161 results on '"Telephone network"'
Search Results
2. ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph
- Author
-
Muhammad Ajmal Azad, Junaid Arshad, and Farhan Riaz
- Subjects
social network analysis ,reputation ,spam over internet technology (spit) ,unwanted calls ,robo-callers ,telephone network ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Robo or unsolicited calls have become a persistent issue in telecommunication networks, posing significant challenges to individuals, businesses, and regulatory authorities. These calls not only trick users into disclosing their private and financial information, but also affect their productivity through unwanted phone ringing. A proactive approach to identify and block such unsolicited calls is essential to protect users and service providers from potential harm. Therein, this paper proposes a solution to identify robo-callers in the telephony network utilising a set of novel features to evaluate the trustworthiness of callers in a network. The trust score of the callers is then used along with machine learning models to classify them as legitimate or robo-caller. We use a large anonymized dataset (call detailed records) from a large telecommunication provider containing more than 1 billion records collected over 10 days. We have conducted extensive evaluation demonstrating that the proposed approach achieves high accuracy and detection rate whilst minimizing the error rate. Specifically, the proposed features when used collectively achieve a true-positive rate of around 97% with a false-positive rate of less than 0.01%.
- Published
- 2024
- Full Text
- View/download PDF
3. Expansionism-Based Design and System of Systems
- Author
-
Luo, Jianxi, Kacprzyk, Janusz, Series editor, Cardin, Michel-Alexandre, editor, Fong, Saik Hay, editor, Krob, Daniel, editor, Lui, Pao Chuen, editor, and Tan, Yang How, editor
- Published
- 2016
- Full Text
- View/download PDF
4. Low Sampling-rate Approach for ECG Signals with Compressed Sensing Theory
- Author
-
Mohammadreza Balouchestani, Kaamran Raahemifar, and Sridhar Krishnan
- Subjects
Engineering ,Telephone network ,Computer science ,business.industry ,Real-time computing ,Local area network ,ECG Signal ,Signal-to-noise ratio ,Compressed sensing ,Compressed Sensing ,Mobile phone ,Body area network ,Bit error rate ,Electronic engineering ,General Earth and Planetary Sciences ,Wireless ,Power Consumption ,Medical diagnosis ,Telecommunications ,business ,low sampling-rate approach ,Wireless sensor network ,General Environmental Science ,Block (data storage) - Abstract
Wireless Body Area Networks (WBANs) consist of tiny Biomedical Wireless Sensors (BWSs) and a Gate Way (GW) to connect to the external databases in the hospital and medical centres. The GW could connect the BWSs, to a range of wireless telecomnumication networks. These wireless telecommunication networks could be either a mobile phone network, a standard telephone network a dedicated medical centre or using public Wireless Local Area Networks (WLANs) nodes also known a Wi-Fi system. The electrocardiogram (ECG) signals are widely used in health care systems because they are non-invasive mechanisms to establish medical diagnosis of heart diseases. The current ECG systems suffer from important limitations: limited patient's mobility, limited energy, limited on wireless applications. The main drawback of current EGG systems is the location-specific nature of the systems due to the use of fixed/wired applications. That is why; there is a critical need to improve the current ECG systems to cover security handling and to achieve extended patient's mobility. With this in mind, Compressed Sensing (CS) procedure and the collaboration of Block Sparse Bayesian Learning (BSBL) framework is used to provide a robust low sampling-rate approach for normal and abnormal ECG signals. Advanced WBANs based on our approach will be able to deliver healthcare not only to patients in hospital and medical centres; but also in their homes and workplaces thus offering cost saving, and improving the quality of life. Our simulation results based on two proposed algorithms illustrate 15% incensement of Signal to Noise Ratio (SNR) and a good level of quality for the degree of incoherence between the random measurement and sparsity matrices.
- Published
- 2022
- Full Text
- View/download PDF
5. Conceptual Modeling of an IP Phone Communication System
- Author
-
Ghadeer Aldamkhi and Sabah Al-Fedaghi
- Subjects
Focus (computing) ,Telephone network ,Computer science ,business.industry ,Cloud computing ,General Medicine ,Communications system ,Telecommunications network ,Abstract machine ,law.invention ,Diagrammatic reasoning ,law ,Internet Protocol ,business ,Computer network - Abstract
In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations of the interiority of nodes. To give uniformity to this cascade of notions of basic units of nodes in network diagrams, the authors propose adoption of a new modeling methodology, called a thinging (abstract) machine (TM) (abstract machine of things) that represents all notions as a single diagrammatic machine. Because of the large number of network types, in this paper, they specifically and without loss of generality focus on IP telephone (internet protocol telephone) networks to exemplify communication networks. A real case study of IP telephone networks is modeled using TM.
- Published
- 2021
- Full Text
- View/download PDF
6. Using machine learning algorithms to detect frauds in telephone networks
- Author
-
Sergiu Apostu
- Subjects
Telephone network ,Computer science ,business.industry ,Principal component analysis ,Word2vec ,Artificial intelligence ,Logistic regression ,business ,Machine learning ,computer.software_genre ,computer ,Random forest - Abstract
This paper presents an analysis of voice traffic in telephone networks, based on machine learning algorithms to detect frauds made by callers. Starting from the raw data set that includes information about the call date, destination number, duration and caller's number, in our approach we were able to identify fraudulent calls in early stages. For balance, the data set was split in 2 parts: one for training and one for testing. To obtain mean’s values from dataset, a standardization technique was applied in order to scale the data before the dimensionality reduction using Principal Component Analysis. Then, the first two components were used as inputs for Logistic Regression and Random Forest models, having the caller as target. Finally, the target was moved on the destination file so as to identify the caller and the moment when the call has started based on a vector representation of words.
- Published
- 2021
- Full Text
- View/download PDF
7. Remote Assessment of Parkinson’s Disease Symptom Severity Using the Simulated Cellular Mobile Telephone Network
- Author
-
Lorraine O. Ramig, Max A. Little, and Athanasios Tsanas
- Subjects
Signal processing ,Telemedicine ,medicine.medical_specialty ,Parkinson's disease ,Decision support tool ,General Computer Science ,Computer science ,Biomedical Engineering ,03 medical and health sciences ,0302 clinical medicine ,Physical medicine and rehabilitation ,Rating scale ,Robustness (computer science) ,medicine ,General Materials Science ,Telephony ,Electrical and Electronic Engineering ,030304 developmental biology ,0303 health sciences ,Telephone network ,business.industry ,General Engineering ,Symptom severity ,medicine.disease ,Replication (computing) ,nonlinear speech signal processing ,Parkinson’s disease ,telemedicine ,business ,030217 neurology & neurosurgery - Abstract
Telemonitoring of Parkinson’s Disease (PD) has attracted considerable research interest because of its potential to make a lasting, positive impact on the life of patients and their carers. Purpose-built devices have been developed that record various signals which can be associated with average PD symptom severity, as quantified on standard clinical metrics such as the Unified Parkinson’s Disease Rating Scale (UPDRS). Speech signals are particularly promising in this regard, because they can be easily recorded without the use of expensive, dedicated hardware. Previous studies have demonstrated replication of UPDRS to within less than 2 points of a clinical raters’ assessment of symptom severity, using high-quality speech signals collected using dedicated telemonitoring hardware. Here, we investigate the potential of using the standard voice-over-GSM (2G) or UMTS (3G) cellular mobile telephone networks for PD telemonitoring, networks that, together, have greater than 5 billion subscribers worldwide. We test the robustness of this approach using a simulated noisy mobile communication network over which speech signals are transmitted, and approximately 6000 recordings from 42 PD subjects. We show that UPDRS can be estimated to withinless than 3.5 points difference from the clinical raters’ assessment, which is clinically useful given that the inter-rater variability for UPDRS can be as high as 4-5 UPDRS points. This provides compelling evidence that the existing voice telephone network has potential towards facilitating inexpensive, mass-scale PDsymptom telemonitoring applications.
- Published
- 2021
- Full Text
- View/download PDF
8. EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO
- Author
-
Igli Tafa, Fabjola Cejku, and Enkli Ylli
- Subjects
Authentication ,Service (systems architecture) ,Telephone network ,Voice over IP ,Exploit ,Computer science ,business.industry ,Usability ,Computer security ,computer.software_genre ,Packet switching ,Key (cryptography) ,business ,computer - Abstract
Voice over Internet Protocol (VoIP) has become mainstream in terms of the usability due to two key factors: flexibility and low cost, all of this towards classic PSTN (Public as well Service Telephone Network) based on several studies and the practical approach because your calls are no longer routed along a dedicated wire to a local exchange, but instead provider implements packet switching and the direct line needed is now performed by the VoIP provider. However, there are several concerns over security, [13] which is quite understandable. The rising issues have naturally come over the efficiency communication VoIP offers and with this being a main key, that’s where companies and businesses have invested, leaving things in the open over security. This study tries to exploit the vulnerabilities VoIP shows in its classic scenario and give a few suggestions on what to do regarding the problems raised during the way. All the work was based on previous knowledge regarding VoIP as studied in Computer Networks.
- Published
- 2021
- Full Text
- View/download PDF
9. Use of ICT to Enhance the Learning Process in Higher Education
- Author
-
Pushpa Gupta and Chetlal Prasad
- Subjects
Telephone network ,Knowledge management ,Higher education ,business.industry ,Process (engineering) ,Information and Communications Technology ,Economic interventionism ,Central government ,ComputingMilieux_COMPUTERSANDEDUCATION ,Acronym ,business ,Digital library - Abstract
ICTs in Education refers to the development of information and communications technology specifically for teaching/learning purposes, while the ICTs in education involves the adoption of general components of information and communication technologies in the teaching learning process. The National Mission on Education through Information and Communication Technology (NME-ICT), launched in 2009 by the Central Government. Let’s see how Information and Communication Technology (ICT) evolved the Higher Education system: The role of ICT in higher education, what students learn, The role of ICT in Higher Education, how Students Learn, The role of ICT in Higher Education, when students learn, The role of ICT in higher education, where students learn. Online courses, development of e-content, e-learning, digital libraries, online encyclopaedias, journals, and books would promote learning and make knowledge available to all irrespective of the distance or location or financial resources. Government intervention is necessary so that ICT can be made successful in higher education. Information and Communications Technology (ICT) has the proven power to change the world. This acronym refers to the merging of audiovisual and telephone networks with the computer single unified system of cabling.
- Published
- 2020
- Full Text
- View/download PDF
10. Socioscope: I know who you are, a robo, human caller or service number
- Author
-
Mamoun Alazab, Tariq Abullah, Junaid Arshad, Muahammad Ajmal Azad, and Farhan Riaz
- Subjects
computer_science ,Voice over IP ,Telephone network ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Cyber-security ,Computer security ,computer.software_genre ,Identification (information) ,Credit card ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Telephony ,business ,Information-security ,computer ,Software - Abstract
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in our daily life and have been widely adopted for business and personal communications. At the same time, scammers, criminals, and fraudsters have also find the telephony network an attractive and affordable medium to target end-users with the advertisement, marketing of legal and illegal products, and bombard them with the huge volume of unwanted calls. These calls would not only trick call recipients into disclosing their private information such as credit card numbers, PIN code which can be used for financial fraud but also causes a lot of displeasure because of continuous ringing. The fraudsters, political campaigners can also use telephony systems to spread malicious information (hate political or religious messages) in real-time through audio or text messages, which have serious political and social consequences if malicious callers are not mitigated in a quick time. In this context, the identification of malicious callers would not only minimize telephony fraud but would also bring peace to the lives of individuals. One way to classifies users as a spammer or legitimate is to get feedback from the call recipients about their recent interactions with the caller, but these systems not only bring inconvenience to callees but also require changes in the system design. The call detail records extensively log the activities of users and can be used to categorize them as the spammer and non-spammer. In this paper, we utilize the information from the call detailed records and proposed a spam detection framework for the telephone network that identifies malicious callers by utilizing the social behavioral features of users within the network. To this extent, we first model the behavior of the users as the directed social graph and then analyze different features of the social graph i.e. the Relationship Network and Call patterns of users towards their peers. We then used these features along with the decision tree to classify callers into three classes i.e. human, spammer and call center. We analyzed the call record data-set consisting of more than 2 million users. We have conducted a detailed evaluation of our framework which demonstrates its effectiveness by achieving acceptable detection accuracy and extremely low false-positive rate. The performance results show that the spammers and call center numbers not only have a large number of non-repetitive calls but also have a large number of short duration calls. Similarly, on the other hand, the legitimate callers have a good number of repetitive calls and most of them interacted for a relatively long duration.
- Published
- 2020
- Full Text
- View/download PDF
11. Telecommunication ties and gender ideologies in the age of globalization: International telephone networks and gender attitudes in 47 countries
- Author
-
Robert Faris, Xiaoling Shu, and George A. Barnett
- Subjects
Value (ethics) ,050402 sociology ,multilevel models ,media_common.quotation_subject ,Sex and gender ,Basic Behavioral and Social Science ,Globalization ,0504 sociology ,Political science ,Behavioral and Social Science ,050602 political science & public administration ,media_common ,Telephone network ,business.industry ,05 social sciences ,Multilevel model ,General Social Sciences ,Gender Equality ,Telecommunications network ,0506 political science ,Test (assessment) ,network ,Ideology ,Telecommunications ,business ,globalization - Abstract
Scholars have posed different hypotheses on the impact of global telecommunications on value orientations. We analyze and characterize the global telecommunication network and test a series of hypotheses on the relationship between gender values and three types of telephone connections: ties with the global society, ties with Western nations, and ties within groups of nations sharing similar cultural, religious, political, or geographical traits. We use multilevel models and data on two levels, between-country telecommunications network data from TeleGeography, and individual-level data ( N = 70,225) on people living in 47 countries from the World Value Survey, waves III and IV. Countries with high degrees of communication insulation, measured as a high percentage of within-group ties of all global telephone links, hold less egalitarian attitudes toward gender equality. This negative effect of group insulation depresses the egalitarian effects of younger birth cohort, college education, and higher income. Embeddedness in a localized information diffusion network and isolated from global communication is associated with less egalitarian attitude toward gender equality. But neither global ties nor ties with Western countries are linked with gender attitudes.
