The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rising popularity of smartphones and the rapid growth of mobile applications, understanding the app usage behavior of mobile users is of growing importance for both app designers and service providers. Different from previous studies mining the correlation between apps and physical world factors, e.g. location, time, etc., in this paper we focus on the interdependency among apps and try to...
The growing popularity of powerful mobile devices such as smart phones and tablet devices has resulted in the exponential growth of demand for video applications. However, due to the intensive computation of the video decoding process, mobile video applications require frequent embedded memory access, which consumes a large amount of power and limits battery life. Various low-voltage memory techniques...
In the 21st Century, China's mobile communications has a huge space for development. The emergence of independent of the 4th generation mobile communication technology provides an unprecedented opportunity for the development of China's mobile communications. As the world's largest telecom operator, China Mobile Communications Corporation has become the leader of promoting China's 4th generation mobile...
Telecom Networks produce huge amount of daily alarm logs. These alarms usually arrive from different regions and network equipments of mobile operators at different times. In a typical network operator, Network Operations Centers (NOCs) constantly monitor those alarms in a central location and try to fix issues raised by intelligent warning systems by performing a trouble ticketing based management...
Data hiding schemes using complete complementary codes have been developed for image and audio signals. It has been shown that a high payload and a low bit-error-rate can be achieved by such data hiding strategies because of the ideal auto-and cross-correlation properties of complete complementary codes. The authors have proposed an emergency broadcasting system based on the data hiding scheme using...
Traditional OTA (Online Travel Agent) is challenged by the Internet and mobile business with the evolution of information. The precise forecasting of ticket sales in OTA companies is beneficial to budget control and service quality. The paper develops an integrated forecasting model by combining the internal factors immediately influencing the ticket sales and the external factors reflecting the ticket...
Data hiding schemes using complete complementary codes have been developed for image and audio signals. It has been shown that a high payload and a low bit-error-rate can be achieved by such data hiding strategies because of the ideal auto- and cross-correlation properties of complete complementary codes. The authors have proposed a disaster prevention broadcasting system based on the data hiding...
Information hiding schemes using complete complementary codes (CCCs) have been developed for image data. It has been shown that a high payload and a low bit-error-rate (BER) can be achieved by such data hiding strategies because of the ideal correlation properties of CCCs. In this work, we apply a data hiding scheme based on CCCs to audio signals. Properties such as signal-to-noise ratio (SNR) and...
Cellular systems operate under restrictive constraints of resources including radio channel capacity and network processing capability. The tremendous growth in the cellular data network usage brings operators with unprecedented signaling overloads and threatens the stability of the network. Understanding the characteristics of the subscribers who are resource inefficient has an important significance...
Mining gradual patterns plays a crucial role in many real world applications where very large and complex numerical data must be handled, e.g., biological databases, survey databases, data streams or sensor readings. Gradual rules highlight complex order correlations of the form “The more/less X, then the more/less Y”. Such rules have been studied for a long time and recently scalable algorithm has...
Social networks have great reach and generate a lot of traffic, especially on mobile devices. Advertising on these networks, though highly rewarding, has many unique challenges. We present a method that deduces social network relationships from just the URLs of the pages on which the ads are sought to be displayed. We show that there is a high correlation between clicking behaviour and relationships...
Service Discovery in Mobile Ad hoc Networks (MANET) is a difficult task because of the dynamic nature of such networks. The availability of the services in MANET varies with respect to time and location. However, the service discovery requests issued by a consumer in one session are correlated, in most of the cases. If we can find out the correlation among the services and piggyback one service response...
Humanoid robots are envisioned in general household tasks. To be able to fulfill a given task the robot needs to be equipped with knowledge concerning the manipulation and interaction in the environment and with knowledge about its own capabilities. When performing actions, e.g. opening doors or imitating human reach to grasp movements special 3-d trajectories are followed with the robot's end-effector...
How to control energy consumption is one of the most important issues for the battery-powered mobile stations in mobile networks. IEEE 802.16e standard proposes an energy saving mechanism that named "sleep mode" for conserving the power of the mobile stations. According to the operating mechanism of the sleep mode for downlink traffic in the type I power saving class, modeling the data frames...
Digital watermarking technologies with spread spectrum (SS) sequences have been previously proposed. The sequences used in previous studies, however, do not necessarily have good correlation properties. It is known that complete complementary codes have ideal correlation properties and very effective for mobile communication systems like CDMA. In this paper, it is shown that correlation properties...
In this paper, in terms of binary sequences with ideal autocorrelation, we present a systematic construction of quaternary low correlation zone (LCZ) sequence sets with flexible parameters. By the proposed construction, new optimal quaternary LCZ sequence sets in equivalent to known ones can be generated. In addition, we give a classification of the constructed optimal quaternary LCZ sequence sets.
With the development of economic globalization, more attention has been paid to cross-cultural study of consumption behavior. Mobile data services speed up the development in China after the issuance of 3G licenses. Impact of different cultural backgrounds on the consumption behavior of mobile data services must be considered when comparing their developments in China with those in other countries...
Due to the growing use of mobile video services, monitoring of perceived video quality in live systems becomes of high interest. For this purpose, it is required to capture video quality consistent with the principles behind the operation of the human visual system and to accommodate some suitable quality reference to the transmission of the mobile video service. This can be achieved by extracting...
The structure of customer communication network provides us the insights into the function of customers' relationships. In this paper, we use egocentric social network to explore how people manage their personal and group communications over time. Our primary goal is that our findings can provide business insights and help devise strategies for telecom service providers. We are interested in tracking...
In this paper, we study a new problem of mining individual friendship pattern (IFP) for characterizing the interaction behavior of each user in cellular phone call logs. The IFP represents the user's recent frequent relationships and their importance in social lives, which is a unique feature like fingerprint and is useful for many applications such as user resolution and viral marketing etc. We first...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.