Abstract: In recent days, there is a change and the ongoing development of the telecommunications sector in the global market. In this sector, churn analysis techniques are commonly used for analysing why some customers terminate their service subscriptions prematurely. In addition, customer churn is utmost significant in this sector since it causes to important business loss. Many companies make various researches in order to prevent losses while increasing customer loyalty. Although a large quantity of accumulated data is available in this sector, their usefulness is limited by data quality and relevance. In this paper, a cost-sensitive feature selection framework is developed aiming to obtain the feature reducts to predict customer churn. The framework is a cost based optional pre-processing stage to remove redundant features for churn management. In addition, this cost-based feature selection algorithm is applied in a telecommunication company in Turkey and the results obtained with this algorithm.
Abstract: One of the leading problems in Cyber Security today
is the emergence of targeted attacks conducted by adversaries with
access to sophisticated tools. These attacks usually steal senior level
employee system privileges, in order to gain unauthorized access to
confidential knowledge and valuable intellectual property. Malware
used for initial compromise of the systems are sophisticated and
may target zero-day vulnerabilities. In this work we utilize common
behaviour of malware called ”beacon”, which implies that infected
hosts communicate to Command and Control servers at regular
intervals that have relatively small time variations. By analysing
such beacon activity through passive network monitoring, it is
possible to detect potential malware infections. So, we focus on
time gaps as indicators of possible C2 activity in targeted enterprise
networks. We represent DNS log files as a graph, whose vertices
are destination domains and edges are timestamps. Then by using
four periodicity detection algorithms for each pair of internal-external
communications, we check timestamp sequences to identify the
beacon activities. Finally, based on the graph structure, we infer the
existence of other infected hosts and malicious domains enrolled in
the attack activities.
Abstract: Integrated systems for product design, manufacturing, and lifecycle management are difficult to implement and customize. Commercial software vendors, including CAD/CAM and third party PDM/PLM developers, create user interfaces and functionality that allow their products to be applied across many industries. The result is that systems become overloaded with functionality, difficult to navigate, and use terminology that is unfamiliar to engineers and production personnel. For example, manufacturers of automotive, aeronautical, electronics, and household products use similar but distinct methods and processes. Furthermore, each company tends to have their own preferred tools and programs for controlling work and information flow and that connect design, planning, and manufacturing processes to business applications. This paper presents a methodology and a case study that addresses these issues and suggests that in the future more companies will develop personalized applications that fit to the natural way that their business operates. A functioning system has been implemented at a highly competitive U.S. aerospace tooling and component supplier that works with many prominent airline manufacturers around the world including The Boeing Company, Airbus, Embraer, and Bombardier Aerospace. During the last three years, the program has produced significant benefits such as the automatic creation and management of component and assembly designs (parametric models and drawings), the extensive use of lightweight 3D data, and changes to the way projects are executed from beginning to end. CATIA (CAD/CAE/CAM) and a variety of programs developed in C#, VB.Net, HTML, and SQL make up the current system. The web-based platform is facilitating collaborative work across multiple sites around the world and improving communications with customers and suppliers. This work demonstrates that the creative use of Application Programming Interface (API) utilities, libraries, and methods is a key to automating many time-consuming tasks and linking applications together.
Abstract: Quality Function Deployment (QFD) was developed in 1960 in Japan and introduced in 1983 in America and Europe. The paper presents a real application of this technique in a way that the method of applying QFD in design and production aero fuel pumps has been considered. While designing a product and in order to apply system engineering process, the first step is identification customer needs then its transition to engineering parameters. Since each change in deign after production process leads to extra human costs and also increase in products quality risk, QFD can make benefits in sale by meeting customer expectations. Since the needs identified as well, the use of QFD tool can lead to increase in communications and less deviation in design and production phases, finally it leads to produce the products with defined technical attributes.
Abstract: The recent tendency of ”Internet of Things” (IoT) has
developed in the last years, causing the emergence of innovative
communication methods among multiple devices. The appearance of
Bluetooth Low Energy (BLE) has allowed a push to IoT in relation
to smartphones. In this moment, a set of new applications related to
several topics like entertainment and advertisement has begun to be
developed but not much has been done till now to take advantage
of the potential that these technologies can offer on many business
areas and in everyday tasks. In the present work, the application of
BLE technology and smartphones is proposed on some business areas
related to the optimization of resource allocation in huge facilities
like airports. An indoor location system has been developed through
triangulation methods with the use of BLE beacons. The described
system can be used to locate all employees inside the building
in such a way that any task can be automatically assigned to a
group of employees. It should be noted that this system cannot
only be used to link needs with employees according to distances,
but it also takes into account other factors like occupation level or
category. In addition, it has been endowed with a security system
to manage business and personnel sensitive data. The efficiency of
communications is another essential characteristic that has been taken
into account in this work.
