115 research outputs found

    Volume II Acquisition Research Creating Synergy for Informed Change, Thursday 19th Annual Acquisition Research Proceedings

    Get PDF
    ProceedingsApproved for public release; distribution is unlimited

    5G Outlook – Innovations and Applications

    Get PDF
    5G Outlook - Innovations and Applications is a collection of the recent research and development in the area of the Fifth Generation Mobile Technology (5G), the future of wireless communications. Plenty of novel ideas and knowledge of the 5G are presented in this book as well as divers applications from health science to business modeling. The authors of different chapters contributed from various countries and organizations. The chapters have also been presented at the 5th IEEE 5G Summit held in Aalborg on July 1, 2016. The book starts with a comprehensive introduction on 5G and its need and requirement. Then millimeter waves as a promising spectrum to 5G technology is discussed. The book continues with the novel and inspiring ideas for the future wireless communication usage and network. Further, some technical issues in signal processing and network design for 5G are presented. Finally, the book ends up with different applications of 5G in distinct areas. Topics widely covered in this book are: • 5G technology from past to present to the future• Millimeter- waves and their characteristics• Signal processing and network design issues for 5G• Applications, business modeling and several novel ideas for the future of 5

    Staring down the lion: Uncertainty avoidance and operational risk culture in a tourism organisation

    Get PDF
    The academic literature is not clear about how uncertainty influences operational risk decision-making. This study, therefore, investigated operational risk-based decision-making in the face of uncertainty in a large African safari tourism organisation by exploring individual and perceived team member approaches to uncertainty. Convenience sampling was used to identify 15 managers across three African countries in three domains of work: safari camp; regional office; and head office. Semi-structured interviews were conducted in which vignettes were incorporated, to which participants responded with their own reactions and decisions to the situations described, as well as with ways they thought other managers would react to these specific operational contexts. The data were transcribed and qualitatively analysed through thematic coding processes. The findings indicated that approaches to uncertainty were influenced by factors including situational context, the availability and communication of information, the level of operational experience, and participants’ roles. Contextual factors alongside diverse individual emotional and cognitive influences were shown to require prudent consideration by safari tourism operators in understanding employee behavioural reactions to uncertain situations. A preliminary model drawn from the findings suggests that, in practice, decision-making in the face of uncertainty is more complex than existing theoretical studies propose. Specifically, the diverse responses anticipated by staff in response to the vignettes could guide safari tourism management towards better handling of risk under uncertainty in remote locations

    News Media Representations of Women in Conflicts: The Boko Haram Conflict in Borno State, North East Nigeria (2012-2015) - A Study of Guardian, Daily Trust, Daily Sun, Leadership, Nation, and Thisday Newspapers

    Get PDF
    This is a study of news media representations of women in the Boko Haram conflict in Borno state, North East Nigeria (2012-2015) with a focus on six Nigerian national newspapers - Guardian, Daily Trust, Daily Sun, Leadership, Nation, and Thisday. It draws on post-colonial theories like Orientalism and the Subaltern; feminism; and the news media to examine how the news media have represented women in this conflict. The study adopted a mixed method approach combining quantitative content analysis and qualitative thematic analysis. The quantitative analysis examined the manifest contents of the newspaper articles in the sample to find out the pattern of frames used by Nigerian journalists to represent women in the Boko Haram conflict while the qualitative analysis examined information generated from semistructured interviews; documentary data; and the translation of YouTube videos released by the Boko Haram sect. A total of 404 newspaper articles were selected, categorized, and examined using SPSS software. Findings suggest that patriarchal phrases and gender stereotypes permeate news media narratives about women affected by the conflict. This thesis therefore provides a better understanding of how Nigerian news media represent women affected by conflicts and factors that inform these representations. This work also provides a better insight into how the intersectionality of gender with other social structures like class, age, ethnicity, religion, patriarchal discrimination and other forms of oppression have permeated media representations of women in the conflict. Results similarly suggest that the Nigerian media over rely on foreign news media organizations as their major story sources about the conflict. Because of this overreliance, this thesis argues that foreign news media set the agenda for Nigerian news media in their representations of women. This study has contributed to a better understanding of how elite news media in the more developed global North set the news agenda for developing nations of the global South like Nigeria through inter-media agenda setting. 12 Findings also suggest that the Nigerian news media system reflects the social, political, religious, ethnic, and regional factors of the area within which it operates in line with the framework of regional parallelism. This study has contributed to a better understanding of how Nigeria’s North/South dichotomies based on these factors have affected the news media. This thesis concludes that as a product of regional parallelism, the Nigerian news media reflect the intersectionality of gender, social structures such as race, ethnic, religious, sexual orientation and patriarchal discrimination with other forms of oppression to disadvantage women in the Boko Haram conflict

    Analysis of the security mechanism in the IMS architecture

    Get PDF
    Orientador: Yuzo IanoDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de ComputaçãoResumo: Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integração completa das redes e serviços. O IMS define uma arquitetura completa e framework que habilita a convergência de voz, vídeo, dados e tecnologia de rede móvel através de uma infraestrutura baseada em IP, preenchendo a distância entre os dois paradigmas de comunicação mais bem sucedidos, celular e tecnologia IP. Este trabalho apresenta a arquitetura IMS como controle central de todas as redes, e uma arquitetura para o desenvolvimento de aplicações móveis que incorporem voz, vídeo e dados. A arquitetura IMS apesar de promissora apresenta inúmeras oportunidades de melhoria no seu mecanismo de segurança, muitas dessas oportunidades de melhoria estão relacionadas a falhas e até mesmo a falta de especificações de segurança quando a arquitetura foi originalmente implementada. Assim o maior desafio na implantação e globalização da arquitetura IMS são as falhas de segurança e a vulnerabilidade que a arquitetura possui a diversos tipos de ataques que podem atingir e prejudicar, tanto operadoras quanto usuários da rede. O objetivo deste projeto de pesquisa é apresentar uma análise detalhada sobre a estrutura da arquitetura IMS focando principalmente na arquitetura de segurança desenvolvida pela 3GPP, e assim prover análises e soluções para os ataques, vulnerabilidades e falhas de segurança que atingem a arquitetura tanto do ponto de vista de operadoras e provedores de serviço quanto na perspectiva do usuárioAbstract: Considering that to control and enable the delivery of diverse content and services to any type of access it should make necessary a core well-defined and structuralized, appeared the IMS (IP Multimedia Subsystem) in order to provide the complete integration of networks and services. IMS defines a complete architecture and framework that enables the convergence of voice, video, data and mobile network technology over an infrastructure based on IP, in addition to filling the gap between the two communications paradigms most successful, cellular and IP technology. This paper presents the IMS architecture as central control of all networks, and architecture for developing mobile applications that incorporate voice, video and data. The IMS architecture despite being promising presents numerous opportunities for improvement in its security mechanism, many of these opportunities for improvement are related to failures and even the lack of security specifications when creating the architecture. So the biggest challenge in the implementation of the IMS architecture and globalization are the security issues and vulnerabilities that the architecture faces being vulnerable to several types of attacks that can reach and affect carriers and network users. The objective of this research project is to present a detailed analysis on the structure of the IMS architecture focusing primarily on security architecture developed by 3GPP, and thus provide analysis and solutions about the attacks, vulnerabilities and security issues that affect the architecture from the point of view of carriers, service providers and from the network usersMestradoTelecomunicações e TelemáticaMestre em Engenharia Elétric

    LMR and LTE for Public Safety in 700 MHz Spectrum

    Get PDF
    This paper presents a concise overview of current public safety communication networks known as LMR (Land Mobile Radio) and emerging LTE-(Long-Term Evolution-) based broadband public safety networks to be deployed in the 700 MHz band. A broadband nationwide network for public safety based on LTE is inevitable where shared or dedicated types of LTE-based public safety networks are possible. Current LTE services do not meet mission-critical requirements and several enhancements have been defined by 3GPP to address this in Releases 12 and 13. First responders are familiar with LMR and consider it to be a reliable technology with massive deployment everywhere. Therefore, it is expected that LMR will continue to exist alongside any new LTE-based broadband public safety network. Recent LTE releases (particularly Release 15) addressed the LMR-LTE interoperability issue and described comprehensive interworking facilities. New and upcoming features and services of LTE in Releases 14 and 15, such as mission-critical data, mission-critical video, and aerial user equipments, are also directly applicable to public safety. The paper endeavours to provide a quick yet meaningful review of all these issues. It also offers a look ahead at the new and rapidly advancing virtualization technologies, such as software-defined radio access network, and radio access network slicing, as enablers for future public safety networks

    Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach

    Get PDF
    Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, which are text-based, client-server, request-response signaling protocols aimed at enabling multimedia sessions over IP networks. RTSP was conceived to set up streaming sessions from a Content / Streaming Server to a Streaming Client, while SIP was conceived to set up media (e.g.: voice, video, chat, file sharing, …) sessions among users. However, their scope has evolved and expanded over time to cover virtually any type of content and media session. As mobile networks progressively evolved towards an IP-only (All-IP) concept, particularly in 4G and 5G networks, 3GPP had to select IP-based signaling protocols for core mobile services, as opposed to traditional SS7-based protocols used in the circuit-switched domain in use in 2G and 3G networks. In that context, rather than reinventing the wheel, 3GPP decided to leverage Internet protocols and the work carried on by the IETF. Hence, it was not surprise that when 3GPP defined the so-called Packet-switched Streaming Service (PSS) for real-time continuous media delivery, it selected RTSP as its signaling protocol and, more importantly, SIP was eventually selected as the core signaling protocol for all multimedia core services in the mobile (All-)IP domain. This 3GPP decision to use off-the-shelf IETF-standardized signaling protocols has been a key cornerstone for the future of All-IP fixed / mobile networks convergence and Next Generation Networks (NGN) in general. In this context, the main goal of our work has been analyzing how such general purpose IP multimedia signaling protocols are deployed and behave over 3GPP mobile networks. Effectively, usage of IP protocols is key to enable cross-vendor interoperability. On the other hand, due to the specific nature of the mobile domain, there are scenarios where it might be possible to leverage some additional “context” to enhance the performance of such protocols in the particular case of mobile networks. With this idea in mind, the bulk of this thesis work has consisted on analyzing and optimizing the performance of SIP and RTSP multimedia signaling protocols and defining optimized deployment architectures, with particular focus on the 3GPP PSS and the 3GPP Mission Critical Push-to-Talk (MCPTT) service. This work was preceded by a detailed analysis work of the performance of underlying IP, UDP and TCP protocol performance over 3GPP networks, which provided the best baseline for the future work around IP multimedia signaling protocols. Our contributions include the proposal of new optimizations to enhance multimedia streaming session setup procedures, detailed analysis and optimizations of a SIP-based Presence service and, finally, the definition of new use cases and optimized deployment architectures for the 3GPP MCPTT service. All this work has been published in the form of one book, three papers published in JCR cited International Journals, 5 articles published in International Conferences, one paper published in a National Conference and one awarded patent. This thesis work provides a detailed description of all contributions plus a comprehensive overview of their context, the guiding principles beneath all contributions, their applicability to different network deployment technologies (from 2.5G to 5G), a detailed overview of the related OMA and 3GPP architectures, services and design principles. Last but not least, the potential evolution of this research work into the 5G domain is also outlined as well.Els mecanismes de Senyalització en xarxes de nova generació es fonamenten en protocols de senyalització definits per IETF. En particular, SIP i RTSP són dos protocols extensibles basats en missatges de text i paradigma petició-resposta. RTSP va ser concebut per a establir sessions de streaming de continguts, mentre SIP va ser creat inicialment per a facilitar l’establiment de sessions multimèdia (veu, vídeo, xat, compartició) entre usuaris. Tot i així, el seu àmbit d’aplicació s’ha anat expandint i evolucionant fins a cobrir virtualment qualsevol tipus de contingut i sessió multimèdia. A mesura que les xarxes mòbils han anat evolucionant cap a un paradigma “All-IP”, particularment en xarxes 4G i 5G, 3GPP va seleccionar els protocols i arquitectures destinats a gestionar la senyalització dels serveis mòbils presents i futurs. En un moment determinat 3GPP decideix que, a diferència dels sistemes 2G i 3G que fan servir protocols basats en SS7, els sistemes de nova generació farien servir protocols estandarditzats per IETF. Quan 3GPP va començar a estandarditzar el servei de Streaming sobre xarxes mòbils PSS (Packet-switched Streaming Service) va escollir el protocol RTSP com a mecanisme de senyalització. Encara més significatiu, el protocol SIP va ser escollit com a mecanisme de senyalització per a IMS (IP Multimedia Subsystem), l’arquitectura de nova generació que substituirà la xarxa telefònica tradicional i permetrà el desplegament de nous serveis multimèdia. La decisió per part de 3GPP de seleccionar protocols estàndards definits per IETF ha representat una fita cabdal per a la convergència del sistemes All-IP fixes i mòbils, i per al desenvolupament de xarxes NGN (Next Generation Networks) en general. En aquest context, el nostre objectiu inicial ha estat analitzar com aquests protocols de senyalització multimèdia, dissenyats per a xarxes IP genèriques, es comporten sobre xarxes mòbils 3GPP. Efectivament, l’ús de protocols IP és fonamental de cara a facilitar la interoperabilitat de solucions diferents. Per altra banda, hi ha escenaris a on és possible aprofitar informació de “context” addicional per a millorar el comportament d’aquests protocols en al cas particular de xarxes mòbils. El cos principal del treball de la tesi ha consistit en l’anàlisi i optimització del rendiment dels protocols de senyalització multimèdia SIP i RTSP, i la definició d’arquitectures de desplegament, amb èmfasi en els serveis 3GPP PSS i 3GPP Mission Critical Push-to-Talk (MCPTT). Aquest treball ha estat precedit per una feina d’anàlisi detallada del comportament dels protocols IP, TCP i UDP sobre xarxes 3GPP, que va proporcionar els fonaments adequats per a la posterior tasca d’anàlisi de protocols de senyalització sobre xarxes mòbils. Les contribucions inclouen la proposta de noves optimitzacions per a millorar els procediments d’establiment de sessions de streaming multimèdia, l’anàlisi detallat i optimització del servei de Presència basat en SIP i la definició de nous casos d’ús i exemples de desplegament d’arquitectures optimitzades per al servei 3GPP MCPTT. Aquestes contribucions ha quedat reflectides en un llibre, tres articles publicats en Revistes Internacionals amb índex JCR, 5 articles publicats en Conferències Internacionals, un article publicat en Congrés Nacional i l’adjudicació d’una patent. La tesi proporciona una descripció detallada de totes les contribucions, així com un exhaustiu repàs del seu context, dels principis fonamentals subjacents a totes les contribucions, la seva aplicabilitat a diferents tipus de desplegaments de xarxa (des de 2.5G a 5G), així una presentació detallada de les arquitectures associades definides per organismes com OMA o 3GPP. Finalment també es presenta l’evolució potencial de la tasca de recerca cap a sistemes 5G

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
    corecore