528 research outputs found
A new vision of software defined radio: from academic experimentation to industrial explotation
The broad objective of this study is to examine the role of Software Defined Radio in an industrial field. Basically examines the changes that have to be done to achieve moving this technology in a commercial domain. It is important to predict the impacts of the introduction of Software Defined Radio in the telecommunications industry because it is a real future that is coming.
The project starts with the evolution of mobile telecommunications systems through the history. Following this, Software Defined Radio is defined and its main features are commented such as its architecture. Moreover, it wants to predict the changes that the telecommunications industry will might suffer with the introduction of SDR and some future structural and organizational variations are suggested. Additionally, it is discussed the positive and negative aspects of the introduction of SDR in the commercial domain from different points of view and finally, the future SDR mobile phone is described with its possible hardware and software.Outgoin
Understanding and supporting large-scale requirements management
Large market-driven software companies face new challenges in requirements engineering and management that emerged due to their recent extensive growth. At the same time, the pressure generated by competitorsâ and usersâ expectations demands being more competitive, creative and flexible to more quickly respond to a rapidly changing market situation. In the pursuit of staying competitive in this context, new ideas on how to improve the current software engineering practice are requested to help maintaining the engineering efficiency while coping with growing size and complexity of requirements engineering processes and their products. This thesis focuses on understanding and supporting large-scale requirements management for developing software products to open markets. In particular, this thesis focuses on the following requirements management activities in the mentioned context, namely: scope management, variability management and requirements consolidation. The goals of the research effort in this thesis are to provide effective methods in supporting mentioned requirements management activities in a situation when the size of them and their complexity require large time and skills efforts. Based on empirical research, where both quantitative and qualitative approaches were utilized, this thesis reports on possible improvements for managing variability and presents visualization techniques to assist scope management for large-scale software product development contexts. Both reported ideas are empirically evaluated in case studies in a large-scale context. Additionally, the benefits of using linguistic methods for requirements consolidation are investigated in a replicated experimental study based on a relevant industry scenario
Recommended from our members
Business model requirements and challenges in the mobile telecommunication sector
The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization, and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak Business Models (BMs). Designing a BM for a mobile network operator is complex and requires multiple actors to balance different and often conflicting design requirements. Hence, there is a need to enhance operatorsâ ability in determining what constitutes the most viable business model to meet their strategic objectives within this turbulent environment. In this paper, the authors identify the main mobile BM dimensions along with their interdependencies and further analysis provides mobile network operators with insights to improve their business models in this new âboundary-lessâ landscape
The Case of Mobile Service Providers
Many companies in high technology fields engage with alliance partners to reduce risks, create synergies and learn. While the challenges of managing individual alliances are well documented, little is known on how to manage several R&D alliances simultaneously. Multiple alliance strategies can be observed in several companies engaged in the cross section of telecommunication and mobile technology where increased complexity magnifies managerial challenges. Drawing on modern portfolio theory, this paper offers a model for managing portfolios of R&D alliances. In particular, an analysis of a technology platform leader reveals how companies can reduce several types of risks associated with new technology and gain synergies by engaging in several alliances simultaneously
Strategic Switchbacks: Dynamic Commercialization Strategies for Technology Entrepreneurs
We present a synthetic framework in which a technology entrepreneur employs a dynamic commercialization strategy to overcome obstacles to the adoption of the firmâs ideal strategy. Whereas prior work portrays the choice of whether to license a new technology or to self-commercialize as a single, static decision, we suggest that when entrepreneurs encounter obstacles to their ideal strategy they can nevertheless achieve it by temporarily adopting a non-ideal strategy. We refer to the sequential implementation of commercialization strategies, in which the first strategy enables the second, as a switchbackâreminiscent of zigzag paths that enable passage up steep mountains. We analyze conditions under which switchbacks can be effective in enabling the entrepreneurâs ideal commercialization strategy given the attending costs, risks, and likely incumbent response
Recommended from our members
The design and engineering of innovative mobile data services: An ontological framework founded on business model thinking
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.This research investigates mobile service design and engineering in the mobile telecommunications industry. The mobile telecommunication business is shifting from one that was voice-centric to one that is almost all data-centric; thanks to recent rapid advances in Information and Communication Technologies (ICTs). The underlying reasons behind this shift can be traced back to two main issues that are interlinked. The first and major reason is that telecoms (telecommunication companies) are trying to generate new revenue streams based on data and information transmissions, given the saturation of the voice market. This is rational given the market opportunities in one direction and the pressures being generated by the current economic downturn from the other direction. The second reason relates to the flexibility of data, compared to voice. Indeed, the number of services that can be developed on the basis of data are much greater than those that can be developed on the basis of voice. However, the design and engineering of successful and innovative mobile data services has proven to be a complex undertaking. The number of effective mobile data services is relatively small and the revenue generated from such offerings has generally been below expectations. This research develops an ontological framework to help in changing this situation, and making mobile services engineering more effective and successful, following the design-science research paradigm.
