SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

SMS-Based Event Notification System
Oludare Olaleye1*, Ayodele Olaniyan2, Olalekan Eboda1, Adeleke Awolere2
1. Department of Computer science, Allover Central Polytechnic, PO box 1518, Sango Ota, Nigeria
2. Department of Computer Engineering, Gateway Polytechnic Saapade, PO box 2003, Isara-Remo,
Nigeria
* E-mail of the corresponding author: oludarejohnson@yahoo.com
Abstract
Existing mass Short Message Service (SMS) mailing systems are designed to work with a specific SMS gateway
hence resulting in user lock-in to a SMS vendor. Also, some SMS gateways support scheduling of SMS message
to be sent at a later time and date, others do not support it. Moreover, those gateways that support scheduling
don't mostly allow users to cancel scheduled SMS message.
This study has successfully designed and developed an enterprise class mass SMS mailing system that support
multiple users as well as multiple SMS gateways, providing a unified interface and common set of features
across many SMS gateways which prevent vendor lock-in as users can choose among multiple SMS vendor
gateways. Another major feature provided by the new system is the introduction of SMS message scheduling.
This feature makes SMS message scheduling possible across all SMS gateways including those that do not
internally support scheduling. Moreover, users can also cancel any scheduled message if the need be.
Keywords: Mailing Systems, Lock-In, Scheduling, SMS, SMS Gateway, SMS Vendor.
1. Introduction
The short message service (SMS) technology is one of the most stable and most widely used mobile
communication methods after phone calls. Most students of tertiary institutions carry mobile phones which is
capable of receiving short messages as a means of event notification. In principle, text message can be used
either as a one-way communication to provide the user information such as reminder, alert, etc, or as a two-way
communication that enables the user to send and receive information (such as question and answer). Event
notification (through SMS) is a well-known way of notifying users about an event scheduled to take effect within
a particular period in an institution. Moreover, Mobile text messages are an excellent aid for communication
when there is a need to submit information also at long distances or without well working communication system
or infrastructure, or when the people cannot physically meet the staff that is concerned, provided that the cost of
the text message is very low and it is available to practically everyone. It has been found useful to employ the
text messaging in many routine-like academic environment applications. Typical examples of these application
areas are e.g. different kinds of reminders and instructions, reporting of laboratory test results or home
assessment for students, remote controlling and monitoring etc. By using this kind of communication, it is
possible to save resources by e.g. avoiding unnecessary visits and phone calls; the mobile phone messaging in
institutions has been a subject of active research work for about a decade.
In this paper, the development of a schedule-able SMS-based system which permits multiple vendor gateways
for event notification is presented.
2. Literature review
SMS is an acronym used in the world of communications technology. It stands for Short Messaging Service
which is a protocol used in communications that gives way to the exchange of short text messages from one
mobile telephone device to another. SMS or text messaging largely dominates today's means of communication
since seventy-four percent of all cell phone users send and receive text messages nowadays. The technology
behind SMS has paved the way for the rapid growth of improvement of text messaging that has now allowed
users to broadcast SMS text messages not just from mobile phones but also from computers with the use of SMS
software and through public SMS gateways. The link between text messaging to SMS technology now co notates
the terminology of "SMS" as the act of texting or sending text messages even with the use of a different
communications protocol.
2.1 The Capabilities of SMS
The use of SMS as an effective means of personal communication has expanded the market of text messaging.
Businesses, government offices, and even television shows now use this service since SMS is the quickest way
to get a message through from one entity to another SMS text messaging is the most widely used data
application on the planet, with 2.4 billion active users, or 74% of all mobile phone subscribers sending and
receiving text messages on their phones . The SMS technology has facilitated the development and growth of
text messaging. SMS has unique advantages that other non-voice services do not have. It provides a very
convenient method of exchanging small bits of information between mobile users. The reasons for the enormous
55
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

