Hasil untuk "Telecommunication"

Menampilkan 20 dari ~207388 hasil · dari DOAJ, arXiv, Semantic Scholar, CrossRef

JSON API
S2 Open Access 2005
Exploring factors affecting the adoption of mobile commerce in Singapore

KENNETH C.C. YANG

M-commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network. There are currently 94.9 million M-commerce users worldwide in 2003 and the segment is expected to grow to 1.67 billion by 2008. This research explores how Singaporeans are influenced to adopt the M-commerce. The research employs the Technology Acceptance Model (TAM) to examine factors affecting Singaporeans' attitudes toward this emerging mobile technology and applications.The research uses a quantitative approach to survey 866 Singaporean students examining their decision-making process to adopt M-commerce. Empirical data from regression analyses reflect consumer perceived usefulness (PU) influence attitude toward using (AT) M-commerce. It is also found consumer innovativeness, past adoption behavior, technology cluster adoption, age, and gender affect their adoption behavior. Results from multiple regression analyses further reveal that male respondents tend to perceived M-commerce favorably.The majority of positive relationships between PU, PEOU, AT, innovativeness, adoption behavior, and demographics are supported by the empirical data. Results also support the applicability of TAM and its extension to examine M-commerce adoption by Singapore consumers. This research also validates the robustness of TAM to study emerging technologies outside the U.S. context.

692 sitasi en Business, Computer Science
S2 Open Access 2014
Measuring Large-Scale Social Networks with High Resolution

Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski et al.

This paper describes the deployment of a large-scale study designed to measure human interactions across a variety of communication channels, with high temporal resolution and spanning multiple years—the Copenhagen Networks Study. Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1 000 individuals, using state-of-the-art smartphones as social sensors. Here we provide an overview of the related work and describe the motivation and research agenda driving the study. Additionally, the paper details the data-types measured, and the technical infrastructure in terms of both backend and phone software, as well as an outline of the deployment procedures. We document the participant privacy procedures and their underlying principles. The paper is concluded with early results from data analysis, illustrating the importance of multi-channel high-resolution approach to data collection.

393 sitasi en Computer Science, Physics
S2 Open Access 2021
Non‐Volatile Reconfigurable Integrated Photonics Enabled by Broadband Low‐Loss Phase Change Material

Zhuoran Fang, Jiajiu Zheng, Abhi Saxena et al.

Phase change materials (PCMs) have long been used as a storage medium in rewritable compact disk and later in random access memory. In recent years, integration of PCMs with nanophotonic structures has introduced a new paradigm for non‐volatile reconfigurable optics. However, the high loss of the archetypal PCM Ge2Sb2Te5 in both visible and telecommunication wavelengths has fundamentally limited its applications. Sb2S3 has recently emerged as a wide‐bandgap PCM with transparency windows ranging from 610 nm to near‐IR. In this paper, the strong optical phase modulation and low optical loss of Sb2S3 are experimentally demonstrated for the first time in integrated photonic platforms at both 750 and 1550 nm. As opposed to silicon, the thermo‐optic coefficient of Sb2S3 is shown to be negative, making the Sb2S3–Si hybrid platform less sensitive to thermal fluctuation. Finally, a Sb2S3 integrated non‐volatile microring switch is demonstrated which can be tuned electrically between a high and low transmission state with a contrast over 30 dB. This work experimentally verifies prominent phase modification and low loss of Sb2S3 in wavelength ranges relevant for both solid‐state quantum emitter and telecommunication, enabling potential applications such as optical field programmable gate array, post‐fabrication trimming, and large‐scale integrated quantum photonic network.

155 sitasi en Physics, Materials Science
S2 Open Access 2020
Toward the 6G Network Era: Opportunities and Challenges

Ioannis Tomkos, D. Klonidis, E. Pikasis et al.

The next generation of telecommunication networks will integrate the latest developments and emerging advancements in telecommunications connectivity infrastructures. In this article, we discuss the transformation and convergence of the fifth-generation (5G) mobile network and the internet of things technologies, toward the emergence of the smart sixth-generation (6G) networks which will employ AI to optimize and automate their operation.

185 sitasi en Computer Science
S2 Open Access 2020
A review and agenda for examining how technology-driven changes at work will impact workplace mental health and employee well-being

Anya Johnson, Shanta Dey, Helena Nguyen et al.

The mental health and well-being of employees is an increasingly important issue, both in terms of the financial costs to the Australian economy and human costs to society. This review examines two major technology-driven trends in the workplace and presents evidence for their impact on mental health, both positive and negative. First, we consider how we work, with a focus on changes which have been driven by automation and advanced technology in the workplace. Next, we consider where and when we work, with a focus on flexible work arrangements afforded by changes in telecommunication technology. Finally, we look forward with a critical lens to examine the implications for future research and for industry, government and education. JEL Classification: I31

173 sitasi en Business
DOAJ Open Access 2025
A secure and efficient user selection scheme in vehicular crowdsensing

Min Zhang, Qing Ye, Zhimin Yuan et al.

Abstract Against the backdrop of the rapid development of the Internet of Things and vehicle technology, the emergence of intelligent connected vehicles provides a technological foundation for vehicle crowdsensing (VCS). This emerging sensing paradigm is beneficial for reducing financial and time costs related to data collection and improving data quality. Inappropriate user selection may lead to redundant sensing data, consequently degrading the quality of sensing tasks. At present, user selection schemes have the following lacks: (1) Privacy protection and data security are often neglected, resulting in reduced user participation willingness. (2) Insufficient data quality assurance and challenges in processing high-dimensional redundant data remain significant issues. (3) Key exchange protocols rely on traditional cryptographic algorithms, which struggle to comply with Chinese cryptographic standards and incur high overhead. In order to solve these problems, this article proposes a secure and efficient user selection scheme in vehicular crowdsensing, named SEUS-VCS, a novel framework that pioneers secure and efficient user selection in VCS. It adopts a key exchange protocol based on Shang Mi Two (SM2) digital signature to ensure the security of data transmission, including the correctness of signatures and session keys. To protect user privacy, pseudonyms are generated to achieve user anonymity while ensuring traceability. In addition, a prediction model based on principal component analysis-enhanced long short-term memory (PCA-Enhanced LSTM) model is constructed by combining the advantages of principal component analysis (PCA) and long short-term memory (LSTM) network. The model uses PCA for data dimensionality reduction to eliminate redundant information and then employs LSTM to process time series data, capture long-term dependencies for more accurate user credit prediction, screen high-quality users, and improve perceived data quality. Security analysis demonstrates that under the Canetti–Krawczyk (CK) model and the Decisional Diffie–Hellman (DDH) security assumption, the SEUS-VCS scheme satisfies the security of session keys. Performance evaluation indicates that compared to other key exchange schemes, the SEUS-VCS scheme shows a significant advantage in supporting national cryptographic algorithms and anonymity. Compared to the scheme with the lowest computational cost and the scheme with the lowest communication cost, the SEUS-VCS scheme reduces computational cost by 42% and decreases communication cost by 50%. The SEUS-VCS scheme has advantages in reducing loss function (Loss), Mean Square Error (MSE), and Mean Absolute Error (MAE), and the predicted results match the true data very well. Performance evaluation indicates that compared to the LSTM baseline, which has the best MSE and MAE performance, the MSE and MAE of the SEUS-VCS scheme are reduced by 47% and 10%, respectively. This scheme is not only applicable to VCS, but can also provide reference for other fields involving credit prediction and incentive mechanisms.

Medicine, Science
DOAJ Open Access 2025
Synthesis of Wide-Angle Scanning Arrays Through Array Power Control

Pietro Rosatti, Giacomo Oliveri, Andrea Massa

A new methodology for the synthesis of wide-angle scanning arrays is proposed. It is based on the formulation of the array design problem as a multi-objective one where, for each scan angle, both the radiated power density in the scan direction and the total reflected power are accounted for. A set of numerical results from full-wave simulated examples - dealing with different radiators, arrangements, frequencies, and number of elements - is reported to show the features of the proposed approach as well as to assess its potentialities. A widening of the field-of-view percentage of up to 22% with respect to standard scanning methods is demonstrated.

