The Application of Text Compression to Short Message Service Using Huffman Table
|
|
|
- Branden Dixon
- 9 years ago
- Views:
Transcription
1 Vol.6 No.1 (Januari 2011) JURNAL GENERIC 19 The Application of Text Compression to Short Message Service Using Huffman Table Ahmad Affandi, 1 Saparudin, 2 and Erwin 3 Abstract Short Message Service (SMS) is a way of sending short messages in a quick and relatively cheap price. However, besides easiness provided, these SMSs limit the number of characters that can be sent by users. A message sent via SMS, has a maximum capacity of 140 bytes. This causes a person who wants to send a message long enough, consists of a number of characters will have difficulty. Although it is delivered, the message must be assembled into a number of SMS based on maximum capacity. Several ways can be performed to overcome this, one of them by doing compression. By using Huffman table an application text compression on SMS is made in order to compress and decompress when sending and receiving message. This application is made by J2ME and will run on mobile phones based on MIDP 2.0. The results of this study SMS text compression application with Huffman table overall is able to perform the compression process of an SMS text with an average compression ratio of 28.73%. Keywords Huffman code, Huffman table, short message service, text compression. S I. INTRODUCTION hort Message Service (SMS) is one of the facilities of the mobile phone that has long been used by the public. Use of this SMS allows mobile phone users to exchange information. Through the SMS services, mobile phone users will be able to send short messages in quick time with a relatively cheap price compared with the use of telephone, without being limited by distance and time. So far the SMS become a favorite among mobile phone users. This can be seen from the results of a survey conducted by Nielsen Mobile in the U.S. in second quarter of 2008, show that cell phone subscribers in the United States are using SMS more than a phone conversation. But besides the eases that has been granted, SMS service limits the number of characters that can be used by users. An SMS message consists of a maximum of 140 bytes, in other words, a message can contain 140 characters of the 8-bit, bit characters or 70 characters for 16-bit Japanese, Mandarin and Korean language [1]. In doing sending an SMS a user can send messages over 140 bytes, but for that payment will be more than one. This happens because the 1 Ahmad Affandi was graduated from bachelor degree in informatics (S.Kom), Faculty of Computer Science, University of Sriwijaya, Inderalaya, Ogan Ilir, Southern Sumatera. 2 Saparudin is a senior lecturer in informatics. He is now with the Faculty of Computer Science, University of Sriwijaya, Inderalaya, Ogan Ilir, Southern Sumatera. ( [email protected]). 3 Erwin is a senior lecturer in informatics. He is now with the Faculty of Computer Science, University of Sriwijaya, Inderalaya, Ogan Ilir, Southern Sumatera. ( [email protected]). message which is sent consists of more than one page and also the process of sending a message will be as many as the number of pages available. Limitations in the number of characters is what makes the users of SMS to be selective in choosing words so that messages to be delivered is contained entirely within a single SMS. And not only that such limitations also pose a habit to write the message in a way abbreviated which will make of misunderstanding the meaning to receiver. This certainly will be a little inconvenient when users have to perform sending SMS,so need to be made an application of compression to increase the amount of the character of the SMS that will be sent in single page SMS, by way of compression the text or content of messages on the SMS service. Compression is the process of encoding data using a smaller number of bits, so that the smaller bits can represent the same information [2]. SMS compression applications is made in order to perform the compression process at the time of sending SMS messages and make the process of decompression when receiving message. The text or data compression will reduce the amount of memory used and accelerate of sending message. In this study the process of compression and decompression using the Huffman tree will not be performed. This is because the receiver (decoder) will have difficulty to decompress the message if the information did not include the Huffman tree when sending message. Addition information on the Huffman tree will need a separate place so that the process of compression becomes less effective. This is reinforced from the results of research Lipesik Liliana VJ [4], which makes the conclusion that the process is less successful if the file contents of too little data so that the size of original file can be smaller than the size of the compressed file because of file compression results still need to save the Huffman tree. The compression process will be applied to SMS text that has a small capacity, which is 140 bytes in one page SMS. So the process of compression with Huffman trees become less effective as an information exchange, Huffman tree will be accommodated in a table. This table is called Huffman table, storing the Huffman codes of SMS characters to be used. This table is static and will be used in applications, either the application sender (encoder) or the application receiver (decoder), as a reference in the process of compression and decompression on the SMS text. By using the Huffman table encoding and decoding process can be performed faster and smaller memory requirements than compared with using the Huffman tree [3]. ISSN: (print) / (online) 2011 JURNAL GENERIC
2 20 JURNAL GENERIC Ahmad Affandi Et Al. A. Short Message Service II. LITERATURE REVIEW SMS is one of the facilities of GSM and CDMA standards used for sending and receiving of text messages from a cellular phone. In order to use the SMS feature, users need to complete a cell phone with SIM card (Subscriber Identity Module) of GSM and CDMA service providers that support SMS. An SMS message is not sent directly from mobile phone to the mobile phone receiver but message will be delivered prior to the Short Message Service Center (SMSC). When the destination mobile phone is not active, the system will delay the delivery of messages to the destination mobile phone until mobile phone is active again. In the event of failure of delivery of messages that are temporary (e.g. mobile phone destination is not active) will be resend the message, unless it is enforced the rule that a message has exceeded a certain time limit should be removed and otherwise failed messages. An SMS message has a maximum length of 140 bytes or 160 characters in the ASCII 7-bit encoding which this format is the standard format used on the SMS [1]. SMS messages in 8-bit encoding has a maximum length of 140 characters and is usually used to send smart message (smart messaging) as a picture or a ringtone and sending data via OTA (over the air) for setting up WAP. Messages are delivered in Arabic, Korean, Chinese or other papers with 16-bit encoding format, then writing an SMS is limited to 70 characters [1]. A standard message containing 160 characters or less will be counted as a single SMS package. For a concatenated message that containing more than 160 characters, each 153 characters will be counted as a single SMS, for seven other characters used as a marker (tag) numbers are part of each section. With the technique of concatenated SMS messaging, although the message contains more than 160 characters, each message sent and equipment consist of 160 characters, only with the marker number of earlier, when an SMS is received by cellular phone that supports concatenated messaging, then some SMS was going directly combined into one long message [5]. B. Huffman Table In this study the compression that will be applied to the SMS text that has a small capacity of 140 bytes for each page of text. This is consistent with the conclusion that produced on Liliana and Lipesik VJ [4] research and the Huffman tree creation process is removed then this may save time so that the process of encoding process can be performed more quickly. To replace the information on the Huffman tree then created a table (Huffman table), which contains the Huffman codes of the characters default GSM to be used. This table is static and will be used by the application, whether the application sender (encoder) or receiver (decoder), as reference to make the process of encoding / decoding of the text messages. Huffman table is made by determining the Huffman code from the SMS characters. Determination of Huffman codes are based on assumptions, that is performed by giving a short code for the character that is often accessed so even vice versa. Lowercase that a chance occurrence is more often given Huffman code is shorter, large letters have a smaller chance of occurrence given a longer Huffman code, as well as frequently accessed punctuation such as: Question mark, commas, periods, etc. also given shorter Huffman code, and the last for numbers and other symbols are rare and never even accessed will have a longer Huffman code. With conditions in the determination of the Huffman codes, Huffman code on one of the characters should not be a prefix for the Huffman code on other characters. In the Huffman tables that used in this research consists of 130 symbols which is the default characters that exist in the GSM 7-bit. Some Huffman table to be used as a reference for compression and decompression in this study can be seen in Table 1. Following: TABEL I. HUFFMAN TABLE No. Huffman Symbol Code Space a n i e t r k u s m g ? b c d h j l o p y Huffman table within the program will be formed into two separate shelters, which are formed in the two arrays, namely: an array of letters (containing the characters SMS) and an array of code (containing the Huffman code). For clearer illustration can be seen from this example: saya ada di rumah By using Table I, then do the encoding of the message. The first word was "s", first the system will perform a search into the array letters and when the letter "s" was found the next step is to match the number sequence on the array code. The point is that in this case the letter s was ranked 10th in the array of letters and then the system will search the sequence is the 10th in an array code and binary code for the letter s was found, namely: "10010". So the next encoding process shifted to the next letter until forming a series of
