Please wait a minute...
New Technology of Library and Information Service  2006, Vol. 1 Issue (11): 85-90    DOI: 10.11925/infotech.1003-3513.2006.11.21
Current Issue | Archive | Adv Search |
Design and Implementation of Consultation Platform Based on ISMG
Cao Jinjun
(Tianjin Normal University Library, Tianjin  300387,China)
Download: PDF(0 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

In view of development diversification in the domain of library information consultation means, in order to develop consultation via maximumly making use of communication instrument, this paper advances a novel theory about using SM to intercommunion between users. At last, It carries out the SMSC system through the Web browser, the SM system sends short messages using plain texts, in conformity to the data of background database. The system has not especial request for network bandwidth.

Key wordsConsultation      SM      Scheduler      Gateway      Internet short message gateway     
Received: 31 August 2006      Published: 25 November 2006
: 

G250

 
Corresponding Authors: Cao Jinjun     E-mail: studio.net@eyou.com
About author:: Cao Jinjun

Cite this article:

Cao Jinjun . Design and Implementation of Consultation Platform Based on ISMG. New Technology of Library and Information Service, 2006, 1(11): 85-90.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2006.11.21     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2006/V1/I11/85

1宋雷.Delphi 7实用程序设计100例.北京:人民邮电出版社,2003
2中国移动通信集团公司.中国移动通信信息资源站实体与互联网短消息网关接口协议,2001
3陈景燕. 基于CMPP3.0的企业短信网关API设计. 计算机与信息技术,2005(8)

[1] Yuemin Wu,Ganggui Ding,Bin Hu. Extracting Relationship of Agricultural Financial Texts with Attention Mechanism[J]. 数据分析与知识发现, 2019, 3(5): 86-92.
[2] Ling Wang,Qianjin Dai,Xiaojun Wu. The Study on the Temporal and Spatial Distribution of Event Tourism Based on Large-scale Tourism Early Warning Platform[J]. 数据分析与知识发现, 2018, 2(8): 31-40.
[3] Yuan Chen,Chaoqun Wang,Zhongyi Hu,Jiang Wu. Identifying Malicious Websites with PCA and Random Forest Methods[J]. 数据分析与知识发现, 2018, 2(4): 71-80.
[4] Liyi Zhang,Yiran Li,Xuan Wen. Predicting Repeat Purchase Intention of New Consumers[J]. 数据分析与知识发现, 2018, 2(11): 10-18.
[5] Xin Wang,Wen’gang Feng. Review of Techniques Detecting Online Extremism and Radicalization[J]. 数据分析与知识发现, 2018, 2(10): 2-8.
[6] Minghui Liu. Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering[J]. 数据分析与知识发现, 2018, 2(10): 21-26.
[7] Wen’gang Feng,Yan Li,Fuhai Li,Xin Wang,Xiping Zhou. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[8] Yongnan Li. Using Bayes Theory to Classify Counter Terrorism Intelligence[J]. 数据分析与知识发现, 2018, 2(10): 9-14.
[9] Xiangquan Yin,Shuning Li. Analyzing Website Navigation Features of Top U.S. Academic Libraries[J]. 数据分析与知识发现, 2017, 1(3): 90-95.
[10] Bincan Yin,Shichao Xin,Han Zhang,Yuhong Zhao. Building Asian Tumor-patients Prognostic Model with Bayesian Network and SEER Database——Case Study of Non-Small Cell Lung Cancer[J]. 数据分析与知识发现, 2017, 1(2): 41-46.
[11] Tong Liu,Jingcheng Yang. Evaluating Online Healthcare Consultation Feedbacks Based on Signal Transmission Algorithm[J]. 数据分析与知识发现, 2017, 1(11): 29-36.
[12] She Jingtao. WeChat Service Platform for Academic Library: Case Study of Zhejiang University of Technology Library[J]. 现代图书情报技术, 2016, 32(7-8): 147-153.
[13] Jiancheng Zheng, Xiaolin Zhang, Yan Zhao, Zhenxin Wu, Gaolei Yin, Man Xiao, Xiujuan Chen. Study of Sustainable Support Mechanisms for Long Term Preservation of Digital Publications[J]. 数据分析与知识发现, 2016, 32(12): 1-8.
[14] Huang Wei,Yu Hui,Li Yuefeng. Review of Online Anti-terrorism Research in China[J]. 现代图书情报技术, 2016, 32(11): 1-10.
[15] Yang Bo, Yang Junwei, Yan Sulan. Research on Rule-based Normalization of Institution Name[J]. 现代图书情报技术, 2015, 31(6): 57-63.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn