103 results on '"telecom operator"'
Search Results
2. Open-Source Solution for Identification and Blocking of Anomalous BGP-4 Routing Information
- Author
-
Minakova, Natalya, Mansurov, Alexander, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Jordan, Vladimir, editor, Tarasov, Ilya, editor, Shurina, Ella, editor, Filimonov, Nikolay, editor, and Faerman, Vladimir, editor
- Published
- 2023
- Full Text
- View/download PDF
3. Research on digital twin network capability maturity model of telecom operators
- Author
-
Shanshan LI, Jianhong XU, Tao LI, Yongjian ZHAO, and Zhifei LIU
- Subjects
digital twin network ,capability maturity model ,index system ,implementation process ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
The digital twin network is an important direction for the transformation and upgrading of the communication industry, and a key lever for telecom operators to implement national strategies and empower the digital economy.The research results of digital twin maturity in the industry were drawn on, the connotation of digital twin network was analyzed, and a set of digital twin network capability maturity model and evaluation method suitable for telecom operators was put forward.Through systematic description of the development stage of digital twin networks and quantitative evaluation of the maturity of digital twin networks capability, it is helpful for operators to identify technical or organizational weaknesses, improve expected results, and promote innovation and collaboration among different organizations in the industry.
- Published
- 2023
- Full Text
- View/download PDF
4. Research and application exploration of threat intelligence system of telecom operators
- Author
-
Haitao ZHANG, Yi JIANG, Shijie ZHU, and Qi CHEN
- Subjects
threat intelligence ,intelligence analysis ,intelligence production ,intelligence application ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.
- Published
- 2022
- Full Text
- View/download PDF
5. 运营商数字孪生网络能力成熟度模型研究.
- Author
-
李姗姗, 许建宏, 李涛, 赵永建, and 刘志飞
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
6. The Approach to the Evaluation of Telecommunications Company Functioning Quality
- Author
-
Larysa, Globa, Rina, Novogrudska, Anastasia, Moroz, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Golenkov, Vladimir, editor, Krasnoproshin, Viktor, editor, Golovko, Vladimir, editor, and Shunkevich, Daniil, editor
- Published
- 2022
- Full Text
- View/download PDF
7. Analysis of telecom operators’ IoT strategy from the perspective of 2G/3G transition
- Author
-
Xiaozhong LIU, Junyu FANG, and Yongbin JIANG
- Subjects
telecom operator ,2G/3G transition ,medium and low-speed IoT ,development strategy ,business model ,Telecommunication ,TK5101-6720 ,Technology - Abstract
In the context of 2G/3G transition, it is a general trend for NB-IoT and LTE Cat.1 to undertake their business development.On the basis of reviewing and analyzing the current status and trends of the 2G/3G-IoT (Internet of things) business, sorting out the IoT business development strategies of the three major domestic telecom operators at the terminal, network and application levels, the three existing business models of telecom operators in the NB-IoT and LTE Cat.1 business area were summarized, including traffic-oriented, platform-supported, and application-enabled.Finally, from three aspects of business opportunity expansion, product marketing and team services, the future upgrade of the business model was prospeted.
- Published
- 2022
- Full Text
- View/download PDF
8. 电信运营商威胁情报体系研究与应用探索.
- Author
-
张海涛, 蒋熠, 竺士杰, and 陈琦
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
9. Architecture and Technology of Multi-Source Heterogeneous Data System for Telecom Operator
- Author
-
Xu, Lexi, Cui, Gaofeng, Hu, Xin, Liu, Shuaijun, Jia, Yuwei, Zhang, Tao, Gao, Jie, Dong, Runsha, Zhou, Yao, Cheng, Xinzhou, He, Xin, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Wang, Yue, editor, Xu, Lexi, editor, Yan, Yufeng, editor, and Zou, Jiaqi, editor
- Published
- 2021
- Full Text
- View/download PDF
10. Towards Top-Up Prediction on Telco Operators
- Author
-
Alves, Pedro Miguel, Filipe, Ricardo Ângelo, Malheiro, Benedita, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Marreiros, Goreti, editor, Melo, Francisco S., editor, Lau, Nuno, editor, Lopes Cardoso, Henrique, editor, and Reis, Luís Paulo, editor
- Published
- 2021
- Full Text
- View/download PDF
11. A Comprehensive Techno-Economic Model for Fast and Reliable Analysis of the Telecom Operator Potentials.
- Author
-
Jurčić, Igor and Gotovac, Sven
- Subjects
TELECOMMUNICATION ,INDUSTRY 4.0 ,SCIENTIFIC models ,NEW product development - Abstract
Modern telecom operators will have to change their business approach, organization, products development and services development, customer approach and many other important issues if they want to be competitive on the telecom markets in the following years and decades. They will have key roles in this period dubbed the Industry 4.0 era. There are many different models of analysis for telecom operators, but they all have a partial approach to analysis and none of them gives a complete picture of the analysis of telecoms. The Comprehensive Techno-Economic (CTE) model for the analysis of telecom operator potentials is a new and original model for analysis and will significantly help in their transformation processes. This model will enable a quick and easy analysis of the potential of the telecom operator, but also of individual parts of it, regardless of other parts of the company. Despite the fact that the model is easy to define the input data and that it is fast in applying the analysis, it gives precise and mathematically defined results from which one can see the assessment of the potential of telecom or independent assessment of its parts. The main advantages of this model are simplicity, speed of telecom analysis, accuracy of results and its modularity, i.e., independent evaluation of individual parts. Such a model is necessary for telecom operators to achieve fast and reliable potential assessment, analysis, modeling and the easier adaptation of new products and services. This is a unique model with a scientific background and theoretical settings, and it provides practical application in the telecommunication market. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. 2G/3G 转网视角下电信运营商物联网发展策略分析.
- Author
-
刘小忠, 方军予, and 蒋永彬
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
13. Assessing the effectiveness of OTT services, branded apps, and gamified loyalty giveaways on mobile customer churn in the telecom industry: A machine-learning approach.
- Author
-
Kirgiz, Omer Bugra, Kiygi-Calli, Meltem, Cagliyor, Sendi, and El Oraiby, Maryam
- Subjects
- *
CUSTOMER loyalty programs , *CONSUMERS , *LOGISTIC regression analysis , *BRAND loyalty , *RANDOM forest algorithms - Abstract
Telecom operators allocate a significant amount of resources to retain their customers as the organic growth in the number of customers is slowing down. Gamified loyalty programs, branded apps, and over-the-top (OTT) services emerged as ways to develop customer acquisition and retention strategies. Despite these strategies, some mobile customers still churn; therefore, churn prediction plays an essential role in the sustainable future of telecom businesses. Churn prediction is used both to detect customers with a high propensity to churn and to identify the reasons behind their churn behavior. This study examines several features affecting the churn behavior of mobile customers, including branded apps, gamified loyalty programs, and OTT services. In this study, the secondary data is provided by a telecom operator and contains the attributes of both churner and non-churner mobile customers. Logistic regression and random forest classifiers are compared in terms of their predictive power, and we used the latter as the machine learning algorithm in the churn prediction model. To understand the variable importance, mean decrease in impurity and permutation importance are performed. The key findings of this research reveal that while gamified loyalty giveaways and branded app strategies are effective, OTT service strategies show lower importance in predicting mobile customer churn behavior. • The usage of company's own OTT apps is not a strong predictor of mobile customer churn behavior. • Gamified loyalty giveaways are very effective strategies for customers' retention. • Remaining Months Before Contract Expiration is an important predictor of CCB. • Unlike Gender, Age is a strong predictor of churn behavior. • Random Forest has a strong predictive power of churn behavior. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Analysis of Backward Payment Model in Traffic Service
- Author
-
Chen, Zhe, Yan, Yanrong, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Atiquzzaman, Mohammed, editor, Yen, Neil, editor, and Xu, Zheng, editor
- Published
- 2020
- Full Text
- View/download PDF
15. Sustainable Urban Mobility Boost Smart Toolbox Upgrade
- Author
-
M. Sostaric, M. Jakovljevic, K. Vidovic, and O. Lale
- Subjects
big data science ,origin/destination matrices ,modal split ,telecom operator ,innovative methodology ,mobile network data ,Science ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
SUMBooST2 research develops universally applicable data science methodology which extracts key urban mobility parameters and origin/destination matrices from the anonymized big data set gathered from telecom operator. The methodology (toolbox) provides transport planners with a method for fast, efficient, and reliable provision of data on movements within the certain area. Origin/destination matrices with modal split will provide transport planners with valid input data for the planning of urban transport systems. The algorithms which separate relevant mobility data from the overall dataset are the unique part of the toolbox. The algorithms to identify passenger car trips are developed in 2020 project SUMBooST, and they are being upgraded in 2021 to detect trips made by active mobility modes and public transport. For the methodology to be valid, it must be implemented in representative number of cities. Previous SUMBooST project included implementation and validation in the City of Rijeka, and SUMBooST2 continues with two other cities, City of Zagreb, and City of Dubrovnik. The aim of the paper is to present innovative toolbox for the boost of sustainable urban planning based on big data science.
- Published
- 2022
- Full Text
- View/download PDF
16. Market Analysis of MEC-Assisted Beyond 5G Ecosystem
- Author
-
Jin Nakazato, Makoto Nakamura, Tao Yu, Zongdian Li, Kazuki Maruta, Gia Khanh Tran, and Kei Sakaguchi
- Subjects
Mobile edge computing ,multi-access edge computing ,telecom operator ,cloud ownercess edge computing ,5G and beyond ,heterogeneous cellular networks ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The quality-of-service (QoS)/quality-of-experience (QoE) demands of mobile services are soaring and have overwhelmed the obsolescent capability of 3G and 4G cellular networks. The emerging 5G networks will bring an unprecedented promotion in transmission data rates. However, the satisfaction of some service requirements is still in dilemma, especially the end-to-end (E2E) latency which varies in different applications. Multi-access edge computing (MEC), a promising technology in 5G cellular networks, can provide ultra-low E2E latency and reduce traffic load on mobile backhaul networks. The potential benefits of MEC for 5G and beyond services have been explored by preliminary studies. What remains is the uncertainty of revenue from the investment of MEC which will shake operators’ decisions about whether and how to deploy MEC in cellular networks. In this light, this paper designs a MEC-assisted 5G and beyond ecosystem inclusive of three players: private (local) telecom operators, backhaul, and cloud service owners. We propose a revenue maximization model for private (local) telecom operators and cloud service owners to minimize the cost from the end-user perspective while satisfying the latency requirement. The derived model indicates that two players’ revenues can be maximized by optimizing MEC resources and backhaul capacity. The game-theoretic analyses also reveal the optimized hybrid strategy of MEC and cloud for efficient mobile traffic management.
- Published
- 2021
- Full Text
- View/download PDF
17. Sustainable Urban Mobility Boost Smart Toolbox Upgrade.
- Author
-
Sostaric, M., Jakovljevic, M., Vidovic, K., and Lale, O.
- Subjects
PUBLIC transit ,URBAN planning ,SUSTAINABLE transportation ,DATA science ,TELECOMMUNICATION - Abstract
SUMBooST2 research develops universally applicable data science methodology which extracts key urban mobility parameters and origin/destination matrices from the anonymized big data set gathered from telecom operator. The methodology (toolbox) provides transport planners with a method for fast, efficient, and reliable provision of data on movements within the certain area. Origin/destination matrices with modal split will provide transport planners with valid input data for the planning of urban transport systems. The algorithms which separate relevant mobility data from the overall dataset are the unique part of the toolbox. The algorithms to identify passenger car trips are developed in 2020 project SUMBooST, and they are being upgraded in 2021 to detect trips made by active mobility modes and public transport. For the methodology to be valid, it must be implemented in representative number of cities. Previous SUMBooST project included implementation and validation in the City of Rijeka, and SUMBooST2 continues with two other cities, City of Zagreb, and City of Dubrovnik. The aim of the paper is to present innovative toolbox for the boost of sustainable urban planning based on big data science. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Sustainable growth research – A study on the telecom operators in China.
- Author
-
Chen, Hong, Li, Ling, and Chen, Yong
- Subjects
TELECOMMUNICATION ,SUSTAINABILITY ,MULTIPLE regression analysis ,EMPIRICAL research - Abstract
In recent years, the telecom industry has faced digital transformation challenges and fierce market competition. The challenges push telecom operators to grow their subscriber bases by offering lower prices and improved services and new features, which puts pressure on operators' profitability. In addition, the rise of Internet companies gradually erodes the profit of the traditional telecom operators. Therefore, paying attention to the critical factors impacting firm sustainable growth can help operators get out of the predicament. Based on the resource-based view (RBV), this study explores the factors that influence the firm sustainable growth. Multiple regression model is applied to empirically test the hypotheses with longitudinal time-series panel data from major telecom operators in China. The study provides empirical evidence for sustainable growth research and useful insights for practitioners on the way to keep sustainable growth. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Application of public key infrastructure in telecom operators
- Author
-
Congli WANG, Jinhua WANG, and Weijia XUE
- Subjects
public key infrastructure ,digital certificate ,telecom operator ,connectivity ,Telecommunication ,TK5101-6720 ,Technology - Abstract
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.
- Published
- 2020
- Full Text
- View/download PDF
20. Application of blockchain in telecom operators
- Author
-
Yunyong ZHANG, Gang CHENG, Gang AN, Xuehong YANG, and Guixiang ZOU
- Subjects
blockchain ,decentralization ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
Blockchain is another disruptive technological revolution after the IoT,cloud computing and big data.Blockchain technology and typical application cases were firstly introduced,and then the role of blockchain technology and blockchain in operators were analyzed.Secondly,combined with the characteristics of the blockchain,the application of blockchain in multiple operators were focused on,such as infrastructure,international roaming settlement,digital points issuance and trading,data storage,cross-border payment,identity verification,and credit reporting.Finally,the challenges faced by operators in the comprehensive application of blockchain were introduced.
- Published
- 2020
- Full Text
- View/download PDF
21. PROCESSES OF THE TELECOM OPERATOR’S INFORMATION ARCHITECTURE TRANSFORMATION
- Author
-
Leonid Smidovych and Yurii Davydovskyi
- Subjects
BSS ,OSS ,information architecture ,telecommunications ,telecom operator ,requirements analysis ,Engineering economy ,TA177.4-185 - Abstract
The subject of the article is the architecture of information systems of telecom operators (BSS/OSS), requirements for it and the processes of its transformation. The goal is to transform the existing information environment of the operator into an open digital ecosystem, in accordance with business and technological requirements for the functionality and architecture of information systems of communication operators, which will introduce new business models, services and products, communication channels, and increase competitiveness. The following tasks were solved at the study: analysis of the current state of telecommunications and information systems used by telecom operators; analysis of requirements for business support and operational information systems, collection and analysis of requirements for the architecture of modern information systems in the field of telecommunications, analysis of the transformation process from the existing BSS/OSS architecture of the communication operator into the target architecture of the digital communications provider, elaboration of a recommendations for an intermediate architecture. To solve these problems, methods of system and business analysis were used, in particular, methods of analysis of software requirements, technologies for developing software application architecture. The following results were obtained. The current state of the telecommunications services industry, the features of the existing information systems of telecommunications operators (BSS/OSS) and the requirements for the architecture of such systems was analyzed. Strategies of transition to modern architecture was considered and analyzed. The target architecture of the digital service provider's information ecosystem and the process of transforming the existing BSS/OSS architecture into the target architecture were considered. Intermediate migration architecture was proposed. Conclusions: the transformation to modern information architecture will ensure compliance of BSS/OSS systems with market requirements and new technologies, adapt to their changes, allow operators to increase competitiveness, reduce operating and capital costs, create technological conditions for open digital ecosystem and transform the operator into a digital services provider. It was recommended to use an intermediate architecture based on the open standardized TMF API for such transformation.
- Published
- 2022
22. A Recommender System for Telecommunication Operators’ Campaigns
- Author
-
Alves, Diogo, Valente, Bruno, Filipe, Ricardo, Castro, Maria, Macedo, Luís, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Moura Oliveira, Paulo, editor, Novais, Paulo, editor, and Reis, Luís Paulo, editor
- Published
- 2019
- Full Text
- View/download PDF
23. A comparative analysis of the development modes of the IoT for telecom operators
- Author
-
Kaikai LIU and Xun ZHANG
- Subjects
telecom operator ,IoT ,development mode ,Telecommunication ,TK5101-6720 ,Technology - Abstract
In recent years,the development of IoT is in full swing.It is of great significance for the current transformation and development of domestic telecom operators.In this context,the business model is very important for operators to achieve “overtaking” in the IoT industry.Based on the analysis of the operation status of the IoT of operators,the development strategies of the IoT industry at home and abroad were compared,and three different development strategies was summarized.Telecom operators had advantages in customers,channels and other aspects,but limited by many factors.It was suggested that in constructing the development model,they should follow the principle of gradual progress,fully according to their own enterprise positioning,combined with national policies,pay attention to their own positioning in the industry chain of the IoT,pay attention to risks,and ultimately realize it.Better development model improve the current situation of increasing revenue in the telecommunications industry.
- Published
- 2019
- Full Text
- View/download PDF
24. A Comprehensive Techno-Economic Model for Fast and Reliable Analysis of the Telecom Operator Potentials
- Author
-
Igor Jurčić and Sven Gotovac
- Subjects
new techno-economic model ,Industry 4.0 ,telecommunication ,telecom operator ,potential ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Modern telecom operators will have to change their business approach, organization, products development and services development, customer approach and many other important issues if they want to be competitive on the telecom markets in the following years and decades. They will have key roles in this period dubbed the Industry 4.0 era. There are many different models of analysis for telecom operators, but they all have a partial approach to analysis and none of them gives a complete picture of the analysis of telecoms. The Comprehensive Techno-Economic (CTE) model for the analysis of telecom operator potentials is a new and original model for analysis and will significantly help in their transformation processes. This model will enable a quick and easy analysis of the potential of the telecom operator, but also of individual parts of it, regardless of other parts of the company. Despite the fact that the model is easy to define the input data and that it is fast in applying the analysis, it gives precise and mathematically defined results from which one can see the assessment of the potential of telecom or independent assessment of its parts. The main advantages of this model are simplicity, speed of telecom analysis, accuracy of results and its modularity, i.e., independent evaluation of individual parts. Such a model is necessary for telecom operators to achieve fast and reliable potential assessment, analysis, modeling and the easier adaptation of new products and services. This is a unique model with a scientific background and theoretical settings, and it provides practical application in the telecommunication market.
- Published
- 2022
- Full Text
- View/download PDF
25. Telecom Big Data Based User Analysis and Application in Telecom Industry
- Author
-
Shao, Guanglu, Chen, Weiwei, Cheng, Xinzhou, Xu, Lexi, Zhang, Tao, Cheng, Chen, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Coulson, Geoffrey, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin Sherman, Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert Y., Series editor, Long, Keping, editor, Leung, Victor C.M., editor, Zhang, Haijun, editor, Feng, Zhiyong, editor, Li, Yonghui, editor, and Zhang, Zhongshan, editor
- Published
- 2018
- Full Text
- View/download PDF
26. 5G will fully enable the industrial internet
- Author
-
Yunyong ZHANG
- Subjects
5G ,telecom operator ,industrial Internet ,artificial intelligence ,big data ,cloud computing ,Internet of things ,Telecommunication ,TK5101-6720 ,Technology - Abstract
With the Ministry of Industry and Information Technology announcing that it has issued a test frequency license to China Telecom, China Mobile and China Unicom for the low and medium frequency band of the 5G mobile communication system, China's 5G commercial pace has officially begun. The global deployment, commercial situation and the oriented industrial network characteristics of 5G were introduced. It was pointed out that 5G would continue to consolidate the foundation for interconnectivity of all things, fully enable the industrial internet, and accelerate the integration of multi-industry internet.
- Published
- 2019
- Full Text
- View/download PDF
27. 公钥密码基础设施在电信运营商的应用.
- Author
-
王聪丽, 王锦华, and 薛伟佳
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
28. Discussion of the Competitive Strategies of Telecom Operators and Over-the-Top Service Providers from the Perspective of Evolutionary Game Theory.
- Author
-
Wang, Hsi Tse
- Subjects
GAME theory ,EVOLUTIONARY theories ,TELECOMMUNICATION ,COST shifting ,TELECOMMUNICATIONS services ,DYNAMICAL systems - Abstract
Over-the-top (OTT) service refers to content included in basic telecommunications subscriptions without the additional features provided by telecom operators. The booming OTT business has had a huge impact on traditional telecommunications businesses such as voice and short message services, and the sense of crisis among telecommunications operators shows that the channeling trend has become more and more obvious. Faced with competition on the distribution of interests between channels and contents, telecommunications operators and OTT service providers are engaged in a fierce competition and cooperation game. To explore this competition relationship, this paper first establishes an evolutionary model, discussing the competition and cooperation behaviors of telecommunications operators and OTT service providers, and then conducts research on the degree of the effects of cooperation in terms of the combination of strategic factors, including cooperation cost sharing, the benefits distribution mechanism, research and development benefits, spillover effect, and network externality. Additionally, a replicator dynamic system is developed to study the influence of related strategic factors on evolutionary equilibrium. Finally, to verify the theoretical results, a simulation experiment is conducted to further clarify the meaning of the model and obtain meaningful results. The evolutionary game model and method provided in this paper are expected to help both parties make better decisions for future operating strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
29. 区块链在电信运营商的应用.
- Author
-
张云勇, 程刚, 安岗, 杨学红, and 邹贵祥
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
30. Telecom Networks and Innovation
- Author
-
Medudula, Murali Krishna, Sagar, Mahim, Gandhi, Ravi Parkash, Medudula, Murali Krishna, Sagar, Mahim, and Gandhi, Ravi Parkash
- Published
- 2016
- Full Text
- View/download PDF
31. Wireless Community Networks: Towards a Public Policy for the Network Commons?
- Author
-
De Filippi, Primavera, Tréguer, Félix, Belli, Luca, editor, and De Filippi, Primavera, editor
- Published
- 2016
- Full Text
- View/download PDF
32. Way for operators to build the telecommunication big data ecology
- Author
-
Mi LIU, Haichuan YANG, and Zhenhua LI
- Subjects
ecosystem ,construction ,telecom operator ,big data ,Telecommunication ,TK5101-6720 ,Technology - Abstract
In the era of rapid development of big data,telecom operator has abundant big data assets and need to unlock the potential of huge data in pipelines through the innovation and development of big data services urgently.The construction of telecom big data ecosystem would help telecom operator solve the problems encountered in the development of big data services effectively and new value growth would be brought out.The target form and construction steps of telecom big data ecosystem were also clarified.
- Published
- 2018
- Full Text
- View/download PDF
33. Suggestions for telecom operators’ big data development
- Author
-
Yunyong ZHANG
- Subjects
big data ,cloud computing ,Internet of things ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
The development of big data at home and abroad was reviewed.On the basis of carefully analyzing the background,advantages and current situation of the development of big data,it was thought that the further development of telecommunication big data was the main component of promoting the national big data strategy project,and suggestions to promote the deepening development of telecom operators’ big data was proposed.
- Published
- 2018
- Full Text
- View/download PDF
34. Personalized recommendation helps carrier’s digital marketing
- Author
-
Chunyu MA, Junlin WANG, Baowang WANG, and Bohua GAN
- Subjects
personalized recommendation ,telecom operator ,big data ,digital marketing ,Telecommunication ,TK5101-6720 ,Technology - Abstract
The challenge and demands of telecom operator’ digital marketing were briefly analyzed,the advantages of internet thought were also drawled and then the personalized recommendations were proposed to help telecom operator’s digital marketing,and the history of carrier’s personalized recommendation was introduced.Then the principle and implementation process of telecom operator’s personalized recommendation which bases on carrier merchandise,user behavior data and the computing ability of big data platform was described.Finally,the implementation scenario of personalized recommendation in telecom operator digital content business was described,and the value and future of personalized recommendation have prospected.
- Published
- 2018
- Full Text
- View/download PDF
35. Data security protection schema of telecom operators under the environment of big data
- Author
-
Shengli ZHOU, Bin CHEN, and Lifa WU
- Subjects
telecom operator ,data security ,privacy protection ,data encryption ,Telecommunication ,TK5101-6720 ,Technology - Abstract
With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.
- Published
- 2017
- Full Text
- View/download PDF
36. Discussion of constructing unified DPI system by operators in the background of big data
- Author
-
Huifang HOU and Jie PAN
- Subjects
unified DPI ,big data ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
Mobile data traffic increases gradually.Operator's business model is transferring from “telephone traffic management” to “traffic management”.Big data management will become the main development direction of operators.For big data management,operators explore the value and application of DPI technology and make the unified DPI system standards to offer comprehensive and standard traffic data.The insufficiency of traditional DPI deployment mode was analyzed,and the unified DPI system to offer basic data security for accelerating development of big data was presented.
- Published
- 2017
- Full Text
- View/download PDF
37. Flow-Aware Networking for Net Neutrality
- Author
-
Domżał, Jerzy, Wójcik, Robert, Jajszczyk, Andrzej, Sammes, A.J., Series editor, Domżał, Jerzy, Wójcik, Robert, and Jajszczyk, Andrzej
- Published
- 2015
- Full Text
- View/download PDF
38. Sanitization of Call Detail Records via Differentially-Private Bloom Filters
- Author
-
Alaggan, Mohammad, Gambs, Sébastien, Matwin, Stan, Tuhin, Mohammed, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, and Samarati, Pierangela, editor
- Published
- 2015
- Full Text
- View/download PDF
39. 电信运营商物联网发展模式比较分析.
- Author
-
刘凯凯 and 张勋
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
40. Big data business innovation model for telecom operator
- Author
-
Jun ZHAO, Lei HUANG, and Ting HUANG
- Subjects
big data ,business innovation ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
From the perspective of some enterprises' big data value technology, despise application, value construction and despise operation problems, the importance of business innovation for big data transformation of enterprises was discussed, the characteristics of big data business innovation were analyzed and combined with the characteristics of telecom operators business and data, the big data business innovation mode suitable for telecom operators was studied, the functional framework of business innovation support system was designed, the implementation strategies and suggestions were proposed.
- Published
- 2016
- Full Text
- View/download PDF
41. Progress of automatic driving technology and future information service architecture evolution of telecom operators
- Author
-
Zhen YANG
- Subjects
artificial intelligence ,automatic driving ,information service architecture ,telecom operator ,Telecommunication ,TK5101-6720 ,Technology - Abstract
The concept of artificial intelligence has been proposed for more than 60 years,with the development of internet of things and big data technology,more and more AI technology applications have been achieved.One of the most remarkable AI technology integration application is automatic driving technology.Firstly,the progress of automatic driving technology was studied.Secondly,key technologies of automatic driving were analyzed.Thirdly, the relationship between the telecom operator information service architecture and the requirements of automatic driving was analyzed.In the end,the technology breakthrough point of information service architecture with the core of application of artificial intelligence technology in the future were given.
- Published
- 2016
- Full Text
- View/download PDF
42. ПРОЦЕСИ ТРАНСФОРМАЦІЇ ІНФОРМАЦІЙНОЇ АРХІТЕКТУРИ ОПЕРАТОРА ЗВ’ЯЗКУ
- Author
-
Leonid Smidovych and Yurii Davydovskyi
- Subjects
OSS ,telecom operator ,телекомунікації ,telecommunications ,omnichannel ,оператор зв’язку ,оператор связи ,процеси трансформації архітектури ,requirements analysis ,BSS ,информационная архитектура ,digital service provider ,відкрита інформаційна екосистема ,омніканальність ,інформаційна архітектура ,аналіз вимог ,открытая информационная экосистема ,анализ требований ,провайдер цифрових послуг ,architecture transformation processes ,провайдер цифровых услуг ,information architecture ,open information ecosystem ,процессы трансформация архитектуры ,телекоммуникации ,омниканальность - Abstract
The subject of the article is the architecture of information systems of telecom operators (BSS/OSS), requirements for it and the processes of its transformation. The goal is to transform the existing information environment of the operator into an open digital ecosystem, in accordance with business and technological requirements for the functionality and architecture of information systems of communication operators, which will introduce new business models, services and products, communication channels, and increase competitiveness. The following tasks were solved at the study: analysis of the current state of telecommunications and information systems used by telecom operators; analysis of requirements for business support and operational information systems, collection and analysis of requirements for the architecture of modern information systems in the field of telecommunications, analysis of the transformation process from the existing BSS/OSS architecture of the communication operator into the target architecture of the digital communications provider, elaboration of a recommendations for an intermediate architecture. To solve these problems, methods of system and business analysis were used, in particular, methods of analysis of software requirements, technologies for developing software application architecture. The following results were obtained. The current state of the telecommunications services industry, the features of the existing information systems of telecommunications operators (BSS/OSS) and the requirements for the architecture of such systems was analyzed. Strategies of transition to modern architecture was considered and analyzed. The target architecture of the digital service provider's information ecosystem and the process of transforming the existing BSS/OSS architecture into the target architecture were considered. Intermediate migration architecture was proposed. Conclusions: the transformation to modern information architecture will ensure compliance of BSS/OSS systems with market requirements and new technologies, adapt to their changes, allow operators to increase competitiveness, reduce operating and capital costs, create technological conditions for open digital ecosystem and transform the operator into a digital services provider. It was recommended to use an intermediate architecture based on the open standardized TMF API for such transformation., Предметом исследования статьи является архитектура информационных систем операторов связи (BSS/OSS), требования к ней и процессы ее трансформации. Целью является трансформация существующей информационной среды оператора связи в открытую цифровую экосистему, в соответствии с бизнес-технологическими требованиями к функционалу и архитектуре информационных систем операторов связи, что позволит внедрить новые бизнес-модели, услуги и продукты, каналы коммуникации с абонентами и повысить конкурентоспособность. В работе решаются следующие задачи: анализ современного состояния сферы телекоммуникации и информационных систем, используемых операторами связи; анализ требований, предъявляемых к информационным системам поддержки бизнеса и операционной деятельности, сбор и анализ требований к архитектуре современных информационных систем в сфере телекоммуникаций, анализ процесса трансформации существующей архитектуры BSS/OSS оператора связи к целевой архитектуре информационной экосистемы цифрового оператора коммуникаций, разработка рекомендации по промежуточной архитектуре. Для решения указанных задач были использованы методы системного и анализа, в частности методы анализа требований к ПО, технологии разработки архитектуры программных приложений. Получены следующие результаты. Проанализировано современное состояние отрасли телекоммуникационных услуг, особенности имеющихся информационных систем операторов связи (BSS/OSS) и требования, предъявляемые к архитектуре таких систем. Рассмотрены и проанализированы стратегии перехода к современной информационной архитектуре. Рассмотрена целевая архитектура информационной экосистемы провайдера цифровых услуг и процесс трансформации существующей архитектуры BSS/OSS в целевую архитектуру. Предложена промежуточная миграционная архитектура. Выводы: переход к современной информационной архитектуре обеспечит соответствие систем BSS/OSS требованиям рынка и новых технологий, адаптацию к их изменениям, позволит операторам повысить конкурентоспособность, уменьшить операционные и капитальные затраты, создаст технологические условия для построения открытой цифровой экосистемы и преобразования оператора связи в цифрового провайдера. услуг. Для трансформации рекомендуется использовать промежуточную архитектуру на базе открытого стандартизированного API TMF., Предметом дослідження статті є архітектура інформаційних систем операторів зв’язку (BSS/OSS), вимоги до неї та процеси її трансформації. Метою є трансформація наявного інформаційного середовища оператора зв’язку у відкриту цифрову екосистему, відповідно до бізнесових та технологічних вимог до функціоналу та архітектури інформаційних систем операторів зв’язку, що дозволить впровадити нові бізнес-моделі, послуги та продукти, канали комунікації із абонентами тощо, та підвищити конкурентоздатність. В роботі вирішуються наступні задачі: аналіз сучасного стану сфери телекомунікації та інформаційних систем, що використовуються операторами зв’язку; аналіз вимог, що висуваються до інформаційних систем підтримки бізнесу та операційної діяльності, збір та аналіз вимог до архітектури сучасних інформаційних систем в сфері телекомунікацій, аналіз процесу трансформації наявної архітектури BSS/OSS оператора зв’язку у цільову архітектуру інформаційної екосистеми цифрового оператора комунікацій, розробка рекомендації щодо проміжної архітектури. Для вирішення зазначених завдань були використані методи системного та бізнес аналізу, зокрема методи аналізу вимог до ПЗ, технології розробки архітектури програмних додатків. Отримані наступні результати. Проаналізовано сучасний стан галузі телекомунікаційних послуг, особливості наявних інформаційних систем операторів зв’язку (BSS/OSS) та вимоги які висуваються до архітектури таких систем. Розглянуто та проаналізовано стратегії переходу до сучасної інформаційної архітектури. Розглянуто цільову архітектуру інформаційної екосистеми провайдера цифрових послуг та процес трансформації наявної архітектури BSS/OSS у цільову архітектуру. Запропоновано проміжну міграційну архітектуру. Висновки: перехід до сучасної інформаційної архітектури забезпечить відповідність систем BSS/OSS вимогам ринку та нових технології, адаптацію до їх змін, дозволить операторам підвищити конкурентоздатність, зменшити операційні та капітальні витрати, створить технологічні умови для розбудови відкритої цифрової екосистеми та перетворення оператора зв’язку у провайдера цифрових послуг. Для трансформації рекомендується використовувати проміжну архітектуру на основі відкритого стандартизованого API TMF.
- Published
- 2022
- Full Text
- View/download PDF
43. A Comprehensive techno-economic model for analysis of the telecom operator telecom potentials
- Author
-
Jurčić, Igor and Gotovac, Sven
- Subjects
potential ,TECHNICAL SCIENCES. Electrical Engineering. Telecommunications and Informatics ,Elektrotehnika ,Industrija 4.0 ,telekom operator ,TEHNIČKE ZNANOSTI. Elektrotehnika. Telekomunikacije i informatika ,udc:621.3(043.3) ,Industry 4.0 ,telecom operator ,Comprehensive techno-economic model ,telekomunikacije ,telecommunication ,Electrical engineering ,cjeloviti tehno-ekonomski model ,potencijal - Abstract
Suvremeni telekom operateri će morati promijeniti pristup poslovanju, organizaciju, razvoj proizvoda i usluga, pristup korisnicima i mnoga druga važna pitanja ako žele biti konkurentni na telekomunikacijskim tržištima u narednim godinama i desetljećima. Oni će imati ključne uloge u ovom razdoblju nazvanom era Industrije 4.0. Postoji mnogo različitih modela analize za telekom operatore, ali svi imaju parcijalni pristup analizi i niti jedan od njih ne daje cjelovitu sliku analize telekoma. Cjeloviti tehno-ekonomski (CTE) model za analizu potencijala telekom operatora je nov i originalan model za analizu i značajno će pomoći u procesima njihove transformacije. Ovaj model omogućit će brzu i jednostavnu analizu potencijala telekom operatora, ali i pojedinih njegovih dijelova, neovisno o ostalim dijelovima tvrtke. Unatoč tome što model lako definira ulazne podatke i što je brz u primjeni analize, daje precizne i matematički definirane rezultate iz kojih se može vidjeti procjena potencijala telekom operatora ili neovisna procjena njegovih pojedinih segmenata. Glavne prednosti ovog modela su jednostavnost, brzina analize telekom operatora, pouzdanost rezultata i njegova modularnost, odnosno neovisna procjena pojedinih dijelova. Takav je model nužan telekom operatorima za brzu i pouzdanu procjenu potencijala, analizu, modeliranje i lakšu prilagodbu novih proizvoda i usluga. Riječ je o jedinstvenom modelu sa znanstvenom pozadinom i teorijskim postavkama, koji pruža praktičnu primjenu na telekomunikacijskom tržištu. Modern telecom operators will have to change their business approach, organization models, products development and services development, customer approach and many other important issues if they want to be competitive on the telecommunication markets in the following years and decades. They will have key roles in this period named the Industry 4.0 era. There are many different models of analysis for telecom operators, but they all have a partial approach to analysis and none of them gives a complete picture of the analysis of telecom operators. The Comprehensive Techno-Economic (CTE) model for the analysis of telecom operator potentials is a new and original model for analysis. It will significantly help telecom operators in their transformation processes. This model will enable a quick and easy analysis of the potential of telecom operators, but also of individual parts of it, regardless of other parts of the company. Despite the fact that the model is easy to define the input data and that it is fast in applying the analysis, it gives reliable and mathematically defined results of the potential of telecom operators or independent assessment of their segments. The main advantages of this model are simplicity, speed of telecom analysis, reliability of results and its modularity, i.e., independent evaluation of individual segments. This model is necessary for telecom operators to achieve fast and reliable potential assessment, analysis, modeling and the easier adaptation of new products and services. This is a unique model with a scientific background and theoretical settings and it enables practical application on the telecommunications market.
- Published
- 2023
44. Moving to Digital Media Worlds: Three Successive Transformational Waves
- Author
-
Simon, Jean Paul, De Prato, Giuditta, editor, Sanz, Esteve, editor, and Simon, Jean Paul, editor
- Published
- 2014
- Full Text
- View/download PDF
45. Media in the Changing Media-IT-Telecom Ecosystem
- Author
-
Simon, Jean Paul, De Prato, Giuditta, editor, Sanz, Esteve, editor, and Simon, Jean Paul, editor
- Published
- 2014
- Full Text
- View/download PDF
46. Commercial Pressure from Rival Competitors: The Impact on PSB Online
- Author
-
Brevini, Benedetta and Brevini, Benedetta
- Published
- 2013
- Full Text
- View/download PDF
47. PBX Forensics
- Author
-
Androulidakis, Iosif I. and Androulidakis, Iosif I.
- Published
- 2013
- Full Text
- View/download PDF
48. Big Data Implications for Industry
- Author
-
Mohanty, Soumendra, Jagadeesh, Madhu, Srivatsa, Harsha, Mohanty, Soumendra, Jagadeesh, Madhu, and Srivatsa, Harsha
- Published
- 2013
- Full Text
- View/download PDF
49. Rating Assignment on Telecom Operators
- Author
-
Izzi, Luisa, Oricchio, Gianluca, Vitale, Laura, Izzi, Luisa, Oricchio, Gianluca, and Vitale, Laura
- Published
- 2012
- Full Text
- View/download PDF
50. e-Identity – Monetization and Interoperability
- Author
-
Sel, Marc, Reimer, Helmut, editor, Pohlmann, Norbert, editor, and Schneider, Wolfgang, editor
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.