Journal articles on the topic 'Telecommunication systems Computer networks Telecommunication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Telecommunication systems Computer networks Telecommunication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yakymchuk, N. M., and A. I. Toroshanko. "METHODS OF IDENTIFICATION AND COMPREHENSIVE DIAGNOSIS OF TELECOMMUNICATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 69 (2020): 58–65. http://dx.doi.org/10.17721/2519-481x/2020/69-06.

Full text
Abstract:
The article formulates the main tasks of management of information networks and telecommunications services in terms of ensuring their reliable operation. The telecommunication network is considered as a complex system consisting of many components, each of which has its own characteristics of operation during operation. The main functions of the telecommunication network control system are determined: fault detection and network status diagnostics, network device administration, forecasting and elimination of congestion and other possible deviations in network functioning, ensuring coordinated interaction between different types of control systems for providing telecommunication services with specified quality. Methods of analysis and management of networks are essentially a kind of identification methods, i.e. the current assessment of the parameters and condition of complex technical systems. There is a close relationship between identification and diagnostic tasks. The methods for solving these problems largely depend on the class to which the identification object can be assigned. Computer and telecommunication networks belong to the class of distributed systems with delays in signal and control information. Methods of retrospective identification are used to analyze the state of such systems. The influence of delays of signal and control information on the efficiency of search and determination of places of failures, overloads and emergency modes in communication networks is investigated. The results of computer simulation are given. The approach based on regular control of parameters and condition of network nodes taking into account delays of receipt of information on parameters and a condition of a concrete network node and delays of the control information necessary for adjustment of parameters of a network node as control object has found further development.
APA, Harvard, Vancouver, ISO, and other styles
2

Adams, Dennis A., Mary C. Lacity, and James R. Mullins. "Telecommunication research in information systems." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 21, no. 2-3 (1991): 21–26. http://dx.doi.org/10.1145/109022.109026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Albert, Sylvie, and Rolland LeBrasseur. "Collaboration Challenges in Community Telecommunication Networks." International Journal of Technology and Human Interaction 3, no. 2 (2007): 13–33. http://dx.doi.org/10.4018/jthi.2007040102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leggieri, Valeria. "Multicast problems in telecommunication networks." 4OR 7, no. 1 (2008): 105–8. http://dx.doi.org/10.1007/s10288-008-0074-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Batenkov, Aleksandr, Kirill Batenkov, and Aleksandr Fokin. "Methods for Formation of Telecommunication Network States Sets for Different Measures of Connectivity." SPIIRAS Proceedings 19, no. 3 (2020): 644–73. http://dx.doi.org/10.15622/sp.2020.19.3.7.

Full text
Abstract:
Reliability, survivability, and stability analysis tasks are typical not only for telecommunications, but also for systems whose components are subject to one or more types of failures, such as transport, power, mechanical systems, integrated circuits, and even software. The logical approach involves the decomposition of the system into a number of small functional elements, and within telecommunications networks they are usually separate network devices (switches, routers, terminals, etc.), as well as communication lines between them (copper-core, fiber-optic, coaxial cables, wireless media, and other transmission media). Functional relationships also define logical relationships between the failures of individual elements and the failure of the network as a whole. The assumption is also used that device failures are relatively less likely than communication line failures, which implies using the assumption of absolute stability (reliability, survivability) of these devices. Model of a telecommunication network in the form of the generalized model of Erdos–Renyi is presented. In the context of the stability of the telecommunications network, the analyzed property is understood as the connectivity of the network in one form or another. Based on the concept of stochastic connectivity of a network, as the correspondence of a random graph of the connectivity property between a given set of vertices, three connectivity measures are traditionally distinguished: two-pole, multi-pole, and all-pole. The procedures for forming an arbitrary structure of sets of paths and trees for networks are presented, as well as their generalization of multipolar trees. It is noted that multipolar trees are the most common concept of relatively simple chains and spanning trees. Solving such problems will allow us to proceed to calculating the probability of connectivity of graphs for various connectivity measures.
APA, Harvard, Vancouver, ISO, and other styles
6

Obaidat, Mohammad S. "Telecommunication systems for the new millennium." International Journal of Communication Systems 12, no. 5-6 (1999): 321–24. http://dx.doi.org/10.1002/(sici)1099-1131(199909/12)12:5/6<321::aid-dac413>3.0.co;2-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shin, Dong Hee. "The development of community telecommunication infrastructure: An evaluation of rural telecommunications project." International Journal of Information Management 28, no. 4 (2008): 322–35. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khasanov, Doston, Khalimjon Khujamatov, Bayram Fayzullaev, and Ernazar Reypnazarov. "WSN-BASED MONITORING SYSTEMS FOR THE SOLAR POWER STATIONS OF THE TELECOMMUNICATION DEVICES." IIUM Engineering Journal 22, no. 2 (2021): 98–118. http://dx.doi.org/10.31436/iiumej.v22i2.1464.

Full text
Abstract:
Renewable energy sources are an increasingly popular way to generate electrical energy for telecommunications systems. The use and effectiveness of remote monitoring systems in such systems has led to growing interests relatively to it. As with any new technological systems, new problems have arisen in the use of renewable energy sources in telecommunications systems and the use of IoT-based remote monitoring systems in them. In particular, one of these problems is the decentralization of remote monitoring systems for renewable power plants of telecommunication systems. The paper details the stages of development and modelling of open-source centralized monitoring systems for solar power station of telecommunication systems. In this paper, a real-time remote monitoring system of solar power sources was modelled and investigated by wireless sensor networks of telecommunications devices. Proteus software environment was obtained for modelling. Before modelling the system, a system structure and a block diagram were developed, each of the elements that are part of the system is described. Software for the system was created. The developed structure and software were tested by modelling. The results of the modelling were presented in a virtual terminal, an oscillography, and a local web browser. ABSTRAK: Sumber tenaga boleh baharu semakin meningkat popular dalam menghasilkan tenaga elektrik bagi sistem telekomunikasi. Penggunaan dan keberkesanan sistem pemonitoran jarak jauh dalam jaringan ini telah membawa kepada peningkatan minat kepada tenaga boleh baharu. Walau bagaimanapun, melalui sistem teknologi baru ini, masalah baru timbul dalam penggunaan punca tenaga boleh baharu dalam sistem telekomunikasi dan penggunaan bersama sistem pemonitoran berdasarkan IoT. Khususnya dalam desentralisasi sistem pemonitoran jarak jauh bagi loji kuasa sistem telekomunikasi. Kajian ini merincikan peringkat pembinaan dan model sumber terbuka berpusat sistem pemonitoran bagi sistem janakuasa solar sistem telekomunikasi. Kajian ini turut memodelkan sistem pemonitoran jarak jauh secara langsung bagi sumber kuasa solar dan dikaji dengan rangkaian sensor tanpa jaringan bagi alatan telekomunikasi. Perisian Proteus telah dihasilkan bagi model ini. Sebelum model sistem dibina, struktur sistem dan gambar rajah blok dibina. Setiap unsur dalam sistem ini diperihalkan. Perisian bagi sistem ini turut dibina. Struktur yang dibina dan perisian ini diuji melalui model. Hasil dapatan model dibentangkan dalam pangkalan maya, oscilograf dan pelayar web tempatan.
APA, Harvard, Vancouver, ISO, and other styles
9

Douligeris, Christos, and Ravi Mazumdar. "Multilevel flow control in telecommunication networks." Journal of the Franklin Institute 331, no. 4 (1994): 417–33. http://dx.doi.org/10.1016/0016-0032(94)90006-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bouloutas, A. T., S. B. Calo, A. Finkel, and Irene Katzela. "Distributed fault identification in telecommunication networks." Journal of Network and Systems Management 3, no. 3 (1995): 295–312. http://dx.doi.org/10.1007/bf02138931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gell, M., and I. Adjali. "Markets in open telecommunication service systems." Telematics and Informatics 10, no. 2 (1993): 131–47. http://dx.doi.org/10.1016/0736-5853(93)90037-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Williams, James G., and Kai A. Olsen. "Developing a Telecommunication Operation Support Systems (OSS)." International Journal of Business Data Communications and Networking 4, no. 1 (2008): 30–51. http://dx.doi.org/10.4018/jbdcn.2008010103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

M. Zaki, Rana, and Hala Bahjat Abdul wahab. "4G Network Security Algorithms: Overview." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (2021): 127. http://dx.doi.org/10.3991/ijim.v15i16.24175.

