Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhe...Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. .展开更多
On the basis of the analysis of main problems existing in current agricultural meteorological service in China,for the purpose of exploring a solution to the "last kilometer" problem in rural meteorological ...On the basis of the analysis of main problems existing in current agricultural meteorological service in China,for the purpose of exploring a solution to the "last kilometer" problem in rural meteorological service,this article designed four short message service products with the business brand name "meteorology for agricultural condition",including "weather prediction for farming season","weather forecast for farming","weather alert",and "meteorological hazards of agriculture".By taking advantage of telecom operators' market,these products have been spread to more than 1 million rural mobile phone users and widely welcomed.They also contributed enormously to disaster prevention and peasants' income growth,and achieved good social and economic benefits.展开更多
Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science. However, it has not made great progress in research on Web S...Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science. However, it has not made great progress in research on Web Services security. Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security. Web Services technology needs a solution integrated in Web Services framework to realize end-to-end security. Based on cryptography and Web Services technology and according to W3C, XML encryption specification, XML digital Signature specification and WS-Security, which proposed by IBM and Microsoft, a new Web services security model based on message layer is put forward in this paper. The message layer is composed of message handlers. It is inserted into the message processing sequence and provides transparent security services for Web Services. To verify the model, a Web Services security system is realized on, net platform. The implementation version of the model can provide various security services, and has advantages such as security, scalability, security controllability and end-to-end security in message level. Key words Web services - Web services security - message layer CLC number TP 393.08 Biography: WANG Cui-ru (1954-), female, Professor, research direction: database and information management system.展开更多
Type of meteorological text message is identified,and concept and characteristics of meteorological message and its relationship with the weather forecast are cleared,and editing service technique of meteorological me...Type of meteorological text message is identified,and concept and characteristics of meteorological message and its relationship with the weather forecast are cleared,and editing service technique of meteorological message and key points are analyzed finally.展开更多
This article introduces the Push-to-talk over Cellular( PoC) service, a new mobile value-added service based on the IP Multimedia Subsystem (IMS). Its implementation scheme is discussed and its Session Initiation Prot...This article introduces the Push-to-talk over Cellular( PoC) service, a new mobile value-added service based on the IP Multimedia Subsystem (IMS). Its implementation scheme is discussed and its Session Initiation Protocol (SIP) signaling exchange flow is described. Target user groups are predicted based on the analysis of the strengths and weaknesses of the PoC service. The article purports that the PoC system could undoubtedly be used as a platform for new services such as multimedia messaging, instant messaging, presence, and picture receiving and sending. Just like the short message service, the PoC service will help the terminal vendors, equipment vendors, content providers and operators setup a win-for-all industrial value chain.展开更多
Through the comparison of the features of GSM and CDMA short message services,the paper shows that the CDMA short message center has stronger service capability and provides more value- added services.
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on M...The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.展开更多
With the development of message service in telecom networks as well as the Internet,multiple message service formats have been emerging,including Short Message Service (SMS),Multimedia Messaging Service (MMS),Mobile E...With the development of message service in telecom networks as well as the Internet,multiple message service formats have been emerging,including Short Message Service (SMS),Multimedia Messaging Service (MMS),Mobile Email Message (MEM) and Instant Message (IM).Based on the latest research achievements of OMA CPM Organization and GSMA RCS Organization,the message service evolution may have two phases:Integration and convergence,with corresponding overall framework realization methods.展开更多
This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the sam...This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
Smartphones and other connected devices rely on data services,such as Web Services(WS),Google Cloud Messaging(GCM)and Firebase Cloud Messaging(FCM),to share the information they collect or use.Traditionally,these serv...Smartphones and other connected devices rely on data services,such as Web Services(WS),Google Cloud Messaging(GCM)and Firebase Cloud Messaging(FCM),to share the information they collect or use.Traditionally,these services were classified according to the average number of bytes transmitted or their delivery time.However,when dealing with battery-operated devices,another important parameter to be taken into account is their power consumption.Furthermore,software designers and developers often do not consider the efficiency of a data communication system,but are simply concerned about ease-of-use and response time.In this paper,we compare FCM,GCM and two types of WS,namely Simple Object Access Protocol(SOAP)and REpresentational State Transfer(REST)WS in terms of delay,data efficiency,and power consumption.The final outcome is that RESTful WS outperforms all others,making GCM and FCM a viable alternative only when the amount of data to be transmitted is very limited,or when the mobile application requires the advanced services offered by FCM or GCM only.展开更多
The Multimedia Messaging Service (MMS)will be a new business growth point for mobile operators,and be an effective method to stimulate more users to use mobile services and ultimately improve the value of ARPU.The pap...The Multimedia Messaging Service (MMS)will be a new business growth point for mobile operators,and be an effective method to stimulate more users to use mobile services and ultimately improve the value of ARPU.The paper introduces MMS applications and its message sending/ receiving modes, analyzes its system architecture and technical implementation,and finally discusses issues related to MMS message structures and content production.展开更多
文摘Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. .
文摘On the basis of the analysis of main problems existing in current agricultural meteorological service in China,for the purpose of exploring a solution to the "last kilometer" problem in rural meteorological service,this article designed four short message service products with the business brand name "meteorology for agricultural condition",including "weather prediction for farming season","weather forecast for farming","weather alert",and "meteorological hazards of agriculture".By taking advantage of telecom operators' market,these products have been spread to more than 1 million rural mobile phone users and widely welcomed.They also contributed enormously to disaster prevention and peasants' income growth,and achieved good social and economic benefits.
文摘Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science. However, it has not made great progress in research on Web Services security. Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security. Web Services technology needs a solution integrated in Web Services framework to realize end-to-end security. Based on cryptography and Web Services technology and according to W3C, XML encryption specification, XML digital Signature specification and WS-Security, which proposed by IBM and Microsoft, a new Web services security model based on message layer is put forward in this paper. The message layer is composed of message handlers. It is inserted into the message processing sequence and provides transparent security services for Web Services. To verify the model, a Web Services security system is realized on, net platform. The implementation version of the model can provide various security services, and has advantages such as security, scalability, security controllability and end-to-end security in message level. Key words Web services - Web services security - message layer CLC number TP 393.08 Biography: WANG Cui-ru (1954-), female, Professor, research direction: database and information management system.
文摘Type of meteorological text message is identified,and concept and characteristics of meteorological message and its relationship with the weather forecast are cleared,and editing service technique of meteorological message and key points are analyzed finally.
文摘This article introduces the Push-to-talk over Cellular( PoC) service, a new mobile value-added service based on the IP Multimedia Subsystem (IMS). Its implementation scheme is discussed and its Session Initiation Protocol (SIP) signaling exchange flow is described. Target user groups are predicted based on the analysis of the strengths and weaknesses of the PoC service. The article purports that the PoC system could undoubtedly be used as a platform for new services such as multimedia messaging, instant messaging, presence, and picture receiving and sending. Just like the short message service, the PoC service will help the terminal vendors, equipment vendors, content providers and operators setup a win-for-all industrial value chain.
文摘Through the comparison of the features of GSM and CDMA short message services,the paper shows that the CDMA short message center has stronger service capability and provides more value- added services.
文摘The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.
文摘With the development of message service in telecom networks as well as the Internet,multiple message service formats have been emerging,including Short Message Service (SMS),Multimedia Messaging Service (MMS),Mobile Email Message (MEM) and Instant Message (IM).Based on the latest research achievements of OMA CPM Organization and GSMA RCS Organization,the message service evolution may have two phases:Integration and convergence,with corresponding overall framework realization methods.
文摘This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘Smartphones and other connected devices rely on data services,such as Web Services(WS),Google Cloud Messaging(GCM)and Firebase Cloud Messaging(FCM),to share the information they collect or use.Traditionally,these services were classified according to the average number of bytes transmitted or their delivery time.However,when dealing with battery-operated devices,another important parameter to be taken into account is their power consumption.Furthermore,software designers and developers often do not consider the efficiency of a data communication system,but are simply concerned about ease-of-use and response time.In this paper,we compare FCM,GCM and two types of WS,namely Simple Object Access Protocol(SOAP)and REpresentational State Transfer(REST)WS in terms of delay,data efficiency,and power consumption.The final outcome is that RESTful WS outperforms all others,making GCM and FCM a viable alternative only when the amount of data to be transmitted is very limited,or when the mobile application requires the advanced services offered by FCM or GCM only.
文摘The Multimedia Messaging Service (MMS)will be a new business growth point for mobile operators,and be an effective method to stimulate more users to use mobile services and ultimately improve the value of ARPU.The paper introduces MMS applications and its message sending/ receiving modes, analyzes its system architecture and technical implementation,and finally discusses issues related to MMS message structures and content production.