The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social networks can be viewed as implicit real world networks, that manage to capture a wealth of information about heterogeneous nodes and edges, which are highly interconnected. Such abundant data can be beneficial in finding and retrieving relevant people and entities within these networks. Effective methods of achieving this can be useful in systems ranging from recommender systems to people...
The telecom networks have undergone a massive transformation in last few decades from all-voice circuit-switched network to all-IP packet-switched network that is converging voice and data worlds. The evolution of the telecom networks have also driven the evolution of Service Delivery Platforms (SDP) from in-flexible single-box solution to a flexible, modular SOA governed SDP to cater the ever changing...
Viterbi Algorithm is the optimum technique for detection of coded signals in white noise. However in many practical situations noise is coloured or correlated. The optimum detection techniques for both uncoded and coded (Trellis coded) signals in additive coloured Gaussian noise (ACGN) have been derived earlier in the literature. For detection of coded signals in coloured noise, the linear equalizer-predictive...
In a user equipment (UE) which supports multiple radio access technologies (multi-RAT), the access technology dependent part i.e., access stratum (AS) draw significant amount of power either in active or idle state. Simultaneous switching ON all UE supported idle RAT-ASs to support multi-RAT mobility, apart from the active RAT-AS can drain battery fast. Even the periodic cell search done by idle RAT-AS...
Generally, IEEE 802.11 DCF is used as a MAC layer protocol to form an ad hoc network as it enables one to configure a mobile host either in ad hoc mode or infrastructure mode. In this paper, we carry out an analysis of IEEE 802.11 DCF for an ad hoc network under saturation conditions. We focus on the average end-to-end delay, throughput, and the loss probability for single hop as well as multiple...
Man toddled into a new era where huge monitors are replaced by palm size screens, and they boom alive to perform millions of activity in a millisecond!!! Seated in one place today, man can do just about anything with his portable palm size gadgets. But as the sizes of gadgets shrunk, iniquity and espionage magnified to monstrosity. Scientists over the years while devised techniques to shrink gadgets,...
Because of the variety of types of collaboration services used in enterprises today, there is difficulty in integrating related work threads from different collaboration environments. Each collaboration tool differs in storage model, APIs, content organization, content addressing, content formats, user authentication, and user interface. Nevertheless users prefer to be able to choose which collaboration...
The convergence of voice and data on Internet Protocol (IP) networks has led to tremendous growth of Voice over IP (VoIP). While SIP/ H.323 are dominant signaling protocols, RTP is widely used for media transfer. Certain situations may require logging of RTP sessions along with the signaling information for call and voice analysis. Recovering voice from RTP packets requires explicit handling of RTP...
A lot of wireless localization schemes using time of arrival (TOA) have been proposed in the literature with comprehensive performance comparisons in terms of accuracy, complexity and robustness. The major issue in TOA-based localization schemes is that the presence of error due to non-line-of-site (NLOS) propagation in the range measurements introduces a lot of errors in location estimation. Thus...
Gaming market is gaining rapid significance and recognized as one of the most revenue generating futuristic services. With IMS(IP Multimedia Subsystem) networks coming in to reality a new gaming experience can be provided to the subscribers by blending the gaming service with IMS service enablers such as presence, location etc. An intelligent service broker element like Service Capability Interaction...
There is a growing concern across the globe about exfiltration of sensitive data over network. This coupled with the increase in other insider threats pose greater challenge. Present day perimeter security solutions such as Intrusion detection & prevention system, firewall are not capable of detecting data-exfiltration. Also existing behavior models that can detect intrusions and worms do not...
Paging latency Is one of the Important parameters for determining the Quality of Service (QoS) required by the telecom and broadband applications. Most of the 4G applications (especially real time applications) require upper bound on paging latency. In this paper, authors have provided a novel algorithm for Enhanced-PGLU (EPGLU) to reduce the paging delay and have provided the comparative study of...
Acoustic features are robust and powerful in video description, but not fully exploited for the emerging Content-Based video Copy Detection (CBCD) methods. To solve this discrepancy, this paper proposes a new CBCD approach using audio spectral features compared to existing visual content based methods. The proposed method incorporates three stages: 1) Extraction of spectral descriptors including centroid...
The Fingerprint is used to authenticate a person for multiple applications. In this paper, we propose Fingerprint Verification Based on Dual Transformation (FVDT). The Fingerprint image size of 300∗480 is segmented into four cells of each size 150∗240. The DCT is applied on each cell to convert from spatial domain to frequency domain. One level DWT is applied on DCT coefficients to derive four sub...
Reliability, efficient bandwidth utilisation, consistency and authenticity are some of the required applications that are required for proper implementation of vehicular ad-hoc networks (VANETs). As vehicular Ad hoc Networks are expected to greatly influence and improve road safety as well as driving conditions, they are attracting much attention these days. But along with all the benefits that it...
Company profiles are a common sight on Social Networking sites these days. Retailers use their pages to bring in new customers and increase visibility across the Internet. But is this all what Social Media can do? Social Media brings with it a potential that has not yet been successfully capitalized on by most companies. This paper brings forward the glaring loop holes that some of the common retailer...
Telecommunication companies maintain a large database of all user communications for billing purpose. This data is now being utilized by the network providers to assess the current needs of the subscribers. Logs of Telecommunication providers not only contain connectivity data but also location data of users. Analyzing this social network along with location data helps identify social interactions...
Innovation has been studied from several different perspectives. Since innovation has increasingly become a nonlinear, interactive and open activity, social network analysis provides a handy tool to examine this phenomenon. This paper aims to review and synthesize the studies that have examined the phenomenon of innovation from a social network perspective. The current state of the literature, gaps...
The proliferation of content on the internet is the result of users taking the role of Prosumers (Producers and Consumers). Enormous amount of content is generated and consumed by users. NGSON aims at providing users and services with reliable content delivery service which can handle large content in both live and offline mode. In this paper we discuss an experiment conducted based on NGSON's Content...
This paper presents high quality and robust Infinite Impulse Response (IIR) adaptive howling suppressor (AHS) developed based on adaptive notch filters (ANF) with regularisation. The proposed method uses Normalised Least Mean Square (NLMS) adaptation algorithm with leakage factor based on moving-average technique. The proposed system uses combination of front end de-correlation and modified NLMS adaptation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.