Full text
Abstract:
&lt;p class="0abstractCxSpFirst"&gt;Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.&lt;/p&gt;&lt;p class="0abstractCxSpLast"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
14

Ben Ahmed, C., N. Boudriga, and M. S. Obaidat. "A methodology to optimize the design of telecommunication systems." Computer Communications 23, no. 10 (2000): 912–21. http://dx.doi.org/10.1016/s0140-3664(99)00215-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ильченко, Михаил Ефимович, Теодор Николаевич Нарытник, Владимир Ильич Присяжный, Сергей Владимирович Капштык та Сергей Анатольевич Матвиенко. "ИССЛЕДОВАНИЕ ПОДХОДОВ К ПОСТРОЕНИЮ ОРБИТАЛЬНОЙ ВЫЧИСЛИТЕЛЬНОЙ СЕТИ СПУТНИКОВОЙ СИСТЕМЫ ИНТЕРНЕТА ВЕЩЕЙ". Aerospace technic and technology, № 8 (31 серпня 2019): 138–51. http://dx.doi.org/10.32620/aktt.2019.8.21.

Full text
Abstract:
There are considered issues of building a Low-Earth-Orbit Satellite System designed to provide the Internet of Things services and adapted to the features of the services and systems of the Internet of Things. The considered system provides the creation of the necessary telecommunication infrastructure based on the Low-Earth-Orbit Broadband Access Satellite System and places Computational Facilities into the Low-Earth-Orbit for to ensure the processing of Internet of Things devices and systems information, and perform computations. The architecture of a “Distributed Satellite” was chosen to construct the telecommunications part of the Internets of Things Satellite System. The chosen architecture allows, on the one hand, to ensure the full functionality of complex telecommunication systems, and on the other hand, to use spacecraft of the form factor nano-satellite / cub-sat. The using of the cube-sat spacecraft for development of the satellite-based system allows to significantly reduce the cost of development of the system and the time of the system deploying. A promising direction in the development of the Internet of Things systems is the implementation of the concept of “Fog Computing” for processing Internet of Things information. To implement “Fog Computing”, it was proposed to include into the composition of each “Distributed Satellite” a separate Satellite-Computer and to build an Orbital Distributed Network based on Satellite-Computers. The issues of the inter-satellite connectivity are considered taking into account ensuring the connection between Satellites-Computers in the framework of the Orbital Distributed Computer Network using inter-satellite links between Distributed Satellites, the characteristics of the orbital construction of the Satellite System Constellation. It was proposed to create and deploy the Distributed Localized Database based on the Orbital Distributed Computer Network, for to ensure the continuous provision of Internet of Things services, taking into account the movement of spacecraft in the orbital plane and the rotation of the Earth. It was shown the direction of transmission of the operational part of a Localized Distributed Database. Proposals are made on the distribution of the excess computational load arising in certain regions of the satellite telecommunications system's service area, involving the resource of neighboring satellite computers in its orbital plane and neighboring orbital planes. An algorithm is proposed for moving the excess computational load to the polar and oceanic regions.
APA, Harvard, Vancouver, ISO, and other styles
16

REN, Hong, Yan ZHENG, and Ye-rong WU. "Clustering analysis of telecommunication customers." Journal of China Universities of Posts and Telecommunications 16, no. 2 (2009): 114–28. http://dx.doi.org/10.1016/s1005-8885(08)60214-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lopes, António M., and José A. Tenreiro Machado. "Symmetry in Complex Systems." Symmetry 12, no. 6 (2020): 982. http://dx.doi.org/10.3390/sym12060982.

Full text
Abstract:
Complex systems with symmetry arise in many fields, at various length scales, including financial markets, social, transportation, telecommunication and power grid networks, world and country economies, ecosystems, molecular dynamics, immunology, living organisms, computational systems, and celestial and continuum mechanics [...]
APA, Harvard, Vancouver, ISO, and other styles
18

Wintermantel, Jörg, Ingo Strauss, and Robert Vretska. "Generic fault isolation concept for telecommunication systems in access networks." International Journal of Communication Systems 10, no. 6 (1997): 253–67. http://dx.doi.org/10.1002/(sici)1099-1131(199711/12)10:6<253::aid-dac334>3.0.co;2-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Eugene Rhee, and Changjae Kim. "Electromagnetic Interference between Power/ Telecommunication Lines and Railway Systems." International Journal of Digital Content Technology and its Applications 7, no. 10 (2013): 163–70. http://dx.doi.org/10.4156/jdcta.vol7.issue10.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rodriguez-Hernandez, Miguel A., Zhuhan Jiang, Angel Gomez-Sacristan, and Vicent Pla. "Intelligent Municipal Heritage Management Service in a Smart City: Telecommunication Traffic Characterization and Quality of Service." Wireless Communications and Mobile Computing 2019 (February 7, 2019): 1–10. http://dx.doi.org/10.1155/2019/8412542.

Full text
Abstract:
The monitoring of cultural heritage is becoming common in cities to provide heritage preservation and prevent vandalism. Using sensors and video cameras for this task implies the need to transmit information. In this paper, the teletraffic that cameras and sensors generate is characterized and the transmissions’ influence on the municipal communications network is evaluated. Then, we propose models for telecommunication traffic sources in an intelligent municipal heritage management service inside a smart sustainable city. The sources were simulated in a smart city scenario to find the proper quality of service (QoS) parameters for the communication network, using Valencia City as background. Specific sensors for intelligent municipal heritage management were selected and four telecommunication traffic sources were modelled according to real-life requirements and sensors datasheet. Different simulations were performed to find the proper CIR (Committed Information Rate) and PIR (Peak Information Rate) values and to study the effects of limited bandwidth networks. Packet loss, throughput, delay, and jitter were used to evaluate the network’s performance. Consequently, the result was the selection of the minimum values for PIR and CIR that ensured QoS and thus optimized the traffic telecommunication costs associated with an intelligent municipal heritage management service.
APA, Harvard, Vancouver, ISO, and other styles
21

Burleigh, Scott C., Tomaso De Cola, Simone Morosi, Sara Jayousi, Ernestina Cianca, and Christian Fuchs. "From Connectivity to Advanced Internet Services: A Comprehensive Review of Small Satellites Communications and Networks." Wireless Communications and Mobile Computing 2019 (May 2, 2019): 1–17. http://dx.doi.org/10.1155/2019/6243505.

Full text
Abstract:
Recently, the availability of innovative and affordable COTS (Commercial Off-The-Shelf) technological solutions and the ever-improving results of microelectronics and microsystems technologies have enabled the design of ever smaller yet ever more powerful satellites. The emergence of very capable small satellites heralds an era of new opportunities in the commercial space market. Initially applied only to scientific missions, Earth observation and remote sensing, small satellites are now being deployed to support telecommunications services. This review paper examines the operational features of small satellites that contribute to their success. An overview of recent advances and development trends in the field of small satellites is provided, with a special focus on telecommunication aspects such as the use of higher frequency bands, optical communications, new protocols, and advanced architectures.
APA, Harvard, Vancouver, ISO, and other styles
22

Tyurin, M. V. "Expert appraisal of survivability of telecommunication systems and computer networks under incomplete information." Automation and Remote Control 73, no. 5 (2012): 916–22. http://dx.doi.org/10.1134/s0005117912050177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

MACHIHARA, F. "Mobile Telecommunication Systems and Generalized Erlang Loss Formula." IEICE Transactions on Communications E88-B, no. 1 (2005): 183–89. http://dx.doi.org/10.1093/ietcom/e88-b.1.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Fatemi, M., S. Salimi, and A. Salahi. "Anonymous roaming in universal mobile telecommunication system mobile networks." IET Information Security 4, no. 2 (2010): 93. http://dx.doi.org/10.1049/iet-ifs.2009.0154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Koizumi, Yasuyuki, Katsuichi Yotsumoto, Hirofumi Hayama, Shizuo Furubo, and Seiichi Muroyama. "Design of power systems for air conditioners used in telecommunication networks." Electronics and Communications in Japan (Part I: Communications) 76, no. 12 (1993): 1–13. http://dx.doi.org/10.1002/ecja.4410761201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Delli Priscoli, Francesco, and Jean-Pierre Thomesse. "Special Issue on Control Methods for Telecommunication Networks." Control Engineering Practice 11, no. 10 (2003): 1097–98. http://dx.doi.org/10.1016/s0967-0661(03)00117-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Sazonov, Konstantin, Maxim Tatarka, Andrey Tsyganov, and Vitaliy Bessolcev. "Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems." SPIIRAS Proceedings 19, no. 2 (2020): 446–74. http://dx.doi.org/10.15622/sp.2020.19.2.8.

Full text
Abstract:
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks.&#x0D; The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained.&#x0D; The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated.&#x0D; The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases.&#x0D; Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem.&#x0D; In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed.&#x0D; Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
APA, Harvard, Vancouver, ISO, and other styles
28

Machuca, Carmen Mas. "Telecommunication, Media and Internet Techno-Economics." NETNOMICS: Economic Research and Electronic Networking 18, no. 1 (2017): 1–2. http://dx.doi.org/10.1007/s11066-017-9115-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

PENCOLÉ, Y., M. O. CORDIER, and L. ROZÉ. "A DECENTRALIZED MODEL-BASED DIAGNOSTIC TOOL FOR COMPLEX SYSTEMS." International Journal on Artificial Intelligence Tools 11, no. 03 (2002): 327–46. http://dx.doi.org/10.1142/s0218213002000927.

Full text
Abstract:
We address the problem of diagnosing complex discrete-event systems such as telecommunication networks. Given a flow of observations from the system, the goal is to explain those observations by identifying and localizing possible faults. Several model-based diagnosis approaches deal with this problem but they need the computation of a global model which is not feasible for complex systems like telecommunication networks. Our contribution is the proposal of a decentralized approach which permits to carry out an on-line diagnosis without computing the global model. This paper describes the implementation of a tool based on this approach. Given a decentralized model of the system and a flow of observations, the program analyzes the flow and computes the diagnosis in a decentralized way. The impact of the merging strategy on the global efficiency is demonstrated and illustrated by experimental results on a real application.
APA, Harvard, Vancouver, ISO, and other styles
30

ALTMAN, EITAN, HISAO KAMEDA, and YOSHIHISA HOSOKAWA. "NASH EQUILIBRIA IN LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS." International Game Theory Review 04, no. 02 (2002): 91–100. http://dx.doi.org/10.1142/s0219198902000574.

Full text
Abstract:
The use of game theoretical techniques has been quite successful in describing routing in networks, both in road traffic applications as well as in telecommunication networks applications. We study in this paper a third area of applications of such games, which is load balancing in distributed computer systems. One of the most important questions that arise in all applications of routing games is the existence and uniqueness of equilibrium. Whereas the existence of Nash equilibrium is known for general models of networks under weak assumptions, uniqueness results are only known for very special applications, i.e., either for very special cost functions or for very special topologies. We establish in this paper the uniqueness of an equilibrium for routing games with topologies that model well distributed computer systems, under quite general assumptions on the costs.
APA, Harvard, Vancouver, ISO, and other styles
31

Omar, Driss Ait, Hamid Garmani, Mohamed El Amrani, Mohamed Baslam, and Mohamed Fakir. "Analyzing the Customers' Dynamic Confusion in Telecommunication Networks Share Game." International Journal of Business Data Communications and Networking 15, no. 2 (2019): 15–34. http://dx.doi.org/10.4018/ijbdcn.2019070102.

Full text
Abstract:
In this article, the authors have developed a simple oligopolistic model to formalize the interactions between service providers and end-users by considering that the rationality of customers varies over time. This article assessed the impact of the dynamics of consumer confusion on the competition and profitability of service providers who are considered rational and competitive with one another to maximize their respective gains in the face of a confused fraction of consumers while others are not confused. This article shows the existence and uniqueness of the Nash equilibrium. The authors used the best response dynamic algorithm for learning Nash equilibrium. We have shown that when the number of confused customers is large, the ISP interest this and they offer moderately high prices with low quality of service. On the other hand, over time, rationality increases, forcing the ISPs to change their strategies by offering better services so that their demand increases. We also add that when customer behavior changes quickly, the ISPs follow clearer strategies with customer satisfactory services.
APA, Harvard, Vancouver, ISO, and other styles
32

Ait Omar, Driss, Hamid Garmani, Mohamed El Amrani, Mohamed Baslam, and Mohamed Fakir. "A Customer Confusion Environment in Telecommunication Networks: Analysis and Policy Impact." International Journal of Cooperative Information Systems 28, no. 02 (2019): 1930002. http://dx.doi.org/10.1142/s021884301930002x.

Full text
Abstract:
In this paper, we have studied the impact of customer confusion on the decision-making strategies of Internet service providers (ISP) in the network and telecommunications market. This confusion may come from several factors, e.g. incomplete information on the offer, non-transparent advertising, the ability of the analysis, etc.; but that sure varies over time since yesterday’s customer is no longer today’s. In this work, we have developed a simple oligopolistic model, using non-cooperative game theory, to formalize the interactions between service providers and end-users by considering that the rationality of customers varies over time. We assessed the impact of the dynamics of consumer confusion on the competition and profitability of service providers who are considered rational and competitive with one another to maximize their respective gains in the face of a confused fraction of consumers while others are not confused. We have shown the existence and uniqueness of the Nash equilibrium. We used the best response dynamic algorithm for learning Nash equilibrium. On the one hand, we have shown that when the number of confused customers is large, the ISP is interested in that and they offer moderately high prices with low quality of service. On the other hand, over time, rationality increases, forcing the ISPs to change their strategies by offering better services so that their demand increases. We also add that when customer behavior changes quickly, the ISPs follow clearer strategies with customer satisfactory services.
APA, Harvard, Vancouver, ISO, and other styles
33

Krile, Srećko, Dragan Peraković, and Vladimir Remenar. "Possible Collision Avoidance with Off-line Route Selection." PROMET - Traffic&Transportation 21, no. 6 (2012): 403–11. http://dx.doi.org/10.7307/ptt.v21i6.257.

Full text
Abstract:
The paper describes the traffic flow problems in telecommunication networks based on the Internet protocol. The main aim of telecommunication network operator today is to offer an SLA (Service Level Agreement) contract to end users, with provided QoS (Quality of Service) for different classes of services. In order to achieve this, it is necessary to establish the routes between marginal network nodes meeting the network traffic requirements and optimizing the network performances free of simultaneous flows conflicts. In DiffServ/MPLS (Multi-Protocol Label Switching) networks traffic flows traverse the network simultaneously and there may come to collision of concurrent flows. They are distributed among LSPs (Labeled Switching Paths) related to service classes. In LSP creation the IGP (Interior Gateway Protocol) uses simple on-line routing algorithms based on the shortest path methodology. In highly loaded networks this becomes an insufficient technique. In this suggested approach LSP need not necessarily be the shortest path solution. It can be pre-computed much earlier, possibly during the SLA negotiation process. In that sense an effective algorithm for collision control is developed. It may find a longer but lightly loaded path, taking care of the collision possibility. It could be a very good solution for collision avoidance and for better load-balancing purpose where links are running close to capacity. The algorithm can be significantly improved through heuristic approach. Heuristic options are compared in test-examples and their application for collision control is explained. KEYWORDS: Telecommunication networks, collision avoidance, multi-constraint route selection, self-organizing systems, MPLS, QoS
APA, Harvard, Vancouver, ISO, and other styles
34

Adams, Dennis A., Mary C. Lacity, and James R. Mullins. "Telecommunication research in information systems: an investigation of the literature." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 22, no. 3 (1991): 35–40. http://dx.doi.org/10.1145/126743.126751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bouras, Christos, Konstantinos Antonis, Georgios Diles, Vasileios Kokkinos, and Leonidas Loukopoulos. "Economic Broadband Development through Infrastructure Sharing." International Journal of Business Data Communications and Networking 10, no. 4 (2014): 21–42. http://dx.doi.org/10.4018/ijbdcn.2014100102.

