New Architecture for Telecomm services and computing the Improvement Attained on KPIs

Publication Date : June 2015

SearchDL ID : 03.IJIS.2015.1.4

View Abstract

Abstract :  In today's era of communication, a company’s brand is driven by more than the combination of promises made and promises kept for customer satisfaction to gain popularity of brand name. Better quality of service gains better customer satisfaction. A telecommunications service provider's survival depends on its ability to prepare for changes in customer needs, as well as changes in regulation and technology. But the increasing expectations of customers and the introduction of many new services and technologies is making it difficult to comprehend and meet customer requirements. Therefore, in this paper the background of transformation in the telecommunication companies is analyzed. As in the rest of the competitors, a performance indicator or key performance indicator (KPI) is a measure of performance. Such measures are commonly used to help an organization define and evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals. From the characteristics of telecommunication services, this paper makes the evaluation method of the quality of telecommunication services based on customer experience. Evaluation method designs for ASR and CCR are considered to determine the quality of telecommunication services and the factors contained in various genes. The implementation of the newly proposed architecture was carried out at BTSOL Bharti Telecom solution. BTSOL Bangalore KPI’s were analyzed on MetaSol software. Hence, this paper makes an analysis on real cases in telecommunication.

Read less

View Paper    


camera - based indoor neural network for visually impaired people "Patented"

Publication Date : June 2015

SearchDL ID : 03.IJIS.2015.1.3

View Abstract

Abstract :  in this paper I will develop a device to help visually impaired people find way around in indoor/outdoor unknown environment. The system is based mainly on obstacles detection in a video stream. Using video/image processing for obstacles detection and pathways determination needs less sensors and smaller than other approaches like using sticks and sensors. Using video allow us utilize smart computer vision techniques to detects and information than other approaches. The system will consist of three parts: camera, video processor, and speech generator. The video processor will process the video stream, detect objects, obstacles and pathways, then deliver the extracted information to the speech generator to generate suitable phrases to inform the user about his/her path. I propose a low cost system that can detect obstacles in user’s path while walking in indoor or outdoor environment then send speech alert to user to help navigate him. In general our system will consist of camera to get frames and a microprocessor to process those frames, finally send the decision as sound alert to the user whether there are obstacles in the path or not

Read less

View Paper    


OLAPSec: A Comprehensive End-to-End Security Framework for OLAP Cubes

Publication Date : June 2015

SearchDL ID : 03.IJIS.2015.1.5

View Abstract

Abstract :  Business decision makers typically use online analytical processing (OLAP) to analyze multidimensional data interactively from multiple perspectives. One must note, however, that not all of the data should be universally accessible. Specifically, DW/OLAP systems almost always house confidential and sensitive data that must be restricted to authorized users. A primary limitation of many current systems is that they construct restrictions on top of very granular data model components, including elements such as tables, columns, and cells. This can produce complex and error prone mappings to the elements of the OLAP domain. In this paper, we propose a comprehensive security framework designed specifically for OLAP domains. The framework allows defining and associating security with an intuitive conceptual OLAP data model. Moreover, it provides an automatic form of access and inference control that is fast enough in practice to not affect query time. To ground our conceptual work, we have integrated our themes on the top of an OLAP-specific DBMS server to conduct a series of experiments. Results show the ratio of checking time to execution time varies considerable, depending on the specified security constraints. These times are acceptable, particularly given that checking costs do not grow with data set size.

Read less

View Paper    


Page : 1