Journal articles on the topic 'Network performance (Telecommunication) Computer networks Computer networks Computer networks Hospitals'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 27 journal articles for your research on the topic 'Network performance (Telecommunication) Computer networks Computer networks Computer networks Hospitals.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kadhim, Qusay Jalil, Ali M. Alsahlany, and Ahmed Hassan Hadi. "Performance assessment of VoIP service over different handover mechanisms in UMTS networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4214. http://dx.doi.org/10.11591/ijece.v11i5.pp4214-4220.

Full text
Abstract:
Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).
APA, Harvard, Vancouver, ISO, and other styles
2

JAIN, AABHA, and SANJIV TOKEKAR. "Application Specific Performance Evaluation of Vertical Handoff in UMTS-WLAN Network." Journal of Interconnection Networks 18, no. 04 (December 2018): 1850013. http://dx.doi.org/10.1142/s0219265918500135.

Full text
Abstract:
The next generation of wireless system is expected to provide multimedia, multi class services any time anywhere with seamless mobility and Quality of Service (QoS). In such environment, vertical handoff management plays an important and challenging role. Some of the main functions of vertical handoff management are: to implement appropriate vertical handoff decision to minimize number of unnecessary handoff, to maintain minimum vertical handoff latency for seamless mobility and to provide guaranteed acceptable QoS required for user satisfaction. Thus, in this paper to avoid unnecessary handoff in integrated heterogeneous network we have proposed that the vertical handoff decision depends on coverage area of the network and the speed of the Mobile Node. Application specific cut-off speed for particular coverage range of network during which handoff is beneficial has been determined. Real time applications like HDTV, MPEG-4, and H.261 are considered in integrated heterogeneous network of UMTS (Universal Mobile Telecommunication System) and WLAN. Vertical handoff latency is analyzed for varied network traffic load, types of application and varied speed of Mobile Node. Effect of Mobile Node speed on packet loss is also analyzed. Finally, to satisfy user with acceptable end to end QoS, especially in the presence of heterogeneous integrated networks where every network has individual QoS, an end to end QoS mapping scheme between UMTS and WLAN integrated network has been proposed. The simulation is performed using Network Simulator NS-2 with NIST (National Institute of Standards and Technology) add on module.
APA, Harvard, Vancouver, ISO, and other styles
3

Lahby, Mohamed. "Enhancing Modeling for Network Selection Using Graph Theory in Beyond 4G Networks." International Journal of Business Data Communications and Networking 16, no. 1 (January 2020): 48–69. http://dx.doi.org/10.4018/ijbdcn.2020010104.

Full text
Abstract:
In recent years, the development and the deployment of different generation systems such as 3G (UMTS, Wi-Fi), 4G (LTE, WIMAX), and 5G have become a reality for different telecommunication operators. At the same time, the development of new mobile devices with multiple interfaces have shifted the behavior of users concerning the utilization of the internet. Additionally, several streaming servers are available to provide real time applications such as e-commerce transactions, video streaming, online gaming, etc. As a result, the users have the privilege to use different multimedia applications at anytime and anywhere. The major trend in Beyond 4G networks is determining the best access network for the end user in terms of quality of service (QoS) during the network selection decision. Thus, in this article, the authors investigate graph theory and the AHP approach to deal with the network selection issue. The experimental results show that the proposed policy can achieve a significant performance in terms of QoS metrics for real-time streaming than conventional algorithms.
APA, Harvard, Vancouver, ISO, and other styles
4

El Fachtali, Imad, Rachid Saadane, and Mohammed ElKoutbi. "Vertical Handover Decision Algorithm Using Ants’ Colonies for 4G Heterogeneous Wireless Networks." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/6259802.

Full text
Abstract:
With the development of 4G mobile telecommunication systems, providing users with the convenience of a seamless continuous connection is not enough anymore. Users want to be connected through the best available network with the best quality of service. It is necessary to have a good decision-making algorithm which decides whether it is necessary to perform handoff to another network, the best network to vertically perform handoff to, and the right time to initiate the handover. This paper proposes a new approach in which mobile terminals (MTs) continuously analyze the network and keep a database of the best available networks. The concept is based on QoS aware ant colony built on the vertical handoff mechanism that uses an updated version of ants’ colony optimization decision algorithm (ACOR), the dynamic and static factors such as RSS, the cost of service, bandwidth, the velocity of MT, the power consumption and security, and the module for predicting the traveling distance within an IEEE 802.11 WLAN cell. Simulation results show that we can not only meet the individual needs of users in terms of QoS, but also improve the whole system performance by reducing the number of handover failures and unnecessary handover instances by up to 95%.
APA, Harvard, Vancouver, ISO, and other styles
5

Chiu, Hsuan, Chi-He Chang, Chao-Wei Tseng, and Chi-Shi Liu. "Window-Based Popularity Caching for IPTV On-Demand Services." ISRN Communications and Networking 2011 (October 12, 2011): 1–11. http://dx.doi.org/10.5402/2011/201314.

Full text
Abstract:
In recent years, many telecommunication companies have regarded IP network as a new delivery platform for providing TV services because IP network is equipped with two-way and high-speed communication abilities which are appropriate to provide on-demand services and linear TV programs. However, in this IPTV system, the requests of VOD (video on demand) are usually aggregated in a short period intensively and user preferences are fluctuated dynamically. Moreover, the VOD content is updated frequently under the management of IPTV providers. Thus, an accurate popularity prediction method and an effective cache system are vital because they affect the IPTV performance directly. This paper proposed a new window-based popularity mechanism which automatically responds to the fluctuation of user interests and instantly adjusts the popularity of VOD. Further, we applied our method to a commercial IPTV system and the results illustrated that our mechanism indeed offers a significant improvement.
APA, Harvard, Vancouver, ISO, and other styles
6

Erofeev, Evgeny, Vadim Arykov, Michael Stepanenko, Aleksei Voevodin, Aleksei Kogai, and Vladimir Kurikalov. "28 GHz Single-Chip Transmit RF Front-End MMIC for Multichannel 5G Wireless Communications." Symmetry 12, no. 7 (July 14, 2020): 1167. http://dx.doi.org/10.3390/sym12071167.

Full text
Abstract:
Millimeter-wave wireless networks of the new fifth generation (5G) have become a primary focus in the development of the information and telecommunication industries. It is expected that 5G wireless networks will increase the data rates and reduce network latencies by an order of magnitude, which will create new telecommunication services for all sectors of the economy. New electronic components such as 28 GHz (27.5 to 28.35 GHz) single-chip transmit radio frequency (RF) front-end monolithic microwave integrated circuits (MMICs) will be required for the performance and power consumption of millimeter-wave (mm-wave) 5G communication systems. This component includes a 6-bit digital phase shifter, a driver amplifier and a power amplifier. The output power P3dB and power-added efficiency (PAE) are 29 dBm and 19.2% at 28 GHz. The phase shifter root-mean-square (RMS) phase and gain errors are 3° and 0.6 dB at 28 GHz. The chip dimensions are 4.35 × 4.40 mm.
APA, Harvard, Vancouver, ISO, and other styles
7

Ekwem, Edith N., and Kashif Nisar. "An Experimental Study." International Journal of Advanced Pervasive and Ubiquitous Computing 6, no. 3 (July 2014): 35–53. http://dx.doi.org/10.4018/ijapuc.2014070103.

Full text
Abstract:
A network whose interconnections between nodes are implemented without using wires is referred to as wireless network and is usually related to a telecommunication network. As related to wired local area network, wireless channels are error-prone. Performance study and optimization of Wireless Local Area Network (WLAN) becomes more essential as its gaining popularity. For performance modelling and evaluation of wireless networks, computer simulation has become one of most widespread tools. While numerous network simulators exist for building a variety of network models, selecting a good network simulator tool is vital in modelling and performance study of wireless networks. Optimized Network Engineering Tools (OPNET) Modeller available to academic institutions at no cost is becoming one of the most widespread network simulators. In this study, the authors used OPNET Modeller 14.5 simulator tool to develop and validate a model for campus based WLAN. The results are expected to display that OPNET Modeller offers credible simulation outcomes close to a genuine system. The effect of network parameters such as the processing time on the performance metrics such as delay and throughput of the various scenarios in the entire network was investigated. The analysis of the results from the simulations carried out can assist the management of computer centre that manages the network in identifying the bottleneck node on the network and for future network capacity building. However, this wireless network involves too many numbers of users which OPNET is not capable to simulate; the authors limited the network to only users in the computer building.
APA, Harvard, Vancouver, ISO, and other styles
8

Matsumura, Hajime, Shigeki Yamada, and Minoru Kubota. "Reliability and cost‐effectiveness of a telecommunication network composed of distributed switching nodes and high‐performance control nodes." Electronics and Communications in Japan (Part I: Communications) 84, no. 11 (November 2001): 1–15. http://dx.doi.org/10.1002/ecja.1048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alhihi, Mohammad, Hani Attar, Mohammad Samour, and Artem Akulynichev. "Researching the Impact of Parameters of the Developed Routing Models on Network Performance." Studies in Engineering and Technology 4, no. 1 (June 7, 2017): 61. http://dx.doi.org/10.11114/set.v4i1.2470.

Full text
Abstract:
Nowadays, it is hard to imagine work without applying the principle of computer networks, and every day the requirement for high-quality network maintenance is increasing. In order to have a high-quality network; always optimize QoS through the optimization of routing protocols is required. In this paper, the scientific task of optimizing routing processes in hybrid telecommunication networks with guaranteed quality of service is solved by developing models and methods of adaptive routing. To develop methods, a system of Telecommunications network (TN) mathematical models was constructed at the levels of its morphological and functional descriptions. We used a weighted oriented graph as a structural model. Formalization of the main indicators of the network operation efficiency is carried out, which are the network performance (or its derivatives – relative and normalized performances) and indicators of the degree of use of network resources – buffer memory capacities of nodes and bandwidth of the transmission paths. In this paper, an experimental study of the developed models and routing methods was carried out in order to verify their adequacy, evaluate the effectiveness, and develop practical recommendations. The scheme of experiment, focusing on the investigation of processes occurring in the network while solving routing tasks (data gathering, RT processing, distribution, and implementation), is proposed.
APA, Harvard, Vancouver, ISO, and other styles
10

Ruiz-Avilés, J. M., S. Luna-Ramírez, M. Toril, F. Ruiz, I. de la Bandera, P. Muñoz, R. Barco, P. Lázaro, and V. Buenestado. "Design of a Computationally Efficient Dynamic System-Level Simulator for Enterprise LTE Femtocell Scenarios." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/802606.

Full text
Abstract:
In the context of Long-Term Evolution (LTE), the next generation mobile telecommunication network, femtocells are low-power base stations that efficiently provide coverage and capacity indoors. This paper presents a computationally efficient dynamic system-level LTE simulator for enterprise femtocell scenarios. The simulator includes specific mobility and traffic and propagation models for indoor environments. A physical layer abstraction is performed to predict link-layer performance with low computational cost. At link layer, two important functions are included to increase network capacity: Link Adaptation and Dynamic Scheduling. At network layer, other Radio Resource Management functionalities, such as Admission Control and Mobility Management, are also included. The resulting tool can be used to test and validate optimization algorithms in the context of Self-Organizing Networks (SON).
APA, Harvard, Vancouver, ISO, and other styles
11

Andreadou, Nikoleta, Evangelos Kotsakis, and Marcelo Masera. "Smart Meter Traffic in a Real LV Distribution Network." Energies 11, no. 5 (May 5, 2018): 1156. http://dx.doi.org/10.3390/en11051156.

Full text
Abstract:
The modernization of the distribution grid requires a huge amount of data to be transmitted and handled by the network. The deployment of Advanced Metering Infrastructure systems results in an increased traffic generated by smart meters. In this work, we examine the smart meter traffic that needs to be accommodated by a real distribution system. Parameters such as the message size and the message transmission frequency are examined and their effect on traffic is showed. Limitations of the system are presented, such as the buffer capacity needs and the maximum message size that can be communicated. For this scope, we have used the parameters of a real distribution network, based on a survey at which the European Distribution System Operators (DSOs) have participated. For the smart meter traffic, we have used two popular specifications, namely the G3-PLC–“G3 Power Line communication” and PRIME–acronym for “PoweRline Intelligent Metering Evolution”, to simulate the characteristics of a system that is widely used in practice. The results can be an insight for further development of the Information and Communication Technology (ICT) systems that control and monitor the Low Voltage (LV) distribution grid. The paper presents an analysis towards identifying the needs of distribution networks with respect to telecommunication data as well as the main parameters that can affect the Inverse Fast Fourier Transform (IFFT) system performance. Identifying such parameters is consequently beneficial to designing more efficient ICT systems for Advanced Metering Infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
12

Allen, Michael, Anne Spencer, Andy Gibson, Justin Matthews, Alex Allwood, Sue Prosser, and Martin Pitt. "Right cot, right place, right time: improving the design and organisation of neonatal care networks – a computer simulation study." Health Services and Delivery Research 3, no. 20 (May 2015): 1–128. http://dx.doi.org/10.3310/hsdr03200.