Full text
Abstract:
Broadband is a public utility with positive effects on competitiveness, employment and growth. Although evidence shows that broadband development is increasing, this increment is not homogeneous between urban and rural areas. The main factor is the high cost for deploying next generation networks in rural areas, and especially the cost linked to civil engineering works. In order to overcome the investment challenges arising in the context of broadband deployment, the European Commission made mandatory the sharing of existing telecommunication and non-telecommunication infrastructures and facilities. This manuscript proposes and presents a novel tool that enables the estimation of the expected savings from exploiting existing infrastructures when deploying a broadband network. This is followed by a number of general principles and recommendations that policy makers and national authorities could embrace to diminish deployment costs and promote broadband deployment.
APA, Harvard, Vancouver, ISO, and other styles
36

Allmagny, Sylvie, Seyhan Civanlar, and Arik N. Kashper. "Information model for capacity management in global telecommunication networks." Journal of Network and Systems Management 2, no. 1 (1994): 29–48. http://dx.doi.org/10.1007/bf02141603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zaluzec, Nestor J. "A hitchhiker’s guide to microscopy and microanalysis using telecommunications, e-mail, and the Internet." Proceedings, annual meeting, Electron Microscopy Society of America 52 (1994): 390–91. http://dx.doi.org/10.1017/s0424820100169687.

Full text
Abstract:
The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.
APA, Harvard, Vancouver, ISO, and other styles
38

Davoli, Franco, Mario Marchese, and Maurizio Mongelli. "A measurement-based adaptive control mechanism for pricing in telecommunication networks." Journal of Communications and Networks 12, no. 3 (2010): 253–65. http://dx.doi.org/10.1109/jcn.2010.6388454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Pliushch, Oleksandr, Viktor Vyshnivskyi, Volodymyr Tolubko, et al. "Performance Study of Spread Spectrum Systems with Hard Limiters." International Journal of Computer Network and Information Security 12, no. 5 (2020): 1–15. http://dx.doi.org/10.5815/ijcnis.2020.05.01.

Full text
Abstract:
Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied. It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter. Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range. Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.
APA, Harvard, Vancouver, ISO, and other styles
40

Kawata, Takehiro, Hiroshi Yamada, Makoto Horiguchi, and Hideyo Murakami. "Performance evaluation of telecommunication systems with forcible cutoff control scheme." Electronics and Communications in Japan (Part I: Communications) 83, no. 6 (2000): 78–87. http://dx.doi.org/10.1002/(sici)1520-6424(200006)83:6<78::aid-ecja8>3.0.co;2-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Erofeev, Evgeny, Vadim Arykov, Michael Stepanenko, Aleksei Voevodin, Aleksei Kogai, and Vladimir Kurikalov. "28 GHz Single-Chip Transmit RF Front-End MMIC for Multichannel 5G Wireless Communications." Symmetry 12, no. 7 (2020): 1167. http://dx.doi.org/10.3390/sym12071167.

Full text
Abstract:
Millimeter-wave wireless networks of the new fifth generation (5G) have become a primary focus in the development of the information and telecommunication industries. It is expected that 5G wireless networks will increase the data rates and reduce network latencies by an order of magnitude, which will create new telecommunication services for all sectors of the economy. New electronic components such as 28 GHz (27.5 to 28.35 GHz) single-chip transmit radio frequency (RF) front-end monolithic microwave integrated circuits (MMICs) will be required for the performance and power consumption of millimeter-wave (mm-wave) 5G communication systems. This component includes a 6-bit digital phase shifter, a driver amplifier and a power amplifier. The output power P3dB and power-added efficiency (PAE) are 29 dBm and 19.2% at 28 GHz. The phase shifter root-mean-square (RMS) phase and gain errors are 3° and 0.6 dB at 28 GHz. The chip dimensions are 4.35 × 4.40 mm.
APA, Harvard, Vancouver, ISO, and other styles
42

Mahey, P., A. Ouorou, L. LeBlanc, and J. Chifflet. "A new proximal decomposition algorithm for routing in telecommunication networks." Networks 31, no. 4 (1998): 227–38. http://dx.doi.org/10.1002/(sici)1097-0037(199807)31:4<227::aid-net3>3.0.co;2-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Boukerche, Azzedine, Kathia Regina Lemos Jucá, João Bosco Sobral, and Mirela Sechi Moretti Annoni Notare. "An artificial immune based intrusion detection model for computer and telecommunication systems." Parallel Computing 30, no. 5-6 (2004): 629–46. http://dx.doi.org/10.1016/j.parco.2003.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Bartolacci, Michael R., and S. David Wu. "A Virtual Clustering Approach for Routing Problems in Telecommunication Networks." INFORMS Journal on Computing 10, no. 1 (1998): 12–24. http://dx.doi.org/10.1287/ijoc.10.1.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

LeBlanc, Larry J., Jerome Chifflet, and Philippe Mahey. "Packet Routing in Telecommunication Networks with Path and Flow Restrictions." INFORMS Journal on Computing 11, no. 2 (1999): 188–97. http://dx.doi.org/10.1287/ijoc.11.2.188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Protsenko, M. V., and A. A. Havlovska. "APPLICATION FORENSIC TECHNIQUES DURING THE PRETRIAL INVESTIGATION OF CRIMINAL OFFENSES IN THE USE OF COMPUTERS (COMPUTER) SYSTEMS AND COMPUTER NETWORKS AND TELECOMMUNICATION NETWORKS." Herald of Zaporizhzhia National University. Jurisprudence, no. 1 (2021): 87–93. http://dx.doi.org/10.26661/2616-9444-2021-1-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Samad, Md Abdus, Md Razu Ahmed, and Syed Zahidur Rashid. "An overview of rain attenuation research in Bangladesh." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 902. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp902-909.

Full text
Abstract:
The demands of shifting to the operating frequency of wireless telecommunication systems at new higher frequency bands increase as day by day the necessity to transfer more data volume through wireless networks. Bangladesh has launched its first satel-lite, Bangabandhu-1, with 40 communication channels in the C and Ku frequency bands. Besides, a huge volume of terrestrial microwave backbone networks suffer from fading during rain across the country. Bangladesh experiences heavy rainfall in June-July-August. The rain has a remarkable impact on deteriorating the signal-to-noise ratio at the receiver end. To implement the 5G network, 2.6–60 GHz frequency bands are promising. However, the propagated waves in these bands are prone to fadedue to rain. Unfortunately, the rain attenuation model developed for other climatic conditions can not be used readily without customization. In this regard, to maintain quality telecommunication networks, proper rain attenuation model development is crucial. This work reviews rain attenuation research in Bangladesh, global research trends and the research scope to manage rain attenuation.
APA, Harvard, Vancouver, ISO, and other styles
48

Lee, Y., and J. M. Tien. "Strategic parameter-driven routing models for multidestination traffic in telecommunication networks." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 31, no. 5 (2001): 720–28. http://dx.doi.org/10.1109/3477.956033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Todd, Brody, and John Doucette. "A Novel Long Term Telecommunication Network Planning Framework." Journal of Network and Systems Management 25, no. 1 (2016): 47–82. http://dx.doi.org/10.1007/s10922-016-9382-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Saputra, Surya Hadi, Ari Endang Jayati, and Erlinasari Erlinasari. "RANCANG BANGUN ANTENA MIKROSTRIP PATCH CIRCULAR DENGAN TEKNIK LINIER ARRAY UNTUK FREKUENSI WIFI 2,4 GHZ." Elektrika 11, no. 1 (2019): 9. http://dx.doi.org/10.26623/elektrika.v11i1.1538.

Full text
Abstract:
&lt;p&gt;Microstrip antenna when the antenna is one of the very rapid development in telecommunications systems that applied to many modern telecommunication equipment today. One application is the wifi. Wifi (Wireless Fidelity) is a wellknown tech-nology that utilizes an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connection, to provide a network connection to all users in the surrounding area. The purpose of this final project is to design microstrip patch antenna built a circular linier array that can be used for signal wifi stronger. The resulting microstrip antenna working in 2.4 GHz band with the acquisition of gain =3.4301 dBi, VSWR = 1.3749 and radiation pattern unidirectional. This antenna design simulation using the software Ansoft High Frequency Structure Simulator v13. For linear circular microstrip patch antenna array then showed its parameters.&lt;br /&gt;Keywords: Microstrip Antenna, Wifi, Array, VSWR, Gain&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!