3 Vol.6 No.1 (Januari 2011) JURNAL GENERIC 21 code like as follow: The next step is to calculate the number of characters from the series of bits above. Due to the encoding that was formed in Binary message format (binary message), then such discussion in the previous section automatic calculations performed using 8-bit encoded data. In other words how the calculation is done by dividing the number of bits with a series of eight, so we get the number of characters compression. However, the amount of the above circuit is 81 bits, 7 bits are needed again for the number of bits to be rounded to be divided by eight, if not then the process of calculating the amount of compression character will be difficult to be determined and the system will experience an error in calculating the number of bytes that must be submitted and message cannot be sent. So that made a way in a program that is adding bits " ". In this case the required seven bits for eight can be divided so that bits that are added is " " when necessary for example in the case of another three points to be divided by eight then added bits "111". So the end result of a series of bits in this encoding process is as follows: And the message is ready to be sent to the recipient's mobile phone number. Once the message is received on a mobile phone receiver, we perform the decoding process (return from a binary message into a text message that can be read by the recipient). To make the process of decoding the first thing to do is read these bits. Reading of the bits is based on the array code and starts reading from the first bit of the bit "1", then searched and matched to the array code and if not found, we perform the shift by 1 bit, so that it becomes "10" again sought the matching bits of the array code and if not found continue to be a shift, so in this case, bit "10010" is found in the array and the same code as in the encoding process. The next step is the matching number sequence on the array of letters based on the number sequence on the array code; it was found and converted into the character s. Next starts again reading the next bits until everything has been on-decoding everything. In the end the remaining bits in this case is " " because the bits are not located in an array of bits, the code will be given a blank value. Decoding process has been successfully carried out and can be read by the recipient. C. Sending and Receiving in J2ME The application of SMS compression in this study is a stand-alone application, which means this application seperates with the existing standard SMS application on mobile phones. Thus, this application must be installed on the sender's mobile phone and receiver s mobile phone, so that the process of compression and decompression can be performed by both parties. In the case of sending a message on the MIDP packages to handle SMS is handled by an optional package that is WMA (Wireless Messaging API). At the WMA 2.0, there are three forms of message delivery [6] namely: 1) Binary messages (binary message) that is shaped binary message that sent via SMS. Message of this type uses 8- bit encoded data with a maximum amount of data per SMS pages 140 bytes or 133 bytes if the port number is included. 2) Text message is message in the form of text sent via SMS. In this type of message if the data used in the GSM 7-bit format, the maximum number of characters in one SMS page is as much as 160 characters or 152 characters if the port number is included. If the data used in UCS-2 format, the maximum number of characters is as much as 70 characters or 66 characters if the port number is included. 3) Multipart message is a multi-media message that is sent via MMS. To receive an SMS message, WMA using the URL "sms: / /" as the SMS protocol identifier. In the WMA format, there are two addresses to send messages [7] namely: 1) Format sms:// <phone number>. SMS messages sent using this format will be immediately catched by inbox and will not be accepted by the WMA application. 2) Format sms:// < phone number >: <Port>. This format allows you to send SMS to other mobile phone applications that enable the WMA as a recipient of an SMS. Port allows for communications between applications WMA. If the port is not included, then the SMS received will go into standard mobile phone inbox so that WMA will never receive the SMS. In this study, sending and receiving SMS conducted in the form of binary format. The process of compression or decompression of the SMS text is performed by manipulating the bits in the character of the SMS which will be sent based on the Huffman table that contains the binary code for each character that was created earlier. On the software created with J2ME storage of all information or messages are stored in non-volatile memory (fixed memory) called the Record Management System (RMS). RMS is a storage management system of record that refers to a table with a collection of records. In the RMS does not have primary keys and foreign keys can be defined. Primary key on the RMS has automatically defined as an integer record id. Record on the RMS is stored as an array of bytes that how it works based on the record (row of data). RMS has the orientation of a simple database record so it does not recognize the fields (columns of data) as a common database, so the data need to be mapped first. And also J2ME does not provide an API to access the inbox and outbox SMS standard application on mobile phone. Due to the limitations that made an inbox and outbox artificial separated with the inbox and outbox SMS standard application on mobile phone. In this final project, software development, there are three types of SMS message storage in the form of tables in the RMS are: ISSN: (print) / (online) 2011 JURNAL GENERIC
4 22 JURNAL GENERIC Ahmad Affandi Et Al. 1) Table inbox (keep messages received that have been decompressed) 2) Table outbox (save the messages sent or outgoing) 3) Table drafts (save the messages are stored before sending) D. Information Compression In the discussion in the previous explanation can be seen that the application of compression can compress SMS can either words or messages in order to save memory and load more characters in one SMS page. Therefore in this application will be made a form which will contain information about the results of compression sms, so users can see how much a given compression ratio, the number of characters that can be loaded after compressing, the number of pages in the SMS after compressing etc. So with the info compression facility is expected to be a validation or consideration of the users in sending a message and also useful as additional information for users about the performance of text compression using the Huffman table from the results shown in the form of compression ratio and percentage increase. The compression-info info that is displayed is as follows: 1) The number of initial messages: the number of initial message before compression 2) The number of initial characters: the number of initial characters before compression 3) Number of message compression: the number of messages after compression that will be sent 4) The amount of compression of characters: the number of characters after compression that will be sent 5) Compression ratio: the percentage of SMS compression ratio, can be calculated by equation as follows [8]: ( ( )) Rasio = 1 compressed _ size / raw _ size * 100% As the foregoing discussion that the application of this final compression is performed by Binary Message mode, which means messages are sent in the form of binary and message of this type uses 8-bit encoded data with a maximum amount of data per SMS pages of 140 bytes or 133 bytes if the port number included. So the equation to get compressed_size is: influence the compression process to the number of characters and number of pages generated SMS. The testing process was conducted in order to calculate the ratio between the data before it is done with the data compression process after the compression process. In this case compressed_size represents the number of bits of compression and raw_size character represents the number of bits initial character (before the compressed data). For visual interest the results of testing applications will be presented using the visualization of the emulator. In this test will show information related to the amount of compression SMS initial message, the number of initial characters, the number of message compression, the number of characters compression, the compression ratio and compression results. Testing applications on the SMS text using Huffman table can be seen in the Figure 1 and Figure 2 below. Figure 1. Original Message In this study the process of compression first will be performed on 15 different pieces lower case letter of SMS, which are consist of 5 pieces of SMS with the number of 1 page, 5 pieces of SMS with the number of 2 pages and 5 pieces of SMS with the number of 3 pages. The language used for writing SMS has the characteristics of many acronyms and many use non-standard language. The results of this test can be seen in the Table II below. compressed _ size = The number of compressed characters * 8 While for raw_size using Text Message mode, which means messages are sent in text. These messages use the GSM-7 bit format with a maximum number of characters in one SMS page is as much as 160 characters or 152 characters if the port number is included. So the equation is obtained in calculating raw_size are as follows: raw _ size = The number of initial characters * 7 Figure 2. Information Compression III. RESULT AND DISCUSSION Tests conducted with the aim to find out how much
5 Vol.6 No.1 (Januari 2011) JURNAL GENERIC 23 TABEL II. SMS COMPRESSION ON FIRST TEST of pages 2 and 2 pieces of SMS with the number of page 3. To more clearly seen from the Table III below. TABEL III. SMS COMPRESSION ON SECOND TEST Bases on the result of system testing SMS compression on Table 4.14 can be concluded that compression ratio averages is 28,73%, for more explanation the result of compression can be looked on Figure 3 below. Based on the results of the testing system for data compression SMS SMS is composed of capital letters in Table 4.15 to conclude that the average compression ratio that is equal to 1.18% for more details, the result of compression can be seen in Figure 4 below. Figure 4. The second compression test based on raw_size Figure 3. The first compression test based on raw_size Based on Figure 3 the test results of compression system using Raw_sized SMS (SMS initial number of bits) ranging between 308 bits to 917 bits, in this case indicates that although the compression continues to be one page, but the results Compressed_sized (number of bits SMS compression) becomes lower ie ranging between 216 bits to 664 bits. While the testing of compression systems using Raw_sized SMS (SMS initial number of bits) ranging from 1358 bit to 1512 bit capable of producing Compressed_sized (number of bits SMS compression), ie ranging between 976 bits to 1064 bits, so that in this test with the number of initial pages to 2 pages compressed into 1 pages. And for testing the compression system using Raw_sized SMS (SMS initial number of bits) ranging from 2366 bit to 2905 bit capable of producing Compressed_sized (number of bits SMS compression), ie ranging