Design-science research, in general, aims to solve unstructured but relevant organizational or social problems through the development of novel and useful artefacts. As the current research aims to help in solving the mobile data services engineering dilemma by developing a purposeful ontological framework, the design-science research paradigm is deemed fitting. Within this paradigm, the author develops a novel design approach specified for ontology engineering, termed âOntoEngâ. This design approach is used in this research for developing the ontological framework.
The developed ontological framework is founded on business model thinking. The idea is that creating innovative mobile data services requires developing innovative business models. Indeed, innovative business models can help translate technological potential into economic value and allow telecoms to achieve their strategic objectives. The ontological framework includes the development of an ontology, termed âV4 Mobile Service BM Ontologyâ as well as âMobile Key Value Driversâ for designing and engineering innovative mobile data services. The V4 Mobile Service BM Ontology incorporates four design dimensions: (1) value proposition including targeting; (2) value architecture including technological and organizational infrastructure; (3) value network dealing with aspects relating to partnerships and co-operations; and finally (4) value finance relating to costs, pricing, and revenue structures. Within these four dimensions, sixteen design concepts are identified along with their constituent elements. Relationships and interdependencies amongst the identified design constructs are established and clear semantics are produced. The research then derives six key value drivers for mobile service engineering as follows: (a) Market Alignment; (b) Cohesion; (c) Dynamicity; (d) Uniqueness; (e) Fitting Network-Mode; and (f) Explicitness.
The developed ontological framework in this research is evaluated to ensure that it can be successfully implemented and performs correctly in the real world. The research mainly utilizes case analysis methods to ensure the semantic correctness of the ontological framework. Indeed, the developed ontological framework is employed as an analytical lens to examine the design and engineering of three key real-life cases in the mobile telecommunications industry. These cases are: (1) Appleâs iPhone Services and Applications; (2) NTT DoCoMoâs i-mode Services; and (3) Orange Business Services. For further validation, the developed ontological framework is evaluated against a set of criteria synthesized from ontology engineering and evaluation literature. These criteria are: Clarity; Coherence; Conciseness; Preciseness; Completeness; and Customizability.
The developed ontological framework is argued to make significant contributions for theory, practice, and methodology. For theory, this research provides (1) a novel ontological framework for designing and engineering mobile data services; (2) a unified framework of the business model concept; and (3) a new design approach for ontology engineering in information systems. For practice, the current research provides practitioners in the telecommunications industry with systematic and customizable means to design, implement, analyze, evaluate, and change new and existing mobile data services to make them more manageable, effective, and creative. For methodology, the use of the design- science research paradigm for ontology engineering signifies the focal methodological contribution in this research given its novelty. This research also contributes to the understanding of the design-science research paradigm in information systems as it is relatively new. It provides a working example in which the author illustrates how recognizing design-science research as a paradigm is essential and useful to the research in information systems discipline
Advanced user authentification for mobile devices
Access to the full-text thesis is no longer available at the author's request, due to 3rd party copyright restrictions. Access removed on 28.11.2016 by CS (TIS).Metadata merged with duplicate record ( http://hdl.handle.net/10026.1/1101 - now deleted) on 20.12.2016 by CS (TIS).Recent years have witnessed widespread adoption of mobile devices. Whereas initial
popularity was driven by voice telephony services, capabilities are now broadening to
allow an increasing range of data orientated services. Such services serve to extend the
range of sensitive data accessible through such devices and will in turn increase the
requirement for reliable authentication of users.
This thesis considers the authentication requirements of mobile devices and proposes novel
mechanisms to improve upon the current state of the art. The investigation begins with an
examination of existing authentication techniques, and illustrates a wide range of
drawbacks. A survey of end-users reveals that current methods are frequently misused and
considered inconvenient, and that enhanced methods of security are consequently required.
To this end, biometric approaches are identified as a potential means of overcoming the
perceived constraints, offering an opportunity for security to be maintained beyond pointof-
entry, in a continuous and transparent fashion.
The research considers the applicability of different biometric approaches for mobile
device implementation, and identifies keystroke analysis as a technique that can offer
significant potential within mobile telephony. Experimental evaluations reveal the potential
of the technique when applied to a Personal Identification Number (PIN), telephone
number and text message, with best case equal error rates (EER) of 9%, 8% and 18%
respectively. In spite of the success of keystroke analysis for many users, the results
demonstrate the technique is not uniformly successful across the whole of a given
population. Further investigation suggests that the same will be true for other biometrics,
and therefore that no single authentication technique could be relied upon to account for all
the users in all interaction scenarios. As such, a novel authentication architecture is
specified, which is capable of utilising the particular hardware configurations and
computational capabilities of devices to provide a robust, modular and composite
authentication mechanism. The approach, known as IAMS (Intelligent Authentication
Management System), is capable of utilising a broad range of biometric and secret
knowledge based approaches to provide a continuous confidence measure in the identity of
the user. With a high confidence, users are given immediate access to sensitive services
and information, whereas with lower levels of confidence, restrictions can be placed upon
access to sensitive services, until subsequent reassurance of a user's identity.
The novel architecture is validated through a proof-of-concept prototype. A series of test
scenarios are used to illustrate how IAMS would behave, given authorised and impostor
authentication attempts. The results support the use of a composite authentication approach
to enable the non-intrusive authentication of users on mobile devices.Orange Personal Communication Services Ltd
Recommended from our members
Managing near field communication (NFC) payment applications through cloud computing
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The Near Field Communication (NFC) technology is a short-range radio communication channel which enables users to exchange data between devices. NFC provides a contactless technology for data transmission between smart phones, Personal Computers (PCs), Personal Digital Assistants (PDAs) and such devices. It enables the mobile phone to act as identification and a credit card for customers. However, the NFC chip can act as a reader as well as a card, and also be used to design symmetric protocols. Having several parties involved in NFC ecosystem and not having a common standard affects the security of this technology where all the parties are claiming to have access to clientâs information (e.g. bank account details).
The dynamic relationships of the parties in an NFC transaction process make them partners in a way that sometimes they share their access permissions on the applications that are running in the service environment. These parties can only access their part of involvement as they are not fully aware of each otherâs rights and access permissions. The lack of knowledge between involved parties makes the management and ownership of the NFC ecosystem very puzzling. To solve this issue, a security module that is called Secure Element (SE) is designed to be the base of the security for NFC. However, there are still some security issues with SE personalization, management, ownership and architecture that can be exploitable by attackers and delay the adaption of NFC payment technology. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compared to the use of SE as a single entity in an NFC enabled mobile phone. We believe cloud computing can solve many issues in regards to NFC application management. Therefore, in the first contribution of part of this thesis we propose a new payment model called âNFC Cloud Wallet". This model demonstrates a reliable structure of an NFC ecosystem which satisfies the requirements of an NFC payment during the development process in a systematic, manageable, and effective way
- âŠ