Search results for "Telecommunication"
showing 10 items of 1769 documents
Mobile media, gender, and power in rural India
2019
This article traces the diffuse connections between mobility and power by exploring how mobile phone use contributed to gendered power relations in rural India. It is based on ethnographic fieldwork on the use of mobile phones, conducted periodically between 2005 and 2013 in the village of Janta in West Bengal, India, and compared to earlier fieldwork in Janta, before the village had any phone system. Analysis of the increased mobility reveals how mobile phone use emerges within interconnected, changing fields of power. The political sphere earlier perceived as predominantly local was replaced by translocal political practices characterized by increasing mobility. Although new political pra…
Impact of centrality on cooperative processes
2016
The solution of today's complex problems requires the grouping of task forces whose members are usually connected remotely over long physical distances and different time zones. Hence, understanding the effects of imposed communication patterns (i.e., who can communicate with whom) on group performance is important. Here, we use an agent-based model to explore the influence of the betweenness centrality of the nodes on the time the group requires to find the global maxima of NK-fitness landscapes. The agents cooperate by broadcasting messages, informing on their fitness to their neighbors, and use this information to copy the more successful agents in their neighborhood. We find that for ea…
Assisted labeling for spam account detection on twitter
2019
Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…
Analysing software integration scenarios: the case of telecommunications operations software
2008
Telecom operators deploy a vast number of software systems to support their operations. Vendors of this software often integrate in their products several software systems, in order to enable innovations, minimize customer's integration efforts, etc. Different integration scenarios can be envisioned, and the issue of identifying more beneficial scenarios is of a great importance to the vendors. This paper aims at analyzing different software integration scenarios from the viewpoint of their support for innovations, and focuses on the context of telecommunications operations software. For each scenario, the overall modularity of the set of software systems is evaluated, and the expected bene…
UBFC-Phys: A Multimodal Database For Psychophysiological Studies of Social Stress
2021
As humans, we experience social stress in countless everyday-life situations. Giving a speech in front of an audience, passing a job interview, and similar experiences all lead us to go through stress states that impact both our psychological and physiological states. Therefore, studying the link between stress and physiological responses had become a critical societal issue, and recently, research in this field has grown in popularity. However, publicly available datasets have limitations. In this article, we propose a new dataset, UBFC-Phys, collected with and without contact from participants living social stress situations. A wristband was used to measure contact blood volume pulse (BVP…
Is IS Online Chatter Just Noise?: An Analysis of the Islamic State Strategic Communications
2020
The objective of this research is to analyze the potential use of strategic communication, and specifically, strategic brand management and online communications directed to a foreign target by the...
Adoption of Open Source Software and Software-as-a- Service Models in the Telecommunication Industry
2011
A case research is carried out on adoption of open source software (OSS) and software-as-a-service (SaaS) in the telecommunication industry. The study was conducted to examine the types of software deployed as OSS and SaaS and the conditions of adopting OSS and SaaS. Findings of the case study indicate that industry-specific software is not developed as OSS or deployed in SaaS mode. Based on the findings, we also arrive at conclusion: Adoption is hindered by specificity of processes and technology interfaces.
Research and Implementation of Energy Dispersal Algorithm for DRM System
2020
The article investigates the randomization algorithm of the OFDM signal energy used in modern digital broadcasting systems. Transmission part of the DRM system was modeled in MATLAB/Simulink software environment, bit sequences allocation tests were conducted using the original information signal and the corresponding modulation symbols with a scrambling algorithm and without it.
Multi-Skill Call Center as a Grading from “Old” Telephony
2009
We explore parallels between the older telephony switches and the multi-skill call centers. The numerical results have shown that a call center with equally distributed skills is preferable compared to traditional grading-type design. The annex contains a short version of mathematical proof on limited availability schemes design for small call flow intensity *** and for large *** . The proof explores one excellent V. Benes' paper (from Bell Labs). On its own merit, the annex could initiate new mathematical research in call center area, more by now the powerful software for numerical analysis is available. Main conclusion is the following: numerical analysis of simple multi-skill call center…
Honeypot Utilization for Network Intrusion Detection
2018
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…