the distinct impact of eight artistic display  on the  of a mobile website or program and the corresponding clients’ . Organisations may thus take advantage of this knowledge to improve usage, trust, frequency of adoption and consequently financial rewards on m-commerce applications. This study uses a  with a screening objective. Data for the experiment was sourced through a web-based questionnaire program, . At the same time, social network sites were used to disseminate the questionnaires to enable gathering a good number of respondents. The data collection instrument had  statements with  threshold for  Ninety-six  participants took part in the inquiry. In contrast, seventy-six  participants completed the exercise, signifying an estimated.  was used in the study of the association concerning the .  package was utilised in the evaluation of the . Findings revealed that artistic architecture bears a substantial impact on  of portable websites and programs as well as influences  artefacts on such platforms. , as well as the  of an application, turned out as two features with the highest impact on the two  factors. That the orientation of their effects is a reverse of the conjectured outcome suggests that future work should explore this issue

    Evaluating SMS parsing using automated testing software

    Get PDF
    Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of information dissemination regarding burning issues, advertisement, and health related matters. Short message services (SMS), an integral functional part of cell phones, can be turned into a major tool for accessing databases of information on HIV/AIDS as appreciable percentage of the youth embrace the technology. The common features by the users of the unique language are the un-grammatical structure, convenience of spelling, homophony of words and alphanumeric mix up of the arrangement of words. This proves it to be difficult to serve as query in the search engine architecture. In this work SMS query was used for information accessing in Frequently Asked Question FAQ system under a specified medical domain. Finally, when the developed system was measured in terms of proximity to the answer retrieved remarkable results were observed

    A dependable model for attaining maximum authetication security procedure in a grid based environment

    Get PDF
    Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols

    ANCAEE: A novel clustering algorithm for energy efficiency in wireless sensor networks

    Get PDF
    One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmis-sion and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization

    UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms

    Get PDF
    Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre called the base station which uses all reported data to detect an event or determine the changes in an environment. In present study, we propose energy optimization in Wireless Sensor Networks (WSNs) using uniform distributed clustering algorithms. One of the algorithms distributes cluster heads uniformly in each cluster and each non-cluster head transmit its data to the cluster heads with short distance which reduces the communication distance of each node. Thus, minimizes the energy consumption of sensor nodes. The second algorithm generates cluster heads in hierarchical form in order to transmit the aggregate data to the base station. It was observed that there is increase in energy savings as we move from bottom up in the hierarchy. Both UDCA protocol and Low Energy Adaptive Cluster Hierarchy protocol (LEACH) were simulated. The simulation results show significant reduction in energy consumption of sensor nodes and cluster heads are more uniformly distributed among all nodes in UDCA compare with LEACH and extend the wireless sensor networks lifetime

    Digital watermarking: a state-of-the-art review

    Get PDF
    Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a natural language, known as steganography, has been in existence as early as the 16th century. However, the increase in electronic/digital information transmission and distribution has resulted in the spread of watermarking from ordinary text to multimedia transmission. In this paper, we review various approaches and methods that have been used to conceal and preserve messages. Examples of real-world applications are also discussed.SANPAD, Telkom, Cisco, Aria Technologies, THRIPDepartment of HE and Training approved lis

    Context-Aware Stemming algorithm for semantically related root words

    Get PDF
    There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm

    Text Messaging a tool in e-Health services

    Get PDF
    HIV/AIDS continues to be a menace to the global community, especially in sub-Saharan Africa and South Africa is not an exception. The infection rate is continues to grow, in particular, among the young adults. Cell phones have been identified as one of the tools that can be used to overcome the challenge of information dissemination regarding HIV/AIDS among young adults because of its acceptability within this age group. Access to appropriate information can be a powerful for prevention and management of many chronic illnesses, including hypertension, diabetes and HIV/AIDS. Within the young adults age group information access by use of Short Messaging Services (SMS) becomes particularly appealing. In this regard, it is proposed to provide access to carefully screened information on HIV/AIDS within the context of frequently asked questions (FAQ) system. However, automating SMS-based information search and retrieval poses significant challenges because of the inherent noise in SMS communications. In the paper, a special corpus of SMS messages was collected based on a standardised question-answer collection. The SMS messages were then analysed, transcribed and classified, with the aim of building a dictionary of SMS-speak to English translations, with reference to HIV/AIDS
    corecore