8,023 research outputs found

    Wi-Fi a simple and efficient way for offloading data traffic in mobile networks

    Get PDF
    Mobile data traffic is significantly increased year by year due to a number of factors including new smart devices, new applications such as M2M, the so-called “always-on” applications and services etc. In addition the recent studies tell us that the forecasts for mobile data traffic in near future will be tenfold higher, while the revenue for this market is expected to be increased only twofold. This trend raised a number of challenges for the mobile network operators (MNOs) in the world and in our region. Different technical and commercial solutions are discussed and developed and / or under developing. The first idea how to cope with high data traffic is to increase the network capacities. Even this is a direct traditional way as a technical solution it is too expensive and time consuming. Alternative ways to cope with data traffic in order to satisfy consumer demand and to keep key performance indicators are under developing. Some solutions in place are linked with traffic management tools such as data optimization, throttling, filtering, caching, video compression etc. In addition, new pricing policies and the adoption of the appropriate business models in new era of mobile data traffic are in the process. On top of the ways mentioned above or alternatively, Wi-Fi is considered as a simple way of data traffic off-load in mobile networks. In this article, we will identify the positive aspects of Wi-Fi offload versus other traffic management tools and draw some conclusions. We will give some recommendations how MNOs improve the situation for high data traffic through Wi-Fi offload solution, how Wi-Fi offload is related with other commercial aspects and quality of service in order to meet the customer satisfaction

    Evaluating Performance of Data Mining Classification Algorithms in Diagnosing for offloading data traffic in mobile networks

    Get PDF
    Mobile data traffic is significantly increased year by year due to a number of factors including new smart devices, new applications such as M2M, the so-called “always-on” applications and services etc. In addition the recent studies tell us that the forecasts for mobile data traffic in near future will be tenfold higher, while the revenue for this market is expected to be increased only twofold. This trend raised a number of challenges for the mobile network operators (MNOs) in the world and in our region. Different technical and commercial solutions are discussed and developed and / or under developing. The first idea how to cope with high data traffic is to increase the network capacities. Even this is a direct traditional way as a technical solution it is too expensive and time consuming. Alternative ways to cope with data traffic in order to satisfy consumer demand and to keep key performance indicators are under developing. Some solutions in place are linked with traffic management tools such as data optimization, throttling, filtering, caching, video compression etc. In addition, new pricing policies and the adoption of the appropriate business models in new era of mobile data traffic are in the process. On top of the ways mentioned above or alternatively, Wi-Fi is considered as a simple way of data traffic off-load in mobile networks. In this article, we will identify the positive aspects of Wi-Fi offload versus other traffic management tools and draw some conclusions. We will give some recommendations how MNOs improve the situation for high data traffic through Wi-Fi offload solution, how Wi-Fi offload is related with other commercial aspects and quality of service in order to meet the customer satisfaction

    Explaining the use and non-use of Smart Cities services in Johannesburg: residents' perspectives

    Get PDF
    A research dissertation submitted for the Degree of Master of Commerce (Information Systems) by ResearchOne of the aims of the development of Smart City initiatives is to provide electronic services that address residents’ information needs. Local governments in South Africa have realised that e-government can improve service delivery. There are currently government e-services that are designed to meet residents’ information needs and transform Johannesburg into a Smart City. However, local governments face the challenge of deficiencies in the use of government e-services. In order to ensure that all residents benefit from Smart City services there is a need to understand the use and non-use of these services. This research has been conducted in Johannesburg to understand what makes people use or not use the provided Smart City services. In this context, Smart City services refer to government e-service websites and government city Wi-Fi. The research was addressed from an interpretive perspective employing qualitative methods. The theoretical framework of government websites utilisation developed by Wang (2014) was used as a theoretical grounding. Data was Data was collected through in- depth semi -structured face-to -face interviews with open-ended questions. Twelve interviews were concluded. The results confirm Wang's (2014) theoretical framework in that all the major concepts: value, user needs, effectiveness of government websites, and alternative information sources were reflected as influencing the use and non-use of Smart City services. In addition the results extend Wang's (2014) framework with additional important core concepts: awareness, access, and trust. These concepts are particularly important to residents' participation in a developing country context and can be used to create a deeper understanding of how different types of residents engage or don't engage with Smart City services. In the pursuit of Smart Cities, local governments can use the results of the study to establish measures that can increase the use of free Wi-Fi around the city and government websites. A paper from this research report has been peer reviewed and was accepted for the Community Informatics Research Network (CIRN) conference which was held at Monash University in Italy, Prato. The title of the paper is: Explaining the Use and Non-Use of Smart Cities Services in Johannesburg: Residents’ Perspectives. On the 9th, 10th, and 11th November 2015, I attended the CIRN conference in Italy and presented the paper. The paper will be part of the conference proceedings.MT201

    Municipal Broadband: History's Guide

    Get PDF

    Ubiquitous Computing for Remote Cardiac Patient Monitoring: A Survey

    Get PDF
    New wireless technologies, such as wireless LAN and sensor networks, for telecardiology purposes give new possibilities for monitoring vital parameters with wearable biomedical sensors, and give patients the freedom to be mobile and still be under continuous monitoring and thereby better quality of patient care. This paper will detail the architecture and quality-of-service (QoS) characteristics in integrated wireless telecardiology platforms. It will also discuss the current promising hardware/software platforms for wireless cardiac monitoring. The design methodology and challenges are provided for realistic implementation

    Contributory Negligence, Technology, and Trade Secrets

    Get PDF
    In tort law, the doctrine of contributory negligence captures conduct by the plaintiff that falls below the standard to which he should conform for his own protection. Whether one has been contributorily negligent is determined by an objective standard of reasonableness under the circumstances. This Article, for the first time, applies contributory negligence principles to trade secret law. It draws upon this doctrine to frame and analyze a challenge posed by modem technology. The very technological tools in use today that increase the efficiency with which companies do business also create challenges for trade secret protection. What might have been a reasonable precaution ten years ago to protect a trade secret is not necessarily reasonable today in light of the changed circumstances created by technology. These changes increase the risk of trade secret misappropriation, and trade secret owners must be mindful to have adequate security measures, both technical and process-based, to deal with these enhanced risks

    The Guardian, March 5, 2008

    Get PDF
    Twenty page issue of The Guardian, the official student-run newspaper for Wright State University. The Guardian has been published regularly since March of 1965.https://corescholar.libraries.wright.edu/guardian/2656/thumbnail.jp
    corecore