Full text
Abstract:
BackgroundThere is a tension in many health-care services between the expertise and efficiency that comes with centralising services and the ease of access for patients. Neonatal care is further complicated by the organisation of care into networks where different hospitals offer different levels of care and where capacity across, or between, networks may be used when local capacity is exhausted.ObjectivesTo develop a computer model that could mimic the performance of a neonatal network and predict the effect of altering network configuration on neonatal unit workloads, ability to meet nurse staffing guidelines, and distance from the parents’ home location to the point of care. The aim is to provide a model to assist in planning of capacity, location and type of neonatal services.DesignDescriptive analysis of a current network, economic analysis and discrete event simulation. During the course of the project, two meetings with parents were held to allow parent input.SettingThe Peninsula neonatal network (Devon and Cornwall) with additional work extending to the Western network.Main outcome measuresAbility to meet nurse staffing guidelines, cost of service provision, number and distance of transfers, average travel distances for parents, and numbers of parents with an infant over 50 km from home.Data sourcesAnonymised neonatal data for 7629 infants admitted into a neonatal unit between January 2011 and June 2013 were accessed from Badger patient care records. Nurse staffing data were obtained from a daily ring-around audit. Further background data were accessed from NHS England general practitioner (GP) Practice Profiles, Hospital Episode Statistics, Office for National Statistics and NHS Connecting for Health. Access to patient care records was approved by the Research Ethics Committee and the local Caldicott Guardian at the point of access to the data.ResultsWhen the model was tested against a period of data not used for building the model, the model was able to predict the occupancy of each hospital and care level with good precision (R2 > 0.85 for all comparisons). The average distance from the parents’ home location (GP location used as a surrogate) was predicted to within 2 km. The number of transfers was predicted to within 2%. The model was used to forecast the effect of centralisation. Centralisation led to reduced nurse requirements but was accompanied by a significant increase in parent travel distances. Costs of nursing depend on how much of the time nursing guidelines are to be met, rising from £4500 per infant to meet guidelines 80% of the time, to £5500 per infant to meet guidelines 95% of the time. Using network capacity, rather than local spare capacity, to meet local peaks in workloads can reduce the number of nurses required, but the number of transfers and the travel distance for parents start to rise significantly above ≈ 70% network capacity utilisation.ConclusionsWe have developed a model that predicts performance of a neonatal network from the perspectives of both the service provider and the parents of infants in care.Future workApplication of the model at a national level.FundingThe National Institute for Health Research Health Services and Delivery Research programme.
APA, Harvard, Vancouver, ISO, and other styles
13

Rodriguez-Hernandez, Miguel A., Zhuhan Jiang, Angel Gomez-Sacristan, and Vicent Pla. "Intelligent Municipal Heritage Management Service in a Smart City: Telecommunication Traffic Characterization and Quality of Service." Wireless Communications and Mobile Computing 2019 (February 7, 2019): 1–10. http://dx.doi.org/10.1155/2019/8412542.

Full text
Abstract:
The monitoring of cultural heritage is becoming common in cities to provide heritage preservation and prevent vandalism. Using sensors and video cameras for this task implies the need to transmit information. In this paper, the teletraffic that cameras and sensors generate is characterized and the transmissions’ influence on the municipal communications network is evaluated. Then, we propose models for telecommunication traffic sources in an intelligent municipal heritage management service inside a smart sustainable city. The sources were simulated in a smart city scenario to find the proper quality of service (QoS) parameters for the communication network, using Valencia City as background. Specific sensors for intelligent municipal heritage management were selected and four telecommunication traffic sources were modelled according to real-life requirements and sensors datasheet. Different simulations were performed to find the proper CIR (Committed Information Rate) and PIR (Peak Information Rate) values and to study the effects of limited bandwidth networks. Packet loss, throughput, delay, and jitter were used to evaluate the network’s performance. Consequently, the result was the selection of the minimum values for PIR and CIR that ensured QoS and thus optimized the traffic telecommunication costs associated with an intelligent municipal heritage management service.
APA, Harvard, Vancouver, ISO, and other styles
14

Domański, Adam, Joanna Domańska, Katarzyna Filus, Jakub Szyguła, and Tadeusz Czachórski. "Self-Similar Markovian Sources." Applied Sciences 10, no. 11 (May 28, 2020): 3727. http://dx.doi.org/10.3390/app10113727.

Full text
Abstract:
Markov queueing models are a powerful tool to evaluate the performance of computer networks and have been used in telecommunication studies for over 100 years. To apply them to the evaluation of the modern Internet, we should not only adapt them to the contemporary network structures but also include a description of the complex stochastic patterns (self-similarity and long-range dependance) of transmitted flows. We examine the features of two Markov models of an almost self-similar process, keeping in mind the modeling of Internet traffic. We have found that the obtained results are comparable with those achieved using a well-known generator of self-similar traffic.
APA, Harvard, Vancouver, ISO, and other styles
15

Nakayama, Yu, and Kazuki Maruta. "Analysis of Nonlinear Bypass Route Computation for Wired and Wireless Network Cooperation Recovery System." Big Data and Cognitive Computing 2, no. 3 (September 3, 2018): 28. http://dx.doi.org/10.3390/bdcc2030028.

Full text
Abstract:
It is a significant issue for network carriers to immediately restore telecommunication services when a disaster occurs. A wired and wireless network cooperation (NeCo) system was proposed to address this problem. The goal of the NeCo system is quick and high-throughput recovery of telecommunication services in the disaster area using single-hop wireless links backhauled by wired networks. It establishes wireless bypass routes between widely deployed leaf nodes to relay packets to and from dead nodes whose normal wired communication channels are disrupted. In the previous study, the optimal routes for wireless links were calculated to maximize the expected physical layer throughput by solving a binary integer programming problem. However, the routing method did not consider throughput reduction caused by sharing of wireless resources among dead nodes. Therefore, this paper proposes a nonlinear bypass route computation method considering the wireless resource sharing among dead nodes for the NeCo system. Monte Carlo base approach is applied since the nonlinear programming problem is difficult to solve. The performance of the proposed routing method is evaluated with computer simulations and it was confirmed that bandwidth division loss can be avoided with the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
16

Paranjay, Om Adideva, and V. Rajeshkumar. "A Neural Network Aided Real-Time Hospital Recommendation System." Indonesian Journal of Science and Technology 5, no. 2 (September 1, 2020): 217–35. http://dx.doi.org/10.17509/ijost.v5i2.24585.

Full text
Abstract:
Over the past few years, there have been an overwhelming number of healthcare providers, hospitals and clinics. In such a situation, finding the right hospital for the right ailment can be a considerable challenge. Inspired by this challenge, this work attempts to build a model that can automatically recommend hospitals based on user requirements. In the past there have been important works in physician recommendation. Our proposed work aims to be more inclusive and provide an automated hospital recommendation system to patients based on neural networks driven classification. We suggest a model that considers several unique parameters, including geographical location. To optimize its usefulness, we design a system that recommends hospitals for general consultation, specialty hospitals, and in view of the pandemic, hospitals recommended for treatment of COVID-19. In this work, we adopt Neural Networks and undertake a comparative analysis between several different available supervised algorithms to identify one best suited neural architecture that can work best in the applied fields. Based on our results from the analysis, we train the selected neural network with context relevant data. In the image of the recommendation system, we develop a website that uses the trained neural network on its backend and displays the recommendation results in a manner interpretable by the end user. We highlight the process of choosing the right neural model for the backend of the website. To facilitate the working of the website in real-time, we use real time databases hosted on Google Firebase and edge devices on hospital ends. Additionally, we suggest two hospital side data updation tools. These tools would ensure that hospitals can update the parameters which change quickly in the real world to their latest values so as to maintain the precision of the system. We test the website with test data and find that the website recommends hospitals with sufficient precision in the specified format. The model has been designed with the limited amount of data available in this field, but its performance and utility can be easily improved with better quality and more abundant data.
APA, Harvard, Vancouver, ISO, and other styles
17

Samad, Md Abdus, Feyisa Debo Diba, and Dong-You Choi. "Rain Attenuation Scaling in South Korea: Experimental Results and Artificial Neural Network." Electronics 10, no. 16 (August 22, 2021): 2030. http://dx.doi.org/10.3390/electronics10162030.

Full text
Abstract:
Scaling rain attenuation parameters will significantly benefit the quick monitoring of rain attenuation in a particular channel with previously known results or in situ setup attenuation measurements. Most of the rain attenuation scaling techniques have been derived for slant links. In this study, we also applied frequency and polarization scaling techniques for terrestrial link applications. We collected real measured datasets from research paper publications and examined those datasets using International Telecommunication Union-Radiocommunication sector (ITU-R) models (P.530-17, P.618-13). Our analyzed results show that existing long-term frequency and polarization scaling rain attenuation models (ITU-R P.618-13 for slant links and ITU-R P.530-17 for terrestrial links) show reduced performance for frequency and polarization scaling measured locations in South Korea. Hence, we proposed a new scaling technique using artificial neural networks from the measured rain attenuation data of slant and terrestrial links in South Korea. The experimental results confirm that the proposed Artificial Neural Network (ANN)-based scaling model shows satisfactory performance to predict attenuation for frequency and vertical polarization scaling.
APA, Harvard, Vancouver, ISO, and other styles
18

Adamuthe, Amol, and Abdulhameed Pathan. "Enhanced shuffled frog leaping algorithm with improved local exploration and energy-biased load reduction phase for load balancing of gateways in WSNs." Open Computer Science 11, no. 1 (January 1, 2021): 437–60. http://dx.doi.org/10.1515/comp-2020-0218.

Full text
Abstract:
Abstract Wireless sensor networks (WSNs) have grown widely due to their application in various domains, such as surveillance, healthcare, telecommunication, etc. In WSNs, there is a necessity to design energy-efficient algorithms for different purposes. Load balancing of gateways in cluster-based WSNs is necessary to maximize the lifetime of a network. Shuffled frog leaping algorithm (SFLA) is a popular heuristic algorithm that incorporates a deterministic approach. Performance of any heuristic algorithm depends on its exploration and exploitation capability. The main contribution of this article is an enhanced SFLA with improved local search capability. Three strategies are tested to enhance the local search capability of SFLA to improve the load balancing of gateways in WSNs. The first proposed approach is deterministic in which the participation of the global best solution in information exchange is increased. The next two variations reduces the deterministic approach in the local search component of SFLA by introducing probability-based selection of frogs for information exchange. All three strategies improved the success of local search. Second contribution of article is increased lifetime of gateways in WSNs with a novel energy-biased load reduction phase introduced after the information exchange step. The proposed algorithm is tested with 15 datasets of varying areas of deployment, number of sensors and number of gateways. Proposed ESFLA-RW variation shows significant improvement over other variations in terms of successful local explorations, best fitness values, average fitness values and convergence rate for all datasets. Obtained results of proposed ESFLA-RW are significantly better in terms of network energy consumption, load balancing, first gateway die and network life. The proposed variations are tested to check the effect of various algorithm-specific parameters namely frog population size, probability of information exchange and probability of energy-biased load reduction phase. Higher population size and probabilities give better solutions and convergence rate.
APA, Harvard, Vancouver, ISO, and other styles
19

Berkman, Liubov, Olga Tkachenko, Oleksandr Turovsky, Vaceslav Fokin, and Vitaliy Strelnikov. "Designing a system to synchronize the input signal in a telecommunication network under the condition for reducing a transitional component of the phase error." Eastern-European Journal of Enterprise Technologies 1, no. 9 (109) (February 27, 2021): 66–76. http://dx.doi.org/10.15587/1729-4061.2021.225514.

Full text
Abstract:
The quality of reception, as well as the processing and demodulation of the input signal in the telecommunication systems' networks, are closely related to the quality indicators in the functioning of one of the subsystems of these networks, namely a phase synchronization system. This work has directly considered the issues related to improving the performance and reducing the transitional component of the phase error generated by transition processes in the combined synchronization system. A mathematical model has been built that makes it possible to synthesize a disrupted link in the synchronization system of a telecommunication network meeting the condition for a decrease in the transitional component of the phase error. It is shown that a simple disrupted link, synthesized under the condition of suppressing a slow-fading transition component, makes it possible to shorten the time of the transition process in the system while maintaining the initial order of astatism. When a complex link is synthesized, the transition process becomes oscillatory. It was established that under the conditions of a phase jump or a frequency jump, it is possible to improve the dynamics of the system and reduce the transitional component of the phase error variance by making the parameters for the disrupted communication link influence the roots of the characteristic equation of the transition process. The features in synthesizing disrupted communication have been considered for the intervals of movement corresponding to areas with the positive and negative inclination of the phase discriminator's static characteristic. Such conditions have been devised that make it possible to determine the value and sign of the root in the characteristic equation of the transition process, which is introduced by the parameter of a disrupted communication link separately for areas of the stable and non-steady movement of the phase discriminator's static characteristic. The reported mathematical model of disrupted link synthesis has made it possible to derive reference results. They indicated that in order to suppress the slowly fading component of the phase error characteristic equation to "0", it is necessary to provide for a significant advantage, up to 10 times, of the roots introduced by the disrupted communication link over the roots of the specified component. By changing the value for a disrupted communication parameter, one can significantly, up to 5 times or larger, shorten the time of the transition process in the combined synchronization system at a simultaneous decrease of 18‒25 % in the initial value of the transition error
APA, Harvard, Vancouver, ISO, and other styles
20

Гаврилов, Дмитро Сергійович, Сергій Степанович Бучік, Юрій Михайлович Бабенко, Сергій Сергійович Шульгін, and Олександр Васильович Слободянюк. "Метод обробки вiдеодaних з можливістю їх захисту після квaнтувaння." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 2 (June 2, 2021): 64–77. http://dx.doi.org/10.32620/reks.2021.2.06.

