Search results for "mobile communication"

showing 10 items of 25 documents

Estimating Applicability of New Mobile Content Formats to Organizational Use

2003

Innovations on information and communication technology reshape organizational communication. Our ability to estimate applicability of new technologies and content formats to organizational use has been limited to generic quantitative methods at the level of technologies and industries and elaborate qualitative methods targeting specific phenomena at the organizational level. In this paper we estimate quantitatively the applicability of MMS, SMS, XHTML, and XML to organizational use based on an analysis of all communication of an organization unit. We enumerate over 700 communication genres using a genre-based information systems planning method, categorise them with taxonomy of communicati…

3G mobile communicationmobile computingmultimedia communicationelectronic data interchangeelectronic messaging
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Towards Service-oriented 5G: Virtualizing the Networks for Everything-as-a-Service

2018

It is widely acknowledged that the forthcoming 5G architecture will be highly heterogeneous and deployed with a high degree of density. These changes over the current 4G bring many challenges on how to achieve an efficient operation from the network management perspective. In this article, we introduce a revolutionary vision of the future 5G wireless networks, in which the network is no longer limited by hardware or even software. Specifically, by the idea of virtualizing the wireless networks, which has recently gained increasing attention, we introduce the Everything-as-a-Service (XaaS) taxonomy to light the way towards designing the service-oriented wireless networks. The concepts, chall…

Big Datawireless networksNetworking and Internet Architecture (cs.NI)FOS: Computer and information sciencesvirtualisointisoftware5G-tekniikkawireless network virtualizationEverything-as-a-servicevirtualizationComputer Science - Networking and Internet Architecture5G technologyvirtualisation5G mobile communicationhardwarelcsh:Electrical engineering. Electronics. Nuclear engineeringeverything-as-a-servicecomputer architecturelcsh:TK1-99715Glangattomat verkot
researchProduct

VoiP performance analysis in IEEE802.16 networks

2012

WiMAX, as known as IEEE standard 802.16, is a wide range broadband wireless access network which has a significant good support for the quality of service. According to IEEE standard 802.16e WiMAX has support also for mobility. One of the key advantages of the WiMAX network is the possibility to assign QoS parameters as connection based. A good example of traffic type having strict QoS demands is VoIP. VoIP will probably be a killer application in the future's broadband wireless networks because of its cost efficiency compared to circuit switched networks. In this paper, we analyze by extensive simulations how QoS is applied per connection, especially for the VoIP connection.

Circuit switchingVoice over IPCost efficiencyWireless broadbandbusiness.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSKey (cryptography)Mobile communications over IPbusinessWiMAXComputer networkProceedings of the 10th ACM international symposium on Mobility management and wireless access
researchProduct

Constraint Hubs Deployment for efficient Machine-Type-Communications

2018

Massive Internet of Things (mIoT) is an important use case of 5G. The main challenge for mIoT is the huge amount of uplink traffic as it dramatically overloads the radio access network (RAN). To mitigate this shortcoming, a new RAN technology has been suggested, where small cells are used for interconnecting different devices to the network. The use of small cells will alleviate congestion at the RAN, reduce the end-to-end (E2E) delay, and increase the link capacity for communications. In this paper, we devise three solutions for deploying and interconnecting small cells that would handle mIoT traffic. A realistic physical model is considered in these solutions. The physical model is based …

Computer scienceReliability (computer networking)Wireless communication050801 communication & media studies02 engineering and technology0508 media and communicationsSINR modelTelecommunications link5G mobile communication0202 electrical engineering electronic engineering information engineeringWirelessPath lossFadingElectrical and Electronic EngineeringDelaysRadio access networkConnectivityta213business.industryApplied Mathematics05 social sciences020206 networking & telecommunicationsRelay Node PlacementReliabilityWireless sensor networksComputer Science ApplicationsBackhaul (telecommunications)businessInterferenceWireless sensor network5GWireless Sensor NetworkComputer networkIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
researchProduct

Mobile Communication and Work Practices in Knowledge-based Organizations

2005

This paper examines the role of mobile communication, mobile tools and work practices in the context of organizations, especially knowledge-based organizations. Today, organizations are highly complex and diverse. Not surprisingly, various solutions to incorporating mobile tools and mobile communication in organizations have been devised. Challenges to technological development and research on mobile communication are presented.