popularity of SMS have been the fact that this mechanism of sending and receiving messages not only saves
time but costs less as well. In many situations one is relatively much more comfortable sending a message via
SMS than talking over phone. With new information services and unique value added services being used by the
operators the popularity of SMS is increasing further. SMS is also uniquely positioned as a very attractive
advertisement medium. SMS should no longer be treated as a value added service in mobile networks. SMS is
not only providing a useful mechanism for a host of innovative services over mobile networks but it acting as a
point of entry for new data services like WAP in mobile networks.
2.2 Application of SMS services
2.2.1 As a tool to provide SMS car parking technique
The car parking technique is being implemented using the SMS services on cellular phone in Vienna (Austria). It
describes how useful these advanced car parking system are in providing drivers with information about the
structure of the car park systems and the space available for them to park their cars. The availability of the vacant
parking space is calculated by means of sensors installed in the parking areas, which count the number of cars
that enter to and exit from the parking areas. Also, the number of parking tickets issued at the tickets counter can
be used to calculate the vacant spaces. All this information from the sensors and tickets counters is used to
update a central database which stores all the information about the areas of the parking space which is vacant or
occupied. The advanced parking system also provides advanced, electronic payment options for the customers.
The idea behind this electronic payment option is to prevent the customer for having to wait in long queues to
buy a ticket. Queues can cause congestion in areas within and outside of parking facilities.
2.2.2 As administrative tool to support communication in higher institution of learning
According to L. Naismith, (2007) from the University of Birmingham reported that an e-mail to text message
service called Study Link is employed to support Administrative communication in higher education. Text
messaging can be “effectively integrated into both the student and staff experience”. Administrative staff
members were able to integrate the service into their current means of communicating with students while
students were able to effectively receive and act on text messages. Message types include notices of changes and
cancellations (e.g., class cancellations), reminders to submit and collect assignments, notices of relevant
lectures/activities, individual administration (e.g., warning messages to absentees), instructional messages (e.g.,
instructions for submitting assignments), and greeting/courteous messages.
According to S. Pramsane, & R. Sanjaya, (2006) development of education services based on short message
services. The education information such as the enrollment information, grade release, university announcement,
and internship opportunity can be retrieved and/or sent by the students via SMS through a login system. This
research points out that administrative support to students via short message services is ideal.
2.2.3 As a tool to support library administrative work
Library services can be improved through SMS-based administrative support. Libraries can reach out and serve
students ubiquitously by sending and receiving SMS-based library information. There are a number of areas in
library services for which SMS-based messages can be helpful. Basic information alerts such as notices of book
reservations, and renewals and overdue reminders are well tailored with this communication medium. One
example is the SMS alert services offered by the Hong Kong Institute of Education. Further library services can
also be provided via SMS based systems. For example, extended text messaging reference can send SMS
messages to and receive answers from librarians as reported in research at Southeastern Louisiana University as
a way to further enhance the quality of services provided by libraries in higher education.
2.2.4 As a tool for Teaching and Learning Support (Classroom interaction and discussion)
A SMS-based classroom interaction system is presented in [65]. They called this the TXT-2-LRN system. The
system allows students to send questions or comments to the instructor’s laptop via SMS. The instructor can read
the messages on the screen and decide to respond immediately or wait for later action. The instructor can also
provide a quiz to the students and collect results. Students can look at the projector’s screen in real-time graphics
showing the results. Short message services encourage interactivity in the classroom, Traxler, J. (2005).
2.3 Related Work
Mobile computing and communication technology interventions for improving health care and health service
outcomes, referred as M-health, Free C et al., Patel V, et al. (2010) are used nowadays on a wide range from data
collection and information transmission to supporting health behavior change.
Wei et al., (2011) presented a literature review including 24 articles on the use of text messaging for clinical and
healthy behavior interventions. In paper of Cole-Lewis and Kershaw, (2010) a review on the behavior change
interventions for disease management and prevention delivered through text messaging is presented. Krishna et
al. (2009) have made an article on the state-of–heart of the use of mobile phones and text messaging
interventions in improving health outcomes and processes of care.
There has been an increasing interest in academic institutions using mobile devices to support teaching and
learning. Different mobile devices can be used in mobile learning. The most ubiquitous and stable mobile

56
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

technologies namely Short Message Service (SMS) texting (Traxler, 2005) on cellular phones has great potential
in education.
In Mozambique health workers can support diagnosis & treatment through Bulk SMS and even in Uganda,
Malawi and Benin health education messages are sent by text messages (Pankaj, 2011).
3.System design
The system defines a common interface that all SMS gateway objects must implements. The interface declares
an abstract method – send - that will performs the function of sending SMS messages through a specific SMS
gateway. The send method must returns an object that contains an error flag that indicates if the send operation
was successful or not and the response message from the SMS gateway – the response message will be from a
set of predefined set of messages provided by the interface. All SMS gateway objects in the system must
implement this interface and define the send method to work with the specific SMS gateway each of the objects
represents. The send method definition in each of the SMS gateway objects must also be able to analyze the
custom response from the gateway and pick the most appropriate message from the set of predefined messages
provided by the interface to be returned to the caller of the send method. This will gives the interface a uniform
set of responses across all SMS gateways. The system stores the SMS gateway objects in a naming service that
binds each object to the name of the SMS gateway it represents. The system also keeps database record of all the
names of the SMS gateway objects in the naming service.
To send SMS message through any SMS gateway, the system simply need to use the name of the gateway to
obtain the appropriate gateway object from the naming service. The obtained object can be used to
• Send instant SMS message - the sender of the message will get an immediate response from the system.
• Schedule a SMS message to be sent on a specified date and time in the future – a scheduler will perform
the send operation on the specified date and time and notify the sender through an appropriate mean e.g.
server side push notification.
3.1 System Architecture
The three-tier architecture model is the structure used for the system architecture. Here is how the three-tier
model is incorporated into the system
3.1.1 Client Tier
This is the client side of the architecture. The user will be shown formatted HTML pages resulting from JSP
code, which will be submitted to the application middleware for processing. It will actually be the front-end of
the system and it is where the user will interact with the system.
3.1.2 Application Tier
This is the middleware side of the architecture. The main application used in this layer is JSP, which will be
processed by a web server, i.e. Tomcat. Also in this tier will be the SSL protocol (Secure Sockets Layer) if it is
exist, to make sure the system and data is secure from unauthorized users.
The application tier is made up of the following components:
• A naming service for storing instances of the various SMS gateways supported by the system. On startup, the system will create an instance of each SMS gateway objects and stored them in the naming
service.
• A thread pool of n size where n is the number of threads in the pool. For optimal performance and to
avoid the overhead of thread context switching, n should not be set too high. For example, on a multicore system, n should be set equal the number of processor cores on the computer system.
• An executor service that will use the thread pool to execute tasks submitted to it asynchronously.
• A scheduler that can schedule tasks to be submitted to the executor service on a specified date and time.
The scheduler must return an object (scheduled task) that can be used to monitor the status of each
scheduled task. The scheduler must also be thread safe. The system will maintain a single instance of
the scheduler in its application context. All requests handling threads will use this scheduler instance to
schedule SMS message.
• The system will also maintain a single instance of a thread safe collection object (scheduled task list)
that will hold all scheduled task objects.
To send a new SMS message, the system will obtain the appropriate SMS gateway object from the naming
service and call the gateway object send method.
To schedule a new SMS message, the system will obtain the appropriate SMS gateway object from the naming
service, create a task object that will act as a closure for calling the SMS gateway object send method, submit the
task object to the scheduler instance along with the specified date and time of executing the task, store the
scheduled task object return by the scheduler in the scheduled task list.