Abstract: Small cell backhaul solutions need to be cost-effective, scalable, and easy to install. This paper presents an overview of small cell backhaul technologies. Wireless solutions including TV white space, satellite, sub-6 GHz radio wave, microwave and mmWave with their backhaul characteristics are discussed. Recent research on issues like beamforming, backhaul architecture, precoding and large antenna arrays, and energy efficiency for dense small cell backhaul with mmWave communications is reviewed. Recent trials of 5G technologies are summarized.
Abstract: The aim of this research paper is to conceptualize, discuss, analyze and propose alternate design methodologies for futuristic Black Box for flight safety. The proposal also includes global networking concepts for real time surveillance and monitoring of flight performance parameters including GPS parameters. It is expected that this proposal will serve as a failsafe real time diagnostic tool for accident investigation and location of debris in real time. In this paper, an attempt is made to improve the existing methods of flight data recording techniques and improve upon design considerations for futuristic FDR to overcome the trauma of not able to locate the block box. Since modern day communications and information technologies with large bandwidth are available coupled with faster computer processing techniques, the attempt made in this paper to develop a failsafe recording technique is feasible. Further data fusion/data warehousing technologies are available for exploitation.
Abstract: A human’s hand localization is revised by using radar cross section (RCS) measurements with a minimum root mean square (RMS) error matching algorithm on a touchless keypad mock-up model. RCS and frequency transfer function measurements are carried out in an indoor environment on the frequency ranged from 3.0 to 11.0 GHz to cover federal communications commission (FCC) standards. The touchless keypad model is tested in two different distances between the hand and the keypad. The initial distance of 19.50 cm is identical to the heights of transmitting (Tx) and receiving (Rx) antennas, while the second distance is 29.50 cm from the keypad. Moreover, the effects of Rx angles relative to the hand of human factor are considered. The RCS input parameters are compared with power loss parameters at each frequency. From the results, the performance of the RCS input parameters with the second distance, 29.50 cm at 3 GHz is better than the others.
Abstract: Information security plays a major role in uplifting the standard of secured communications via global media. In this paper, we have suggested a technique of encryption followed by insertion before transmission. Here, we have implemented two different concepts to carry out the above-specified tasks. We have used a two-point crossover technique of the genetic algorithm to facilitate the encryption process. For each of the uniquely identified rows of pixels, different mathematical methodologies are applied for several conditions checking, in order to figure out all the parent pixels on which we perform the crossover operation. This is done by selecting two crossover points within the pixels thereby producing the newly encrypted child pixels, and hence the encrypted cover image. In the next lap, the first and second order derivative operators are evaluated to increase the security and robustness. The last lap further ensures reapplication of the crossover procedure to form the final stego-image. The complexity of this system as a whole is huge, thereby dissuading the third party interferences. Also, the embedding capacity is very high. Therefore, a larger amount of secret image information can be hidden. The imperceptible vision of the obtained stego-image clearly proves the proficiency of this approach.
Abstract: Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.
Abstract: Mining big data represents a big challenge nowadays. Many types of research are concerned with mining massive amounts of data and big data streams. Mining big data faces a lot of challenges including scalability, speed, heterogeneity, accuracy, provenance and privacy. In telecommunication industry, mining big data is like a mining for gold; it represents a big opportunity and maximizing the revenue streams in this industry. This paper discusses the characteristics of big data (volume, variety, velocity and veracity), data mining techniques and tools for handling very large data sets, mining big data in telecommunication and the benefits and opportunities gained from them.
Abstract: Device-to-device (D2D) communication is considered a
promising technique to provide wireless peer-to-peer communication
services. Due to increasing demand on mobile services, available
spectrum for radio frequency (RF) based communications becomes
scarce. Recently, visible light communications (VLC) has evolved
as a high speed wireless data transmission technology for indoor
environments with abundant available bandwidth. In this paper,
a novel VLC based D2D communication that provides wireless
peer-to-peer communication is proposed. Potential low operating
power devices for an efficient D2D communication over increasing
distance of separation between devices is analyzed. Optical repeaters
(OR) are also proposed to enhance the performance in an environment
where direct D2D communications yield degraded performance.
Simulation results show that VLC plays an important role in
providing efficient D2D communication up to a distance of 1 m
between devices. It is also found that the OR significantly improves
the coverage distance up to 3.5 m.
Abstract: The use of optical technologies in the
telecommunications has been increasing due to its ability to transmit
large amounts of data over long distances. However, as in all systems
of data transmission, optical communication channels suffer from
undesirable and non-deterministic effects, being essential to know the
same. Thus, this research allows the assessment of these effects, as
well as their characterization and beneficial uses of these effects.
Abstract: In this paper, approach to incoherent signal detection
in multi-element antenna array are researched and modeled. Two
types of useful signals with unknown wavefront were considered:
first one, deterministic (Barker code), and second one, random
(Gaussian distribution). The derivation of the sufficient statistics took
into account the linearity of the antenna array. The performance
characteristics and detecting curves are modeled and compared for
different useful signals parameters and for different number of
elements of the antenna array. Results of researches in case of some
additional conditions can be applied to a digital communications
systems.
Abstract: Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Abstract: This paper describes the design and implementation of
a hardware setup for online monitoring of 24 refrigerators inside
blood bank center using the microcontroller and CAN bus for
communications between each node. Due to the security of locations
in the blood bank hall and difficulty of monitoring of each
refrigerator separately, this work proposes a solution to monitor all
the blood bank refrigerators in one location. CAN-bus system is used
because it has many applications and advantages, especially for this
system due to easy in use, low cost, providing a reduction in wiring,
fast to repair and easily expanding the project without a problem.
Abstract: The aim of the study is to describe and analyze design
of mobile teaching for students collaborative learning in distance
higher education with a focus on mobile technologies as online
webinars (web-based seminars or conferencing) by using laptops,
smart phones, or tablets. These multimedia tools can provide face-toface
interactions, recorded flipped classroom videos and parallel chat
communications. The data collection consists of interviews with 22
students and observations of online face-to-face webinars, as well
two surveys. Theoretically, the study joins the research tradition of
Computer Supported Collaborative learning, CSCL, as well as
Computer Self-Efficacy, CSE concerned with individuals’ media and
information literacy. Important conclusions from the study
demonstrated mobile interactions increased student centered
learning. As the students were appreciating the working methods,
they became more engaged and motivated. The mobile technology
using among student also contributes to increased flexibility between
space and place, as well as media and information literacy.
Abstract: The customers use the best compromise criterion
between price and quality of service (QoS) to select or change
their Service Provider (SP). The SPs share the same market and
are competing to attract more customers to gain more profit. Due
to the divergence of SPs interests, we believe that this situation is a
non-cooperative game of price and QoS. The game converges to an
equilibrium position known Nash Equilibrium (NE). In this work, we
formulate a game theoretic framework for the dynamical behaviors
of SPs. We use Genetic Algorithms (GAs) to find the price and
QoS strategies that maximize the profit for each SP and illustrate
the corresponding strategy in NE. In order to quantify how this NE
point is performant, we perform a detailed analysis of the price of
anarchy induced by the NE solution. Finally, we provide an extensive
numerical study to point out the importance of considering price and
QoS as a joint decision parameter.
Abstract: Spectrum handover is a significant topic in the
cognitive radio networks to assure an efficient data transmission in
the cognitive radio user’s communications. This paper proposes a
comparison between three spectrum handover models: VIKOR, SAW
and MEW. Four evaluation metrics are used. These metrics are,
accumulative average of failed handover, accumulative average of
handover performed, accumulative average of transmission
bandwidth and, accumulative average of the transmission delay. As a difference with related work, the performance of the three
spectrum handover models was validated with captured data of
spectrum occupancy in experiments performed at the GSM frequency
band (824 MHz - 849 MHz). These data represent the actual behavior
of the licensed users for this wireless frequency band. The results of the comparison show that VIKOR Algorithm
provides a 15.8% performance improvement compared to SAW
Algorithm and, it is 12.1% better than the MEW Algorithm.
Abstract: New and more powerful communications technologies
continue to emerge at a rapid pace and their uses in education are
widespread and the impact remarkable in the developing societies.
This study investigates Mobile Collaboration Learning Technique
(MCLT) on learners’ outcome among students in tertiary institutions
of developing nations (a case of Nigeria students). It examines the
significance of retention achievement scores of students taught using
mobile collaboration and conventional method. The sample consisted
of 120 students using Stratified random sampling method. Five
research questions and hypotheses were formulated, and tested at
0.05 level of significance. A student achievement test (SAT) was
made of 40 items of multiple-choice objective type, developed and
validated for data collection by professionals. The SAT was
administered to students as pre-test and post-test. The data were
analyzed using t-test statistic to test the hypotheses. The result
indicated that students taught using MCLT performed significantly
better than their counterparts using the conventional method of
instruction. Also, there was no significant difference in the post-test
performance scores of male and female students taught using MCLT.
Based on the findings, the following submissions was made that:
Mobile collaboration system be encouraged in the institutions to
boost knowledge sharing among learners, workshop and training
should be organized to train teachers on the use of this technique,
schools and government should consistently align curriculum
standard to trends of technological dictates and formulate policies
and procedures towards responsible use of MCLT.