Full text
Abstract:
The subject of research in the article is the video processing processes based on the JPEG platform for data transmission in the information and telecommunication network. The aim is to build a method for processing a video image with the possibility of protecting it at the quantization stage with subsequent arithmetic coding. That will allow, while preserving the structural and statistical regularity, to ensure the necessary level of accessibility, reliability, and confidentiality when transmitting video data. Task: research of known methods of selective video image processing with the subsequent formalization of the video image processing procedure at the quantization stage and statistical coding of significant blocks based on the JPEG platform. The methods used are an algorithm based on the JPEG platform, methods for selecting significant informative blocks, arithmetic coding. The following results were obtained. A method for processing a video image with the possibility of its protection at the stage of quantization with subsequent arithmetic coding has been developed. This method will allow, while preserving the structural and statistical regularity, to fulfill the set requirements for an accessible, reliable, and confidential transmission of video data. Ensuring the required level of availability is associated with a 30% reduction in the video image volume compared to the original volume. Simultaneously, the provision of the required level of confidence is confirmed by an estimate of the peak signal-to-noise ratio for an authorized user, which is dB. Ensuring the required level of confidentiality is confirmed by an estimate of the peak signal-to-noise ratio in case of unauthorized access, which is equal to dB. Conclusions. The scientific novelty of the results obtained is as follows: for the first time, two methods of processing video images at the quantization stage have been proposed. The proposed technologies fulfill the assigned tasks to ensure the required level of confidentiality at a given level of confidence. Simultaneously, the method of using encryption tables has a higher level of cryptographic stability than the method of using the key matrix. It is due to a a more complex mathematical apparatus. Which, in turn, increases the time for processing the tributes. To fulfill the requirement of data availability, it is proposed to use arithmetic coding for info-normative blocks, which should be more efficient compared with the methods of code tables. So, the method of using the scoring tables has greater cryptographic stability, and the method of using the matrix-key has higher performance. Simultaneously, the use of arithmetic coding will satisfy the need for accessibility by reducing the initial volume.
APA, Harvard, Vancouver, ISO, and other styles
21

Gaidamakin, N. А., N. I. Sinadsky, and P. V. Sushkov. "COMPLEX SIMULATION-STATISTICAL METHOD FOR SYNTHESIZING CONDITIONALLY REAL DATA ARRAYS BASED ON A STRUCTURAL-PARAMETRIC MODEL OF INTERACTION BETWEEN USERS OF INFORMATION AND TELECOMMUNICATION SERVICES." Journal of the Ural Federal District. Information security 20, no. 1 (2020): 12–23. http://dx.doi.org/10.14529/secur200102.

Full text
Abstract:
The article presents a solution to the problem of synthesizing training tasks and data arrays when organizing a computer training platform for conducting practical exercises to investigate information security incidents. Two main stages of the synthesis of the background and situa-tional components of the conditionally real data arrays based on the structural-parametric model of interaction between users of information and telecommunication services are pro-posed: the formation of static and dynamic components. 14КОМПЛЕС НЫЙИ. ТОАИЦ-МЛИМПЧ К ЕЛЙИДЗ-ВЕИЛЛИУ МЙОДО Р 1Ь35Х / 2020Вступление в силу Федерального закона «О безопасности критической информацион-ной инфраструктуры Российской Федера-ции» свидетельствует об актуальности и зна-чимости решения задачи по обнаружению, предупреждению и ликвидации последствий компьютерных атак и реагирования на ком-пьютерные инциденты. Условием качествен-ного решения данных задач является практи-ко-ориентированная профессиональная под-готовка соответствующих специалистов. Для организации и проведения практи-ческих занятий по расследованию инциден-тов информационной безопасности в сетях документальной электросвязи и сети Интер-нет как на потоках магистратуры по направ-лению «Информационная безопасность», так и на потоках специалитета «Информацион-ная безопасность телекоммуникационных систем» и «Информационно-аналитические системы безопасности» необходимо созда-ние учебного компьютерного полигона, осна-щенного современными образцами инфор-мационно-аналитических систем безопасно-сти (далее – ИАСБ), такими как IBM I21, МФИ СОФТ «Январь»2, Lampyre3, Gephi4 и др. ИАСБ – это аппаратно-программные ком-плексы для проведения поисково-аналитиче-ской работы, имеющие возможность нака-пливать и анализировать данные о взаимо-действии пользователей информационно-те-1 http://www.ibm.com/software/ products/ru/analysts-notebook2 http://www.mfisoft.ru/direction/sorm/sorm-3/3 http://www.lampyre.io4 http://www.gephi.orgлекоммуникационных сервисов (далее – ИТ-сервисов). Однако подключение учебных ИАСБ к действующему оборудованию опера-торов связи, являющемуся источником ин-формации о взаимодействии пользователей ИТ-сервисов, невозможно в соответствии со ст. 64 Федерального закона «О связи». Также отсутствует возможность применения насто-ящих массивов биллинговой информации в силу того, что такие массивы содержат персо-нальные данные пользователей, а доступ к ним ограничен законодательно. Обзор литературы позволяет сделать вы-вод об отсутствии готовых методов и алгорит-мов генерации массивов данных, отражающих взаимодействие пользователей ИТ-сервисов.Для решения данной проблемы при соз-дании учебного компьютерного полигона по расследованию инцидентов информацион-ной безопасности в учебно-научном центре «Информационная безопасность» ИРИТ-РтФ УрФУ им. первого Президента России Б.Н. Ельцина разработано программное обеспе-чение (далее – ПО). Данное ПО работает в со-ответствии с созданной структурно-параме-трической моделью взаимодействия пользо-вателей в ИТ-сервисах и позволяет синтези-ровать массивы условно-реальных данных. Файлы, содержащие сгенерированные мас-сивы, в дальнейшем загружаются в базу дан-ных ИАСБ для проведения практических за-нятий по решению поисково-аналитических задач. На текущем этапе разработки ПО спо-собно генерировать массивы условно-реаль-ных данных о взаимодействии пользователей социальных сетей и сетей мобильной связи.Static components are synthesized based on the method of forming the structure of social graphs using a composition of models for constructing complex networks with various struc-tural parameters: the Watts-Strogatz model is used for a mobile communication service, and the Barabashi-Albert model is used for a social network service. To preserve the relationship between users in various services, a method is proposed for determining the largest common part of social graphs, based on the mutual differentiation of vertices and the allocation of a partial isomorphism of the compared graphs. When generating vertex attributes, the method of searching for social groups (families) is used, based on the Bron-Kerbosch algorithm for find-ing a click of a given size in a graph.For the synthesis of dynamic components of data arrays that describe the performance of communication events, the mathematical apparatus of color Petri nets is used. An interaction event in information and telecommunication services is represented in the form of a Petri net label, which contains the necessary set of parameters, depending on the type of service. It is proposed to use the structural, event, social and temporal statistical characterist
APA, Harvard, Vancouver, ISO, and other styles
22

Wu, Chao, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, and Kenichi Tayama. "Intent-driven cloud resource design framework to meet cloud performance requirements and its application to a cloud-sensor system." Journal of Cloud Computing 10, no. 1 (June 2, 2021). http://dx.doi.org/10.1186/s13677-021-00242-w.

Full text
Abstract:
AbstractIn cloud service delivery, the cloud user is concerned about “what” function and performance the cloud service could provide, while the cloud provider is concerned about “how” to design proper underlying cloud resources to meet the cloud user’s requirements. We take the cloud user’s requirement as intent and aim to translate the intent autonomously into cloud resource decisions. In recent years, intent-driven management has been a widely spread management concept which aims to close the gap between the operator’s high-level requirements and the underlying infrastructure configuration complexity. Intent-driven management has drawn attention from telecommunication industries, standards organizations, the open source software community and academic research. There are various application of intent-driven management which are being studied and implemented, including intent-driven Software Defined Network (SDN), intent-driven wireless network configuration, etc. However, application of intent-driven management into the cloud domain, especially the translation of cloud performance-related intent into the amount of cloud resource, has not been addressed by existing studies. In this work, we have proposed an Intent-based Cloud Service Management (ICSM) framework, and focused on realizing the RDF (Resource Design Function) to translate cloud performance-related intent into concrete cloud computation resource amount settings that are able to meet the intended performance requirement. Furthermore, we have also proposed an intent breach prevention mechanism, P-mode, which is essential for commercial cloud service delivery. We have validated the proposals in a sensor-cloud system, designed to meet the user’s intent to process a large quantity of images collected by the sensors in a restricted time interval. The validation results show that the framework achieved 88.93 ~ 90.63% precision for performance inference, and exceeds the conventional resource approach in the aspects of human cost, time cost and design results. Furthermore, the intent breach prevention mechanism P-mode significantly reduced the breach risk, at the same time keeping a high level of precision.
APA, Harvard, Vancouver, ISO, and other styles
23

Trichias, Konstantinos, Panagiotis Demestichas, and Nikolaos Mitrou. "Inter-PLMN Mobility Management Challenges for Supporting Cross-Border Connected and Automated Mobility (CAM) Over 5G." Journal of ICT Standardization, June 8, 2021. http://dx.doi.org/10.13052/jicts2245-800x.924.

Full text
Abstract:
As the first 5G networks are being deployed across the world, new services enabled by the superior performance of 5G in terms of throughput, latency and reliability are emerging. Connected and Automated Mobility (CAM) services are perhaps among the most demanding applications that 5G networks will have to support and their deployment, performance and potential for improvement has been well investigated over the past few years. However, CAM operation in multi-operator environments and the inevitable inter-PLMN handover caused by the inherent mobility of CAM services have not been studied in length. Moreover, the multiple domains, multi-vendor components and inherent high mobility of the cross-border vehicular environment, introduce multiple challenges in terms of network management and dynamic slicing, making Zero-touch network and Service Management (ZSM) solutions an attractive alternative for these environments. The work presented in this study attempts to analyse the requirements for cross-border CAM operation for the five main CAM use cases selected by 3GPP, based on input from key European stakeholders (Network Operators, vendors, Automotive Manufacturers etc.). A detailed analysis and categorization into four categories of the main challenges for cross-border CAM service provisioning is performed, namely Telecommunication, Application, Security/Privacy and Regulatory issues, while potential solutions based on existing and upcoming technological enablers are discussed for each of them. The role of standardization and relevant regulatory and administrative bodies is analysed, leading to insights regarding the most promising future research directions in the field of cross-border CAM services.
APA, Harvard, Vancouver, ISO, and other styles
24

Chaudhari, Shilpa, Sumukh N. Aradhya, Sonia Benny Thomas, Sonali Pandey, and Rohit Prasanna Sai Durbha. "A Survey on Game Theory based Interference Mitigation in WBASN." International Journal of Sensors, Wireless Communications and Control 11 (January 20, 2021). http://dx.doi.org/10.2174/2210327911666210120120946.

Full text
Abstract:
A wireless body area network (WBAN) consists of several sensors implanted inside the body or placed on the body, that help in the continuous monitoring of health conditions such as heart rate. The sensor nodes transmit the data to a central controller which serves as a gateway to transmit this information to medical servers and then finally to the hospitals for medical attention. Due to multiple body area networks operating in the same frequency band, interinterference takes place. The WBAN’s working in a small sphere cause inter-interference resulting in packet-loss and performance degradation. Hence, interference is a complex and challenging problem. Interference mitigations are receiving immense attention from the research community, but are far from creating a complete solution. Usage of game theoretic approach to address the interference issues is very promising. This survey paper presents the comparative analysis of existing game theoretic solutions designed to mitigate interference. As per our knowledge, this is the first survey work based on usage of game theory approach for interference mitigation in WBANs.
APA, Harvard, Vancouver, ISO, and other styles
25

Ramachandran, Tayaallen, Mohammad Rashed Iqbal Faruque, Air Mohammad Siddiky, and Mohammad Tariqul Islam. "Reduction of 5G cellular network radiation in wireless mobile phone using an asymmetric square shaped passive metamaterial design." Scientific Reports 11, no. 1 (January 29, 2021). http://dx.doi.org/10.1038/s41598-021-82105-7.

Full text
Abstract:
AbstractThis study aims to demonstrate the feasibility of metamaterial application in absorption reduction of 5G electromagnetic (EM) energy in the human head tissue. In a general sense, the radio frequency (RF) energy that received by wireless mobile phone from the base station, will emit to surrounding when the devices are in active mode. Since the latest fifth generation technology standard for cellular networks is upon us, the emission of radiation from any wireless devices needs to be taken into consideration. This motivation helps to prepare this paper that focuses on construction of novel and compact square-shaped metamaterial (SM) design to reduce electromagnetic exposure to humans. The commercially available substrate material known as FR-4 with thickness of 1.6 mm was selected to place the metamaterial design on it. The electromagnetic properties and Specific Absorption Rate (SAR) analyses were carried out numerically by utilising high-performance 3D EM analysis, Computer Simulation Technology Studio (CST) software. Meanwhile, for the validation purpose, the metamaterial designs for both unit and array cells were fabricated to measure the electromagnetic properties of the material. From the numerical simulation, the introduced SM design manifested quadruple resonance frequencies in multi bands precisely at 1.246 (at L-band), 3.052, 3.794 (at S-band), and 4.858 (C-band) GHz. However, the comparison of numerically simulated and measured data reveals a slight difference between them where only the second resonance frequency was decreased by 0.009 GHz while other frequencies were increased by 0.002, 0.045, and 0.117 GHz in sequential order. Moreover, the SAR analysis recorded high values at 3.794 GHz with 61.16% and 70.33% for 1 g and 10 g of tissue volumes, respectively. Overall, our results demonstrate strong SAR reduction effects, and the proposed SM design may be considered a promising aspect in the telecommunication field.
APA, Harvard, Vancouver, ISO, and other styles
26

Zurada, Jozef, and Subhash Lonial. "Comparison Of The Performance Of Several Data Mining Methods For Bad Debt Recovery In The Healthcare Industry." Journal of Applied Business Research (JABR) 21, no. 2 (January 18, 2011). http://dx.doi.org/10.19030/jabr.v21i2.1488.