57
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

3.1.3 Back-End Tier
This is the backend side of the architecture and where all the data and records are kept. Also known as the
business data, the technology used to store the business data is Postgresql Database Server.
3.2 Interface Design
3.2.1 Login Page
W2This page welcomes the user to the application. It displays and allows the user to Input User Id and
Password, then click login button; the screen will automatically display the Home page, the home page menu
will be created depends on the user role. Based on the user login info the system will specify the user Role and
permissions and based on those permissions the system main menu which is a dynamic menu will be generated
to enable the user to access only his authorized pages of the system.
3.2.2 Manage Contact page
This page allows the user to add new contact information or edit existing ones. The user can group the contacts
into groups selects the Add New Event button. In order to delete any contact the user just clicks the delete link
beside the desired contact in the grid in order to delete that contact.
3.2.3 Manage Notifications page
This page allows the user to add new notification or edit existing ones. To add new notification, the user will
enter the new Notification information and clicks save to store the data in the system database. In order to delete
any contact the user just clicks the delete link beside the desired contact in the grid in order to delete that contact.
3.2.4 Send Notifications page
This page allows the user to send new notification to selected contacts. In order to send a new notification first
the user selects the desired notification from the list of notification grid. Then the user select a desired group
from the drop down list for the contact groups Finally the system will display all contact included in that group
and then the admin has to select contacts to be notified and click Send or Schedules Notification button to
complete the process.
Conclusion
This study has successfully designed and developed an enterprise class mass SMS mailing system that support
multiple users as well as multiple SMS gateways, providing a unified interface and common set of features
across many SMS gateways which prevent vendor lock-in as users can choose among multiple SMS vendor
gateways. Another major feature provided by the new system is the introduction of SMS message scheduling.
This feature makes SMS message scheduling possible across all SMS gateways including those that do not
internally support scheduling. Moreover, users can also cancel any scheduled message if the need be.
Reference
Cole-Lewis H, Kershaw T (2010) Text Messaging as a Tool for Behavior Change in Disease Prevention and
Management. Epidemiol Rev 32: 56-69.
Free C, Phillips G, Felix L, Galli L, Patel V, et al. (2010) The effectiveness of M-health technologies for
improving health and health services: a systematic review protocol. BMC Research Notes 3: 250.
Infotech.monash.edu/promotion/.../projects/carparksms/literaturereview.doc
Krishna S, Boren SA, Balas EA (2009) Healthcare via Cell Phones: A Systematic Review. Telemed J E Health
15: 231-240.
L. Naismith, (2007). Using text messaging to support administrative communication in higher education. Active
Learning in Higher Education,Vol 8, 155-171.
L. Smith & H. Roth (2003). “Parking Systems Technologies”. Retrieved on 11 August 2005
Masoud, H., Masoud, A (2012); The Pedagogical Applications of Using Short Message System (SMS) in
Language Learning Classes, International Journal of Academic Research in Progressive Education and
Development , Vol. 1, No. 1
Pankaj, K. J.,(2011);SMS Based Information Systems
S. Pramsane, & R. Sanjaya, (2006). Mobile education services based on SMS and their architecture comparison.
Proceedings of the Third International Conference on eLearning for Knowledge-based Society.
So, S. (2009). The development of a SMS-based teaching and learning system. Journal of Educational
Technology Development and Exchange, 2(1), 113-124.
Traxler, J. (2005). Case studies: Introduction and overview. In A. Kukulska-Hulme and J. Traxler (Eds), Mobile
learning: A handbook for educators and trainers (pp 70-75). London: Routledge
Wei J, Hollin I, Kachnowski S (2011) A review of the use of mobile phone text messaging in clinical and
healthy behaviour interventions. J Telemed Telecare 17: 41-48.

58
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

www.sicet.org/journals/jetde/jetde09/simon.pdf. Block all www.sicet.org results. In teaching and learning
Traxler, J. (2005). Case studies: Introduction and overview. In A. Kukulska-Hulme and J. Traxler (Eds), Mobile
learning: A handbook for educators and trainers (pp 70-75).
http://www.cs.washington.edu/education/courses/cse590f/07sp/docs/Mukhebi.pdf.
http://www.sicet.org/journals/jetde/jetde09/simon.pdf
http://www.ewh.ieee.org/soc/e/sac/meem/index.php/meem/article/view/119/152

Figure 1: System Architecture Diagram

Figure 2: Login Page

59
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

Figure 3: Manage contacts page

Figure 4: Add new group/member page

60
Journal of Information Engineering and Applications
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.10, 2013

www.iiste.org

Figure 5: Manage notifications page

Figure 6: Send notification page

61
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Mais conteúdo relacionado

Mais procurados

3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Contoh Kasus Pelanggaran HAM Luar Negeri
Contoh Kasus Pelanggaran HAM Luar NegeriContoh Kasus Pelanggaran HAM Luar Negeri
Contoh Kasus Pelanggaran HAM Luar NegeriFenti Anita Sari
 
Pengertian Firewall, NAT, dan Proxy Server
Pengertian Firewall, NAT, dan  Proxy ServerPengertian Firewall, NAT, dan  Proxy Server
Pengertian Firewall, NAT, dan Proxy Serverfajaarfds
 
Pemrograman Virus Menggunakan VBScript
Pemrograman Virus Menggunakan VBScriptPemrograman Virus Menggunakan VBScript
Pemrograman Virus Menggunakan VBScriptWahyu Primadi
 
Membangun system monitoring menggunakan Cacti di Debian 7
Membangun system monitoring menggunakan Cacti di Debian 7Membangun system monitoring menggunakan Cacti di Debian 7
Membangun system monitoring menggunakan Cacti di Debian 7AdityaBintangPradana
 
