Analysis of Traffic Relations Based on Mobile Operator Data

2021 ◽  
pp. 414-423
Author(s):  
Marek Drliciak ◽  
Jan Celko
Keyword(s):  
Author(s):  
Md.Taz Uddin, Ahmed al Marzean, Md Rafiqul Islam, Shahjahan Ahmed

There are different communication standards in present mobile communication industry. Each of this standards has its own feature, architecture, and channel assignment strategies. Each mobile operator uses one of any standard and their aim is to support as much user as possible to communicate with tolerable interference. For that reason they use different cluster size and frequency planning to cover entire geographical area. To reuse the given bandwidth within the entire geographical area some cells uses same sets of frequency and interference arise when the distance between these cells is small. Also when distance is large then capacity is going low. In this thesis our work is to investigation the co channel interference among different cluster size assuming a limited sub urban geographical area in a cellular GSM network. Also we calculate the number of users using each of this cluster size and finally design a cellular system in this geographical area using best results (minimum interference and maximum capacity).


Author(s):  
Arda Batuhan Demir ◽  
Onur Tengirsek ◽  
Aysun Guran ◽  
Mustafa Zahid Gurbuz ◽  
Bilgisayar Muhendisligi Bolumu

Author(s):  
Xu Xia ◽  
Zhenqiang Sun ◽  
Huiling Zhao ◽  
Fan Shi ◽  
Congjie Mao ◽  
...  

2020 ◽  
Vol 9 (1) ◽  
pp. 1-16
Author(s):  
Tommy Setiawan Ruslim ◽  
Henryanto Wijaya ◽  
Halim Putera Siswanto ◽  
Hadi Cahyadi

The need for cell phone use can be said to be a necessity that cannot be avoided anymore in this day and age, both its use in communicating in business needs, personal needs to social relations with others. The importance of maintaining customer loyalty is very significant to the survival of a company, to maintain customer loyalty many variables that can influence it. This study examines the effect of service quality, customer satisfaction, perceived switching cost on customer loyalty of "X" mobile operator users at a university in West Jakarta. In this research, it was founded that was a positive and significant effect service quality, customer satisfaction, perceived switching cost on customer loyalty of "X" mobile operator users at a university in West Jakarta.


NFC enabled mobile phones are equipped with SE combined with NFC infrastructure like readers and POS terminals. The actors in the NFC infrastructure are the pre requisites but not sufficient for the use of NFC payments. There has to be a secure way to download, install, personalize, upgrade and delete an application in SE without the need to go to the service provider or mobile operator stores. TSM solution provide means of managing the NFC service life cycle OTA by using built upon and emphasizes the role an importance in NFC ecosystem. Mobile device needs to have a trusted Execution environment a place where sensitive data can be stored in secure fashion. It is a piece of hardware called as SE.


2009 ◽  
pp. 1135-1142
Author(s):  
Victor I. Khashchanskiy ◽  
Andrei L. Kustov

One of the applications of m-commerce is mobile authorization, that is, rights distribution to mobile users by sending authorization data (a token) to the mobile devices. For example, a supermarket can distribute personalized discount coupon tokens to its customers via SMS. The token can be a symbol string that the customers will present while paying for the goods at the cash desk. The example can be elaborated further—using location information from the mobile operator, the coupons can only be sent to, for example, those customers who are in close vicinity of the mall on Saturday (this will of course require customers to allow disclosing their location). In the example above, the token is used through its manual presentation. However, most interesting is the case when the service is released automatically, without a need for a human operator validating the token and releasing a service to the customer; for example, a vending machine at the automatic gas station must work automatically to be commercially viable. To succeed, this approach requires a convenient and uniform way of delivering authorization information to the point of service—it is obvious that an average user will only have enough patience for very simple operations. And this presents a problem. There are basically only three available local (i.e., short-range) wireless interfaces (LWI): WLAN, IR, and Bluetooth, which do not cover the whole range of mobile devices. WLAN has not gained popularity yet, while IR is gradually disappearing. Bluetooth is the most frequently used of them, but still it is not available in all phones. For every particular device it is possible to send a token out using some combination of LWI and presentation technology, but there is no common and easy-to-use combination. This is a threshold for the development of services. Taking a deeper look at the mobile devices, we can find one more non-standard simplex LWI, which is present in all devices—acoustical, where the transmitter is a phone ringer. Token presentation through acoustic interface along with general solution of token delivery via SIM Toolkit technology (see 3GPP TS, 1999) was presented by Khashchanskiy and Kustov (2001). However, mobile operators have not taken SIM Toolkit into any serious use, and the only alternative way of delivering sound tokens into the phone-ringing tone customization technology was not available for a broad range of devices at the time the aforementioned paper was published. Quite unexpectedly, recent development of mobile phone technologies gives a chance for sound tokens to become a better solution for the aforementioned problem, compared with other LWI. Namely, it can be stated that every contemporary mobile device supports either remote customization of ringing tones, or MMS, and in the majority of cases, even both, thus facilitating sound token receiving over the air. Most phone models can playback a received token with only a few button-clicks. Thus, a sound token-based solution meets the set criteria better than any other LWI. Token delivery works the same way for virtually all phones, and token presentation is simple. In this article we study the sound token solution practical implementation in detail. First, we select optimal modulation, encoding, and recognition algorithm, and we estimate data rate. Then we present results of experimental verification.


Sign in / Sign up

Export Citation Format

Share Document