Knowledge managementwork practiceslcsh:T58.5-58.64Social Psychologyknowledge-based organizationslcsh:Information technologybusiness.industryCommunicationmobile communicationMobile business developmentContext (language use)mobilityHuman-Computer InteractionWork (electrical)Information and Communications TechnologyICTMobile telephonybusinessHuman Technology: An Interdisciplinary Journal on Humans in ICT Environments
researchProduct

Categorizing networked services The role of intrinsic-, user network- and complement network attributes

2009

PurposeThis paper aims to investigate the properties and attributes of networked services and to propose a general categorization scheme for such services.Design/methodology/approachTwo separate studies were conducted to test the validity and applicability of the categorization scheme. First, industry experts categorized a set of pre‐selected mobile services based on the services' dominant source of value. Second, a large‐scale end‐user study of the same services was conducted for testing cross‐service differences between the proposed service categories in terms of what drives perceived customer value. It is argued that services can be categorized on the basis of whether their dominant sour…

MarketingScheme (programming language)Value (ethics)Service (business)servicesComputer scienceServices marketingTest (assessment)Categorizationservices marketingmobile communication systemscomputer networksMarketingSet (psychology)computerComplement (set theory)computer.programming_languageEuropean Journal of Marketing
researchProduct

Antecedents to permission based mobile marketing: an initial examination

2009

PurposeThis paper's aim is to develop a conceptual model to examine the influence of four antecedent factors (personal trust, institutional trust, perceived control and experience) on consumers' willingness to participate in permission‐based mobile marketing. The model is to be tested empirically across three European countries and gender.Design/methodology/approachData are collected from surveys of consumers in Finland, Germany and the UK. The partial least squares (PLS) approach is utilised to test the model fit.FindingsThe main factor affecting the consumers' decision to participate in mobile marketing is institutional trust, which is a significant factor in all three countries and acros…

Marketingmedia_common.quotation_subjectHavaintokuluttajakäyttäytyminenPermissionTest (assessment)EuropeAntecedent (grammar)mobiilit kommunikaatiojärjestelmätmarkkinointiluottamusPerceptionConceptual modelPerceptionMobile communication systemsMobile marketingMarketingEurooppaPsychologyConsumer behaviourPermission marketingmedia_commonEuropean Journal of Marketing
researchProduct

Joint LMMSE equalizer for HSDPA in full-rate space time transmit diversity schemes

2005

This contribution presents a joint linear minimum mean square error (LMMSE) equalizer for full-rate space-time transmit diversity multi-code schemes based on W-CDMA, featuring two and four transmit antennas. Specifically, high-rate, high load systems are targeted, in order to analyze the high speed downlink packet access (HSDPA) of 3GPP Release 6. We derive an equivalent transmission scheme to equalize the received sufficient statistic in a single stage. To reduce the effects of multipath and multiuser interference, and to provide spatial and frequency diversity at the receiver, an LMMSE equalizer is employed. Computer simulations confirm that the proposed schemes achieve robust performance…

Minimum mean square errorComputer scienceSettore ING-INF/03 - Telecomunicazionileast mean squares methodsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEqualizerAdaptive equalizerData_CODINGANDINFORMATIONTHEORYFull RateTransmit diversityTransmission (telecommunications)3G mobile communicationantenna arrayfading channelTelecommunications linkdiversity receptionComputer Science::Networking and Internet ArchitectureElectronic engineeringequaliserFadingMultipath propagationComputer Science::Information TheoryCommunication channelDiversity scheme
researchProduct

Modelling Mobile Encounter Networks

2006

This article presents mobile encounter networks, which emerge when mobile devices come across each other and form a temporary connection between them using a common short-range radio technology. Local information exchanges between mobile devices results in a broadcast diffusion of information to other users of the network with a delay. In addition to presenting the concept of mobile encounter networks, we also provide an abstract method for describing the information diffusion process inside them. peerReviewed

Mobile identification numberComputer scienceMobile computingMobile WebmatkaviestinverkotPublic land mobile networkMobile stationMobile phone signalMobile searchMobile technologyGSM servicesRadio access networkbusiness.industryIMT AdvancedMobile broadbandmobile communicationmobile p2p networkvertaisverkotMobile telephonySmall cellbusinessMobile devicelangattomat verkotComputer networkMobile collaborationmobiilit vertaisverkot
researchProduct