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Walid Umar
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
kuh perdata hukum perikatan
kuh perdata hukum perikatankuh perdata hukum perikatan
kuh perdata hukum perikatandwi aprilia
 
CyberOps Associate Modul 25 Network Security Data
CyberOps Associate Modul 25 Network Security DataCyberOps Associate Modul 25 Network Security Data
CyberOps Associate Modul 25 Network Security DataPanji Ramadhan Hadjarati
 
Tugas permohonan pengangkatan anak
Tugas permohonan pengangkatan anakTugas permohonan pengangkatan anak
Tugas permohonan pengangkatan anakDesy Fitrianty
 
DNS server configuration
DNS server configurationDNS server configuration
DNS server configurationSanguine_Eva
 
Jaringan Wireless BSS dan ESS
Jaringan Wireless BSS dan ESSJaringan Wireless BSS dan ESS
Jaringan Wireless BSS dan ESSRizalIhza
 
FIREWALL PADA JARINGAN VOIP.docx
FIREWALL PADA JARINGAN VOIP.docxFIREWALL PADA JARINGAN VOIP.docx
FIREWALL PADA JARINGAN VOIP.docxNeNg ANtie
 
Pertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanwormPertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanwormRoziq Bahtiar
 
DNS Configuration
DNS ConfigurationDNS Configuration
DNS ConfigurationVinod Gour
 

Mais procurados (20)

3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
EUT440 LAW 3 (Negligence)
EUT440 LAW 3 (Negligence)EUT440 LAW 3 (Negligence)
EUT440 LAW 3 (Negligence)
 
Contoh Kasus Pelanggaran HAM Luar Negeri
Contoh Kasus Pelanggaran HAM Luar NegeriContoh Kasus Pelanggaran HAM Luar Negeri
Contoh Kasus Pelanggaran HAM Luar Negeri
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Pengertian Firewall, NAT, dan Proxy Server
Pengertian Firewall, NAT, dan  Proxy ServerPengertian Firewall, NAT, dan  Proxy Server
Pengertian Firewall, NAT, dan Proxy Server
 
Pemrograman Virus Menggunakan VBScript
Pemrograman Virus Menggunakan VBScriptPemrograman Virus Menggunakan VBScript
Pemrograman Virus Menggunakan VBScript
 
Membangun system monitoring menggunakan Cacti di Debian 7
Membangun system monitoring menggunakan Cacti di Debian 7Membangun system monitoring menggunakan Cacti di Debian 7
Membangun system monitoring menggunakan Cacti di Debian 7
 
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
 
Laporan praktikum jarkom_2
Laporan praktikum jarkom_2Laporan praktikum jarkom_2
Laporan praktikum jarkom_2
 
information security technology
information security technologyinformation security technology
information security technology
 
kuh perdata hukum perikatan
kuh perdata hukum perikatankuh perdata hukum perikatan
kuh perdata hukum perikatan
 
CyberOps Associate Modul 25 Network Security Data
CyberOps Associate Modul 25 Network Security DataCyberOps Associate Modul 25 Network Security Data
CyberOps Associate Modul 25 Network Security Data
 
Tugas permohonan pengangkatan anak
Tugas permohonan pengangkatan anakTugas permohonan pengangkatan anak
Tugas permohonan pengangkatan anak
 
DNS server configuration
DNS server configurationDNS server configuration
DNS server configuration
 
Memahami hak akses di linux
Memahami hak akses di linuxMemahami hak akses di linux
Memahami hak akses di linux
 
Jaringan Wireless BSS dan ESS
Jaringan Wireless BSS dan ESSJaringan Wireless BSS dan ESS
Jaringan Wireless BSS dan ESS
 
FIREWALL PADA JARINGAN VOIP.docx
FIREWALL PADA JARINGAN VOIP.docxFIREWALL PADA JARINGAN VOIP.docx
FIREWALL PADA JARINGAN VOIP.docx
 
Pertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanwormPertemuan09 virus,trojandanworm
Pertemuan09 virus,trojandanworm
 
DNS Configuration
DNS ConfigurationDNS Configuration
DNS Configuration
 
Vpn
VpnVpn
Vpn
 

Destaque

Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...
Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...
Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...Ioannis Alexakis
 
1.2M .pdf
1.2M .pdf1.2M .pdf
1.2M .pdfbutest
 
Thesis:"DLAlert and Information Alert System for Digital Libraries"
Thesis:"DLAlert and Information Alert System for Digital Libraries"Thesis:"DLAlert and Information Alert System for Digital Libraries"
Thesis:"DLAlert and Information Alert System for Digital Libraries"Ioannis Alexakis
 
Real-time monitoring and delay management of a transport information system
Real-time monitoring and delay management of a transport information systemReal-time monitoring and delay management of a transport information system
Real-time monitoring and delay management of a transport information systemLorenzo Sfarra
 
Chapter 3 research design
Chapter 3 research designChapter 3 research design
Chapter 3 research designFaisal Pak
 
Chapter 3 research method p1
Chapter 3 research method p1Chapter 3 research method p1
Chapter 3 research method p1dabneyluang
 
Chapter 3 research design and methodology
Chapter 3   research design and methodologyChapter 3   research design and methodology
Chapter 3 research design and methodologyLokman Hakim Ismail
 
Manelyn L. Mananap Thesis (Chapter 3)
Manelyn L. Mananap Thesis (Chapter 3)Manelyn L. Mananap Thesis (Chapter 3)
Manelyn L. Mananap Thesis (Chapter 3)mtlobrido
 
Ed200 research chapter 3 methodology(jan282012)
Ed200 research  chapter 3 methodology(jan282012)Ed200 research  chapter 3 methodology(jan282012)
Ed200 research chapter 3 methodology(jan282012)Maria Theresa
 
Research Methodology Chapter 3
Research Methodology Chapter 3Research Methodology Chapter 3
Research Methodology Chapter 3Pulchowk Campus
 
Thesis computerized grading system
Thesis computerized grading systemThesis computerized grading system
Thesis computerized grading systemjolensreyes
 
Thesis about Computerized Payroll System for Barangay Hall, Dita
Thesis about Computerized Payroll System for Barangay Hall, DitaThesis about Computerized Payroll System for Barangay Hall, Dita
Thesis about Computerized Payroll System for Barangay Hall, DitaAcel Carl David O, Dolindo
 
Result Monitoring System using SMS thesis
Result Monitoring System using SMS thesisResult Monitoring System using SMS thesis
Result Monitoring System using SMS thesisCarul Push
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 

Destaque (20)

Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...
Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...
Thesis Document "Parsimomious Estimation of Default Probabilities from Credit...
 
1.2M .pdf
1.2M .pdf1.2M .pdf
1.2M .pdf
 
Ao thesis
Ao thesisAo thesis
Ao thesis
 
Thesis:"DLAlert and Information Alert System for Digital Libraries"
Thesis:"DLAlert and Information Alert System for Digital Libraries"Thesis:"DLAlert and Information Alert System for Digital Libraries"
Thesis:"DLAlert and Information Alert System for Digital Libraries"
 
Real-time monitoring and delay management of a transport information system
Real-time monitoring and delay management of a transport information systemReal-time monitoring and delay management of a transport information system
Real-time monitoring and delay management of a transport information system
 
Chapter 3 research design
Chapter 3 research designChapter 3 research design
Chapter 3 research design
 
Chapter 3 research method p1
Chapter 3 research method p1Chapter 3 research method p1
Chapter 3 research method p1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 3 research design and methodology
Chapter 3   research design and methodologyChapter 3   research design and methodology
Chapter 3 research design and methodology
 
Manelyn L. Mananap Thesis (Chapter 3)
Manelyn L. Mananap Thesis (Chapter 3)Manelyn L. Mananap Thesis (Chapter 3)
Manelyn L. Mananap Thesis (Chapter 3)
 
Ed200 research chapter 3 methodology(jan282012)
Ed200 research  chapter 3 methodology(jan282012)Ed200 research  chapter 3 methodology(jan282012)
Ed200 research chapter 3 methodology(jan282012)
 
Research Methodology Chapter 3
Research Methodology Chapter 3Research Methodology Chapter 3
Research Methodology Chapter 3
 
Thesis computerized grading system
Thesis computerized grading systemThesis computerized grading system
Thesis computerized grading system
 
Thesis about Computerized Payroll System for Barangay Hall, Dita
Thesis about Computerized Payroll System for Barangay Hall, DitaThesis about Computerized Payroll System for Barangay Hall, Dita
Thesis about Computerized Payroll System for Barangay Hall, Dita
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Data gathering
Data gatheringData gathering
Data gathering
 
Result Monitoring System using SMS thesis
Result Monitoring System using SMS thesisResult Monitoring System using SMS thesis
Result Monitoring System using SMS thesis
 
Writing chapter 3
Writing chapter 3Writing chapter 3
Writing chapter 3
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Semelhante a Sms based event notification system

Applying of bulk_sms_system_to_enhance_educational
Applying of bulk_sms_system_to_enhance_educationalApplying of bulk_sms_system_to_enhance_educational
Applying of bulk_sms_system_to_enhance_educationaldavidmoro13
 
Result Alert System through SMS and E-mail
Result Alert System through SMS and E-mailResult Alert System through SMS and E-mail
Result Alert System through SMS and E-mailiosrjce
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
 
Ensuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEnsuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
 
User experience evaluation for a bus tracking apps in smart campus initiative
User experience evaluation for a bus tracking apps in smart campus initiativeUser experience evaluation for a bus tracking apps in smart campus initiative
User experience evaluation for a bus tracking apps in smart campus initiativejournalBEEI
 
Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015Carlos Malab
 
M-Learning
M-LearningM-Learning
M-Learningbutest
 
M-Learning
M-LearningM-Learning
M-Learningbutest
 
SMS Technology for your Business
SMS Technology for your BusinessSMS Technology for your Business
SMS Technology for your BusinessMelvin Dave Vivas
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-edIAESIJEECS
 
Leveraging low-cost mobile platform technology for pro-poor development
Leveraging low-cost mobile platform technology for pro-poor developmentLeveraging low-cost mobile platform technology for pro-poor development
Leveraging low-cost mobile platform technology for pro-poor developmentCharles Darwin University
 
An examination and report on potential methods of strategic location based se...
An examination and report on potential methods of strategic location based se...An examination and report on potential methods of strategic location based se...
An examination and report on potential methods of strategic location based se...ijmpict
 
IRJET- Retrieving Web Pages Via Short Message Service
IRJET-  	  Retrieving Web Pages Via Short Message ServiceIRJET-  	  Retrieving Web Pages Via Short Message Service
IRJET- Retrieving Web Pages Via Short Message ServiceIRJET Journal
 
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...IJRES Journal
 
Mobile Learning Technologies
Mobile Learning Technologies Mobile Learning Technologies
Mobile Learning Technologies IJECEIAES
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filteringijtsrd
 

Semelhante a Sms based event notification system (20)

Applying of bulk_sms_system_to_enhance_educational
Applying of bulk_sms_system_to_enhance_educationalApplying of bulk_sms_system_to_enhance_educational
Applying of bulk_sms_system_to_enhance_educational
 
Result Alert System through SMS and E-mail
Result Alert System through SMS and E-mailResult Alert System through SMS and E-mail
Result Alert System through SMS and E-mail
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
 
Ensuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEnsuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert System
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
User experience evaluation for a bus tracking apps in smart campus initiative
User experience evaluation for a bus tracking apps in smart campus initiativeUser experience evaluation for a bus tracking apps in smart campus initiative
User experience evaluation for a bus tracking apps in smart campus initiative
 
Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015
 
M-Learning
M-LearningM-Learning
M-Learning
 
M-Learning
M-LearningM-Learning
M-Learning
 
SMS Technology for your Business
SMS Technology for your BusinessSMS Technology for your Business
SMS Technology for your Business
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
Leveraging low-cost mobile platform technology for pro-poor development
Leveraging low-cost mobile platform technology for pro-poor developmentLeveraging low-cost mobile platform technology for pro-poor development
Leveraging low-cost mobile platform technology for pro-poor development
 
An examination and report on potential methods of strategic location based se...
An examination and report on potential methods of strategic location based se...An examination and report on potential methods of strategic location based se...
An examination and report on potential methods of strategic location based se...
 
R01821116120
R01821116120R01821116120
R01821116120
 
BULK SMS SENDER project report
BULK SMS SENDER project reportBULK SMS SENDER project report
BULK SMS SENDER project report
 
IRJET- Retrieving Web Pages Via Short Message Service
IRJET-  	  Retrieving Web Pages Via Short Message ServiceIRJET-  	  Retrieving Web Pages Via Short Message Service
IRJET- Retrieving Web Pages Via Short Message Service
 
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
Mobile Cloud Computing: Academic Services for Palestinian Higher Education In...
 
Mobile Learning Technologies
Mobile Learning Technologies Mobile Learning Technologies
Mobile Learning Technologies
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
 
P47
P47P47
P47
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Sms based event notification system

  • 1. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org SMS-Based Event Notification System Oludare Olaleye1*, Ayodele Olaniyan2, Olalekan Eboda1, Adeleke Awolere2 1. Department of Computer science, Allover Central Polytechnic, PO box 1518, Sango Ota, Nigeria 2. Department of Computer Engineering, Gateway Polytechnic Saapade, PO box 2003, Isara-Remo, Nigeria * E-mail of the corresponding author: oludarejohnson@yahoo.com Abstract Existing mass Short Message Service (SMS) mailing systems are designed to work with a specific SMS gateway hence resulting in user lock-in to a SMS vendor. Also, some SMS gateways support scheduling of SMS message to be sent at a later time and date, others do not support it. Moreover, those gateways that support scheduling don't mostly allow users to cancel scheduled SMS message. This study has successfully designed and developed an enterprise class mass SMS mailing system that support multiple users as well as multiple SMS gateways, providing a unified interface and common set of features across many SMS gateways which prevent vendor lock-in as users can choose among multiple SMS vendor gateways. Another major feature provided by the new system is the introduction of SMS message scheduling. This feature makes SMS message scheduling possible across all SMS gateways including those that do not internally support scheduling. Moreover, users can also cancel any scheduled message if the need be. Keywords: Mailing Systems, Lock-In, Scheduling, SMS, SMS Gateway, SMS Vendor. 1. Introduction The short message service (SMS) technology is one of the most stable and most widely used mobile communication methods after phone calls. Most students of tertiary institutions carry mobile phones which is capable of receiving short messages as a means of event notification. In principle, text message can be used either as a one-way communication to provide the user information such as reminder, alert, etc, or as a two-way communication that enables the user to send and receive information (such as question and answer). Event notification (through SMS) is a well-known way of notifying users about an event scheduled to take effect within a particular period in an institution. Moreover, Mobile text messages are an excellent aid for communication when there is a need to submit information also at long distances or without well working communication system or infrastructure, or when the people cannot physically meet the staff that is concerned, provided that the cost of the text message is very low and it is available to practically everyone. It has been found useful to employ the text messaging in many routine-like academic environment applications. Typical examples of these application areas are e.g. different kinds of reminders and instructions, reporting of laboratory test results or home assessment for students, remote controlling and monitoring etc. By using this kind of communication, it is possible to save resources by e.g. avoiding unnecessary visits and phone calls; the mobile phone messaging in institutions has been a subject of active research work for about a decade. In this paper, the development of a schedule-able SMS-based system which permits multiple vendor gateways for event notification is presented. 2. Literature review SMS is an acronym used in the world of communications technology. It stands for Short Messaging Service which is a protocol used in communications that gives way to the exchange of short text messages from one mobile telephone device to another. SMS or text messaging largely dominates today's means of communication since seventy-four percent of all cell phone users send and receive text messages nowadays. The technology behind SMS has paved the way for the rapid growth of improvement of text messaging that has now allowed users to broadcast SMS text messages not just from mobile phones but also from computers with the use of SMS software and through public SMS gateways. The link between text messaging to SMS technology now co notates the terminology of "SMS" as the act of texting or sending text messages even with the use of a different communications protocol. 2.1 The Capabilities of SMS The use of SMS as an effective means of personal communication has expanded the market of text messaging. Businesses, government offices, and even television shows now use this service since SMS is the quickest way to get a message through from one entity to another SMS text messaging is the most widely used data application on the planet, with 2.4 billion active users, or 74% of all mobile phone subscribers sending and receiving text messages on their phones . The SMS technology has facilitated the development and growth of text messaging. SMS has unique advantages that other non-voice services do not have. It provides a very convenient method of exchanging small bits of information between mobile users. The reasons for the enormous 55
  • 2. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org popularity of SMS have been the fact that this mechanism of sending and receiving messages not only saves time but costs less as well. In many situations one is relatively much more comfortable sending a message via SMS than talking over phone. With new information services and unique value added services being used by the operators the popularity of SMS is increasing further. SMS is also uniquely positioned as a very attractive advertisement medium. SMS should no longer be treated as a value added service in mobile networks. SMS is not only providing a useful mechanism for a host of innovative services over mobile networks but it acting as a point of entry for new data services like WAP in mobile networks. 2.2 Application of SMS services 2.2.1 As a tool to provide SMS car parking technique The car parking technique is being implemented using the SMS services on cellular phone in Vienna (Austria). It describes how useful these advanced car parking system are in providing drivers with information about the structure of the car park systems and the space available for them to park their cars. The availability of the vacant parking space is calculated by means of sensors installed in the parking areas, which count the number of cars that enter to and exit from the parking areas. Also, the number of parking tickets issued at the tickets counter can be used to calculate the vacant spaces. All this information from the sensors and tickets counters is used to update a central database which stores all the information about the areas of the parking space which is vacant or occupied. The advanced parking system also provides advanced, electronic payment options for the customers. The idea behind this electronic payment option is to prevent the customer for having to wait in long queues to buy a ticket. Queues can cause congestion in areas within and outside of parking facilities. 2.2.2 As administrative tool to support communication in higher institution of learning According to L. Naismith, (2007) from the University of Birmingham reported that an e-mail to text message service called Study Link is employed to support Administrative communication in higher education. Text messaging can be “effectively integrated into both the student and staff experience”. Administrative staff members were able to integrate the service into their current means of communicating with students while students were able to effectively receive and act on text messages. Message types include notices of changes and cancellations (e.g., class cancellations), reminders to submit and collect assignments, notices of relevant lectures/activities, individual administration (e.g., warning messages to absentees), instructional messages (e.g., instructions for submitting assignments), and greeting/courteous messages. According to S. Pramsane, & R. Sanjaya, (2006) development of education services based on short message services. The education information such as the enrollment information, grade release, university announcement, and internship opportunity can be retrieved and/or sent by the students via SMS through a login system. This research points out that administrative support to students via short message services is ideal. 2.2.3 As a tool to support library administrative work Library services can be improved through SMS-based administrative support. Libraries can reach out and serve students ubiquitously by sending and receiving SMS-based library information. There are a number of areas in library services for which SMS-based messages can be helpful. Basic information alerts such as notices of book reservations, and renewals and overdue reminders are well tailored with this communication medium. One example is the SMS alert services offered by the Hong Kong Institute of Education. Further library services can also be provided via SMS based systems. For example, extended text messaging reference can send SMS messages to and receive answers from librarians as reported in research at Southeastern Louisiana University as a way to further enhance the quality of services provided by libraries in higher education. 2.2.4 As a tool for Teaching and Learning Support (Classroom interaction and discussion) A SMS-based classroom interaction system is presented in [65]. They called this the TXT-2-LRN system. The system allows students to send questions or comments to the instructor’s laptop via SMS. The instructor can read the messages on the screen and decide to respond immediately or wait for later action. The instructor can also provide a quiz to the students and collect results. Students can look at the projector’s screen in real-time graphics showing the results. Short message services encourage interactivity in the classroom, Traxler, J. (2005). 2.3 Related Work Mobile computing and communication technology interventions for improving health care and health service outcomes, referred as M-health, Free C et al., Patel V, et al. (2010) are used nowadays on a wide range from data collection and information transmission to supporting health behavior change. Wei et al., (2011) presented a literature review including 24 articles on the use of text messaging for clinical and healthy behavior interventions. In paper of Cole-Lewis and Kershaw, (2010) a review on the behavior change interventions for disease management and prevention delivered through text messaging is presented. Krishna et al. (2009) have made an article on the state-of–heart of the use of mobile phones and text messaging interventions in improving health outcomes and processes of care. There has been an increasing interest in academic institutions using mobile devices to support teaching and learning. Different mobile devices can be used in mobile learning. The most ubiquitous and stable mobile 56
  • 3. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org technologies namely Short Message Service (SMS) texting (Traxler, 2005) on cellular phones has great potential in education. In Mozambique health workers can support diagnosis & treatment through Bulk SMS and even in Uganda, Malawi and Benin health education messages are sent by text messages (Pankaj, 2011). 3.System design The system defines a common interface that all SMS gateway objects must implements. The interface declares an abstract method – send - that will performs the function of sending SMS messages through a specific SMS gateway. The send method must returns an object that contains an error flag that indicates if the send operation was successful or not and the response message from the SMS gateway – the response message will be from a set of predefined set of messages provided by the interface. All SMS gateway objects in the system must implement this interface and define the send method to work with the specific SMS gateway each of the objects represents. The send method definition in each of the SMS gateway objects must also be able to analyze the custom response from the gateway and pick the most appropriate message from the set of predefined messages provided by the interface to be returned to the caller of the send method. This will gives the interface a uniform set of responses across all SMS gateways. The system stores the SMS gateway objects in a naming service that binds each object to the name of the SMS gateway it represents. The system also keeps database record of all the names of the SMS gateway objects in the naming service. To send SMS message through any SMS gateway, the system simply need to use the name of the gateway to obtain the appropriate gateway object from the naming service. The obtained object can be used to • Send instant SMS message - the sender of the message will get an immediate response from the system. • Schedule a SMS message to be sent on a specified date and time in the future – a scheduler will perform the send operation on the specified date and time and notify the sender through an appropriate mean e.g. server side push notification. 3.1 System Architecture The three-tier architecture model is the structure used for the system architecture. Here is how the three-tier model is incorporated into the system 3.1.1 Client Tier This is the client side of the architecture. The user will be shown formatted HTML pages resulting from JSP code, which will be submitted to the application middleware for processing. It will actually be the front-end of the system and it is where the user will interact with the system. 3.1.2 Application Tier This is the middleware side of the architecture. The main application used in this layer is JSP, which will be processed by a web server, i.e. Tomcat. Also in this tier will be the SSL protocol (Secure Sockets Layer) if it is exist, to make sure the system and data is secure from unauthorized users. The application tier is made up of the following components: • A naming service for storing instances of the various SMS gateways supported by the system. On startup, the system will create an instance of each SMS gateway objects and stored them in the naming service. • A thread pool of n size where n is the number of threads in the pool. For optimal performance and to avoid the overhead of thread context switching, n should not be set too high. For example, on a multicore system, n should be set equal the number of processor cores on the computer system. • An executor service that will use the thread pool to execute tasks submitted to it asynchronously. • A scheduler that can schedule tasks to be submitted to the executor service on a specified date and time. The scheduler must return an object (scheduled task) that can be used to monitor the status of each scheduled task. The scheduler must also be thread safe. The system will maintain a single instance of the scheduler in its application context. All requests handling threads will use this scheduler instance to schedule SMS message. • The system will also maintain a single instance of a thread safe collection object (scheduled task list) that will hold all scheduled task objects. To send a new SMS message, the system will obtain the appropriate SMS gateway object from the naming service and call the gateway object send method. To schedule a new SMS message, the system will obtain the appropriate SMS gateway object from the naming service, create a task object that will act as a closure for calling the SMS gateway object send method, submit the task object to the scheduler instance along with the specified date and time of executing the task, store the scheduled task object return by the scheduler in the scheduled task list. 57
  • 4. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org 3.1.3 Back-End Tier This is the backend side of the architecture and where all the data and records are kept. Also known as the business data, the technology used to store the business data is Postgresql Database Server. 3.2 Interface Design 3.2.1 Login Page W2This page welcomes the user to the application. It displays and allows the user to Input User Id and Password, then click login button; the screen will automatically display the Home page, the home page menu will be created depends on the user role. Based on the user login info the system will specify the user Role and permissions and based on those permissions the system main menu which is a dynamic menu will be generated to enable the user to access only his authorized pages of the system. 3.2.2 Manage Contact page This page allows the user to add new contact information or edit existing ones. The user can group the contacts into groups selects the Add New Event button. In order to delete any contact the user just clicks the delete link beside the desired contact in the grid in order to delete that contact. 3.2.3 Manage Notifications page This page allows the user to add new notification or edit existing ones. To add new notification, the user will enter the new Notification information and clicks save to store the data in the system database. In order to delete any contact the user just clicks the delete link beside the desired contact in the grid in order to delete that contact. 3.2.4 Send Notifications page This page allows the user to send new notification to selected contacts. In order to send a new notification first the user selects the desired notification from the list of notification grid. Then the user select a desired group from the drop down list for the contact groups Finally the system will display all contact included in that group and then the admin has to select contacts to be notified and click Send or Schedules Notification button to complete the process. Conclusion This study has successfully designed and developed an enterprise class mass SMS mailing system that support multiple users as well as multiple SMS gateways, providing a unified interface and common set of features across many SMS gateways which prevent vendor lock-in as users can choose among multiple SMS vendor gateways. Another major feature provided by the new system is the introduction of SMS message scheduling. This feature makes SMS message scheduling possible across all SMS gateways including those that do not internally support scheduling. Moreover, users can also cancel any scheduled message if the need be. Reference Cole-Lewis H, Kershaw T (2010) Text Messaging as a Tool for Behavior Change in Disease Prevention and Management. Epidemiol Rev 32: 56-69. Free C, Phillips G, Felix L, Galli L, Patel V, et al. (2010) The effectiveness of M-health technologies for improving health and health services: a systematic review protocol. BMC Research Notes 3: 250. Infotech.monash.edu/promotion/.../projects/carparksms/literaturereview.doc Krishna S, Boren SA, Balas EA (2009) Healthcare via Cell Phones: A Systematic Review. Telemed J E Health 15: 231-240. L. Naismith, (2007). Using text messaging to support administrative communication in higher education. Active Learning in Higher Education,Vol 8, 155-171. L. Smith & H. Roth (2003). “Parking Systems Technologies”. Retrieved on 11 August 2005 Masoud, H., Masoud, A (2012); The Pedagogical Applications of Using Short Message System (SMS) in Language Learning Classes, International Journal of Academic Research in Progressive Education and Development , Vol. 1, No. 1 Pankaj, K. J.,(2011);SMS Based Information Systems S. Pramsane, & R. Sanjaya, (2006). Mobile education services based on SMS and their architecture comparison. Proceedings of the Third International Conference on eLearning for Knowledge-based Society. So, S. (2009). The development of a SMS-based teaching and learning system. Journal of Educational Technology Development and Exchange, 2(1), 113-124. Traxler, J. (2005). Case studies: Introduction and overview. In A. Kukulska-Hulme and J. Traxler (Eds), Mobile learning: A handbook for educators and trainers (pp 70-75). London: Routledge Wei J, Hollin I, Kachnowski S (2011) A review of the use of mobile phone text messaging in clinical and healthy behaviour interventions. J Telemed Telecare 17: 41-48. 58
  • 5. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org www.sicet.org/journals/jetde/jetde09/simon.pdf. Block all www.sicet.org results. In teaching and learning Traxler, J. (2005). Case studies: Introduction and overview. In A. Kukulska-Hulme and J. Traxler (Eds), Mobile learning: A handbook for educators and trainers (pp 70-75). http://www.cs.washington.edu/education/courses/cse590f/07sp/docs/Mukhebi.pdf. http://www.sicet.org/journals/jetde/jetde09/simon.pdf http://www.ewh.ieee.org/soc/e/sac/meem/index.php/meem/article/view/119/152 Figure 1: System Architecture Diagram Figure 2: Login Page 59
  • 6. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org Figure 3: Manage contacts page Figure 4: Add new group/member page 60
  • 7. Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.10, 2013 www.iiste.org Figure 5: Manage notifications page Figure 6: Send notification page 61
  • 8. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar