Professional Documents
Culture Documents
Employment and productivity are key issues to the social and economic life of every
country. From time to time, the world experiences technological revolutions which
alter the way people live, interact, communicate, seek operational information, and
have provided new opportunities for the delivery of high priority and instant
messages.
The print media and the Internet poses their own sets of challenges to acquiring
timely information, such as access, cost and time. Whereas, text messages (SMS)
Mobile devices have become an essential part of everyday life. The penetration level
developing economies the number of phones is rising very quickly; From this aspect,
the use of mobile phones for delivering important information is justified (Rantanen
et al., 2009).
The mobile phone has not only transformed the way we communicate with one
another, but has transformed the way we work; seek information, and the way
message is easily conveyed. Agu (2001) as cited by Onu (2004) opines that the
As a result of this, this study seeks to use suitable technology to link online portal
1
The population of Africa's largest country (Nigeria) was estimated at 123,337,822 in
2000 census. This figure represents an increase of 39.36 percent over the 1991
population census figure of 88.5 million, which was hotly debated and widely
Nations estimates that the population of Nigeria in 2005 was at 141 million, and
the third millennium. The implications are both social, economic and political. He
disturbing signal to all segments of the society. The rate of youth unemployment in
technology (I.T) and Information systems, together with internet technology, has
websites and portals are developed providing information on job leads (vacancies).
Such websites are recruiting agents consulting for and acquiring job knowledge from
organizations; it requires job seekers register and submit data in order to assess
2
example advertising in the press: daily newspapers, magazines, mass media,
Galanaki (2002) lists eight traditional recruitment methods: job fairs, selection
valuable information system that has edge in informing / alerting job seekers „on-
the-go‟ i.e., wherever they are; using mobile telephone short message services
(SMS) facility; messaging client server integrated with the backend online portal
that can be accessed with internet browser(s). The portal will allow the seekers to
assess knowledge and skills required to search and get a job as well, provide
locations, and providing alternative to job seekers who lack necessary skills to
timely information for job seekers to easily acquire and respond to information
Obadan and Odusola (1999) reported that unemployment is a very serious issue in
3
resources, it generates welfare loss in terms of lower output thereby leading to lower
Graduates are one of the most important aspects of human capital for every country.
When unemployment exists, it means that the country‟s human capital resource is
Large number of job seekers rely on getting information on job leads from
search with surfing the websites on internet, such as recruiting agents sites, job
Nevertheless, there are factors that limit afore-mentioned seekers from getting as
much information as desired; such factors include: limited information seeking skills,
poor social (networking) and communication skills, and poor information technology
skills. Hawamdeh (2007) in his study opined that these skills and competencies were
among the highest percentages (73%, 70%, and 67%) that are highlighted in job
descriptions.
the need for mobile alert information system that is a tradeoff with time, effort,
actionable. It is not limited by location constraints compared with other existing job
It is believed that, the unemployed and those who want to change their jobs, as well
as recruitment consultants will find the system useful by getting the information
needed to make better decisions about their time. With that knowledge sharing
4
should be encouraged, where unemployed graduates needs to be motivated in
realizing the importance of skills in searching for jobs or a career, Sulaiman and
Burke (2009).
1.3 OBJECTIVES
The aim of the study is to channel job information to seekers through mobile phone
As influenced by the aim of the study, the primary objective of this study is to
describe the architecture, workflow and design of an alert system within a knowledge
In this context the main objectives of the research study could be stated as:
them to spend less time searching for job leads regardless of choice of
network operator;
disseminated and;
5. To introduce sms facility to various job sites where a person can easily find
jobs, get Short Message Service (SMS) alert for new jobs and get
5
1.4 JUSTIFICATION
The goal of this research project is to provide job seekers with the abundance of
time efficiency. This improves the responsiveness of job seekers, thus lowering
costs of job search, and helps keep the information road open. A mobile information
many would continue to slow down rate at which relevant information are
heavily laden, and many will be denied job leads that could possibly have
removed them from the growing queue of job seekers. This will continue to
considerably. This could help seekers surfing the internet to spend less time,
6
since they already know what to do; unlike doing open browsing which could
be daunting.
Using traditional mail and paper based system was slow, ineffective and
people.
text alerts and receive messages through their sites and computers, ensuring
candidates.
The fresh graduates, the unemployed, and those seeking to change careers
Mobile communication systems have been used to deliver alert messages for
7
There are various methods to generate alerts such as manual alerts, event based
alerts, and automatic alerts using communication modes like e-mail, mobile and
recruitment has made impact on the human resource field (Bussler & Davis 2002).
This study does not attempt to replace the traditional practices. Crails (2007)
identified that the majority of employers prefer to use online recruitment because it
has good potential for finding the right candidates. This study will link online
recruitment with mobile alert system to motivate job seekers and complement the
existing style.
Existing mobile network operators in Nigeria will be used as channels to reach the
Message alerts on job leads will cover job openings within Nigeria; however
recipients outside of coverage areas of local network operators may lose alert
delivery because data error detection and recovery protocol will not be utilized due to
Alert: Alert is a notification informing its recipients that a critical or very important
situation has arisen. The situation is as severe that an action must be taken
8
Information source: a place where one can get information about an, event, jobs, etc.
documents on the Internet, e.g. Internet Explorer, Mozilla Firefox, Google chrome,
etc.
I.C.T / I.T: The branch of engineering that deals with the use of computers and
artifacts and human activities that performs one or more functions involving the
Job seeker: An unemployed person looking for work (esp. someone who needs to
Job lead: information that cause job seeker to undertake a certain action
how to manage the knowledge in organization. Online site/ portal can be considered
as knowledge management systems, since knowledge inside the portal contains the
Mobile telephone: A hand-held mobile radio telephone for use in an area divided
WAP: Wireless Application Protocol (for example as used to access the Internet from
a mobile phone)
(Web) portal: A site that is interactive with users; and positions as an entrance or
9
CHAPTER TWO
reviews earlier studies relevant to the present study in public and e-libraries. The
literature which have bearing on the present day study are herein cited. The aim of
this chapter is to provide relevant literature on mobile alert messaging systems and
Topics discussed here includes: Firstly, a review of literature that is concerned with
mobile alert information and text messaging (to job seeking); Fourthly, a review of
The United Nations estimates that the population in 2005 was at 141 million,
whereas, the United States Census Bureau projects that population of Nigeria will
reach 264 million by 2050. Nigeria will then be the 8th most populous country in the
The population projections highlighted in the study conducted by Felix (2006), listed
Nigeria‟s age structure: 0–14 years: 44% (male 27,181,020; female 26,872,317)
10
15–64 years: 53% (male 33,495,794; female 32,337,193)
Unemployment in Nigeria is one of the most critical problems the country is facing.
Nigeria is endowed with diverse and infinite resources, both human and material.
However, years of negligence and adverse policies have led to the under-utilization
of these resources. These resources have not been effectively utilized in order to
thereby leading to lower income and well-being, and particularly in Nigeria (Oladeji,
The World Bank reported the GDP at purchasing power parity of Nigeria was $170.7
and socially. Unemployment in Nigeria has resulted in more and more people who
do not have purchasing power. Less consumption has led to lower production and
economic growth has been hampered. Unemployment also has social consequences
principal fraction of the unemployed accounting for nearly 35% to 50%. The rate of
11
unemployment within the age group of 20 to 24 years is 40 %. Underemployed farm
about 2.8 million fresh graduates enter the Nigerian labour market, with only about
Economic growth is not the only solution to curb unemployment in Nigeria, as the
official statistics illustrate that previously unemployment did not always decline with
the economic growth. Other solutions such as the provision of right skills to the
people to help them tackle the problem and lead a more prosperous life should also
be given importance. Recently the experts have suggested some techniques, which
dangerous as it sends disturbing signal to all segments of the Nigerian Society. The
normalcy i.e. the oil boom of the 1970s (6.2%); 1980s (9.8%) and the 1990s (11.5%).
