7,007 research outputs found

    Knowing Your Population: Privacy-Sensitive Mining of Massive Data

    Full text link
    Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications. Mining telecommunication traffic and transactions data for such purposes is controversial, in particular raising issues of privacy. However, our hypothesis is that privacy-sensitive uses are possible and often beneficial enough to warrant considerable research and development efforts. Our work contends that peoples behavior can yield patterns of both significant commercial, and research, value. For such purposes, methods and algorithms for mining telecommunication data to extract commonly used routes and locations, articulated through time-geographical constructs, are described in a case study within the area of transportation planning and analysis. From the outset, these were designed to balance the privacy of subscribers and the added value of mobility patterns derived from their mobile communication traffic and transactions data. Our work directly contrasts the current, commonly held notion that value can only be added to services by directly monitoring the behavior of individuals, such as in current attempts at location-based services. We position our work within relevant legal frameworks for privacy and data protection, and show that our methods comply with such requirements and also follow best-practice

    Potential Applications of IPsec in Next Generation Networks

    Get PDF

    Supervisor virtual machine for VoLTE service on a cloud environment

    Get PDF
    With the continuing growth of Voice of Long Term Evolution (VoLTE) networks, coupled with the need of Mobile Operators to reduce maintenance costs, Cloud Service deployment is becoming a common application. This study was designed to create a method capable of improving the Operations and Monitoring activities of a VoLTE service that is deployed on a Cloud platform. In this study, we present contents referring to the constituent elements of a VoLTE network, and we review in detail the features of the Telephony Application Server. For this study, TAS used was the Open TAS. Also included in this study is a generic explanation of Cloud Openstack’s behavior. The presented method implies the creation of a virtual machine Supervisor and its deployment in Cloud. This virtual machine is capable of establishing SSH connections with open TAS to extract the Clear Codes report, which identifies the state with which calls were terminated for analysis. The virtual machine contains defined limits, which check if they have been exceeded. If this a limit is excited, the virtual machine notifies the system operator of an incident. This study presents the possibilities of implementation in a Cloud environment, to improve and automate Operations and Maintenance functions in the Telecommunications network.Com o crescimento contínuo das redes de Voice over Long Term Evolution (VoLTE), juntamente com a necessidade de redução de custo de manutenção pelos Operadores Móveis, a implementação do Serviço em Cloud começa a ser uma aplicação comum. Este estudo foi elaborado com o intuito de criar um método capaz de melhorar as atividades de Operações e Monitorização de um serviço de VoLTE, que esteja implementado numa plataforma Cloud. Neste estudo, encontram-se presentes conteúdos referentes aos elementos constituintes de uma rede de VoLTE, e é revisto em detalhe as funcionalidades do Telephony Application Server. Para este estudo, o TAS utilizado foi o open TAS. Neste estudo, igualmente é incluído uma explicação genérica do comportamento da Cloud Openstack. O método apresentado implica criação de uma máquina virtual Supervisor e da sua implementação na Cloud. Esta máquina virtual é capaz de estabelecer ligações SSH com o open TAS, de modo a extrair o relatório de Clear Codes, que identifica o estado com que as chamadas foram finalizadas, para proceder a análises. A máquina virtual contém limites definidos, os quais verifica se foram excedidos. Caso este evento seja verificado, notificam o operador do sistema para um incidente. Esta é uma proposta que apresenta as possibilidades de implementação num ambiente de Cloud, em melhorar e automatizar as funções de Operações e Manutenção na rede de Telecomunicações

    Stay Tuned: Whether Cloud-Based Service Providers Can Have Their Copyrighted Cake and Eat It Too

    Get PDF
    Copyright owners have the exclusive right to perform their works publicly and the ability to license their work to others who want to share that right. Subsections 106(4) and (5) of the Copyright Act govern this exclusive public performance right, but neither subsection elaborates on what constitutes a performance made “to the public” versus one that remains private. This lack of clarity has made it difficult for courts to apply the Copyright Act consistently, especially in the face of changing technology. Companies like Aereo, Inc. and AereoKiller, Inc. developed novel ways to transmit content over the internet to be viewed instantly by their subscribers and declined to procure the licenses that would have been required if these transmissions were being made “to the public.” However, while these companies claimed that their activities were outside of the purview of § 106(4) and (5), their rivals, copyright owners, and the U.S. Supreme Court disagreed. Likening Aereo to a cable company for purposes of § 106(4) and (5), the Supreme Court determined that the company would need to pay for the material it streamed. Perhaps more problematic for Aereo (and other similar companies) is the fact that the Court declined to categorize Aereo as an actual cable company, such that it would qualify to pay compulsory licensing fees—the more affordable option given to cable companies under § 111—to copyright holders. This Comment shows that, while the Court correctly ruled that companies like Aereo and AereoKiller should pay for the content transmitted, its failure to address whether Aereo is a cable company could frustrate innovation to the detriment of the public. It suggests, therefore, that these companies should be required to pay for the content that they transmit in the same way that cable companies do until Congress develops another system

    The latest frontiers for financial inclusion: Using mobile phones to reach the unbanked

    Get PDF
    The goal of community development should be to improve the lives of as many disadvantaged people as possible with a minimum amount of resources. The field can achieve this goal by identifying those community development projects that are both efficient and have significant social impacts, and then scaling up. However, without effective evaluations, it is impossible to gauge progress. Effective evaluations include randomized experiments and well-designed observational studies, both of which can measure the impact to society. This article analyzes the best evaluation methods in international development, including examples of evaluation toolkits, with the aim of helping community development practitioners apply the methods to projects in the United States. The article also includes steps and recommendations to increase the quantity and quality of evaluations for community development projects.Unbanked

    Indoor Mobile Positioning Using Neural Networks and Fuzzy Logic Control

    Get PDF
    Indoor mobile navigation systems are becoming more prevalent in many areas (transport, public institutions, logistics, etc.). The interior navigation based on the access points, arranged according to the radio fingerprints, is becoming increasingly popular. The model of artificial neural networks (ANN) is often used as a mechanism for storing and processing radio fingerprints. The task of selection of the access point in WLAN network in the case of high user density is quite topical. Such selection must take into account not only the level of the signal received by the mobile device, but also a width in the dedicated channel bandwidth. The main issues related to the creation of program complex for the mobile indoors navigation using neural networks is discussed in the chapter as well as the method of access point selection based on analysis not only the signal level but also the other parameters. To solve this task, fuzzy logic is used
    corecore