984 resultados para Text Message Analysis


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nonadherence to treatment is a worldwide problem among people with severe mental disorders. Patient treatment adherence may be supported with simple reminding methods e.g. text message reminders. However, there is limited evidence of its benefits. Intervention evaluation is essential in mHealth research. Therefore, this evaluative study was conducted. This study aimed to evaluate text message reminder use in encouraging patients’treatment adherence among people with antipsychotic medication. The data were collected between September 2011 and December 2013. First, a systematic literature review revealed that text message reminders were widely used in healthcare. However, its impacts were conflicting. Second, a sub-sample (n = 562) analysis showed that patients preferred humorous text message reminders and preferred to receive them in the morning, at the beginning of the week. Age, gender and marital status seemed to have different effects on the preferred amount and timing of the selected reminders. Third, a cross-sectional survey revealed that people with antipsychotic medication (n = 408) expressed overall satisfaction towards the reminder system. Finally, the evaluative design showed that patient recruitment for a randomized controlled trial concerning people with antipsychotic medication was challenging due to low rates of eligible participants. Follow-up drop-out rates varied depending on the data collection method. Participants’ demographic characteristics were associated with the risk of dropping out from the trial. This study suggests that text messages are a potential reminder system in healthcare services among people with antipsychotic medication. More research is needed to gain a comprehensive picture of the impacts and effectiveness of text message reminders.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Population growth is always increasing, and thus the concept of smart and cognitive cities is becoming more important. Developed countries are aware of and working towards needed changes in city management. However, emerging countries require the optimization of their own city management. This chapter illustrates, based on a use case, how a city in an emerging country can quickly progress using the concept of smart and cognitive cities. Nairobi, the capital of Kenya, is chosen for the test case. More than half of the population of Nairobi lives in slums with poor sanitation, and many slum inhabitants often share a single toilet, so the proper functioning and reliable maintenance of toilets are crucial. For this purpose, an approach for processing text messages based on cognitive computing (using soft computing methods) is introduced. Slum inhabitants can inform the responsible center via text messages in cases when toilets are not functioning properly. Through cognitive computer systems, the responsible center can fix the problem in a quick and efficient way by sending repair workers to the area. Focusing on the slum of Kibera, an easy-to-handle approach for slum inhabitants is presented, which can make the city more efficient, sustainable and resilient (i.e., cognitive).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

SMS (Short Message Service) is now a hugely popular and a very powerful business communication technology for mobile phones. In order to respond correctly to a free form factual question given a large collection of texts, one needs to understand the question at a level that allows determining some of constraints the question imposes on a possible answer. These constraints may include a semantic classification of the sought after answer and may even suggest using different strategies when looking for and verifying a candidate answer. In this paper we focus on various attempts to overcome the major contradiction: the technical limitations of the SMS standard, and the huge number of found information for a possible answer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

World’s mobile market pushes past 2 billion lines in 2005. Success in these competitive markets requires operational excellence with product and service innovation to improve the mobile performance. Mobile users very often prefer to send a mobile instant message or text messages rather than talking on a mobile. Well developed “written speech analysis” does not work not only with “verbal speech” but also with “mobile text messages”. The main purpose of our paper is, firstly, to highlight the problems of mobile text messages processing and, secondly, to show the possible ways of solving these problems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pesiqta Rabbati is a unique homiletic midrash that follows the liturgical calendar in its presentation of homilies for festivals and special Sabbaths. This article attempts to utilize Pesiqta Rabbati in order to present a global theory of the literary production of rabbinic/homiletic literature. In respect to Pesiqta Rabbati it explores such areas as dating, textual witnesses, integrative apocalyptic meta-narrative, describing and mapping the structure of the text, internal and external constraints that impacted upon the text, text linguistic analysis, form-analysis: problems in the texts and linguistic gap-filling, transmission of text, strict formalization of a homiletic unit, deconstructing and reconstructing homiletic midrashim based upon form-analytic units of the homily, Neusner’s documentary hypothesis, surface structures of the homiletic unit, and textual variants. The suggested methodology may assist scholars in their production of editions of midrashic works by eliminating superfluous material and in their decoding and defining of ancient texts.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

We carried out a randomized controlled trial in Bogotá, the recipient of Colombia´s highest number of internally displaced people (IDP), to assess whether the use of SMS to communicate eligibility to social benefits fosters the welfare of victimized internal refugees. Only a fraction of IDP are elegible to benefits. We inform eligibility via SMS to a random half of IDP-households who are, and estimate the Local Average Treatment Effect of the text message on the knowledge of the benefits available tothe displaced population. We show that while on the average treated households know their rights better than controls, a more disaggregate analysis suggest that there is variation of awareness across benefits. The intervention was overall successful in empowering IDP and the use of SMS should be widened as a social policy instrument. However our results suggest that text messages should be complemented with other communication strategies, yet to be evaluated.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Text messaging is a new form of writing, brought about by technological development in the last couple of decades. Mobile phone usage has increased rapidly worldwide and texting is now part of many people's everyday communcation. A large number of users send or receive texts which include some abbreviations and shortenings, commonly referred to as textspeak. This novel linguistic phenomenon is perceived by some with indifference and by others with aggravation. The following study examines attitudes towards this linguistic change from a gender and age perspective. The comparison between two groups show that the most conservative and least positive to change are young women. The analysis and discussion around this focuses on power, prestige and patterns.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Se comparan y contrastan las destrezas requeridas para la comprensión lectora con aquellas que se necesitan para la producción de escritos correctos, en inglés, coherentes y bien cohesionados. Se comentan las actividades didácticas relacionadas con ello.The aim of this article is to establish the relevance of teaching reading and writing skills to students at Madrid Polytechnic University, and to show the relationship and interdependence of these activities in EAP courses. The skills involved in reading and writing processes for academic purposes for L2 students are compared and commented on from a rhetorical point of view. Learning tasks based on text-type analysis are recommended as adequate activities to build schemata for writing and represent a synthesis of the teaching objectives proposed for reading and writing English courses.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Non-attendance at paediatric outpatient appointments results in delayed diagnosis and treatment, putting children at risk of avoidable ill health, and incurring considerable health service costs. Links between missed appointments and clinical, socio-demographic, and access-related factors have been indicated, but parental cognitions associated with non-attendance have yet to be investigated. The aims of this project were to evaluate the effectiveness and theoretical bases of existing interventions designed to reduce non-attendance; to consider the ways in which missed appointments are managed by healthcare providers; to explore parents’ beliefs and experiences of attending and missing appointments; and to investigate the factors underlying these beliefs. A systematic literature review focusing on non-attendance interventions was conducted Within a mixed methods framework, interviews were conducted with healthcare professionals, subsequent interviews were conducted with parents who had attended or missed a General Paediatric outpatient appointment, and a cross-sectional questionnaire study of parents’ beliefs was implemented. The systematic review revealed that text message appointment reminders are effective at reducing non-attendance rates, but that no interventions have thus far been developed using theories of behaviour. Healthcare professionals recognised both barriers and parents’ beliefs as influences on attendance, but also believed there were ‘types’ of families who miss appointments. Healthcare professionals disagreed somewhat about how non-attendance should best be managed. The parent interview study found six themes. The findings reflect parents’ perceptions about the importance of attending and of their ability to attend. The results of the questionnaire study corroborate this structure of beliefs as the analysis produced two factors, the perceived ‘worth’ of attending and anticipated ‘worry’ when attending. This thesis demonstrates an original approach to investigating non-attendance at children’s outpatient appointments, using mixed methods and adopting a psychological rather than service-use perspective. The findings contribute to Health Psychology theory and offer recommendations for healthcare providers.