The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In telecommunication network systems, there are a large number of interconnected components which also contain many subcomponents. Heavy rain, thunder or other factors can cause mal-function of the components or disconnections between the components which trigger alarms. Because of the interconnection of elements, triggered alarms may propagate to other components. This creates harsh challenges to...
Estimating mobile user speed is a problematic issue which has significant impacts to radio resource management and also to the mobility management of Long Term Evolution (LTE) networks. This paper introduces two algorithms that can estimate the speed of mobile user equipments (UE), with low computational requirement, and without modification of neither current user equipment nor 3GPP standard protocol...
Telecom Networks produce huge amount of daily alarm logs. These alarms usually arrive from different regions and network equipments of mobile operators at different times. In a typical network operator, Network Operations Centers (NOCs) constantly monitor those alarms in a central location and try to fix issues raised by intelligent warning systems by performing a trouble ticketing based management...
There are well-known attack techniques that threaten current apps stores. However, the complexity of these environments and their high rate of variability have prevented any effective analysis aimed at mitigating the effects of these threats. In this paper, the analysis performed over one of these techniques, Shuabang, is introduced. The completion of this analysis has been supported by a new tool...
In this paper we present new reduced video quality measure (RVQM) based on 3D steerable wavelet transform and modified SSIM (Structural Similarity index) measure. RVQM is compared with other full and reduced reference quality measures and tested on LIVE video and LIVE mobile databases. Results show that proposed RVQM measure provides good correlation with subjective grades on both databases, while...
The multipath propagation in the cellular nets can cause large fluctuations of the base stations' (BSs) RSS which detected by the mobile stations (MSs).The movement of mobile stations and the changes of environment will aggravate the fluctuations of RSS. There is a possibility that RSS values appear outliers during the process from its examination by mobile stations to its transfer to the positioning...
Preventing networks from being attacked has become a critical issue for network administrators and researchers. With the popularity and variety of large-scale zero-day threats over the Internet, security companies have to keep on inserting new virus signatures into their databases. However, the increasing size of virus signature file is dragging computers to a crawl during the virus scan. To effectively...
Poor retrieval performance significantly degenerates users' experience of visual search, especially in mobile search. Ideally, users would like to be alerted when bad queries are present, which helps eliminate latency as well as waste of bandwidth, especially in 3G wireless environment. In this paper, we propose a visual query performance prediction (v-QPP) approach to predict the retrieval effectiveness...
An inquiry-based ubiquitous tour system is proposed in this paper. The main concept is to use the strategy of inquiry to achieve the purposes of guiding and learning by using PDAs in a ubiquitous environment. This system has the following characteristics: the inquiry learning theory is used to design the guide activities, the provisions of clues are used to guide the inquiry activities of learners...
Mining gradual patterns plays a crucial role in many real world applications where very large and complex numerical data must be handled, e.g., biological databases, survey databases, data streams or sensor readings. Gradual rules highlight complex order correlations of the form “The more/less X, then the more/less Y”. Such rules have been studied for a long time and recently scalable algorithm has...
Self-organising Networks (SON) as introduced for 3G Long Term Evolution (LTE) will typically involve several different SON functions. These functions are not necessarily aware of each other and may have complex relations and interdependencies, for example, conflicting parameter settings, depending on their design and approach. Coordination of SON functions may become necessary in order to harmonise...
In this paper, we present a novel location detection service model on applying data correlation methods to locate mobile stations within a cellular network. In the proposed location detection algorithm, the mobile stations' signal strength values which obtained from the periodic Mobile Station measurement reports from Abis interface is used to calculate the position of Mobile Station (MS). The location...
The rapid growth in the development of Internet-based information systems increases the demand for natural language interfaces that are easy to set up and maintain. Unfortunately, the problem of deep understanding natural language queries is far from being solved. In this paper, an automated question answering system based on domain ontology and question template is proposed, which does not need deep...
In recent years, the developing speed of emerging technologies keep accelerating. Correctly understanding the future trend of technologies can help the government and enterprises formulate R&D strategies, and then seize the chance. Therefore, the research in Technology Trend has increasingly becomes a hotspot in technology management. First, the article puts forward four main aspects that technological...
Service Discovery in Mobile Ad hoc Networks (MANET) is a difficult task because of the dynamic nature of such networks. The availability of the services in MANET varies with respect to time and location. However, the service discovery requests issued by a consumer in one session are correlated, in most of the cases. If we can find out the correlation among the services and piggyback one service response...
To develop a flexible indoor localization system which is hardware independent, it is necessary to accommodate the diversity of mobile units in the installed WLAN infrastructure. The diversity of mobile units induces the diversity of signal reception bias terms. To deal with the signal reception bias, this paper proposes an extended signal propagation model and two new localization algorithms. A simulation...
Estimation of the location of a Mobile Station accurately is a key requirement to effectively provide a wide range of Location Based Services over mobile networks. Hence developing cellular positioning techniques has been a key research problem, with numerous localization solutions been proposed. These include technologies such as Cell ID, angle and time of arrival methods, statistical methods and...
Tagciti is a novel location-aware and socially-relevant information creating and discovering service for mobile users. Instead of depending on commercially created location related information, Tagciti provides users the necessary means to become part of the information creation process. It enables the creation of dynamic, up to date, and socially-relevant shared information. Also, it provides an...
This paper discusses a transaction framework that supports data sharing services in mobile environments. The transaction framework is based on the export-import transaction model that has the capacity to enhance data availability in mobile environments. The transaction framework also consists of a set of transaction dependencies and a set of managing operations. The transaction framework possesses...
Third generation mobile networks rely on an architecture where a certain number of Operation and Maintenance Centers handle a large amount of information about the network behavior. In this scenario, the amount of traffic-related data may become so large that even straightforward processing tasks, such as off-line querying, become a serious challenge. In this paper we show how, by integrating different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.