Full text
Abstract:
<p class="MsoNormal" style="text-align: justify; margin: 0in 0.6in 0pt 0.5in;"><span style="font-size: x-small;"><span style="font-family: Times New Roman;">The healthcare industry, specifically hospitals and clinical organizations, are often plagued by unpaid bills and collection agency fees. These unpaid bills contribute significantly to the rising cost of healthcare. Unlike financial institutions, health care providers typically do not collect financial information about their patients.<span style="mso-spacerun: yes;">&nbsp; </span>This lack of information makes it difficult to evaluate whether a particular patient-debtor is likely to pay his/her bill.<span style="mso-spacerun: yes;">&nbsp; </span>In recent years, the industry has started to apply data mining tools to reduce bad-debt balance. This paper compares the effectiveness of five such tools - neural networks, decision trees, logistic regression, memory-based reasoning, and the ensemble model in evaluating whether a debt is likely to be repaid. The data analysis and evaluation of the performance of the models are based on a fairly large unbalanced data sample provided by a healthcare company, in which cases with recovered bad debts are underrepresented. Computer simulation shows that the neural network, logistic regression, and the combined model produced the best classification accuracy. More thorough interpretation of the results is obtained by analyzing the lift and receiver operating characteristic charts. We used the models to score all &ldquo;unknown&rdquo; cases, which were not pursued by a company. The best model classified about 34.8% of these cases into &ldquo;good&rdquo; cases. To collect bad debts more effectively, we recommend that a company first deploy and use the models, before it refers unrecovered cases to a collection agency.<span style="mso-spacerun: yes;">&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></p>
APA, Harvard, Vancouver, ISO, and other styles
27