from 1688 bits to 2032 bits, so that in this test with the number of initial pages 3 pages can be compressed into 2 pages. SMS compression system further testing will be conducted on 5 pieces of data an SMS with the text type which consists of all upper case, which consists of 2 pieces of SMS with the number of pages 1, 2 SMS with the number Based on Figure 4 the test results of compression system using Raw_sized SMS (SMS initial number of bits) in the SMS data consisting of all uppercase ranging between 798 bits to 2933 bits, and gives results in Compressed_sized (number of bits SMS compression), ie, ranging between 784 bits up to 2960 bits, shows that the difference between Raw_sized and Compressed_sized is very small. In this test can be proved that the pages aren t compressed which consisting of 2 pages and 3 pages. It can be concluded that the SMS data consisting of all uppercase less effective for compressed. IV. CONCLUSION Huffman table can be used in the compression text on SMS services. Generally Huffman table has an average compression ratio of %. Overall SMS compression testing system by using the Huffman table will produce good compression if the compressed data to be composed of the characters with a shorter length code (lower case letter) contained in the Huffman table, and vice versa if the SMS data consists of characters which have a longer code (data consisting of all upper case) contained in the table Huffman compression results become less effective. ISSN: (print) / (online) 2011 JURNAL GENERIC
6 24 JURNAL GENERIC Ahmad Affandi Et Al. REFERENCES [1] Aprianto, D Performansi Modifikasi LZW (Lempel-Ziv- Welch) Untuk Kompresi Teks. [unpublished thesis], Department of Informatics, Bandung Institute of Technology. [2] Ayuningtyas, N Implementasi Kode Huffman Dalam Kompresi Teks. [unpublished thesis], Department of Informatics, Bandung Institute of Technology. [3] Hashemian, R Direct Huffman Code and Decoding Using The Table of Code-Lengths. [unpublished thesis], Northen Illionis University. [4] Liliana, Lipesik, V.J Pembuatan Perangkat Lunak Untuk Kompresi File Text Dengan Menggunakan Huffman Tree. [unpublished thesis], Faculty of Industry Technology, Kristen Petra University. [5] JSR 120 Expert Group Wireless Messaging API for Java 2 Micro Edition. Sun Microsystem Inc. [6] Ortiz, C.E The Wireless Messaging API, Sun Microsystem, Inc. [online]available: midp/articles/ wma2/ [7] Mardiono, T Membangun Solusi Mobile Business Dengan Java. Elex Media Komputindo, Jakarta. [8] Nelson, M., Jean, L.G., 1995, The Data Compression Book Second Edition, IDG Books Worldwide, Inc, Cambridge.
Technical documentation
Technical documentation HTTP Application Programming Interface SMPP specifications Page 1 Contents 1. Introduction... 3 2. HTTP Application Programming Interface... 4 2.1 Introduction... 4 2.2 Submitting
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
Now SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
Sprint Worldwide Services Guide
Sprint Worldwide Services Guide HTC Touch Pro2 www.sprint.com 2009 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. Table of Contents Sprint
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions
Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing
Digital Versus Analog Lesson 2 of 2
Digital Versus Analog Lesson 2 of 2 HDTV Grade Level: 9-12 Subject(s): Science, Technology Prep Time: < 10 minutes Activity Duration: 50 minutes Materials Category: General classroom National Education
Base Conversion written by Cathy Saxton
Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,
Barcodes principle. Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague
Barcodes principle Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague Contents How does it work? Bulls eye code PostNet 1D Bar code 2D
Wan Accelerators: Optimizing Network Traffic with Compression. Bartosz Agas, Marvin Germar & Christopher Tran
Wan Accelerators: Optimizing Network Traffic with Compression Bartosz Agas, Marvin Germar & Christopher Tran Introduction A WAN accelerator is an appliance that can maximize the services of a point-to-point(ptp)
Advanced HTTP API Documentation
Advanced HTTP API Documentation Page 1 of 8 Introduction The SMS Broadcast Advanced HTTP API can be used to integrate SMS messaging into your own systems. This API allows for tracking of SMS messages and
Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives
Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,
UNDERSTANDING SMS: Practitioner s Basics
UNDERSTANDING SMS: Practitioner s Basics Michael Harrington, CFCE, EnCE It is estimated that in 2006, 72% of all mobile phone users world wide were active users of SMS or text messaging. In European countries
Index. Corporate Profile. Page 2 360Global Company Profile
Index Corporate Profile. Page 2 360Global Company Profile 1. Introduction Of SMS.. Page 2 1.1. What is SMS? 1.2 Comparison Of SMS Against Other Means Of Advertising 1.3 Where does SMS fit in? 2. Bulk SMS
Avaya one-x Mobile User Guide for iphone
Avaya one-x Mobile User Guide for iphone Release 5.2 January 2010 0.3 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was
Quick Start Guide Now SMS/MMS Gateway
Quick Start Guide Now SMS/MMS Gateway This document is intended for new users of the Now SMS/MMS gateway, as a quick start toward a working installation. In this guide, we will perform the following steps:
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
KPN SMS mail. Send SMS as fast as e-mail!
KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.
ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6)
ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6) 1 COMPUTER LANGUAGES In order for a computer to be able to execute a program, the program must first be present
A L ERT. Quick Start With
A L ERT Quick Start With I NSTAL L ATION To launch the installation of Micromedia Solution, insert the installation CD-ROM in the CD/DVD drive. If the installation program does not start automatically
Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)
Collaboration Protocol Agreement Guide Public Health Information Network Messaging System (PHINMS) Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: April 15, 2008 EXECUTIVE
2011, The McGraw-Hill Companies, Inc. Chapter 3
Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through
Quick Start Guide. U.S. Cellular Customer Care: 1-888-944-9400
Quick Start Guide LG ENVOY III U.S. Cellular Customer Care: 1-888-944-9400 Getting to Know Your Phone Earpiece 3.5 mm Headset Jack Left Soft Key Text Message Key Volume Up/Down Keys Send Key Micro USB
Diafaan SMS Server 3.0 Manual. 2009-2015 Diafaan communication software
Diafaan SMS Server 3.0 Manual 2 Diafaan SMS Server 3.0 Manual Table of Contents Part I Welcome to Diafaan SMS Server 5 Part II Getting started 7 1 Gateways... and connectors 10 2 Add a... gateway 12 Add
Vodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
Today s topics. Digital Computers. More on binary. Binary Digits (Bits)
Today s topics! Binary Numbers! Brookshear.-.! Slides from Prof. Marti Hearst of UC Berkeley SIMS! Upcoming! Networks Interactive Introduction to Graph Theory http://www.utm.edu/cgi-bin/caldwell/tutor/departments/math/graph/intro
SMS Inbound Germany, Austria & Switzerland Specification of Services
Germany, Austria & Switzerland Version 5.1 whatever mobile GmbH Contents 1. Introduction... 3 2. Overview... 3 3. SMS Inbound... 3 3.1. SMS long numbers... 3 3.2. Virtual SIM Hosting... 4 3.3. SMS short
MS Access: Advanced Tables and Queries. Lesson Notes Author: Pamela Schmidt
Lesson Notes Author: Pamela Schmidt Tables Text Fields (Default) Text or combinations of text and numbers, as well as numbers that don't require calculations, such as phone numbers. or the length set by
Introduction to Web Services
Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 7, July 23 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Greedy Algorithm:
International Language Character Code
, pp.161-166 http://dx.doi.org/10.14257/astl.2015.81.33 International Language Character Code with DNA Molecules Wei Wang, Zhengxu Zhao, Qian Xu School of Information Science and Technology, Shijiazhuang
send and receive MMS
send and receive MMS 1 Contents Page 3 Page 4 Page 7 Page 8 Page 12 Page 13 Page 15 An introduction to MMS messaging How to send MMS messages How much does it cost to send MMS? Receiving MMS How much does
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Setting Up Message Notifications in Cisco Unity 8.x
CHAPTER 23 Setting Up Message Notifications in Cisco Unity 8.x See the following sections in this chapter: Overview of Message Notifications in Cisco Unity 8.x, page 23-1 Setting Up Text Message Notifications
NØGSG DMR Contact Manager
NØGSG DMR Contact Manager Radio Configuration Management Software for Connect Systems CS700 and CS701 DMR Transceivers End-User Documentation Version 1.24 2015-2016 Tom A. Wheeler [email protected] Terms
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
This document is to provide help and illustrations to users who wish to deliver SMS using the Pinnacle SMS Gateway via the HTTP Protocol.
