The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The widespread diffusion of mobile phones and the convergence of more and more services to the mobile devices allow the service providers to collect a huge corpus of information about the behaviour of the users (e.g., location and activity), “transforming” the cellular network into a highly distributed and pervasive sensor network. In this paper, we aim at demonstrating how, by using simple statistical...
With the development of mobile application reinforcement technology, traditional detecting and reverse analysis technology has been unable to cope with the reinforced mobile application using new reinforcement technology. In this paper, we analyze the mechanism of new reinforcement technology such as process state detection and memory protection, and proposed a novel shelling method using Hook and...
The object of this paper is to express influence of OTT service providers on Croatian telecommunication market in comparison with some European countries and United States based on mobileSQUARED research. As part of the project “Looking to the future”, the authors conducted a questionnaire about the impact of OTT service providers on the Croatian telecommunications market. The questionnaire has been...
This paper explores how can one virtualize a mobile packet core infrastructure using the IETF Forwarding and Control Element Separation (ForCES) standard and capitalizing on recent advances in networking, namely Software Defined Networking (SDN) and Network Functions Visualization (NFV). As a case in point we build a proof-of-concept (PoC) implementation of the currently standardized 3GPP Evolved...
This paper presents a study of the Nigeria's presence in Cyberspace. The Cyberspace (Internet) is now critical to every nation's socio-economic, cultural and political activities. When it is disrupted or fails, can grind a nation to a standstill. On the contrary, its correct functioning and pliability is transforming modern society with exceptional pecuniary and social benefits. With nearly all traditional...
Wireless technologies and services in emerging markets have been central to enabling the communications explosion over the last decade that has, in many ways, revolutionized the lives and the economies of the people living there. The nature of the markets and the competitive dynamics in these regions are undergoing some delicate but very important shifts. This white paper analyzes the leading opportunities...
Mobile technology is increasingly being used to support blended learning. The satisfactory results of our previous research show the use of mobile technology could enhance accessibility and communication in a blended learning course. In Algeria the mobile penetration rate stands at over 111% and 21% with 3G. Since most our students have access to mobile technology, three in five were smartphones,...
In this paper, we study on the price comparison between shared plan and non-shared plan for mobile service. A non-shared data plan is a traditional data plan for a single user with a limited monthly data allowance. A shared data plan allows a user to add different devices to one inclusive plan and receive one bill at the end of every month, which the monthly data allowance is shared by a group of...
From an Internet service provider's prospective, the increasing popularity of mobile devices and broadband Internet has created new business challenges: more diverse competitions and more volatile customer behaviors. Therefore, to accurately respond to the changing customer demands, using big data to analyze existing and potential customers has become a trend among businesses in designing marketing...
This paper discusses the relationship between Internet plus and networks convergence and highlights the development of ICT industry and the process of networks convergence. Based on Internet plus and the theory of networks convergence, this paper suggests to implement Internet plus action plan as a strategy to accelerate the construction of networks and application of Internet, promote the traditional...
Access to information and communication technologies (ICTs) is becoming a necessity not only for communication, but for commerce, and for obtaining information about healthcare, employment, and education. Unfortunately, the global digital divide has deepened to include limits on access to mobile broadband services. This paper uses an information ethics (IE) perspective, based the work of Floridi,...
In this paper, we present DAGGER, a distributed architecture for collaborating mobile hosts and telecom operators for the granular mitigation of mobile-based attacks. Due to the growing usage of network resources by mobile handsets and the increasing spread of malicious applications among those handsets, it has become vital for mobile operators to join the fight against mobile-based attacks in order...
The mobile signal in the elevator becomes weak because of the electromagnetic shielding effect of the elevator car, and it harmful to the user's health and interrupt the online business, to install signal amplifier in the elevator is a useful way to strengthen the mobile phone signal, however, the failure troubled the using of signal amplifier in the distributed environment, therefore, it is necessary...
Mobile internet penetration is increasing significantly in Taiwan, but it also leads to more and more subscribers' complaints about mobile internet performance. The regulatory authority, National Communications Commission (NCC), authorizes Telecom Technology Center (TTC) to start the project named “Measure Taiwan Mobile Internet” since 2012. The project not only aims to comprehensively understand...
BH mobile Internet market is mostly presented by 3G data technology. Due to limitations regarding capacity, performances, speed and QoS, new technologies such as IMT-Advanced (4G) have been developed. This article presents an overview and statistics of mobile data usage in different technologies as well as representation of different kind of applications and devices globally and by region underling...
Today the advertising industry is becoming increasingly dependent on the Internet to deliver advertisements to viewers. Third party advertising networks such as Advertising.com, a division of AOL Inc., are utilizing targeted advertising strategies to make Internet advertising more profitable. Targeted advertising utilizes cookies to track users and target them with advertisements based on attributes...
This paper analyzes the unreasonable relationship between the growths of revenue and decrease of profit. Then, using the operating model of Apple and other successful foreign operators' cases, it points out that the intellectualization would be the only way for Chinese telecom operators. This paper makes use of the Smart Pine structure and the contrast among three Chinese telecom operators' transformation...
Advances in information and communication technologies (ICTs) have created a global environment in which citizens from more developed countries have greater access to mobile broadband Internet services. The research question posed in this study is: Do national policy initiatives, regulatory measures, or governance practices increase a nation's mobile broadband diffusion? There is little research that...
The coverage region of WLAN network is limited compare with cell phone system such as GSM and WCDMA. The favorable area to deploy WLAN is the area which has strong demand for wireless network. How to identify the needs and guide the deployment of WLAN, that isn't a easy issue. It will waste the investment if we deploy the WLAN in improper places. This paper proposes a solution which can collect customer...
With the 3G explosive growth, telecom operators pay more and more attention to traffic management. Based on the key elements analysis of traffic operation, the paper proposes the ATNE model of traffic management, which content four key element "application, terminal, network, experience", and it can provide valuable reference of traffic management strategy.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.