3,471 research outputs found
Reconstruction of Pakistan Economyâ An Entrepreneurâs View Point
Investment, production and export are sine quo non of a viable economy. Pakistan has, however, constantly suffered from its inability to achieve this viabilityâ more recently arising out of the nuclear testing in May 1998, followed by the change of government in October 1999 and the 11th September 2001 disaster at the World Trade Centre in New York, which ultimately lead to the war in Afghanistan.
A cooperative cellular and broadcast conditional access system for Pay-TV systems
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.The lack of interoperability between Pay-TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay-TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay-TV systems. As a result, this paper presents the Mobile Conditional Access System (MICAS) as an end-to-end access control solution for Pay-TV systems. It incorporates the mobile and broadcasting systems and provides a platform whereby service providers can effectively interact with their customers, personalize their services and adopt appropriate security measurements. This would result in the decrease of operating expenses and increase of customers' satisfaction in the system. The paper provides an overview of state-of-the-art conditional access solutions followed by detailed description of design, reference model implementation and analysis of possible MICAS security architectures.Strategy & Technology (S&T) Lt
A comparative study on the functional response of Wolbachia-infected and uninfected forms of the parasitoid wasp Trichogramma brassicae
Trichogramma species (Hymenoptera: Trichogrammatidae) are haplo-diploid egg parasitoids that are frequently used as biological control agents against lepidopteran pests. These wasps display two reproductive modes, including arrhenotoky (bisexuality) and thelytoky (unisexuality). Thelytokous forms are often associated with the presence of endosymbiotic Wolbachia bacteria. The use of thelytokous wasps has long been considered as a way to enhance the efficacy of biological control. The present study investigates the potential of a thelytokous Wolbachiainfected and an arrhenotokous uninfected Trichogramma brassicae Bezdenko strain as inundative biocontrol agents by evaluating their functional response towards different egg densities of the factitious host, the Angoumois grain moth, Sitotroga cerealella (Olivier) (Lepidoptera: Gelechiidae). The results revealed a type II functional response for both strains in which parasitism efficiency decreases with host egg density because of an increasing host handling time. A model with an indicator variable was used to compare the parameters of Hollingâs disc equation in different data sets. It was demonstrated that the two strains did not differ in host attack rate. However, the Wolbachia-infected strain did have an increased host handling time when compared to the bisexual strain. Some applied aspects of the findings are discusse
A QoS monitoring system in a heterogeneous multi-domain DVB-H platform
The MobileTV, IPTV, and DVB standards (DVB-H/T) have been defined to offer mobile users interactive multimedia services with quality of service (QoS) consistency analogous to TV services. However, the market has yet to provide effective and economical solutions for the real-time delivery of such services to the corresponding transmitters over multi-domain IP networks. The monitoring system proposed in this paper enables the QoS in the IP networks involved in the delivery of real-time multimedia content to the transmitters to be ascertained. The system utilizes the QoS parameters defined in MPEG-2 Transport Streams to detect problems occurring in the heterogeneous multi-domain IP networks. The ability to detect problems having an adverse effect on QoS allows appropriate control actions to be determined to recover the QoS across the composite IP network. The design and implementation of the proposed QoS-Monitoring system (QoS-MS) is presented, followed by analysis of experimental results that demonstrate the feasibility of the system
Reconstruction of Pakistan Economyâ An Entrepreneurâs View Point
Investment, production and export are sine quo non of a viable
economy. Pakistan has, however, constantly suffered from its inability
to achieve this viabilityâ more recently arising out of the nuclear
testing in May 1998, followed by the change of government in October
1999 and the 11th September 2001 disaster at the World Trade Centre in
New York, which ultimately lead to the war in Afghanistan
Security architectures in mobile integrated pay-TV
This paper presents the design and describes the advantage of the state-of-the-art Mobile Integrated Conditional Access System (MICAS) concerning interoperability, personalisation, security and operational costs in Pay-TV systems. The Message Handling Subsystem is proposed and outlined together with âFollow-Meâ service, which proposed herewith to extend mobility and personalisation concepts on Pay-TV service
Mobile integrated conditional access system
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Follow-me service that enables subscribers to access their entitlements via an arbitrary set-top box
Transparency effect in the emergence of monopolies in social networks
Power law degree distribution was shown in many complex networks. However, in
most real systems, deviation from power-law behavior is observed in social and
economical networks and emergence of giant hubs is obvious in real network
structures far from the tail of power law. We propose a model based on the
information transparency (transparency means how much the information is
obvious to others). This model can explain power structure in societies with
non-transparency in information delivery. The emergence of ultra powerful nodes
is explained as a direct result of censorship. Based on these assumptions, we
define four distinct transparency regions: perfect non-transparent, low
transparent, perfect transparent and exaggerated regions. We observe the
emergence of some ultra powerful (very high degree) nodes in low transparent
networks, in accordance with the economical and social systems. We show that
the low transparent networks are more vulnerable to attacks and the
controllability of low transparent networks is harder than the others. Also,
the ultra powerful nodes in the low transparent networks have a smaller mean
length and higher clustering coefficients than the other regions.Comment: 14 Pages, 3 figure
- âŠ