Telecommunication
arXiv Open Access 2025
Coverage of the unit cube by dynamic Boolean models

Hanna Döring, Lianne de Jonge, Xiaochuan Yang

Motivated by peer-to-peer telecommunication, we study a dynamic Boolean model. We define a Poisson number of random lines through the $(d-1)$-dimensional base of a $d$-dimensional unit cube and dilate them to define cylinders. Letting $ρ$ be the expected number of cylinders, the random variable of interest is the coverage radius $R_ρ$, which is the cylinder radius required to cover the $d$-dimensional unit cube. We show that $R_ρ^{d-1}$ is of the order $\log ρ/ ρ$ with high probability as $ρ$ tends to infinity. We also consider alternative dynamics resulting in generalized cylinders that are generated by dilating the trajectories of stochastic processes, in particular Brownian motions. This leads to a coverage radius of the same order.

en math.PR
arXiv Open Access 2025
LP Relaxations for Routing and Wavelength Assignment with Partial Path Protection: Formulations and Computations

Xianyan Yang, Junyan Liu, Fan Zhang et al.

As a variant of the routing and wavelength assignment problem (RWAP), the RWAP with partial path protection (RWAP-PPP) designs a reliable optical-fiber network for telecommunications. It assigns paths and wavelengths to meet communication requests, not only in normal working situations but also in potential failure cases where an optical link fails. The literature lacks efficient relaxations to produce tight lower bounds on the optimal objective value of the RWAP-PPP. Consequently, the solution quality for the RWAP-PPP cannot be properly assessed, which is critical for telecommunication providers in customer bidding and service improvement. Due to numerous failure scenarios, developing effective lower bounds for the RWAP-PPP is challenging. To address this, we formulate and analyze various linear programming (LP) relaxations of the RWAP-PPP. Among them, we propose a novel LP relaxation yielding promising lower bounds. To solve it, we develop a Benders decomposition algorithm with valid inequalities to enhance performance. Computational results on practical networks, including large ones with hundreds of nodes and edges, demonstrate the effectiveness of the LP relaxation and efficiency of its algorithm. The obtained lower bounds achieve average optimality gaps of 8.6%. Compared with a direct LP relaxation of the RWAP, which has average gaps of 36.7%, significant improvements are observed. Consequently, our LP relaxation and algorithm effectively assess RWAP-PPP solution quality, offering significant research and practical value.

en math.OC
S2 Open Access 2020
SS7 Vulnerabilities—A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks

Kaleem Ullah, Imran Rashid, H. Afzal et al.

The Signalling System No. 7 (SS7) is used in GSM/UMTS telecommunication technologies for signalling and management of communication. It was designed on the concept of private boundary walled technology having mutual trust between few national/multinational operators with no inherent security controls in 1970s. Deregulation, expansion, and merger of telecommunication technology with data networks have vanquished the concept of boundary walls hence increasing the number of service providers, entry points, and interfaces to the SS7 network, which made it vulnerable to serious attacks. The SS7 exploits can be used by attackers to intercept messages, track a subscriber’s location, tape/redirect calls, adversely affect disaster relief operations, drain funds of individuals from banks in combination with other methods and send billions of spam messages. This paper provides a comprehensive review of the SS7 attacks with detailed methods to execute attacks, methods to enter the SS7 core network, and recommends safeguards against the SS7 attacks. It also provides a machine learning based framework to detect anomalies in the SS7 network which is compared with rule based filtering. It further presents a conceptual model for the defense of network.

163 sitasi en Computer Science
S2 Open Access 2023
The impact of electronic customer relationship management strategies on customer loyalty: A mediated model

Sima Magatef, Manaf Al-Okaily, Laila Ashour et al.

This study investigated the impact of electronic customer relationship management (e-CRM) strategies (functional and personal dimensions) on customer loyalty in the Jordanian telecommunication sector. The mediating role of perceived customer relationship quality (cognitive and an emotional dimensions) was tested in this relationship. Data was collected via online survey from 301 Jordanian online shoppers and analysed using structural equation modelling (AMOS). The results showed a significant and positive impact of the functional dimension on customer loyalty, while the personal dimension negatively affected it. However, the functional and personal dimensions had a positive effect of on perceived customer relationship (CR) quality, as it positively affected customer loyalty. Hence, CR quality is indirectly impacted the relationship between the functional dimension and customer loyalty; in other words, CR quality mediated the relationship between the personal dimension and customer loyalty. The study ’ s findings enhance the current understanding of the relationship between e-CRM strategies and customer loyalty in a context specific bounded to Jordan. In addition, it provides evidence of the mediating role of CR quality in the Jordanian telecommunication sector. This research suggests practical strategies for the Jordanian telecommunication industry to enhance customer loyalty.

45 sitasi en

Halaman 26 dari 10370