The paper suggests measures for reducing unemployment, but the question
12
remains: how shall Nigeria ensure full employment for its populations and how will
they become aware of information to job leads even in their remotest places?
The paper further sees hope for Nigeria only if youths are mobilized by way of
genuinely socializing them into taking their roles in the employment (recruitment)
Phones are now the dominant technology with which young people, and urban
The mobile phone has rapidly become an integral part of our lives. In many countries
more than half the population uses a mobile phone and, in some developing
The mobile phone dominates our lives. It is more than just a „must have‟ item in
developed, western countries. To many young people, it has become a fashion item.
Uptake in more established markets has now reached saturation point; there are
currently more than 51 million users in the UK (BBC News Online, 2003b). While the
demand for mobile phones seems to be insatiable, it is after all only a technology;
Banks and Burge (2004) emphasize that mobile phones and other ICTs are only
13
world can be adapted to the developing world, and vice-versa, providing there is
projects underway, or being piloted, that use mobile phone technology to support
In this respect, ICTs should be seen as tools of wider strategies, which aim to
rescue from threats to the environment, as well as information divide. There are
always going to be more pressing needs for its use. Nevertheless, it is a technology
which we live. It brings both benefits and challenges. This study looks at the
relevant information from sources to users without expending much time and efforts
i.e. 'doing more with less' in the developing world. It takes into account the
Technologies (ICTs), this is a unique way in which mobile phones play a role in the
According to Hall (2003) Africans‟ insatiable appetite for cell (mobile) phones has
made the continent a profitable market for the high-tech gadgets, which were
introduced only a decade ago. But in the intervening ten years, the sales figures
have masked a larger social story: how the proliferation of cell phones is changing
14
Ndukwe (2009) corroborated the claim that major advances in ICTs and the rapid
They have also empowered individuals and communities with new ways of doing
things, as well as transformed our ways of learning and sharing knowledge. The
age with computer solutions that enable resources and information sharing even on
has brought about greater efficiency and better information sharing and
management. This revolution also means that constraints of time and distance have
been virtually eliminated. Clearly, ICT is driving the global economy. People,
In Nigeria, about 68 million telephone lines connected by July 2009. When compared
to a total subscriber level of less than 0.5M in July 2001. The rapid rate of
a faster pace of national economic development and growth. Today there are mobile
signals in all the states of the federation; a number of our major highways are
covered by mobile services; several rural communities have access to one form of
telecom service or the other; the Nigerian economy has been impacted positively
In the paper Ndukwe (2009) elicited two major technologies, digital mobile phones
15
and the internet are driving a new level of connectivity that were hitherto unknown
and are enabling various transactions to be carried out over high capacity modern
networks on an anywhere, anytime basis. The content flowing over such modern
networks includes not only e-mails and telephone calls, but also music, movies and
universal network to support any and all media. The mobility and freedom offered by
wireless networks cuts the communications cords tying us to specific locations. Our
locations such as remote villages, means the network can finally go wherever it‟s
needed. The anywhere network is a seamless network with broadband capacity and
wireless ubiquity.
From above, it suffices to say that the impact of mobile phones has possibly been
Gent (2003) submitted the mobile phone has rapidly become an integral part of our
lives. In many countries more than half the population uses a mobile phone and, in
telecommunication.
ValueFrontera (2009) found Nigeria in her survey as Africa‟s largest telecom market
with active subscribers of over 65.3 million in mid 2009 surpassing South Africa‟s
Nigeria has grown at the fastest rate; between 1997 and 2000 subscribership hit
about 1 million before the issuance of (GSM) unified license in 2001; While GSM
16
subscribers are in the range of 58.3 million, CDMA subscription in Nigeria grew from
With mobile penetration at 42%, Nigeria‟s tele-density grew from 0.73% in 2001 to
about 48% in mid 2009; the current market installed capacity is 120.92 million
(ValueFrontera, 2009).
“The whole world is going mobile. Phones, computers and media devices now
fit in our pockets and can connect us to a variety of information sources and
Mobile technologies are a familiar part of our social lives the world over today. We
take it for granted that we can talk to other people at any time, from wherever we
may be; we are beginning to see it as normal that we can access information, take
photographs, record our thoughts with mobile telecommunication devices, and that
we can share these with our friends, colleagues or the wider world. Newer
developments in mobile phone technology are also beginning to offer the potential
al., 2006).
The challenge for designers, however, is one of understanding and exploring how
best we might use these resources to support information needs. At the present
time, however, mobile communication applications are being developed and used for
17
diverse purposes such as: learning. This study seeks to look at developments in the
area of instant messaging for job seekers. It moves away from the dominant view of
classrooms, homes or the streets of a city. It asks how we might draw on existing
under development and in use around the world and it explores what the future might
In their research work on alert system for hospital information management in India,
Razdan and Cheema (2009) found out that, in a hospital there are numerous
situations where the health provider needs to be alerted so as to take some action.
and responsible or concerned parties are identified and informed immediately. Using
alert system, we can create and manage tasks as well as send and receive
application and end-users. There are various methods to generate the alerts such as
manual alerts, event based alerts, and automatic alerts using communication modes
like e-mail, mobile and application window. In a hospital there are various critical
18
conditions where alerts need to be sounded. Typical example of these types of
conditions are alerting about notifiable diseases like dengue. Another area of
relevance is providing alerts for enabling decision support. Examples include various
alerts which inform a clinician about allergy, history, drug dosage, etc. There are also
purposes like work progress of various user groups, informing about a delay in an
Basically alert is a message about the state of the system that needs immediate
attention. Some observers highlight that many countries across the African continent
that is now „leapfrogging‟ older technologies, mobile phones and other wireless
technologies are often the preferred options (AllAfrica.com, May 2010). Their impact
"Farmers are using mobile phones to ensure the best prices for their crops,
IDRC (2003a).
The Federal Emergency Management Agency (FEMA), aggregates alerts from the
president of the United States, the National Weather Service (NWS), and state and
local emergency operations centers, and then send the alerts over a secure interface
19
emergencies, such as terrorist attacks, that will preempt any other pending
alerts;
to see how well it met the needs of people with vision and hearing impairments. They
• Although 90 percent of participants who are blind or have low vision found the
alert attention signal to be loud enough and long enough to get their attention, only
70 percent of deaf and hard of hearing participants indicated the same regarding the
would only be effective if the individual were holding the phone in their hand, but
• All hearing participants expressed concern that the early part of the message
was missed because the tone went too quickly into the 90-character spoken alert,
causing the first few words of the message to be missed. The required Commercial
20
Mobile Alert System message format places the event type first (i.e., tornado, flood,
vacancies, etc.) so crucial information may not be heard by blind consumers using
text-to-speech software on their mobile phones to access the alerts. Many suggested
the need for a header such as “This is a…” to allow for more clarity. Such a header is
• Deaf and hard of hearing participants commented that they would like to see
According to Sponberg (2009) a lot has been written about the use of cellular text
messages to the public. Major disasters such as Katrina and the Indian Ocean
tsunami have stimulated this discussion among government, NGO, and commercial
entities alike. Several countries have very advanced systems relying on cell
broadcast, while others are still testing and struggling to determine how best to
implement mobile messaging systems at both the local and national level. Similarly,
within their organization and to communities in which they work, and some
commercial services are even available to provide subscribers with custom alerts on
varying types.
21
SMS alert system sends notifications to key individuals when the offficial channel
releases a message. Hence, the program is 'watching' for alerts, and in so doing it
provides a basic notification service. The full text of the messages from the offficial
channel cannot be squeezed into the size of a single SMS, so the service is really
intended as a 'heads up' notification to let recipients know that more information is
The important thing about this service is that the provider targets only contacts who
are officially involved with its service(s). This limitation is self-imposed for a number
of reasons; technical and non-technical. Most technical reasons relate to the cost
and reliability of reaching more than a few hundred individuals in a timely manner.
publicly available through its official channel, for instance, a website, meant for
recipients consumption.
The technology used in such alert systems often contains some form of source
information) integrity. The lack of such a confirmation channel within SMS alert
systems is of primary concern. While one can set up a short code, establish a
dedicated number, or even apply a name to the warning authority (in essence
creating a recognizable 'from address'), it seems highly unlikely that most individuals
will know or confirm the sender of information. This is particularly true when an SMS
alert system is used for the general public rather than a closed group or 'club' of
22
circulating rumors open. There are numerous anecdotes of rumors being
It might be argued that because mobile devices are hyper-local (literally held by an
individual) the message sent to each device can be highly targeted geographically
and in terms of content. This is certainly true, and as location based services
increase, so too will these possibilities. However, the reality is that most warning
messages for instance produced by government authorities simply are not this
legally defined roles. Even in the most scientifically and technically advanced
course a lot will depend upon the geographic scope of the hazard in question.
Inherently a tornado or localized flash flood message can be more targeted than say
According to Sponberg (2009) the short answer to this question is yes. As one of
the most pervasive and fastest growing means of connectivity, mobile services (SMS
and other) represent a valuable and powerful tool to quickly disseminate information
to selected groups of individuals and even the public at large. Moreover, mobile
mobile phone is an intimate device; even more so than a personal computer one
might use at work or at home. It is reasonable to assume that mobile devices change
23
individuals do not expect to seek out information, but rather expect that information
to seek them out. So, not only does mobile text messaging have a role to play in
alert and notification services, the weather services and related authorities provide
That said there are some clear limitations that need to be managed and addressed
improve. Warning systems for instance work best when information is disseminated
through multiple platforms and media. Mobile phones represent one of such
platforms. And as noted, issues of security and maintaining trust are best addressed
through dialog and education. This is perhaps not unique to mobile services, but a
Below are several sample messages from a text message alert provider (TCNJ,
appropriate circumstances. The actual message sent in a given situation may vary.
Due to the character limitations associated with text-messaging TCNJ alerts will
e-mail) for more complete information. These sources may not be updated as rapidly
possible.
Sample Messages:
24
TCNJ weather closing. All classes canceled and offices closed today. Visit
TCNJ facility closure - (insert facility name here). TCNJ e-mail will provide
details soon.
TCNJ timely warning of criminal activity. TCNJ e-mail will provide details
soon.
TCNJ Emergency Alert – Stay away from (insert location here). Visit
The messages as seen from samples above will be very brief and contain vital and
communication channels, such as e-mail, Web pages to be created for the purpose
of this study.
refers to a system of persons, data records and activities that process the data and
25
automated processes. Computer-based information systems are the field of study for
system".
The concept of Information systems was brought home also by Tiamiyu (2005,
p.67) who noted that Information systems are mechanisms or facilities through
which one or more information activities are performed to satisfy the information and
while submitting that it is any system that processes information by the collection of
has emerged as an agent of integration and the enabler of new competitiveness for
Information Systems is the only discipline with a primary focus to study the
Information systems as computer systems that support end users, giving them
access to the information. For a large number of systems the information is held in
perform a variety of tasks. While all of the information processes are represented in
26
Allen Lee tries to distinguish information systems from other disciplines without
presenting too narrow a view. He argues that the IS discipline is distinct in that it:
examines more than just the technological system, or just the social system, or even
the two side by side; in addition it investigates the phenomena that emerge when the
As Lee points out: „This embodies both a research perspective and a subject matter
that differentiate the academic field of information systems from other disciplines‟
(Lee, 2001, p. iii). For the purpose of this study, the term information system will be
defined in line with the definition of Garber (1994). To him, information system
meant,
former as: all components and resources necessary to deliver information and
information processing functions to the organization; and the latter as: various
micro computers, mid-size servers, large mainframe systems, the input, the
27
Operating system software‟s, web browsers, software productivity suites and
based and wireless access and support for the internet and private internet
based networks.
Information system in this research work is the means by which people and
organizations utilize hardware, software, networks and a data resource that stores,
consonance with Gleim (2006) the system design would be able to perform the
2. Transformation. Data are converted into knowledge useful for decision making
(information).
28
2.4.1 Types of Information Systems
Organizations and individuals use different types of systems for different purposes.
Here are some of the main types of information systems and their uses. Bearing in
mind from our various definitions the components of information systems are:
people, equipment, procedures, and data. The main ones highlighted in this work
agreeing with the classifications of Kelly (2008) are TPS, MIS, DSS, and EIS.
is often tied to other systems such as the inventory system which tracks stock
29
Sub-Type of TPS:
iv. Human Resources System: Systems that deal with recruitment, placement,
employees.
support.They are flexible, adaptable and quick. The user controls inputs and
outputs. They support the decision process and often are sophisticated
Their inputs are aggregate data, and they produce projections. An example
are analyzed and reported by an MIS. They have large quantities of input data
30
4. Executive information system (EIS):
over the entire organisation and also allows drilling down to specific levels of
detail. They also use data produced by the ground-level TPS so the
individual. They let the CEO of an organisation tie in to all levels of the
organisation. They are very expensive to run and require extensive staff
support to operate.
packages.
They are used for increasing personal productivity and reducing "paper
warfare". OAS software tools are often integrated (e.g. Word processor can
OAS Subtypes:
31
Communication systems: helps people work together by sharing information in many
Groupware system: helps teams work together by providing access to team data,
6. Knowledge work systems (KWS): are used by technical staff. KWS use
Given the avalanche of challenges facing job seeking and recruitment world over, it
is important for this study to take a quick review of the concept of world-class
The Human Resource Information System (HRIS) is a software or online solution for
the data entry, data tracking, and data information needs of the Human Resources,
base. Every HRIS has different capabilities. HRIS are carefully based on the
overall:
32
• Reporting and analysis of employee information.
information updating.
needs to track and analyze about employees, former employees, and applicants.
its needs.
With an appropriate HRIS, human resources staff enables employees to do their own
benefits updates and address changes, thus freeing HR staff for more strategic
Finally, managers can access the information they need to legally, ethically, and
management and database management to make available job lead and other
related information, users may now obtain information about vacancies, recruitment
statistics and profile management. The system offers users the opportunity to get
complete information about the flow of information. The information provided, which
33
is categorized in a unified and simple format, includes the categories of career fields,
This unique channel draws from the knowledge and human resources management
needs, and as part of efforts to improve interaction and communication with job
employers and employees. This will assist in achieving timeliness demanded by the
modern business society; and this will not confine information acquisition to a certain
It will also promote informative integration among seekers, and will decrease the
Designing an information system that can deliver on time and speed efficiencies to
job seekers using information technology as a vehicle is strategic and will satisfy the
message service (SMS) facility and other information channels, in this instance, a
web site which will form the informational resource and biggest asset for the whole
dynamic.
34
In the post-industrial information age, the focus of companies has shifted from being
compete in process and innovation rather than in products: the emphasis has shifted
from the quality and quantity of production to the production process itself--and the
services that accompany the production process. The study of information systems
focus on why and how technology can be put into best use to serve the information
information technology.
• Web browsers
• Internet and other online services and methods (World Wide Web, FTP, Web
search engines,)
networking
35
• Functions performed by computer, telecommunications, and network
hardware
GPS)
Privacy concerns
36
Intellectual property rights and legal issues, including open source initiatives
Knowledge management
Database design is essential to the study due to the fact that the web pages of the
disseminating messages to phones SMS facility for recipients will contain information
File-based,
Database.
For the purpose of this study, database approach is chosen over file based due to
access data not owned by their application. Data owned by other applications may
application.
37
3. File-based approaches to data storage are tied to applications rather than the
(Borysowich, 2007).
Borysowich (2007) argues that database approaches to data storage support the
sharing of data across multiple applications with multiple users. Databases are
service, there would be a link in the database between the suppliers and geographic
areas.
A Database Management System (DBMS) is the software that handles all database
accesses. A DBMS presents a logical view of the data to the users. It hides how
data is stored and retrieved from the users. A DBMS ensures that the data is
consistent across the database and controls who can access what data (Borysowich,
1. Hierarchical Databases
2. Network Databases
3. Relational Databases
38
The relational model for databases provides the basic DBMS characteristics. In
relational. DBMSs vary in the way in which they comply with these rules; however,
Strengths of RDBMS
Sound theoretical foundation and use over many years has resulted in stable,
Costs and risks associated with large development efforts and with large
The fundamental structure, i.e., a table, is easily understood and the design
2.5.3 Conclusion
Until recently, jobs searching were not a very easy task. People have to check
newspapers everyday or weekly. Now with the blessings of the Internet technology,
many job sites are giving services to the job seekers (through emailing) from which
they can find job news easily. It‟s now the era of job search online. We can easily
find part time or full time jobs by visiting different job sites of different countries. In
Nigeria we have some sites from where we can easily find our suitable jobs. Many
39
developed countries like UK, and USA and so many have developed their sites for
mobile users.
about vacancies and interviews to job seekers via web platforms. The proliferation of
mobile phones with SMS facility would make the service useable by large number of
job seekers.
The technology development and support will enable access to relevant information
Finally, using SMS for alert has been in use in other parts of the world. So, it is
In a Malaysian web site named www.jobsmobile.com where a person can easily find
jobs, get Short Message Service (SMS) alert for new jobs, get confirmation SMS
from the sites. Hence user no longer needs to go through difficulties when using the
service. Our country has many job sites but like other developing countries these
40
CHAPTER THREE
3.1 Introduction
Our main target is giving SMS facilities to job seekers so that no one misses any
opportunities. Now mobile is a very available handy device to everyone. This study
introduces new features from where applicants easily get the updated information
through cell phones. This system is developed for all job types. It has also the
facilities to submit jobs from any part of the country because the web aspect is
internet driven.
Literature have revealed that SMS messages can be sent and read at any time,
SMS messages can be sent to an offline mobile phone, SMS messaging is less
disturbing while you can still stay in touch, and, SMS messages are supported by
100% GSM mobile phones and they can be exchanged between different wireless
carriers.
valid member and for that he has to fill up resume forms on the web interface
must be on for 24 hours. This server always searches for job updates. Job posting
An employer must be registered before posting for new jobs. For that the company
has to have agreement procedures fulfilled in order to use the web site. As a result,
this chapter discusses the methods used in the design. Topics covered include:
41
system analysis, method of data collection, design approach, problem of existing
System analysis gives insight into the framework of a system. The major
components are:
1. Input,
2. Process and,
3. Output
When the information is taken in as input, it processes the information, stores it and
called information system. E.g., web site, database management system, SMS
center. The Information system type adopted in this study is the information
providing system.
Structured system analysis and design method (SSADM) was modeled in this study.
analysis and design of information systems. SSADM was produced for the central
42
computer and telecommunications agency (now Office of Government Commerce), a
1980 onwards.
SSADM is one particular implementation and builds on the work of different schools
In order to carry out an in-depth investigation of the existing system, the following
Graduate job applicants were interviewed on the constraints and the current mode of
obtaining information on job leads. The aim of this interview was not to document the
outcome, but to have a good understanding of the current system / method, its
43
3.2.2 Record inspection:
The review of existing publications on the unemployed in Nigeria was carried out
through review of books and journals. Records included reports of the department of
The inspection / reviews were done side-by-side the interview for better
The Structured system analysis and design method (SSADM) involves the
The logic design is the starting point of every project. In this design, it is been
planned how the works will be done. All the works are summarized and revised.
Conceptual model was built from existing theoretical model in this section. Our main
concern was to select how to send SMS and what class of alerts should be made to
gain the maximum output. The main areas of activity are the definition of the user
dialogues. These are the main interfaces with which the users will interact with the
system. The logical design specifies the main methods of interaction in terms of
The other activities are concerned with analyzing the effects of events in updating
the system and the need to make enquiries about the data on the system. Both of
these use the events, function descriptions and effect correspondence diagrams
44
produced in this stage is to determine precisely how to update and read data in a
This stage is the next towards a physical implementation of the new system. In this
stage a large number of options for the implementation of the system are generated.
This is honed down to two or three to present to the user from which the final option
is chosen or synthesized.
All of these aspects must also conform to any constraints imposed by the business
This is the final stage where all the logical specifications of the system are converted
to descriptions of the system in terms of real hardware and software. The logical
45
structures. The exact structure of the functions and how they are implemented is
specified. The physical data structure is optimized where necessary to meet size and
performance requirements.
The product is a complete physical design which could tell software engineers how
to build the system in specific details of hardware and software and to the
appropriate standards.
Existing information systems of similar nature and function were also examined, in
order to glean ideas of design methods and approaches. The design methods were
discussed below.
these (usually unstructured) real life data or raw facts in such a way that they would
fit into our highly structured database. Raya Fidel (1987) stated that when the
carry out these task, a data entry form would be designed which would
systematically capture all the relevant information on advertised job positions to suit
the information need of the seeker and easy retrieval , and the bio data of the job
46
Furthermore, the environment of the database was described to get a full
specific (and by far the most common) type of DBMS, the relational DBMS. There
language called SQL. Using SQL, we can define, manipulate, and query our data.
SQL is divided into three major parts. Data manipulation language (DML) is used to
store and retrieve data from the database. This is the part of SQL used by the most
people. Data description language (DDL) is used to define the structure of the data.
Data control language (DCL) is used to restrict access to data by certain users.
The database system approach adopted for this study was built to support
administrative process, thus analysis of information flow captured from the web
making in categorizing job class and selecting suitable candidates for specified job
The goal of this project is not to create a real-time hardware but to use the SMS
SMS notification from web to phone making up the proposed information system.
Therefore, the learning of web process/ procedures and web to phone SMS
programming is a must for designing the information system in this project. While,
47
Public library, e-library and the internet were used as sources to identify relevant
materials in previous chapter for the study. A web site developed for the purpose of
this study, tagged "jobs.com" to collect data from users (job seeker) and
organizations (employers). The purpose for the data (e.g. phone numbers) was to be
specific on the category of job alert which individual job seeker desires to receive for
his or her career field. This necessitated job alert recipients to register on the website
This chapter was a prelude to actual physical design of the web pages and SMS
application. The design of the web interface was to afford users interface and
interact with detail information about job notifications sent to their phones; and the
Web site is an information dissemination resource having web pages for targeted
users who have information needs, and capable of getting feedback from users
Tools used in describing and designing the system includes: Microsoft (MS) front
page web and notepad editor with HTML 4.01. Hypertext mark-up language (HTML)
is a markup language used for instructing the browser how to present the web
pages. A markup language uses a set of markup tags to describe web pages. A
markup tag is essentially a code that instructs a web browser to format and display
text in a specified manner. HTML was employed because it is compatible with almost
all browsers.
48
HTML code is the major language of the World Wide Web. Web sites and web pages
are written in HTML code. HTML code and the World Wide Web allow text, pictures,
sounds, and other document formats to be used together in the same document. So
This web site was hosted or published on a client web server to enable users‟
access it simultaneously. A Web server is a computer that runs special software that
"serves" HTML pages and associated files when requested by a client, such as a
Web browser.
The web interface was designed to be interactive and user friendly, having menu
tabs for users to register and manage their profiles, upload / submit resumes. The
pages have job category listings for users to choose types and category of jobs in
The web site backend and the SMS platform being run on the host computer was
the web server, process the information and subsequently disseminate appropriate
alerts to deserving registrants from the remote server referred to as SMS server
which is in synchrony with the database containing phone numbers and users‟ bio
The hardware required is a standalone computer with average speed of 1.90 GHZ
dual core processor and minimum of 512mb RAM, necessary for management and
maintenance of the system. As each part of stages gets done, the hardware and
software will be assembled and followed by the project functionality testing and
validation. In the testing portion, some troubleshooting and rework may need to
49
Finally, the mechanical models for the information system will be constructed as
propose.
Short Message Service (SMS) is a technology that enables the sending and
receiving of messages between mobile phones SMS platform and from web to
phone. SMS is the only medium that enables almost instantaneous notification of a
As suggested by the name "Short Message Service", the data that can be held by an
message can contain at most 140 bytes (1120 bits) of data, so one SMS message
can contain up to: 160 characters if 7-bit character encoding is used. (7-bit character
characters if 16-bit Unicode UCS2 character encoding is used. (SMS text messages
encoding.)
SMS text messaging supports languages internationally. It works fine with all
One major advantage of SMS is that it is supported by 100% GSM mobile phones.
Almost all subscription plans provided by wireless carriers include inexpensive SMS
messaging service. Unlike SMS, mobile technologies such as WAP and mobile Java
50
3.4.4 Concatenated SMS Messages / Long SMS messages
One drawback of the SMS technology is that one SMS message can only carry a
concatenated SMS (also known as long SMS) was developed. A concatenated SMS
text message can contain more than 160 English characters. Concatenated SMS
works like this: The sender's mobile phone breaks down a long message into smaller
parts and sends each of them as a single SMS message. When these SMS
messages reach the destination, the recipient mobile phone will combine them back
c. Downloading service;
This study employs SMS alert and notifications service because it is a very suitable
technology for delivering alerts and notifications of important events. This is because
of two reasons:
1. A mobile phone is a device that is carried by its owner most of the time.
Whenever an SMS text message is received, the mobile phone will notify you
by giving out a sound or by vibrating. You can check what the SMS text
51
2. SMS technology allows the "push" of information. This is different from the
"pull" model where a device has to poll the server regularly in order to check
whether there is any new information. The "pull" model is less suitable for
server load.
The alert system used in this study is similar to the Stock Market Alerts which is an
condition is satisfied, the program will send a text message to the user's mobile
phone to notify him/her of the situation. For example, you can configure the alert
system such that if the stock price of a company is lower than a certain value or
An SMS center (SMSC) is responsible for handling the SMS operations of a wireless
network. When an SMS message is sent from a mobile phone, it will reach an SMS
center first. The SMS center then forwards the SMS message towards the
destination. An SMS message may need to pass through more than one network
entity (e.g. SMSC and SMS gateway) before reaching the destination. The main duty
of an SMSC is to route SMS messages and regulate the process. If the recipient is
unavailable (for example, when the mobile phone is switched off), the SMSC will
store the SMS message. It will forward the SMS message when the recipient is
available.
Very often an SMSC is dedicated to handle the SMS traffic of one wireless network.
A network operator usually manages its own SMSC(s) and locates them inside its
52
wireless network system. However, it is possible for a network operator to use a
third-party SMSC that is located outside the wireless network system. This is
applicable to this study design, since the SMS center sends SMS to people
centers. Generally, there are two different ways for the transmission of inter-operator
SMS messages. In the first way, signaling interconnections are set up between two
wireless networks. When the originator SMS center receives an inter-operator SMS
message, it gets the routing information from the recipient wireless network and
delivers the SMS message to the recipient mobile phone directly. The following
Fig. 3.1
The first way can be used if the two wireless networks involved in the transmission of
the inter-operator SMS message are based on similar technologies. However, if this
is not true, the second way has to be used. For example, when an SMS message is
53
In the second way, the originator SMS center and the recipient SMS center are
supported by both SMS centers. The SMS message first reaches the originator SMS
center, which will then forward the SMS message towards the recipient SMS center.
The recipient SMS center will be responsible for sending the SMS message to the
recipient mobile phone and storing the SMS message if the recipient mobile phone is
Fig. 3.2
Source: http://www.developershome.com/sms/
The above framework was modified to the concept below because the application
used in this study works from a web based server and not from a mobile network to
The model is left with the originator‟s SMSC, the recipient SMSC, and recipient
mobile phone.
54
Fig. 3.3
Originator‟s
SMSC.
SMS Message
The recipient SMSC refers to individual‟s network operator. The recipient SMSC
center is responsible for sending the SMS message to the recipient mobile phone
and storing the SMS message if the recipient mobile phone is offline.
The SMS gateway acts as a relay between the two SMSCs. It translates one SMSC
protocol to another one (interoperability). This can be used by two different wireless
carriers to interconnect their SMSCs for purposes such as enabling the exchange of
SMSC SMSC
SMS
Fig. 3.4
Different wireless carriers may use different SMSCs from different vendors, which
mean the SMS text messaging application must support multiple SMSC-specific
55
Fig.3.5
SMSC 1
SMSC protocol1
SMSC 2
Or other protocols
SMSC Protocol 4
SMSC 4
The use of an SMS gateway can greatly shorten the SMS text messaging
such as SMPP and CIMD can be used. Some SMS gateways support an HTTP /
HTTPS interface (this was used to design the web pages). HTTP / HTTPS is easier
to use than SMSC protocols. The drawback is that there may be fewer SMS features
to use. For example, an SMS gateway may not support the sending of picture
The SMS gateway and messaging centre application for this study was made
available through open source and free SMS gateway software. From figure 3.5
messaging system. So, SMS gateway software can be very complex and complex
software is usually expensive. Fortunately, there are open source SMS gateway
56
software packages that were made available and downloaded free for research work
on the web. A high-quality SMS gateway software package used is Microsoft SMS
As stated earlier, the paper based and the email approaches efficiencies of the
existing system was noticeably fraught with some set backs. Some are:
Slow operations
The act of waiting for newspapers advert publications weekly, and checking emails
once in a while or when able are slow and „energy sapping experience‟. this result in
Job seekers often lack skill to accessing sources for jobs leads. Irrespective of the
challenge to many.
The possible solution to the problems listed above could be attained through
integration of mobile alert system to increase and enhance access to job leads. The
57
This option suggests design of viable and web based mobile alert system. The
system is an information system that uses the infrastructure of the internet and the
The system will provide relevant information to users online or offline in real time
mode.
Technical feasibility
Technical feasibility relates to how the system will be developed, and implemented.
The software needed for the development of the system is readily available and
sufficient technical know-how exists for the development and implementation of the
Operational feasibility
Operational feasibility relates to how the proposed system will be integrated into the
work system of the organization. The web based information system will be
integrated with the SMS messaging system. This will require routine maintenance
Economic feasibility
58
Economic feasibility is concerned with the availability of financial resources required
to implement and sustain the system. Presented in table 4.1 below is the estimated
Table 3.1
TOTAL N156,000.00
The web based application will offer online and offline access of timely information,
This alternative was chosen because of its wider coverage, mobility, affordability and
Sample users from the environment were selected to use the system to see if they
The program was also tested to ensure that it was working properly and up to
expectation.
CHAPTER FOUR
59
SYSTEM DESIGN
4.0 Introduction
The previous chapter presented the approach to the research design of SMS
This chapter analyzes the architecture and actual design of a Short Message Service
Center (SMSC); and the web site interface of the information system.
In the early nineties, a Short Message Service Center was developed according to
the specifications for text messaging embedded in the GSM standard, Poort et al,
(2009). This study looks back at the conceptual design of sending SMS from WEB
Several modifications and adaptations of SMS technology have been done- from
development of applications (by vendors) that can send SMS without being part of
warning systems,
governance,
hospitals, etc.,
This study adopts use of SMS notification to route information to seekers because in
the modern information society, mobility is getting more and more important and
therefore there is an increasing demand for communication with the mobile user.
60
The GSM networks provides ideal medium to send short messages and globally to
This is the process of identifying, modeling and documenting the data requirements
of the system being designed. The following represent types of data modeling:
The data are separated into entities (things about which a business needs to record
Database schema
Entities identified as relevant to the environment of this database are listed with their
attributes as follows:
1. Job site: (URL varchar (20), not null; Bizname varchar (25), location varchar (25));
2. Job Seeker: (Username, varchar (15), Password varchar (12), Address varchar
(30), Email varchar (20), Telephone varchar (15), Gender varchar (6), Age varchar
(2), Job category varchar (20), state varchar (30),CV, blob,Feedback varchar (100));
3. Employer: (Name, varchar (25), Location, varchar (25), Phone varchar (15),
jobvacancies, blob);
4. Vacancies: (VacId, varchar (3), Type varchar (50); Joblocation, varchar (15)
deadlinedate);
5. Employee: (Name varchar (20), Phone varchar (15), Discipline varchar (25),
61
Entity Relationship Diagram
Figure 4.1
62
4.1.2 Web-to-Phone Data Flow Modeling
This is the process of identifying, modeling and documenting how data moves
that transform data from one form to another), data stores (the holding areas for
data), external entities (what sends data into a system or receives data from a
FIG 4.2
START
JOB LISTINGS;
APPLICANT & COMPANY
REGISTRATION ON WEB
DOMAIN
63
NO
SIGN UP
FOR SMS BROWSE JOBS LISTED
ALERT ON WEB PAGES
YES
RECEIVE SMS
Confirmation &
JOB ALERT
YES
VISIT WEB
NO PAGE FOR
DETAILS
YES
64
4.2 General information about SMS and Architecture
SMS appeared on the wireless scene in 1991 in Europe, Rahmah (2006). The
European standard for digital wireless, now known as the Global System for Mobile
Communications (GSM), included short messaging services from the outset. In North
America, SMS was made available initially on digital wireless networks built by early
pioneers such as BellSouth Mobility, PrimeCo, and Nextel, among others. These
digital wireless networks are based on GSM, code division multiple access(CDMA),
Figure 4.3 represents the basic network architecture for an Information System
(VMS), Web-based messaging, e-mail integration, and other external short message
entities (ESMEs). Communication with the wireless network elements such as the
home location register (HLR) and mobile switching center (MSC) is achieved through
SMS provides a mechanism for transmitting short messages to and from wireless
system for short messages. The wireless network provides the mechanisms required
to find the destination station(s) and transports short messages between the SMSCs
services such as alphanumeric paging, the service elements are designed to provide
Additionally, SMS supports several input mechanisms that allow interconnection with
65
A distinguishing characteristic of the service is that an active mobile handset is able
data call is in progress (in some implementations, this may depend on the MSC or
SMSC capabilities). SMS also guarantees delivery of the short message by the
network. Temporary failures due to unavailable receiving stations are identified, and
the short message is stored in the SMSC until the destination device becomes
available.
Integration with the Internet spurred the development of Web-based messaging and
A Short Message Service Center employed in this work is in conformity with the
specifications for text messaging embedded in the GSM standard. This study looks
at the theoretical design phases of some similar projects from literature to adapting it
The SMS Message Center was implemented as service in Windows XP and uses
semi persistent queuing, i.e. ingoing or outgoing messages are inserted into queues;
messages in the queues cannot get lost during a power failure (which is signaled by
an UPS and the service can be terminated correctly). After starting the service again
the queues are recovered and the messages will be delivered. Every frontend and
66
FIG 4.3 (Source: Rahman, 2006)
The SMSC‟s key requirements are listed according to first: the primary (functional)
FIG 4.4
67
Source:
Source:
From the architecture above, this study‟s purpose is to send messages to recipients
using GSM (and CDMA) mobile devices, as a result terminals, voicemail and other
The architecture framework for the study is found in FIG 4.5 below as suited
FIG 4.5
GSM Networks
SMSC
68
4.2.3 Secondary requirements
The major secondary functional requirements (SF1) were that a record of every
message that has passed through the system is kept, and there is an interface to
The major quality requirements expected of the system centered around [QR1:]
To understand how the SMS travels from the PC to the SMSC please take a look at
Figure 4.5. On this figure you can see which protocols are used and which GSM
network entities take place in the communication process. As you can see, the
mobile phone (Mobile station) / PC transmit the SMS message to the GSM base
station (BTS) through a wireless link. After this the message goes though the
backbone network of the service provider. The mobile switching center (MSC), the
Home Location Register (HLR) and optionally the Visitor Location Register (VLR) are
used to find out the appropriate short message service center (SMSC) that will store
and forward the message when the receiving party becomes available.
SMSC HLR
BSC MSC/VLR MS
69
4.3 Input Design
The system receives input at different stages of operation, which includes the
following:
submission of CV
The outputs from the system are basically result from users requests, such as
The mobile device is the wireless terminal capable of receiving and originating short
messages. Commonly, these devices have been digital cellular phones, but more
recently the application of SMS has been extended to other terminals such as POS,
on SS7. SMS makes use of the mobile application part (MAP), which defines the
transfer of short messages between the peer entities. The capabilities of the terminal
technology, may not be fully supported in the terminal, which may represent a
While this application is widely used, there are more recent niches that SMS still
Another family of applications that can use SMS as a data transport mechanism is
transactions are even cheaper than ATM transactions. Therefore, enabling wireless
subscribers to check their balances, transfer funds between accounts, pay their bills
and credit cards is valuable, not only for the subscriber but also for financial
institutions.
Entertainment applications are also good drivers of SMS usage. Examples of these
are simple short message exchanges between two parties (“texting”) or between
Wireless Web browsing allows the users to search for information without the
71
E-mail continues to be by far the most used wireless data application. However,
handsets are evolving quickly and are including more and more functionality that
supports newer applications at the same time are user friendly increases.
The potential for applications is enormous, and new needs appear to arise
This is a fast and reliable device to send and receive SMS messages. We can
send plain text SMS messages, Unicode messages, ring tones and other
advanced SMS messages using a GSM modem. To send and receive SMS,
we used the Nokia 2760 phone set and to connect it with the computer and
We connect our GSM phone to the computer via virtual port. Connection with
serial port or USB data cable is also possible. People usually prefer to use a
14 inch VGA monitor and 1024 X 768 screen resolution and 24-bit colour
display;
Mouse
72
4.8 Software Requirement
Microsoft Windows 2003 operating system with service pack, System type: 32
modems.
Windows notepad
Corel Draw X3
free, air conditioned and burglar proof room to prevent system crash and theft.
In logical security, the first page of the website requires username and password
73
The key to protecting a system through logical safeguard is access control. Access
control mechanisms like user identification and authorisation will serve as the main
In order to ensure the complete security of the system, only the system administrator
will assign access rights to users of the system by approving the registration, users
of the system will be uniquely identified by their username and password which gives
The system will also provide users and the admin officers‟ access right to change
their password to ensure complete security of the system. Below illustrates the
Fig 4.7 Proposed user Login form page of the web site
74
CHAPTER FIVE
5.1 Introduction
This chapter is about the development of the programs necessary to implement the
new system designed in the previous chapter. It also looks at the efficiency of the
program and includes a listing of the modules that constitute the web application
In this section, we divide the total works into three different parts: Database Design,
The development of the system was made up of static and dynamic pages. HTML,
CSS, JAVASCRIPT, PHP, ASP were used in the development of the development of
the pages. The computer was first configured as a web server using Microsoft
Notepad and Microsoft Expression Web were used to create the website on which
75
5.2 Database Design
EMPLOYER /
JOB SEEKER COMPANY
APPLY SUBMITS
JOBS
FOR JOBS
HAVE
SPECIALIZATION WITH
CRITERIA
CHOOSE
SEND SMS SEND
SMS
JOB CATEGORY
76
SEEKER
RECEIVE MATCH Apply APPLICATION
SMS KEYWORD
S
DETAILS CHECKED BY
EMPLOYER
77
varchar (15) deadlinedate
5 Employee Name varchar (20), Phone
varchar (15), Discipline
varchar (25), Experience
(2), Age, varchar (2), marital
status varchar (10)
Table 5.1
78
Proposed Database table Structure of Jobseeker. Fig 5.3
79
Database table structure of employer fig 5.5
80
5.3 Website Design
Many job sites were visited at the start of this work to know all features that are
added in their sites. This site tagged: JOBS.COM consists of three active pages,
which work for different purposes: Home, Employers Page and Job Openings.
database driven website which currently runs on local host. To manipulate the
PHP 5.2.6
MySQL 5.0.51b
MIcrosoft Notepad
Corel X3
The database designed for the backend of the website will enable it capture inputs
from users.
To make it World Wide Web functional, an internet connection from a vendor would
be deployed for uploading the web content to host server to facilitate full deployment
and access. The web interface was designed using Notepad and Microsoft
81
expression web editors. Hypertext mark-up language (HTML) and cascading style
sheet (CSS), and PHP were used to write instructions and format the web pages to
allow the web pages inputs interact with the database in anticipation of users‟
requests.
The SMS sender application was set up and connected to a stand alone computer
being fed with feedback from the web content to take decision on sending alert
messages.
In the home page, there exists log in options, for the job seekers and company or
employers. Also browser of this site can watch the available jobs in different
websites provided by the RSS feeds. The new users can create account in order to
post their resumes. There is a link for the seekers to view jobs listings.
82
Fig. Homepage of the website
83
5.3.3 Company Section
For Employers: By clicking this link, anybody can move to the company log in page.
This Is where company will log in before going further to submit jobs. Without log-in a
company cannot use the site. The company can update its own information, add a
new job, and see all the applicants that applied for any jobs. The company can easily
In this page company put the details for the new job available in the company.
84
Fig 5.9 New job page of the website
This page seeker can apply online. Seekers need to submit resume to be valid
member of the site. Considering some job sites we have added the same technique
without posting resume seekers can‟t be a regular member. Seeker will post resume
according to the form designed in the software. Through that all relevant information
So that seeker can easily post their resume and click on the “Apply” button. The
85
Figure 5.10 Job opening page of the website
86
5.4 Sending and Receiving SMS
To integrate the SMS capabilities, we rely upon the power, flexibility and reliability of
the Microsoft SMS sender application Software and mobile phone toolkit. With these
GSM modem;
GSM phone;
Short Message Server is a powerful, flexible SMS application that enables you and
computer. It has an easy to use user interface, and an internal architecture which
include built in database. The application can use a GSM mobile phone attached to
the PC with a phone-to-PC data cable or IP SMS technology to transmit and receive
operating systems.
87
Source: http://www.ozeki.hu/
Microsoft Outlook and Microsoft Excel can be used to send hundreds of messages to
clients. The messages and the phone numbers are stored in Excel files and an Excel
Macro initiates the sending process. (The excel macro is included in the software
The website functionality can be integrated with the SMS messaging applications by
creating a projection of the phone numbers, registered job classes, and vacancies
tables, and then exported to the SMS centre easily. For example if an SMS message
needs to be sent, it can be inserted into a database table used for outgoing
messages. The message server monitors this table and delivers the message.
Figure 5.12 shows how SMS travels from the PC to the cell phones, on this figure
you can see which protocols are used and which GSM network entities take place in
the communication process. As you can see, the mobile phone (Mobile station) or
computer transmits the SMS message to the GSM base station (BTS) through a
88
wireless link. After this the message goes though the backbone network of the
service provider. The Mobile Switching Center (MSC), the Home Location Register
(HLR) and optionally the Visitor Location Register (VLR) are used to find out the
appropriate Short Message Service Center (SMSC) that will store and forward the
PC
SMSC HLR
BSC MSC/VLR
whereas a dial-up modem transmits data through a copper telephone line. Most
To send SMS messages, a valid SIM card from a wireless carrier was inserted into a
serial cable, a USB cable, a bluetooth link or an infrared link. But this study preferred
89
to use a bluetooth link that supports a range of 100M. The actual way to use
depends on the capability of the mobile phone or GSM/GPRS modem. For example,
if a mobile phone does not support bluetooth, it cannot connect to the computer
After connecting the mobile phone or GSM/GPRS modem to a computer, the mobile
instructions used for controlling the mobile phone or GSM/GPRS modem are called
AT commands. One use of the extended AT commands is to control the sending and
The following table lists the AT commands that are related to the writing and sending
of SMS messages:
Table 5.2
AT COMMANDS MEANING
90
One way to send AT commands to a mobile phone or GSM/GPRS modem is to use
a terminal program. A terminal program's function is like this: It sends the characters
you typed to the mobile phone or GSM/GPRS modem. It then displays the response
it receives from the mobile phone or GSM/GPRS modem on the screen. The
GSM/GPRS Modem
Before the start of the SMS application programming, it is important to check if the
mobile phone, GSM/GPRS modem and SIM card are working properly first. The MS
idea to test the GSM devices beforehand. When a problem occurs, sometimes it is
difficult to tell what causes the problem. The cause can be the program, the GSM
device or the SIM card. If the GSM device was tested and SIM card with MS
HyperTerminal and they operate properly, then it is very likely that the problem is
The lines in bold type are the command lines that should be entered in
HyperTerminal. The other lines are responses returned from the GSM / GPRS
AT
OK
AT+CMGF=1
OK
91
AT+CMGW="+8033957506" (Press Enter on keyboard)
+CMGW: 1
OK
AT+CMSS=1
+CMSS: 20
OK
Line 1: "AT" is sent to the GSM / GPRS modem to test the connection. The
GSM / GPRS modem sends back the result code "OK" (line 2), which means
the connection between the HyperTerminal program and the GSM / GPRS
Line 3: The AT command +CMGF is used to instruct the GSM / GPRS modem
to operate in SMS text mode. The result code "OK" is returned (line 4), which
the result code "ERROR" is returned, it is likely that the GSM / GPRS modem
does not support the SMS text mode. To confirm, type "AT+CMGF=?" in the
and 1=text mode), then SMS text mode is supported. If the response is
recipient mobile phone number, you should press the Enter button of the
92
keyboard. The GSM / GPRS modem will then return a prompt "> " and you
can start typing the SMS text message "A simple demo of SMS text
Line 7: "+CMGW: 1" tells us that the index assigned to the SMS text message
storage.
Line 9: The result code "OK" indicates the execution of the AT command
+CMGW is successful.
Line 10: The AT command +CMSS is used to send the SMS text message
from the message storage of the GSM / GPRS modem. "1" is the index of the
Line 11: "+CMSS: 20" tells us that the reference number assigned to the SMS
Line 13: The result code "OK" indicates the execution of the AT command
+CMSS is successful.
To send SMS messages from an application, you have to write the source code for
modem, just like what a terminal program does. The source code can be written in C,
C++, Java, Visual Basic, Delphi or other programming languages. However, writing
You have to learn how to compose the bits and bytes of an SMS message.
For example, to specify the character encoding (e.g. 7-bit encoding and 16-bit
93
Unicode encoding) of an SMS message, you need to know which bits in the
traffic and finally the mobile phone or GSM/GPRS modem will not be able to
take the load. To obtain a high SMS transmission speed, a direct connection
SMS center or SMS gateway. This means your have to make a big change to
In most cases, instead of writing your own code for interacting with the mobile
development kit) / library. The API / SDK / library encapsulates the low-level details.
So, an SMS application developer does not need to know AT commands and the
composition of SMS messages in the bit-level. Some SMS messaging APIs / SDKs
Another way to hide the low-level AT command layer is to place an SMS gateway
between the SMS messaging application and the mobile phone or GSM/GPRS
94
modem. (This has been discussed above under "SMS Gateway" Simple protocols
such as HTTP / HTTPS can then be used for sending SMS messages in the
application. If an SMSC protocol (e.g. SMPP, CIMD, etc) is used for communicating
with the SMS gateway instead of HTTP / HTTPS, an SMS messaging API / SDK /
library can be very helpful since it encapsulates the SMSC protocol's details.
provided on the web site of an SMS messaging API / SDK / library or an SMS
Computer (PC) that runs Microsoft Windows XP was used to run the SMSC
application. Sending SMS messages with a mobile phone has a major problem -- it
is time consuming to write a text message using the small keypad of a mobile
SMS messages. This way a full-sized QWERTY keyboard can be used to write text
messages.
5.4.5 Requirements
To send SMS messages via a mobile phone using a Windows PC, the following
were used:
A Windows program that can control the mobile phone to send and receive
SMS messages.
95
Today, most mobile phones support at least one of the following options to connect
to a PC:
Via Bluetooth
The infrared and bluetooth option are very useful to many notebook computer users
support.
The Windows program for sending and receiving SMS messages is provided by
some mobile phone manufacturers. For example, Nokia offers a software package
called Nokia PC Suite to their mobile phone users. A program by Microsoft called
SMS Sender that enables Windows users to send SMS messages via a GSM
mobile phone from a PC was used for the purpose of this study.
To send SMS, I used the Nokia 2760 phone set and to connect it with the SMS
5.4.6 Using Microsoft SMS Sender to Send SMS Messages from a Windows
PC
Microsoft SMS Sender is a Windows program for sending SMS messages from a
PC via a GSM mobile phone. It was made available through open source from
96
One major limitation of this Windows program is that it does not support
concatenated SMS messages, flash SMS messages, MMS messages and SMS
messages that contain ring tones or logos. The SMS Sender can only be installed
To use SMS Sender, the modem driver of the mobile phone was installed on the PC
via Bluetooth device. If not, the mobile phone will not be shown in the available
device combo box in the main window of SMS sender. Normally, Windows should
Below is the SMS Server for sending SMS from the GSM device. The SMS server
will run all-time and check the database if there is any new SMS to send.
97
Figure 5.11 SMS SERVER
98
CHAPTER SIX
6.1 Introduction
This chapter is about testing the system that has been designed in this study.
The software was tested in cell phones by sending SMS repeatedly from the SMS
sender. All the cell phones with GSM support will be able to successfully run the
software.
First I posted a new job in the website. As soon as the job is saved in the database,
a new job alert SMS is sent to the desired applicants. A dedicated number with
Now suppose applicant want to see the details. Then he/she has to type details and
job id by a space to our server number (+2348033957506). After the mobile server
gets the SMS, it will reply with details to the applicant.
99
ID: 1; Qual:
Graduate; Agent:
DETAILS Uni.Ibadan;
:1
Last Date;
14/08/2010
Salary: N/A
SEND TO 8033957506
send to
8033957506
After getting the details of the job, if anyone wants to apply, then that person types
apply followed by his/her log in username then job id by a space to our server
100
APPLY
Ogunkua
1
After all the tasks that are mentioned above are done, the company employer will
check all the CV‟s. Then he/she chooses some applicant and sends SMS to those
Interview alert
being sent to
seekers mobile
phone
101
After interview, the applicant can be called for 2nd interview or joining.
After all the SMS are sent to the desired applicant, the SMS server will keep a record
(log) of all the SMS that are sent.
=============================================
Number: 08029501947
=============================================
Number: 08034071675
============================================
Number: 08055363556
=============================================
6.4 Results
The unity and integrity of the system software have been tested. It sends the SMS
properly and properly receives in the server end. I have tested it using several types
of input and have successfully been able to harvest out all the data logs. But I have
considered only one database for testing. For a complete testing we have to test in a
large scale. It took lots of time for studying and testing.
102
6.5 Future Scope and Conclusion
Due to lack of time i cannot add some stunning features that i thought to the project.
For checking purpose and to keep things simple, members are permitted to
apply from cell phone only by submitting their usernames. This system may
create holes in security issue. This is because any body can send SMS with
any random name and unfortunately resume will be submitted if the name
exists. So, i think to give every member a unique identification number that
In future it will be developed and will be able to test in a large scale for the
large environment.
The proposed System does not allow searching job using mobile phones. This
searching jobs through SMS. Searching job through mobile makes the system
6.5.2 Conclusion
Being a part of the growing job market, it is expected that the proposed system will
give great advantage to the job seekers. They will always be up-to-date with the new
job alert in their cell-phone. Getting interview alert will not let them miss any dream
opportunities. Getting job details will help them to check whether they are suitable for
the job and applying by SMS will enable them to apply for any job from anywhere
anytime.
103
REFERENCES
17p.
http://it.toolbox.com/blogs/enterprise-solutions/an-overview-of-database-
Strategies and Methods, In: Tiamiyu M.A. Information Science Concept, Models and
104
Heathfield, S. M. (2008). Human Resources Information System. (internet),
Laura Naismith, Peter Lonsdale, Giasemi Vavoula, Mike Sharples (2006). Mobile
http://www.innovationsreport.de/html/berichte/informationtechnologies/researchers_t
Nächste Meldung. (2008). Researchers Test Mobile Alert System for Cell Phones.
Ibadan.
Onuah, Felix. (2006). Nigeria gives census result, avoids risky details. (Internet),
Onu Blessing, C. (2004). The GSM, Internet, Library and Information Service in
Communication Technology [ICT. Vol.1 (1&2), June & December 2004, 51-58.
105
Ottong, J.G. (2009). Demographics of Nigeria. http://en-wikipedia.com. Site
accessed 25/01/10
Methods, In: Tiamiyu M.A. Information Science Concept, Models and Applications.
106
Victor, U. (2009). The Nigerian Telecommunications Industry: Overview of Nigeria‟s
25/01/10
107
APPENDICES
<html>
<head>
<meta name="description" content="Job hunting and in a hurry? Let us text you any
new job as it gets published. Jobs straight to your mobile!" />
</head>
<body>
<tr>
<td>
<div id="navigation">
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="about.html">About</a></li>
<li><a href="jobopenings.html">Jobopenings</a></li>
108
<li><a href="photo_gallery/photo_gallery.html">Photo
Gallery</a></li>
<li><a href="faq/faq.html">FAQ</a></li>
<li><a href="contact/contact.html">Contact</a></li>
</ul>
</div>
</td>
<ul>
<li>Register</li>
</ul>
</td></tr>
</table>
109
<h3>SMS Alerts on your Mobile! - Let Job Info Reach Your Hand!</h3>
<p>
Jobs.com(TM) pledges that the information you enter will not be shared with any
outside party without your expressed consent and that any e-mails you receive from
us will be related to your submissions.
</p>
<fieldset >
<legend>Register Here</legend>
110
<h4><b>PICK YOUR JOB CATEGORIES / TYPE</b></h4>
<p> This is the most important step. Be sure to chose the categories specific to
work you want. These can be added or removed at any time. Ever wanted to work
<br />in a bar but changed your mind to working in a hotel? No problem, simply
unclick one category and re-click another, or click both! You can always log onto
the<br /> website and amend this in the future or CLICK STOP Alert.</p>
<h4>Choose State</h4>
<select name="States">
<option value="Abuja">Abuja</option>
111
<option value="Sokoto ">Sokoto </option>
<option value="Maiduguri">Maiduguri</option>
<option value="Taraba">Taraba</option>
<h5 valign="top">Feedback:</h5>
</fieldset>
</form>
<p> </p>
<p>Once approved by the jobs.com moderator, the job goes live and is immediately
text to anyone subscribed to that category of job.<br /> The job is also placed on the
website and can be reviewed by candidates.</p>
<p> </p>
<div id="content">
112
<h2></h2>
<p></p>
</div>
</body>
</html>
113
Structure of the database: Jobsnaija
114
115