Optimal Price Setting For Video Stream Redistribution in Mobile Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Now a days mobile device became a necessity for the people and with this 3G network service consumer can watch he video program by subscribing data plans from the various service providers. Due to heavy use of mobile phones and phone-to-phone communication , data-plan subscribers can redistribute the video content to nonsubscribers which is avery vital problem to the service provider. Here they face difficulty in tracing r to reusability of the dataplans. In this paper, we analyze the optimal price setting for the service provider by investigating the equilibrium between the subscribers and the secondary buyers in the contentredistribution network. Here the subscribers and the secondary buyers has considered as a non cooperative gameand find the optimal price and quantity.
Authors and Affiliations
S. Lakshmivasu, K V Satyanarayana Murthy
A survey on Transmission of data through illumination - Li-Fi
Li-Fi is a new wireless technology to provide the connectivity with in localized network environment. The main principle of this technology is we can transmit the data using light illumination by using light-emitting...
Performance Analysis of Two Methods for Dimension Reduction in Face Recognition
Face recognition has been a fast growing, challenging and interesting area in real time applications. This work aims to compare the two renowned techniques of feature dimension reduction on the basis of the classific...
Peak-to-Average Power Ratio Reduction in OFDM system using Block Coding technique
One of the challenging issues for Orthogonal Frequency Division Multiplexing (OFDM) system is its high Peak-to-Average Power Ratio (PAPR). In this paper, we review and analysis different OFDM PAPR reduction technique...
A Survey of Signcryption Its Type and Techniques
Signcryption is a combinational method of performing signatures of the encrypted data so that the data can be made secure and authenticated during the access of the data. Since there are various techniques are implem...
Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and emin...