scholarly journals An intelligent algorithm to reduce and eliminate coverage holes in the mobile network

2021 ◽  
Vol 30 (1) ◽  
pp. 920-930
Author(s):  
Rageed Hussein Hussan Al-Hashemy ◽  
Intisar Mohsin Saadoon

Abstract The need for services in the world of telecommunications and the prosperity and rapid development of this sector around the world has led mobile phone companies to compete to provide the best services to customers. One of these devices used for communications is the mobile phone. The mobile phone is simply an electronic device that is mainly serving unwired telecommunications through a cellular network of particular base stations known as cell sites. There are many obstacles or problems in the telecommunication field, and the relevant institutions and companies should find solutions to these obstacles and problems. One of these obstacles in telecommunications is the coverage holes. Coverage holes occur when the location of the mobile phone is set in midway between the two base transceiver stations (BTSs). This causes an abnormal interruption in communication until the user crosses the coverage holes area. This paper presents an intelligent algorithm as a set of technical steps that can be used to improve the communication services of the mobile phone network and to solve the communication problems via the reduction of the coverage holes between two BTSs. It suggests a method that could alleviate this problem using a strategy that reduces the coverage holes by developing an intelligent algorithm system to receive signal strength indicators and use AT command “+CREG” to disconnect and reconnect to available BTS within an acceptable energy level. As a result, the connection turned from marginal into good connection.

Paid ◽  
2017 ◽  
Author(s):  
Rachel O’Dwyer

In many parts of the world, the most common way to pay for talktime, texts, or data on a mobile phone is in advance, by buying airtime. This airtime is often used like money: given away, exchanged for goods and services, or used to store value for later. In this scenario, the mobile network operator is not only providing communication services but financial services.The money in question is guaranteed by the underlying ether, the electromagnetic wavelengths that transmit mobile signals. When it was first being discovered and imagined, ether was a commons: anyone could transmit and receive messages provided they had access to the necessary equipment. Today this resource is commoditized: divided up and auctioned to the highest bidder.This chapters uses the case of the mobile airtime, delineated in ether, and traded as a money-like thing, to explore the materiality and value of money more broadly.


Author(s):  
Dickinson C. Odikayor ◽  
Ikponmwosa Oghogho ◽  
Samuel T. Wara ◽  
Abayomi-Alli Adebayo

Dual-SIM mobile phones utilize technology that permits the use of two SIMs at a time. The technology permits simultaneous access to the mobile network services. Its disruptive nature is with reference to the mobile phone market in Nigeria and other parts of the world. Earlier market trend was inclination to “newer” and “better” phones, in favour of established single-SIM mobile phone manufacturers like Nokia and Samsung. Introduction of dual-SIM phones mainly manufactured by Chinese mobile phone manufacturing firms propelled user preference for phones acquisition which permits dual and simultaneous access to mobile network. This technology has compelled its adoption by established manufacturing names in order that they may remain competitive. It is a clear case of a disruptive technology, and this chapter focuses on it need, effects, and disruptive nature.


2012 ◽  
pp. 617-624
Author(s):  
Dickinson C. Odikayor ◽  
Ikponmwosa Oghogho ◽  
Samuel T. Wara ◽  
Abayomi-Alli Adebayo

Dual-SIM mobile phones utilize technology that permits the use of two SIMs at a time. The technology permits simultaneous access to the mobile network services. Its disruptive nature is with reference to the mobile phone market in Nigeria and other parts of the world. Earlier market trend was inclination to “newer” and “better” phones, in favour of established single-SIM mobile phone manufacturers like Nokia and Samsung. Introduction of dual-SIM phones mainly manufactured by Chinese mobile phone manufacturing firms propelled user preference for phones acquisition which permits dual and simultaneous access to mobile network. This technology has compelled its adoption by established manufacturing names in order that they may remain competitive. It is a clear case of a disruptive technology, and this chapter focuses on it need, effects, and disruptive nature.


2020 ◽  
Vol 57 (5) ◽  
pp. 30-38
Author(s):  
G. Ancans ◽  
E. Stankevicius ◽  
V. Bobrovs ◽  
G. Ivanovs

AbstractThe 694–790 MHz band (700 MHz) known also as the second digital dividend was allocated to the mobile radiocommunication service on a primary basis in Region 1 and identified to International Mobile Telecommunications by the World Radiocommunication Conference 2012 (WRC-12). The designation of mobile service in Europe and other countries of Region 1 in 700 MHz band was obtained after the World Radiocommunication Conference 2015 (WRC-15). Administrations of Region 1 will be able to plan and use these frequencies for mobile networks, including IMT. The goal of this study is to estimate the electromagnetic compatibility of Digital Video Broadcasting – Terrestrial (DVB-T/DVB-T2) and LTE (Long Term Evolution) technology operating both in 700 MHz band. The study assumes frequency division duplex (FDD) channel arrangement of 703–733 MHz (for uplink) and of 758–788 MHz (for downlink).The model contains two parts: a DVB-T/DVB-T2 system and LTE mobile broadband network. Co-channel scenario is considered in this paper, and possible impact of DVB-T/DVB-T2 on LTE base stations (receivers) is also investigated. The Monte Carlo simulations within SEAMCAT software and the Minimum Coupling Loss (MCL) method are used for interference investigation. The coordination trigger field strength value predetermined by GE06 Agreement is also used in this study. The Monte Carlo method presents more relaxed electromagnetic compatibility scenario in comparison with the MCL method. For SEAMCAT simulations, ITU-R P.1546-5 radio propagation model is used.The obtained results present the required minimum separation distance between DVB-T/DVB-T2 and LTE networks in the 694–790 MHz in order to provide the necessary performance of LTE mobile network.


Since the number of mobile users has been increased, there comes a number of new mobile operators. This accounts for the increased installation of towers. A critical mobile network consume 40-50MW (approx.) and a diesel generator consume 1MG (approx.) of diesel per day. Also a base station requires greater amount of power employed for its working in which some of its internal applications like light, coolant systems say air conditioning, fans etc., uses the major part of the power utilized. This intensifies the burning of coal which emits carbon dioxide into the atmosphere. At times the number of users for a base station may be very less especially during night time, consuming the power unnecessarily. Our approach is to reduce the intake of power by the base stations during unwanted time. This can be done by establishing communication between the adjacent towers to intimate the unused tower to remain idle or active based on the requirement. Also this approach conveys the measures taken to reduce the power consumed by the internal applications of the base station. The entire setup is under the surveillance of personal computer thereby creating an energy efficient mobile infrastructure with power saving, reduction of CO2 emission which in turn reduces global warming and successful operation of large scale mobile communication services.


Author(s):  
Dominic Mentor

This chapter introduces how mobile devices can be used on a personal and macro level for professional development. The chapter also covers theories posited for practical applications from pedagogy and andragogy perspectives. There are multiple layers of considerations in terms of context, content, and collaboration factors to optimize mobile learning. There are more mobile devices in the world than people, and more than three quarters of the world's population already has some type of mobile phone, making it the most wide-spread technology and most common electronic device in people's hands. Un-tapping this ubiquitous technology creates a wide array of educational possibilities. Hence, a mobile first learning design is crucial in organizational leadership and professional development, to help bridge the gap between personal lives, schools, colleges, and the workplace. Furthering the concept of learning is everywhere as a natural segue for ownership of learning and engagement.


2020 ◽  
Vol 3 (2) ◽  
pp. 105
Author(s):  
Ilya Binti Ismail ◽  
Noor Azlina binti Ahmad ◽  
Suriah Binti Mohamad

The rapid development of 4IR in Malaysia has revolutionized the way of learning. Whole world is promoting electronic learning (e-Learning) as a new method to enhance the learning activities. The campaign continues to hike up when the world was shaken by the COVID19 pandemic, which caused most of the learning centre to close and force classes to be implemented completely online. Hence, this situation introduces the style of studying through mobile phone using the internet known as m-Learning. Although those two styles has been introduced for some time now at Politeknik Malaysia, there is no research conducted to measure the readiness of e-Learning and m-Learning within its context. As such, the aim of this study is to assess the lecturers' readiness in two politeknik namely; Politeknik A and Politeknik B. A total of 140 respondents were collected from using an online survey. A five-point Likert scale that demonstrated degrees of the agreement was applied to capture the lecturers' perceptions on their readiness for these two style learning. The results attained from this particular assessment can be used as some sort of guidelines for further development of e-Learning environment in Politeknik Malaysia.


2014 ◽  
pp. 46-50
Author(s):  
Wentao Jiang

According to a report from the World Health Organization, over 1.4 million mobile phone base stations exist worldwide today, and that number is significantly increasing with the emergence of new communication technologies. What about mobile phones? The International Telecommunication Union (ITU) claims that there are almost as many mobile phone subscriptions in the world as people. And that’s about 6 billion! The growth of wireless networks has enabled people to use personal devices anywhere at any time. Wireless communication nowadays has become a utility like water, electricity and gas. With the convenience and efficiency it brings, we also have to consider some issues with this technology, because it is so fundamental to our everyday lives. One critical and urgent issue is wireless availability. Like the laptops, mobile phones and tablets we know and love today, wireless devices communicate with each other using what are known as radio waves. Useful radio ...


2021 ◽  
pp. 109-122
Author(s):  
JaeSeung Song ◽  
Andreas Kunz

The world of communication technology is changing fast and the means of communication are moving towards a packet switched transmission systems such as Voice over IP (VoIP). Formerly call identity spoofing of the displayed number in circuit switched (CS) networks was too difficult to perform so that people could be sure that when receiving a call on their mobile phone or at home, the displayed number is the one as it is supposed to be. Nowadays this is not the case anymore, voice communication from the internet with VoIP is cheap and spam calls can be easily realized without any costs, also it is getting easier to perform spoofed calls with wrong display name or number. The mobile network operators have no mechanisms to tackle those threats, but standardization activities are already in place within the security group SA3 of 3GPP. This paper provides an overview of the current status of the standards activities and shows the most promising solutions that are proposed up to now. The proposed solutions detect unsolicited communications and spoofed calls by tracing back to the displayed number used in the attack.


2014 ◽  
Vol 13 (8) ◽  
pp. 4729-4737
Author(s):  
Nikhil Sakhare ◽  
Pawan Khade ◽  
Purshottam J. Assudani

Many users like to watch video by a mobile phone, but the media player has many limitations. With a rapid development of communication and network, multimedia based technology is adopted in media player. Different approaches shows in this paper are plug-in extension technology, multimedia based on hierarchy, media player based on file browser, media player based on FFmpeg (Fast Forward Moving Picture Expert Group), media player based on file server.


Sign in / Sign up

Export Citation Format

Share Document