10,257 research outputs found

    Adam Smith goes mobile : managing services beyond 3G with the digital marketplace

    Get PDF
    The next generation of mobile communications systems is expected to offer new business opportunities to existing and new market players. A market-based middleware framework has been recently proposed whereby service providers, independent of network operators, are able to tender online service contracts to network operators in a dynamic and competitive manner. This facilitates a seamless service provision over disparate networks in a consumer-centric manner. Service providers select network bearers according to the network operators' ability to meet the QoS target, which in turn is influenced, among other things, by user's price and quality requirements. The benefits of this proposal are the complementarity of numerous network resources, the decoupling of services and networks in a self-organising distributed environment, and increased competition to consumers’ advantag

    The corporate connection: financial reporting in a large religious/charitable organization in Australia

    Get PDF
    Nonprofit organizations operate in an increasingly corporatised, competitive environment. More and more, as institutions with charitable agenda, they need to promote an image that will enhance their ability to attract the funding they require in order to continue their operations. Competition for donations is becoming more intense and society is increasing its expectations about the level of accountability desirable from such organizations. One means by which nonprofit organizations can address this issue of accountability, and present themselves to the public as financially sound and worthy of receiving donations, is through their annual financial statements. As accounting practices have changed over time, it has been essential for religious/charitable and other nonprofit organizations to present a financial image in keeping with that which is valued and esteemed by society. They may have a “sacred” agenda, but in a changing environment where attitudes to religion and religious organizations have changed, where social problems abound and the need for their services is increasing, where philanthropy is rapidly becoming an industry, and government funding is increasingly tied to performance, nonprofit organizations have had to adopt “secular” accounting practices in order to survive. Borrowed from the corporate world, these accounting practices are in the process of being institutionalized into the nonprofit sector, as an aid to ensuring financial survival. This paper has as its focus one of two Australian divisions of an international religious/charitable organization. It was the subject of a twelve month study. The division relies heavily on the general public for donations, works hard to increase corporate sponsorship, and also depends on the government for funding. The organization has responded to society’s demands for more financial accountability by presenting financial statements based on accrual accounting and in conformity with generally accepted accounting principles. While the production of an image-enhancing report has been achieved, the cost has been substantial, not just financially, but in organizational, personnel and cultural terms. Given that world-wide, nonprofit organizations are operating in a similar environment, there will be many such organizations undergoing similar changes in their style of financial reporting. Based on this case, these transitions are likely also to be painful, but perceived as necessary, with the benefits being in terms of image rather than technical usefulness

    Anonymous network access using the digital marketplace

    Get PDF
    With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access

    An FPGA implementation of pattern-Selective pyramidal image fusion

    Get PDF
    The aim of image fusion is to combine multiple images (from one or more sensors) into a single composite image that retains all useful data without introducing artefacts. Pattern-selective techniques attempt to identify and extract whole features in the source images to use in the composite. These techniques usually rely on multiresolution image representations such as Gaussian pyramids, which are localised in both the spatial and spatial-frequency domains, since they enable identification of features at many scales simultaneously. This paper presents an FPGA implementation of pyramidal decomposition and subsequent fusion of dual video streams. This is the first reported instance of a hardware implementation of pattern-selective pyramidal image fusion. Use of FPGA technology has enabled a design that can fuse dual video streams (greyscale VGA, 30fps) in real-time, and provides approximately 100 times speedup over a 2.8GHz Pentium-

    Characteristics of WAP traffic

    Get PDF
    This paper considers the characteristics of Wireless Application Protocol (WAP) traffic. We start by constructing a WAP traffic model by analysing the behaviour of users accessing public WAP sites via a monitoring system. A wide range of different traffic scenarios were considered, but most of these scenarios resolve to one of two basic types. The paper then uses this traffic model to consider the effects of large quantities of WAP traffic on the core network. One traffic characteristic which is of particular interest in network dimensioning is the degree of self-similarity, so the paper looks at the characteristics of aggregated traffic with WAP, Web and packet speech components to estimate its self-similarity. The results indicate that, while WAP traffic alone does not exhibit a significant degree of self-similarity, a combined load from various traffic sources retains almost the same degree of self-similarity as the most self-similar individual source

    A resource management architecture for future mobile communications systems

    Get PDF
    This paper presents an overview of a hierarchical Resource Management architecture for future mobile communications systems. The architecture is designed to be generic and can therefore be adopted for a range of Radio Access Methodologies. In particular it provides a mechanism for radio resource management across airinterfaces such as those being defined for use with UMTS. Given the move towards packet-switched technologies both in the Core Network and the Radio Access Network [1], the architecture embraces the concept of statistical QoS applied to individual flows in the form of a commitment level. I

    A personal networking solution

    Get PDF
    This paper presents an overview of research being conducted on Personal Networking Solutions within the Mobile VCE Personal Distributed Environment Work Area. In particular it attempts to highlight areas of commonality with the MAGNET initiative. These areas include trust of foreign devices and service providers, dynamic real-time service negotiation to permit context-aware service delivery, an automated controller algorithm for wireless ad hoc networks, and routing protocols for ad hoc networking environments. Where possible references are provided to Mobile VCE publications to enable further reading

    Mobile distributed authentication protocol

    Get PDF
    Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues. This paper proposes a new protocol, GSM-secure network access protocol (G-SNAP). In G-SNAP, the authentication procedure and network access control is handled by a quorum of authentication centres. The advantages of the novel protocol include increased security, availability and distributed trust

    Management system requirements for wireless systems beyond 3G

    Get PDF
    This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints

    Securing personal distributed environments

    Get PDF
    The Personal Distributed Environment (PDE) is a new concept being developed by Mobile VCE allowing future mobile users flexible access to their information and services. Unlike traditional mobile communications, the PDE user no longer needs to establish his or her personal communication link solely through one subscribing network but rather a diversity of disparate devices and access technologies whenever and wherever he or she requires. Depending on the services’ availability and coverage in the location, the PDE communication configuration could be, for instance, via a mobile radio system and a wireless ad hoc network or a digital broadcast system and a fixed telephone network. This new form of communication configuration inherently imposes newer and higher security challenges relating to identity and authorising issues especially when the number of involved entities, accessible network nodes and service providers, builds up. These also include the issue of how the subscribed service and the user’s personal information can be securely and seamlessly handed over via multiple networks, all of which can be changing dynamically. Without such security, users and operators will not be prepared to trust their information to other networks
    corecore