Search results for "Telecommunication"

showing 10 items of 1769 documents

Mobile media, gender, and power in rural India

2019

This article traces the diffuse connections between mobility and power by exploring how mobile phone use contributed to gendered power relations in rural India. It is based on ethnographic fieldwork on the use of mobile phones, conducted periodically between 2005 and 2013 in the village of Janta in West Bengal, India, and compared to earlier fieldwork in Janta, before the village had any phone system. Analysis of the increased mobility reveals how mobile phone use emerges within interconnected, changing fields of power. The political sphere earlier perceived as predominantly local was replaced by translocal political practices characterized by increasing mobility. Although new political pra…

Social PsychologyeducationIndia5143 Social and cultural anthropologyRural indiasukupuoliPower (social and political)powerPolitics5. Gender equalitypolitiikkagenderIntiamobile telephonybusiness.industryCommunicationmobilityHuman-Computer InteractionMobile medialiikkuvuusBusinessMobile telephonypoliticsTelecommunicationsmatkapuhelimetvalta
researchProduct

Impact of centrality on cooperative processes

2016

The solution of today's complex problems requires the grouping of task forces whose members are usually connected remotely over long physical distances and different time zones. Hence, understanding the effects of imposed communication patterns (i.e., who can communicate with whom) on group performance is important. Here, we use an agent-based model to explore the influence of the betweenness centrality of the nodes on the time the group requires to find the global maxima of NK-fitness landscapes. The agents cooperate by broadcasting messages, informing on their fitness to their neighbors, and use this information to copy the more successful agents in their neighborhood. We find that for ea…

Social and Information Networks (cs.SI)FOS: Computer and information sciencesPhysics - Physics and SocietyTheoretical computer scienceGroup (mathematics)Computer scienceFOS: Physical sciencesComputer Science - Social and Information NetworksTopology (electrical circuits)Physics and Society (physics.soc-ph)Variance (accounting)01 natural sciencesTelecommunications network010305 fluids & plasmasTask (computing)Broadcasting (networking)Betweenness centrality0103 physical sciencesMODELOS010306 general physicsCentralityPhysical Review E
researchProduct

Assisted labeling for spam account detection on twitter

2019

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

Social network021110 strategic defence & security studiesInformation retrievalSocial networkbusiness.industryComputer scienceSpam detectionSmart device0211 other engineering and technologies020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrePhishinglaw.inventionManual annotationlawComputer security0202 electrical engineering electronic engineering information engineeringBlacklistingMalwarebusinessCluster analysiscomputer
researchProduct

Analysing software integration scenarios: the case of telecommunications operations software

2008

Telecom operators deploy a vast number of software systems to support their operations. Vendors of this software often integrate in their products several software systems, in order to enable innovations, minimize customer's integration efforts, etc. Different integration scenarios can be envisioned, and the issue of identifying more beneficial scenarios is of a great importance to the vendors. This paper aims at analyzing different software integration scenarios from the viewpoint of their support for innovations, and focuses on the context of telecommunications operations software. For each scenario, the overall modularity of the set of software systems is evaluated, and the expected bene…

Social software engineeringInformation Systems and ManagementResource-oriented architectureComputer sciencebusiness.industryStrategy and ManagementMechanical EngineeringSoftware developmentManagement Science and Operations ResearchSoftware analyticsSoftware sizingSoftware constructionSoftware systembusinessTelecommunicationsEngineering (miscellaneous)System integration testingInternational Journal of Management Science and Engineering Management
researchProduct

UBFC-Phys: A Multimodal Database For Psychophysiological Studies of Social Stress

2021

As humans, we experience social stress in countless everyday-life situations. Giving a speech in front of an audience, passing a job interview, and similar experiences all lead us to go through stress states that impact both our psychological and physiological states. Therefore, studying the link between stress and physiological responses had become a critical societal issue, and recently, research in this field has grown in popularity. However, publicly available datasets have limitations. In this article, we propose a new dataset, UBFC-Phys, collected with and without contact from participants living social stress situations. A wristband was used to measure contact blood volume pulse (BVP…

Social stressFacial expressionModalitiesComputer scienceSpeech recognition010401 analytical chemistryFeature extraction[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunications02 engineering and technology01 natural sciencesField (computer science)0104 chemical sciencesHuman-Computer InteractionPsychophysiology[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingStress (linguistics)0202 electrical engineering electronic engineering information engineeringTask analysisComputingMilieux_MISCELLANEOUSSoftwareIEEE Transactions on Affective Computing
researchProduct

Is IS Online Chatter Just Noise?: An Analysis of the Islamic State Strategic Communications

2020

The objective of this research is to analyze the potential use of strategic communication, and specifically, strategic brand management and online communications directed to a foreign target by the...

Sociology and Political ScienceComputer sciencecomputer.internet_protocolbusiness.industryCommunication05 social sciences050801 communication & media studiesIslamBrand managementNoise0508 media and communications0502 economics and businessIS-ISStrategic communicationState (computer science)Telecommunicationsbusinesscomputer050203 business & managementInternational Journal of Strategic Communication
researchProduct

Adoption of Open Source Software and Software-as-a- Service Models in the Telecommunication Industry

2011

A case research is carried out on adoption of open source software (OSS) and software-as-a-service (SaaS) in the telecommunication industry. The study was conducted to examine the types of software deployed as OSS and SaaS and the conditions of adopting OSS and SaaS. Findings of the case study indicate that industry-specific software is not developed as OSS or deployed in SaaS mode. Based on the findings, we also arrive at conclusion: Adoption is hindered by specificity of processes and technology interfaces.

SoftwareMode (computer interface)business.industryComputer scienceInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSSoftware as a serviceOpen source softwareSoftware engineeringbusinessTelecommunications
researchProduct

Research and Implementation of Energy Dispersal Algorithm for DRM System

2020

The article investigates the randomization algorithm of the OFDM signal energy used in modern digital broadcasting systems. Transmission part of the DRM system was modeled in MATLAB/Simulink software environment, bit sequences allocation tests were conducted using the original information signal and the corresponding modulation symbols with a scrambling algorithm and without it.

SoftwareTransmission (telecommunications)Computer sciencebusiness.industryOrthogonal frequency-division multiplexingDigital broadcastingbusinessAlgorithmSignalEnergy (signal processing)ScramblingShift register2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
researchProduct

Multi-Skill Call Center as a Grading from “Old” Telephony

2009

We explore parallels between the older telephony switches and the multi-skill call centers. The numerical results have shown that a call center with equally distributed skills is preferable compared to traditional grading-type design. The annex contains a short version of mathematical proof on limited availability schemes design for small call flow intensity *** and for large *** . The proof explores one excellent V. Benes' paper (from Bell Labs). On its own merit, the annex could initiate new mathematical research in call center area, more by now the powerful software for numerical analysis is available. Main conclusion is the following: numerical analysis of simple multi-skill call center…

Softwarebusiness.industryComputer scienceTelephonybusinessGrading (education)Mathematical proofTelecommunicationsCall controlParallelsMathematical researchCall setup success rate
researchProduct

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct