Cloud Based Mobile Network Sharing: A New Model
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2015, Vol 2, Issue 3
Abstract
The tradition network sharing models on existing mobile architecture is a challenging for the mobile operator to cope the future competitive market while increasing average revenue per user. In fact, to sustain the future data tsunami, the operators are already investing in their network. However, they are not yet capturing their investments. The average revenue per user has declined. Moreover, the static and rapid commoditization of network equipments and service provisioning are pushing the mobile operators’ to adopt different strategies such as networking sharing in the access and core network for to reduce OPEX and CAPEX. In this paper, we proposed new models for mobile operators to share their network through cloud platform (e.g. pay-as-you-go) in order to open new business strategies and to reduce CAPEX and OPEX. On the other hand, this proposal also cops the future data tsunami and introduces more flexibility, elasticity and on-demand features to the LTE/EPC architecture.
Authors and Affiliations
Malla Reddy Sama, Yvon Gourhant, Lucian Suciu
Constructing a Knowledge Base for Entertainment by Interlinking Multiple Data Sources
This paper describes a knowledge base for entertainment domains, including movies, music, and celebrities. We present an ontology model for representing graph-based knowledge, and describe knowledge processing techniques...
Centrality-Based Paper Citation Recommender System
Researchers cite papers in order to connect the new research ideas with previous research. For the purpose of finding suitable papers to cite, researchers spend a considerable amount of time and effort. To help researche...
Scalable SOCP-based localization technique for wireless sensor network
Node localization is one of the essential requirements to most applications of wireless sensor networks. This paper presents a detailed implementation of a centralized localization technique for WSNs based on Second Orde...
Attribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or nationa...
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions
Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monit...