URL API Reference 1. INTRODUCTION This document is to provide help and illustrations to users who wish to deliver SMS using the Pinnacle SMS Gateway via the HTTP Protocol. Accessing gateway through HTTP
Messaging API. API Specification Document Messaging API. Functionality: Send SMS Messages.
Functionality: Send SMS Messages. This gateway can be accessed via the HTTP or HTTPs Protocol by submitting values to the API server and can be used to send simple text messages to single or multiple mobile
How to select the right Marketing Cloud Edition
How to select the right Marketing Cloud Edition Email, Mobile & Web Studios ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire customer lifecycle
Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and
Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide Rev: 2013-02-01 Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide A practical guide to creating and managing web
Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Fast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
Storage Optimization in Cloud Environment using Compression Algorithm
Storage Optimization in Cloud Environment using Compression Algorithm K.Govinda 1, Yuvaraj Kumar 2 1 School of Computing Science and Engineering, VIT University, Vellore, India [email protected] 2 School
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
Class Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433
Class Notes CS 3137 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 1. FIXED LENGTH CODES: Codes are used to transmit characters over data links. You are probably aware of the ASCII code, a fixed-length
Technical Information. Digital Signals. 1 bit. Part 1 Fundamentals
Technical Information Digital Signals 1 1 bit Part 1 Fundamentals t Technical Information Part 1: Fundamentals Part 2: Self-operated Regulators Part 3: Control Valves Part 4: Communication Part 5: Building
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
ASCII Code. Numerous codes were invented, including Émile Baudot's code (known as Baudot
ASCII Code Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is made up of dots and dashes (a sort of binary code). It was
Sending MIME Messages in LISTSERV DISTRIBUTE Jobs
Whitepaper Sending MIME Messages in LISTSERV DISTRIBUTE Jobs August 25, 2010 Copyright 2010 L-Soft international, Inc. Information in this document is subject to change without notice. Companies, names,
Text Steganography in SMS
2007 International Conference on Convergence Information Technology Text Steganography in SMS Mohammad Shirali-Shahreza Computer Science Department Sharif University of Technology Tehran, Iran [email protected]
Analysis of Compression Algorithms for Program Data
Analysis of Compression Algorithms for Program Data Matthew Simpson, Clemson University with Dr. Rajeev Barua and Surupa Biswas, University of Maryland 12 August 3 Abstract Insufficient available memory
Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
BulkSMS API Document. Contents. 1 P a g e. API Version: 5.9 Document Version: 2.0 Last Updated Date: 31st July 2013
BulkSMS API Document API Version: 5.9 Document Version: 2.0 Last Updated Date: 31st July 2013 1 P a g e Contents CHAPTER 1: INTRODUCTION 4 1.1 PURPOSE... 4 1.1 SCOPE... 4 1.2 AUDIENCE... 4 1.3 DOCUMENT
No restrictions are placed upon the use of this list. Please notify us of any errors or omissions, thank you, support@elmcomputers.
This list of shortcut key combinations for Microsoft Windows is provided by ELM Computer Systems Inc. and is compiled from information found in various trade journals and internet sites. We cannot guarantee
AT&T Business Messaging Account Management
AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein
The use of binary codes to represent characters
The use of binary codes to represent characters Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.4/hi Character Learning objective (a) Explain the use of binary codes to represent characters
Digital codes. Resources and methods for learning about these subjects (list a few here, in preparation for your research):
Digital codes This worksheet and all related files are licensed under the Creative Commons Attribution License, version 1.0. To view a copy of this license, visit http://creativecommons.org/licenses/by/1.0/,
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Storing Measurement Data
Storing Measurement Data File I/O records or reads data in a file. A typical file I/O operation involves the following process. 1. Create or open a file. Indicate where an existing file resides or where
Nokia Internet Modem User Guide
Nokia Internet Modem User Guide 9216562 Issue 1 EN 2009 Nokia. All rights reserved. Nokia, Nokia Connecting People and Nokia Original Accessories logo are trademarks or registered trademarks of Nokia Corporation.
