Search results for "Telecommunication"
showing 10 items of 1769 documents
Joint Radio and Computational Resource Allocation in IoT Fog Computing
2018
The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…
A Data-Driven Architecture for Personalized QoE Management in 5G Wireless Networks
2017
With the emergence of a variety of new wireless network types, business types, and QoS in a more autonomic, diverse, and interactive manner, it is envisioned that a new era of personalized services has arrived, which emphasizes users' requirements and service experiences. As a result, users' QoE will become one of the key features in 5G/future networks. In this article, we first review the state of the art of QoE research from several perspectives, including definition, influencing factors, assessment methods, QoE models, and control methods. Then a data-driven architecture for enhancing personalized QoE is proposed for 5G networks. Under this architecture, we specifically propose a two-ste…
Kata Containers: An Emerging Architecture for Enabling MEC Services in Fast and Secure Way
2019
New coming applications will be only possible through Mobile Edge Servers deployed in proximity of the mobile users. Due to the user's mobility and server's workload, service migration will be an integral part of the services. For this reason, a standardized architecture should be designed to accomplish a workload migration in a secure and timely manner. Most research done to date has focused on the use of either virtual machine (VM) or container or a mix of both recently. A final solution might be an architecture only having the advantages of both technologies as the security of the VM and the speed of the containers. Custom solutions, actually, by using both technologies, need continuous …
Breaking layer 2: A new architecture for programmable wireless interfaces
2012
This paper introduces a new architecture for programmable wireless interfaces, aiming at responding to the emerging request of wireless access flexibility and adaptability. Instead of implementing a specific MAC protocol stack, the proposed architecture supports a set of programmable services, devised to customize the wireless access operations according to specific network and application scenarios. The services are composed by means of simpler functions, which in turns work on system primitives (i.e. elementary non-programmable functionalities, natively provided by the system) dealing with the physical transmission and reception of the frames. Our approach significantly differs from softw…
Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities
2010
This paper examines the telecommunication software market and the adoption of topical Software-as-a-Service (SaaS) model in this vertical market. The aim of this paper is to estimate which telecommunication software products are likely to be provided as a Service, and to examine the potential factors disallowing SaaS adoption. The set aim is pursued by studying both the supplying software vendors and the communication service providers (CSP) as customers. A set of thematic interviews, software industry statistics and information disclosed by the software vendors are used in the analysis. The results of the analysis reveal challenges in adopting SaaS for telecommunication software as well as…
Network channel allocation and revenue maximization
2002
This paper introduces a model that can be used to share link capacity among customers under different kind of traffic conditions. This model is suitable for different kind of networks like the 4G networks (fast wireless access to wired network) to support connections of given duration that requires a certain quality of service. We study different types of network traffic mixed in a same communication link. A single link is considered as a bottleneck and the goal is to find customer traffic profiles that maximizes the revenue of the link. Presented allocation system accepts every calls and there is not absolute blocking, but the offered data rate/user depends on the network load. Data arriva…
Toward solutions for energy efficiency
2020
Abstract The tariff setting for district heating (DH) services is a hard regulatory procedure. This chapter is devoted to development of the simple but sufficiently accurate methodology for fast and objective evaluation of the actual costs of DH to optimize the regulatory process and to set adequate tariffs on heat production and transmission. The developed methodology is based on the data sets of Latvian DH providers, but the methodological principles are applicable in another area too. Investigation of heat production drivers and following simulation revealed the key performance indicators (KPIs): fuel type and price. By usage of intelligent benchmarking data mining methods and mathematic…
An Encoding in Metaheuristics for the Minimum Communication Spanning Tree Problem
2009
Problem-specific encodings can improve the performance of metaheuristics, such as genetic algorithms or simulated annealing. This paper studies the link-biased (LB) encoding, which is a tree representation, and applies metaheuristics using this encoding to the minimum communication spanning tree (MCST) problem. Given the communication requirements of the nodes, the MCST problem seeks a communication spanning tree with minimum total cost. Optimal solutions for MCST problems are similar to minimum spanning trees (MSTs), and the LB encoding exploits this property by encoding trees similar to MSTs with higher probability. The paper investigates how to systematically design problem-specific enc…
Analysis of Users Behaviour from a Movie Preferences Perspective
2018
Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…
Exploiting community detection to recommend privacy policies in decentralized online social networks
2018
The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…