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Mobile phones have the potential of fostering political mobilisation. There is a significant political power in mobile technology. Like the Internet, mobile phones facilitate communication and rapid access to information. Compared to the Internet, however, mobile phone diffusion has reached a larger proportion of the population in most countries, and thus the impact of this new medium is conceivably greater. There are now more mobile phones in the UK than there are people (averaging at 121 mobile phones for every 100 people). In this paper, the attempt to use modern mobile technology to handle the General Election, is discussed. The pre-election advertising, election day issues, including the election news and results as they come in, and answering questions via text message regarding the results of current and/or previous general elections are considered.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this paper is to highlight the mobile services developed by the Rector Gabriel Ferraté Library (BRGF) of the Universitat Politècnica de Catalunya (UPC Barcelona Tech) in Barcelona, Spain.We hope this paper will be of use to other libraries exploring new technologies for communicating and delivering their services to users at a time when mobile services are an emerging topic in librarianship and information science literature. By setting out the successive steps involved in the as yet unfinished process of building our mobile services portfolio, we aim to offer a detailed picture of the mobile services and features offered by a university library from a case study perspective.The main topics to be discussed include:- The BRGF’s mobile website, including the information available, its interactivecapabilities and the services it provides to its users.- The mobile-friendly version of UPCommons (the UPC Library Service’s institutionalrepositories).- The UPC Library Service’s mobile OPAC.- The mobile version of u-win (BRGF’s videogame service).- The use of QR codes to deliver information to mobile devices.- Text message notifications.Additional topics for discussion include:- The library’s organisation and the organisational concepts that underpin andmake possible its technological developments (including mobile).- BRGF’s concern regarding the reduction of investment in the development of mobile services.- The criteria and tools used to guide the library’s decisions regarding thedesign and orientation of current and future mobile services.- How mobile services can help to improve the image of the library as a leadingtechnology site.- Selected mobile features that BRGF plans to offer in the near future.Ultimately, this paper aims to delineate the effectiveness and potential of deliveringlibrary services by the preferred means of communication of a new generation of studentsand teachers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Following high winds on January 24, 2006, at least five people claimed to have seen or felt the superstructure of the Saylorville Reservoir Bridge in central Iowa moving both vertically and laterally. Since that time, the Iowa Department of Transportation (DOT) contracted with the Bridge Engineering Center at Iowa State University to design and install a monitoring system capable of providing notification of the occurrence of subsequent high winds. Although measures were put into place following the 2006 event at the Saylorville Reservoir Bridge, knowledge of the performance of this bridge during high wind events was incomplete. Therefore, the Saylorville Reservoir Bridge was outfitted with an information management system to investigate the structural performance of the structure and the potential for safety risks. In subsequent years, given the similarities between the Saylorville and Red Rock Reservoir bridges, a similar system was added to the Red Rock Reservoir Bridge southeast of Des Moines. The monitoring system developed and installed on these two bridges was designed to monitor the wind speed and direction at the bridge and, via a cellular modem, send a text message to Iowa DOT staff when wind speeds meet a predetermined threshold. The original intent was that, once the text message is received, the bridge entrances would be closed until wind speeds diminish to safe levels.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Iowa’s traffic safety culture is influenced by laws and policies, enforcement methods, driver education, roadway engineering, and drivers’ behaviors. The Center for Social and Behavioral Research at the University of Northern Iowa was contracted by the Iowa Department of Transportation to conduct a general population survey of adult Iowans. Telephone interviews were conducted with 1,088 adult Iowans from October to December 2011. A dual-frame (cell phone and landline) sampling design was used. The interview covered a wide range of traffic safety topics (e.g., traffic safety policies, enforcement techniques, and distracted driving). Most Iowans said driving in Iowa is about as safe now as it was 5 years ago; however, one-fourth said driving in Iowa is less safe now. There are a number of driving-related behaviors many adult Iowans consider serious threats to traffic safety and never acceptable to do while driving. Yet, many Iowans report often seeing other drivers engaging in these behaviors and admit engaging in some themselves. For example, nearly 1 in 5 adult Iowa drivers said they have sent or read a text message or email while driving in the past 30 days despite this being prohibited since July of 2011. A slight majority said they support using cameras on highways, interstates, and city streets to automatically ticket drivers for speeding, with even stronger support for red light cameras. A comprehensive approach to traffic safety in Iowa is required to encourage protective factors that enhance traffic safety and reduce the impact of detrimental factors.