366 research outputs found
Telecommunications Wireless Generations: Overview, Technological Differences, Evolutional Triggers, and the Future
This study expands on prior studies on wireless telecommunication generations by examining the technological differences and evolutional triggers that characterise each Generation (from 1G to 5G). Based on a systematic literature review approach, this study examines fifty (50) articles to enhance our understanding of wireless generation evolution. Specifically, this study analyses i) the triggers that necessitated the evolution of wireless telecommunication generations and ii) makes a case regarding why it is imperative to look beyond the fifth Generation (5G) network technologies. The authors propose areas for future research
Journal of Telecommunications in Higher Education
In This Issue
6 Meeting Bandwidth Challenges on Campus
12 Voice-over-LAN: A Solution for Convergence in the Enterprise
20 Going Beyond Best Effort IP Networking
25 The Politics of Convergence
32 Pursuing the Promise of the Paperless Office
38 New Visions for University Cellular Service
44 Maintaining Excellence at UM
Journal of Telecommunications in Higher Education
In This Issue
6 Meeting Bandwidth Challenges on Campus
12 Voice-over-LAN: A Solution for Convergence in the Enterprise
20 Going Beyond Best Effort IP Networking
25 The Politics of Convergence
32 Pursuing the Promise of the Paperless Office
38 New Visions for University Cellular Service
44 Maintaining Excellence at UM
Journal of Telecommunications in Higher Education
In this Issue
6 The Synergy of Network Convergence and the IP Infrastructure
12 Leveraging the IP Network at the University of Oregon
18 How the Internet Will Change Network Management
26 Voice Over IP: The Stakes Get Higher
30 Abilene: An Advanced Research Network
34 Web-Based Systems on the 21st-Century Campus
46 Bill D. Morris Award: Whitney Johnso
Extractive Summarization of Voicemail using Lexical and Prosodic Feature Subset Selection
This paper presents a novel data-driven approach to summarizing spoken audio transcripts utilizing lexical and prosodic features. The former are obtained from a speech recognizer and the latter are extracted automatically from speech waveforms. We employ a feature subset selection algorithm, based on ROC curves, which examines different combinations of features at different target operating conditions. The approach is evaluated on the IBM Voicemail corpus, demonstrating that it is possible and desirable to avoid complete commitment to a single best classifier or feature set
Automatic summarization of voicemail messages using lexical and prosodic features
This article presents trainable methods for extracting principal content words from voicemail messages. The short text summaries generated are suitable for mobile messaging applications. The system uses a set of classifiers to identify the summary words with each word described by a vector of lexical and prosodic features. We use an ROC-based algorithm, Parcel, to select input features (and classifiers). We have performed a series of objective and subjective evaluations using unseen data from two different speech recognition systems as well as human transcriptions of voicemail speech
Recommended from our members
A Comprehensive Survey of Voice over IP Security Research
We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify these papers according to an extended version of the VoIP Security Alliance (VoIPSA) Threat Taxonomy. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. We discuss the implications of our findings with respect to vulnerabilities reported in a variety of VoIP products. We identify two specific problem areas (denial of service, and service abuse) as requiring significant more attention from the research community. We also find that the overwhelming majority of the surveyed work takes a black box view of VoIP systems that avoids examining their internal structure and implementation. Such an approach may miss the mark in terms of addressing the main sources of vulnerabilities, i.e., implementation bugs and misconfigurations. Finally, we argue for further work on understanding cross-protocol and cross-mechanism vulnerabilities (emergent properties), which are the byproduct of a highly complex system-of-systems and an indication of the issues in future large-scale systems
Instant Crime Scene Reporting (ICSR)
Almost everyday the newspaper, magazines and televisions bombards us with the
heartbreaking news of increasing number of crimes committed all around the nation.
Often the policeofficers have difficulties in enforcing the lawdue to lackof evidence and
poor public cooperation especially involunteering to be a witness. The aim of the project
is to create a MMS application to be used by the general public to allow them to lodge
instant report on any crime scene that they have witnessed by providing a rough picture
of the scene or potential suspect in assistance towards the investigations. Civilians can
use MMS technology to send multimedia messages the police department reporting on
various incidents such as traffic violations, robberies, vandalism and so forth. The
proposed system is aimed to help the authorities to identify suspects, obtaining reliable
evidence which enables them to conduct an effective investigation on the alleged crime.
The research to be undertaken will involve delving into the nature of law enforcement in
Malaysia as well as the mobile phone technology in general and in depth research on the
MMS system and application development. The Rapid Application Development (RAD)
has been chosen as methodology to be applied during the development ofthe system
ACUTA Journal of Telecommunications in Higher Education
In This Issue
The Rollout That Will Never End
Unified Communications lmplementation: A People Problem?
UNC\u27s VolP Migration: Decommissioning a Legacy Switch
Mapping the Plumbing of Unified Communications
Technology Primer: Unified Communications
Higher Ed, Data Retention\u27 and Federal eDiscovery: The Case for Full e-Mail Archiving
Partnerships: Taking the Business Relationship to the Next Level
Interview
President\u27s Message
From the Executive Directo
Telecommunication Economics
This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics. Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed: - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
- …