SMPP protocol analysis using Wireshark (SMS)
SMPP protocol analysis using Wireshark (SMS) Document Purpose Help analyzing SMPP traffic using Wireshark. Give hints about common caveats and oddities of the SMPP protocol and its implementations. Most
Taxi Service Coding Policy. Version 1.2
Taxi Service Coding Policy Version 1.2 Revision History Date Version Description Author 2012-10-31 1.0 Initial version Karlo Zanki 2012-11-18 1.1 Added a section relative to Java/Android Fabio Kruger 2013-01-02
The Unicode Standard Version 8.0 Core Specification
The Unicode Standard Version 8.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers
A Smart Telephone Answering Machine with Voice Message Forwarding Capability
A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
Computer and Set of Robots
Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction
SMS History. Introduction to SMS and SMS Messaging Services
Introduction to SMS and SMS Messaging Services The Short Message Service (SMS), as defined within the GSM digital mobile phone standard that is popular in Europe, the Middle East, Asia, Africa and some
12 File and Database Concepts 13 File and Database Concepts A many-to-many relationship means that one record in a particular record type can be relat
1 Databases 2 File and Database Concepts A database is a collection of information Databases are typically stored as computer files A structured file is similar to a card file or Rolodex because it uses
Chapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below.
Using UMB Secure File Transfer UMB Secure File Transfer is a Java-based interface that you can use to upload and download your files through a secure SSL connection using a Javasupported web browser such
Streaming Lossless Data Compression Algorithm (SLDC)
Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch
Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time.
, page 1 This chapter provides an overview of the Cisco Cisco Unified Communications Manager service and describes how to configure the Cisco Cisco Unified Communications Manager feature. The feature allows
PROBLEMS (Cap. 4 - Istruzioni macchina)
98 CHAPTER 2 MACHINE INSTRUCTIONS AND PROGRAMS PROBLEMS (Cap. 4 - Istruzioni macchina) 2.1 Represent the decimal values 5, 2, 14, 10, 26, 19, 51, and 43, as signed, 7-bit numbers in the following binary
State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009
State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,
User Guide for the VersaMail Application
User Guide for the VersaMail Application Copyright and Trademark 2004 palmone, Inc. All rights reserved. palmone, HotSync, the HotSync logo, Palm, Palm OS, the Palm logo, and VersaMail are among the trademarks
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
Compression techniques
Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
AS DNB banka. DNB Link specification (B2B functional description)
AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...
How to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
ICS 413 Application Development for Mobile Devices (3 Credits Elective) Course Duration:
ICS 413 Application Development for Mobile Devices (3 Credits Elective) Course Duration: One hour for teaching and Six hours for practical within a week for a period of 15 weeks (i.e. 15h (T) and 90h (P))
E-mail Settings 1 September 2015
Training Notes 1 September 2015 PrintBoss can be configured to e-mail the documents it processes as PDF attachments. There are limitations to embedding documents in standard e-mails. PrintBoss solves these
The Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
On the Use of Compression Algorithms for Network Traffic Classification
On the Use of for Network Traffic Classification Christian CALLEGARI Department of Information Ingeneering University of Pisa 23 September 2008 COST-TMA Meeting Samos, Greece Outline Outline 1 Introduction
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Everything you wanted to know about using Hexadecimal and Octal Numbers in Visual Basic 6
Everything you wanted to know about using Hexadecimal and Octal Numbers in Visual Basic 6 Number Systems No course on programming would be complete without a discussion of the Hexadecimal (Hex) number
User s Guide for Nokia 6310i
User s Guide for Nokia 6310i List of menu functions 1. Messages 1. Write message 2. Write e-mail 3. Inbox 4. Outbox 5. Archive 6. Templates 7. My folders 8. Erase messages 9. Voice messages 10.Info messages
LOCATIONS AROUND ME (ANDROID)
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 193-198 Impact Journals LOCATIONS AROUND ME (ANDROID)
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Introduction to Wireshark Network Analysis
Introduction to Wireshark Network Analysis Page 2 of 24 Table of Contents INTRODUCTION 4 Overview 4 CAPTURING LIVE DATA 5 Preface 6 Capture Interfaces 6 Capture Options 6 Performing the Capture 8 ANALYZING
Table and field properties Tables and fields also have properties that you can set to control their characteristics or behavior.
Create a table When you create a database, you store your data in tables subject-based lists that contain rows and columns. For instance, you can create a Contacts table to store a list of names, addresses,
Field Properties Quick Reference
Field Properties Quick Reference Data types The following table provides a list of the available data types in Microsoft Office Access 2007, along with usage guidelines and storage capacities for each
Moven Studio realtime. streaming
Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax