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text
Abstract:
Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile phones have produced new uses and new discourses (see Katz and Aakhus; Brown, Green, and Harper; and Plant). Contemporary soundscapes now feature not only voice calls in previously quiet public spaces such as buses or restaurants but also the aural irruptions of customised polyphonic ringtones identifying whose phone is ringing by the tune downloaded. The mobile phone plays an important role in contemporary visual and material culture as fashion item and status symbol. Most tragically one might point to the tableau of people in the twin towers of the World Trade Centre, or aboard a plane about to crash, calling their loved ones to say good-bye (Galvin). By contrast, one can look on at the bathos of Australian cricketer Shane Warne’s predilection for pressing his mobile phone into service to arrange wanted and unwanted assignations while on tour. In this article, I wish to consider another important and so far also under-theorised aspect of mobile phones: text. Of contemporary textual and semiotic systems, mobile text is only a recent addition. Yet it is already produces millions of inscriptions each day, and promises to be of far-reaching significance. Txt Txt msg ws an acidnt. no 1 expcted it. Whn the 1st txt msg ws sent, in 1993 by Nokia eng stdnt Riku Pihkonen, the telcom cpnies thought it ws nt important. SMS – Short Message Service – ws nt considrd a majr pt of GSM. Like mny teks, the *pwr* of txt — indeed, the *pwr* of the fon — wz discvrd by users. In the case of txt mssng, the usrs were the yng or poor in the W and E. (Agar 105) As Jon Agar suggests in Constant Touch, textual communication through mobile phone was an after-thought. Mobile phones use radio waves, operating on a cellular system. The first such mobile service went live in Chicago in December 1978, in Sweden in 1981, in January 1985 in the United Kingdom (Agar), and in the mid-1980s in Australia. Mobile cellular systems allowed efficient sharing of scarce spectrum, improvements in handsets and quality, drawing on advances in science and engineering. In the first instance, technology designers, manufacturers, and mobile phone companies had been preoccupied with transferring telephone capabilities and culture to the mobile phone platform. With the growth in data communications from the 1960s onwards, consideration had been given to data capabilities of mobile phone. One difficulty, however, had been the poor quality and slow transfer rates of data communications over mobile networks, especially with first-generation analogue and early second-generation digital mobile phones. As the internet was widely and wildly adopted in the early to mid-1990s, mobile phone proponents looked at mimicking internet and online data services possibilities on their hand-held devices. What could work on a computer screen, it was thought, could be reinvented in miniature for the mobile phone — and hence much money was invested into the wireless access protocol (or WAP), which spectacularly flopped. The future of mobiles as a material support for text culture was not to lie, at first at least, in aping the world-wide web for the phone. It came from an unexpected direction: cheap, simple letters, spelling out short messages with strange new ellipses. SMS was built into the European Global System for Mobile (GSM) standard as an insignificant, additional capability. A number of telecommunications manufacturers thought so little of the SMS as not to not design or even offer the equipment needed (the servers, for instance) for the distribution of the messages. The character sets were limited, the keyboards small, the typeface displays rudimentary, and there was no acknowledgement that messages were actually received by the recipient. Yet SMS was cheap, and it offered one-to-one, or one-to-many, text communications that could be read at leisure, or more often, immediately. SMS was avidly taken up by young people, forming a new culture of media use. Sending a text message offered a relatively cheap and affordable alternative to the still expensive timed calls of voice mobile. In its early beginnings, mobile text can be seen as a subcultural activity. The text culture featured compressed, cryptic messages, with users devising their own abbreviations and grammar. One of the reasons young people took to texting was a tactic of consolidating and shaping their own shared culture, in distinction from the general culture dominated by their parents and other adults. Mobile texting become involved in a wider reworking of youth culture, involving other new media forms and technologies, and cultural developments (Butcher and Thomas). Another subculture that also was in the vanguard of SMS was the Deaf ‘community’. Though the Alexander Graham Bell, celebrated as the inventor of the telephone, very much had his hearing-impaired wife in mind in devising a new form of communication, Deaf people have been systematically left off the telecommunications network since this time. Deaf people pioneered an earlier form of text communications based on the Baudot standard, used for telex communications. Known as teletypewriter (TTY), or telecommunications device for the Deaf (TDD) in the US, this technology allowed Deaf people to communicate with each other by connecting such devices to the phone network. The addition of a relay service (established in Australia in the mid-1990s after much government resistance) allows Deaf people to communicate with hearing people without TTYs (Goggin & Newell). Connecting TTYs to mobile phones have been a vexed issue, however, because the digital phone network in Australia does not allow compatibility. For this reason, and because of other features, Deaf people have become avid users of SMS (Harper). An especially favoured device in Europe has been the Nokia Communicator, with its hinged keyboard. The move from a ‘restricted’, ‘subcultural’ economy to a ‘general’ economy sees mobile texting become incorporated in the semiotic texture and prosaic practices of everyday life. Many users were already familiar with the new conventions already developed around electronic mail, with shorter, crisper messages sent and received — more conversation-like than other correspondence. Unlike phone calls, email is asynchronous. The sender can respond immediately, and the reply will be received with seconds. However, they can also choose to reply at their leisure. Similarly, for the adept user, SMS offers considerable advantages over voice communications, because it makes textual production mobile. Writing and reading can take place wherever a mobile phone can be turned on: in the street, on the train, in the club, in the lecture theatre, in bed. The body writes differently too. Writing with a pen takes a finger and thumb. Typing on a keyboard requires between two and ten fingers. The mobile phone uses the ‘fifth finger’ — the thumb. Always too early, and too late, to speculate on contemporary culture (Morris), it is worth analyzing the textuality of mobile text. Theorists of media, especially television, have insisted on understanding the specific textual modes of different cultural forms. We are familiar with this imperative, and other methods of making visible and decentring structures of text, and the institutions which animate and frame them (whether author or producer; reader or audience; the cultural expectations encoded in genre; the inscriptions in technology). In formal terms, mobile text can be described as involving elision, great compression, and open-endedness. Its channels of communication physically constrain the composition of a very long single text message. Imagine sending James Joyce’s Finnegan’s Wake in one text message. How long would it take to key in this exemplar of the disintegration of the cultural form of the novel? How long would it take to read? How would one navigate the text? Imagine sending the Courier-Mail or Financial Review newspaper over a series of text messages? The concept of the ‘news’, with all its cultural baggage, is being reconfigured by mobile text — more along the lines of the older technology of the telegraph, perhaps: a few words suffices to signify what is important. Mobile textuality, then, involves a radical fragmentation and unpredictable seriality of text lexia (Barthes). Sometimes a mobile text looks singular: saying ‘yes’ or ‘no’, or sending your name and ID number to obtain your high school or university results. Yet, like a telephone conversation, or any text perhaps, its structure is always predicated upon, and haunted by, the other. Its imagined reader always has a mobile phone too, little time, no fixed address (except that hailed by the network’s radio transmitter), and a finger poised to respond. Mobile text has structure and channels. Yet, like all text, our reading and writing of it reworks those fixities and makes destabilizes our ‘clear’ communication. After all, mobile textuality has a set of new pre-conditions and fragilities. It introduces new sorts of ‘noise’ to signal problems to annoy those theorists cleaving to the Shannon and Weaver linear model of communication; signals often drop out; there is a network confirmation (and message displayed) that text messages have been sent, but no system guarantee that they have been received. Our friend or service provider might text us back, but how do we know that they got our text message? Commodity We are familiar now with the pleasures of mobile text, the smile of alerting a friend to our arrival, celebrating good news, jilting a lover, making a threat, firing a worker, flirting and picking-up. Text culture has a new vector of mobility, invented by its users, but now coveted and commodified by businesses who did not see it coming in the first place. Nimble in its keystrokes, rich in expressivity and cultural invention, but relatively rudimentary in its technical characteristics, mobile text culture has finally registered in the boardrooms of communications companies. Not only is SMS the preferred medium of mobile phone users to keep in touch with each other, SMS has insinuated itself into previously separate communication industries arenas. In 2002-2003 SMS became firmly established in television broadcasting. Finally, interactive television had arrived after many years of prototyping and being heralded. The keenly awaited back-channel for television arrives courtesy not of cable or satellite television, nor an extra fixed-phone line. It’s the mobile phone, stupid! Big Brother was not only a watershed in reality television, but also in convergent media. Less obvious perhaps than supplementary viewing, or biographies, or chat on Big Brother websites around the world was the use of SMS for voting. SMS is now routinely used by mainstream television channels for viewer feedback, contest entry, and program information. As well as its widespread deployment in broadcasting, mobile text culture has been the language of prosaic, everyday transactions. Slipping into a café at Bronte Beach in Sydney, why not pay your parking meter via SMS? You’ll even receive a warning when your time is up. The mobile is becoming the ‘electronic purse’, with SMS providing its syntax and sentences. The belated ingenuity of those fascinated by the economics of mobile text has also coincided with a technological reworking of its possibilities, with new implications for its semiotic possibilities. Multimedia messaging (MMS) has now been deployed, on capable digital phones (an instance of what has been called 2.5 generation [G] digital phones) and third-generation networks. MMS allows images, video, and audio to be communicated. At one level, this sort of capability can be user-generated, as in the popularity of mobiles that take pictures and send these to other users. Television broadcasters are also interested in the capability to send video clips of favourite programs to viewers. Not content with the revenues raised from millions of standard-priced SMS, and now MMS transactions, commercial participants along the value chain are keenly awaiting the deployment of what is called ‘premium rate’ SMS and MMS services. These services will involve the delivery of desirable content via SMS and MMS, and be priced at a premium. Products and services are likely to include: one-to-one textchat; subscription services (content delivered on handset); multi-party text chat (such as chat rooms); adult entertainment services; multi-part messages (such as text communications plus downloads); download of video or ringtones. In August 2003, one text-chat service charged $4.40 for a pair of SMS. Pwr At the end of 2003, we have scarcely registered the textual practices and systems in mobile text, a culture that sprang up in the interstices of telecommunications. It may be urgent that we do think about the stakes here, as SMS is being extended and commodified. There are obvious and serious policy issues in premium rate SMS and MMS services, and questions concerning the political economy in which these are embedded. Yet there are cultural questions too, with intricate ramifications. How do we understand the effects of mobile textuality, rewriting the telephone book for this new cultural form (Ronell). What are the new genres emerging? And what are the implications for cultural practice and policy? Does it matter, for instance, that new MMS and 3rd generation mobile platforms are not being designed or offered with any-to-any capabilities in mind: allowing any user to upload and send multimedia communications to other any. True, as the example of SMS shows, the inventiveness of users is difficult to foresee and predict, and so new forms of mobile text may have all sorts of relationships with content and communication. However, there are worrying signs of these developing mobile circuits being programmed for narrow channels of retail purchase of cultural products rather than open-source, open-architecture, publicly usable nodes of connection. Works Cited Agar, Jon. Constant Touch: A Global History of the Mobile Phone. Cambridge: Icon, 2003. Barthes, Roland. S/Z. Trans. Richard Miller. New York: Hill & Wang, 1974. Brown, Barry, Green, Nicola, and Harper, Richard, eds. Wireless World: Social, Cultural, and Interactional Aspects of the Mobile Age. London: Springer Verlag, 2001. Butcher, Melissa, and Thomas, Mandy, eds. Ingenious: Emerging youth cultures in urban Australia. Melbourne: Pluto, 2003. Galvin, Michael. ‘September 11 and the Logistics of Communication.’ Continuum: Journal of Media and Cultural Studies 17.3 (2003): 303-13. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Digital in New Media. Lanham, MA: Rowman & Littlefield, 2003. Harper, Phil. ‘Networking the Deaf Nation.’ Australian Journal of Communication 30. 3 (2003), in press. International Telecommunications Union (ITU). ‘Mobile Cellular, subscribers per 100 people.’ World Telecommunication Indicators <http://www.itu.int/ITU-D/ict/statistics/> accessed 13 October 2003. Katz, James E., and Aakhus, Mark, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. Cambridge: Cambridge U P, 2002. Morris, Meaghan. Too Soon, Too Late: History in Popular Culture. Bloomington and Indianapolis: U of Indiana P, 1998. Plant, Sadie. On the Mobile: The Effects of Mobile Telephones on Social and Individual Life. < http://www.motorola.com/mot/documents/0,1028,296,00.pdf> accessed 5 October 2003. Ronell, Avital. The Telephone Book: Technology—schizophrenia—electric speech. Lincoln: U of Nebraska P, 1989. Citation reference for this article MLA Style Goggin, Gerard. "‘mobile text’" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/03-goggin.php>. APA Style Goggin, G. (2004, Jan 12). ‘mobile text’. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/03-goggin.php>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography