23 research outputs found
Short message service normalization for communication with a health information system
Philosophiae Doctor - PhDShort Message Service (SMS) is one of the most popularly used services for communication between mobile phone users. In recent times it has also been proposed as a means for information access. However, there are several challenges to be overcome in order to process an SMS, especially when it is used as a query in an information retrieval system.SMS users often tend deliberately to use compacted and grammatically incorrect writing that makes the message difficult to process with conventional information retrieval systems. To overcome this, a pre-processing step known as normalization is required. In this thesis an investigation of SMS normalization algorithms is carried out. To this end,studies have been conducted into the design of algorithms for translating and normalizing SMS text. Character-based, unsupervised and rule-based techniques are presented.
An investigation was also undertaken into the design and development of a system for information access via SMS. A specific system was designed to access information related to a Frequently Asked Questions (FAQ) database in healthcare, using a case study. This study secures SMS communication, especially for healthcare information systems. The proposed technique is to encipher the messages using the secure shell (SSH) protocol
A Mobile-Health Information Access System
Patients using the Mobile-Health Information System
can send SMS requests to a Frequently Asked Questions
(FAQ) web server with the expectation of receiving an appropriate
feedback on issues that relate to their health. The accuracy of
such feedback is paramount to the mobile search user. However,
automating SMS-based information search and retrieval poses
significant challenges because of the inherent noise in SMS
communication. First, in this paper an architecture is proposed
for the implementation of the retrieval process, and second, an
algorithm is developed for the best-ranked question-answer pair
retrieval. We present an algorithm that assists in the selection of
the best FAQ-query after the ranking of the query-answer pair.
Results are generated based on the ranking of the FAQ-query.
Our algorithm gives a better result in terms of average precision
and recall when compared with the naıve retrieval algorithm.Southern Africa Telecommunication Networks and Applications Conference (SATNAC)Department of HE and Training approved lis
ASSESSING THE IMPACT OF ARTISTIC ARCHITECTURE ON PERCEIVED USABILITY AND WILLINGNESS TO USE MOBILE COMMERCE APPLICATIONS
Creating a useful portable browser or program is a demanding challenge for organisations due to the size constraints of the display area, which additionally is contingent on usability, internet connectivity, efficient backup power and mobility. Users also expect performance equivalent to that of microcomputers. Portable display programmers need to surmount these challenges without compromising users’ concerns for safety and confidentiality. Various works in the past couple of years revealed the ability of a strongly perceived artistic architecture of a mobile website as a push to overcome clients’ reduced skill. The investigation conducted in this report sought to determine the distinct impact of eight artistic display on the of a mobile website or program and the corresponding clients’ . Organisations may thus take advantage of this knowledge to improve usage, trust, frequency of adoption and consequently financial rewards on m-commerce applications. This study uses a with a screening objective. Data for the experiment was sourced through a web-based questionnaire program, . At the same time, social network sites were used to disseminate the questionnaires to enable gathering a good number of respondents. The data collection instrument had statements with threshold for Ninety-six participants took part in the inquiry. In contrast, seventy-six participants completed the exercise, signifying an estimated. was used in the study of the association concerning the . package was utilised in the evaluation of the . Findings revealed that artistic architecture bears a substantial impact on of portable websites and programs as well as influences artefacts on such platforms. , as well as the of an application, turned out as two features with the highest impact on the two factors. That the orientation of their effects is a reverse of the conjectured outcome suggests that future work should explore this issue
Evaluating SMS parsing using automated testing software
Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication.
Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of
information dissemination regarding burning issues, advertisement, and health related matters. Short message services (SMS), an integral
functional part of cell phones, can be turned into a major tool for accessing databases of information on HIV/AIDS as appreciable
percentage of the youth embrace the technology. The common features by the users of the unique language are the un-grammatical
structure, convenience of spelling, homophony of words and alphanumeric mix up of the arrangement of words. This proves it to be
difficult to serve as query in the search engine architecture. In this work SMS query was used for information accessing in Frequently
Asked Question FAQ system under a specified medical domain. Finally, when the developed system was measured in terms of proximity
to the answer retrieved remarkable results were observed
A dependable model for attaining maximum authetication security procedure in a grid based environment
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols
ANCAEE: A novel clustering algorithm for energy efficiency in wireless sensor networks
One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmis-sion and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization
UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms
Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre called the base station which uses all reported data to detect an event or determine the changes in an environment. In present study, we propose energy optimization in Wireless Sensor Networks (WSNs) using uniform distributed clustering algorithms. One of the algorithms distributes cluster heads uniformly in each cluster and each non-cluster head transmit its data to the cluster heads with short distance which reduces the communication distance of each node. Thus, minimizes the energy consumption of sensor nodes. The second algorithm generates cluster heads in hierarchical form in order to transmit the aggregate data to the base station. It was observed that there is increase in energy savings as we move from bottom up in the hierarchy. Both UDCA protocol and Low Energy Adaptive Cluster Hierarchy protocol (LEACH) were simulated. The simulation results show significant reduction in energy consumption of sensor nodes and cluster heads are more uniformly distributed among all nodes in UDCA compare with LEACH and extend the wireless sensor networks lifetime
Digital watermarking: a state-of-the-art review
Digital watermarking is the art of embedding data, called a
watermark, into a multimedia object such that the watermark can be detected or
extracted later without impairing the object. Concealment of secret messages inside a
natural language, known as steganography, has been in existence as early as the 16th
century. However, the increase in electronic/digital information transmission and
distribution has resulted in the spread of watermarking from ordinary text to
multimedia transmission. In this paper, we review various approaches and methods
that have been used to conceal and preserve messages. Examples of real-world
applications are also discussed.SANPAD, Telkom, Cisco, Aria Technologies, THRIPDepartment of HE and Training approved lis
Context-Aware Stemming algorithm for semantically related root words
There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are
flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery
of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic
interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be
more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim
to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of
the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results
show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising
the efficacy of Porter’s algorithm
Text Messaging a tool in e-Health services
HIV/AIDS continues to be a menace to the
global community, especially in sub-Saharan Africa and
South Africa is not an exception. The infection rate is
continues to grow, in particular, among the young adults.
Cell phones have been identified as one of the tools that
can be used to overcome the challenge of information
dissemination regarding HIV/AIDS among young adults
because of its acceptability within this age group. Access to
appropriate information can be a powerful for prevention
and management of many chronic illnesses, including
hypertension, diabetes and HIV/AIDS. Within the young
adults age group information access by use of Short
Messaging Services (SMS) becomes particularly appealing.
In this regard, it is proposed to provide access to carefully
screened information on HIV/AIDS within the context of
frequently asked questions (FAQ) system. However,
automating SMS-based information search and retrieval
poses significant challenges because of the inherent noise
in SMS communications. In the paper, a special corpus of
SMS messages was collected based on a standardised
question-answer collection. The SMS messages were then
analysed, transcribed and classified, with the aim of
building a dictionary of SMS-speak to English
translations, with reference to HIV/AIDS