- Published
- 2020
- Full Text
- View/download PDF
12. Fault Diagnosis Knowledge Reasoning of Switching Network in Distributed Generation Based on Petri Net
- Author
-
Ziquan Liu, Chengbo Hu, Hui Fu, Ke Zhao, Jingtan Ma, and Zhu Xueqiong
- Subjects
Network architecture ,Telephone network ,Computer science ,business.industry ,Distributed computing ,Energy Engineering and Power Technology ,Distributed power ,Petri net ,Fault (power engineering) ,Telecommunications network ,Power (physics) ,Distributed generation ,Electrical and Electronic Engineering ,business - Abstract
Telephone network based on IMS technology has been widely applied inpower production and dispatching communication, especially in distributedpower stations. Analysis and positioning failure of IMS network is arduous,because it’s dependent on IP data communication network. In this paper,we first introduced IMS switching network architecture and distributed gen-eration communication network architecture, analyzed and summarized allkinds of network malfunction. Combining typical IMS network fault con-nection relations, we introduced an improved Petri net fault handling modeland reasoning method. The diagnosis and positioning results could reflectthe defects of equipment logic functions. This method on fault diagnosisand location of substation network has been proved to be effective throughpractical application.
- Published
- 2021
- Full Text
- View/download PDF
13. Assessing Parkinson’s Disease at Scale Using Telephone-Recorded Speech:Insights from the Parkinson’s Voice Initiative
- Author
-
Siddharth Arora and Athanasios Tsanas
- Subjects
Medicine (General) ,medicine.medical_specialty ,Parkinson's disease ,Clinical Biochemistry ,Population ,sustained vowel phonations ,Feature selection ,dysphonia measures ,Audiology ,Clinical decision support system ,Article ,R5-920 ,medicine ,Phonation ,education ,education.field_of_study ,Telephone network ,business.industry ,S Voice ,telemonitoring ,medicine.disease ,Support vector machine ,acoustic measures ,clinical decision support tool ,Parkinson’s disease ,biomarker ,business - Abstract
Numerous studies have reported on the high accuracy of using voice tasks for the remote detection and monitoring of Parkinson’s Disease (PD). Most of these studies, however, report findings on a small number of voice recordings, often collected under acoustically controlled conditions, and therefore cannot scale at large without specialized equipment. In this study, we aimed to evaluate the potential of using voice as a population-based PD screening tool in resource-constrained settings. Using the standard telephone network, we processed 11,942 sustained vowel /a/ phonations from a US-English cohort comprising 1078 PD and 5453 control participants. We characterized each phonation using 304 dysphonia measures to quantify a range of vocal impairments. Given that this is a highly unbalanced problem, we used the following strategy: we selected a balanced subset (n = 3000 samples) for training and testing using 10-fold cross-validation (CV), and the remaining (unbalanced held-out dataset, n = 8942) samples for further model validation. Using robust feature selection methods we selected 27 dysphonia measures to present into a radial-basis-function support vector machine and demonstrated differentiation of PD participants from controls with 67.43% sensitivity and 67.25% specificity. These findings could help pave the way forward toward the development of an inexpensive, remote, and reliable diagnostic support tool for PD using voice as a digital biomarker.
- Published
- 2021
- Full Text
- View/download PDF
14. Decentralized Blockchain Based System for Secure Data Storage in Cloud
- Author
-
S. Uthayashangar, T. Dhanya, S. Dharshini, and R. Gayathri
- Subjects
Telephone network ,Blockchain ,business.industry ,Computer science ,Advanced Encryption Standard ,Computer data storage ,Systems architecture ,Solidity ,Schematic ,Cloud computing ,business ,Computer network - Abstract
Cloud computing is one of the leading options to store massive amount of data. The metaphor of the cloud was borrowed from old telecoms network schematics, in which the public telephone network was often represented as a cloud to denote that the just did not a matter it was just a cloud of stuff. However, cost and risk will increase inthe organization which are using cloud platforms. Hence this paper combines Cloud with blockchain technology to produce a secured file storage system. Blockchain is considered by many to be the safest technology. Here, a single file is splited and stored in blocks using the file manipulation and Advanced Encryption Standard (AES) algorithms. A high level, contract oriented language, Solidity is used for writing smart contracts. The system architecture which explains the cloud and blockchain processes is constructed. This system also ensures that it is free from attacks such as Brute force. Finally, the blockchain network in the cloud platform is implemented.
- Published
- 2021
- Full Text
- View/download PDF
15. El edificio de Telefónica en Cáceres (1935-1938/39)
- Author
-
Cristian Holgado Ávila
- Subjects
Telephone network ,paulino gusto gayo marín ,lcsh:NX1-820 ,Media studies ,cáceres ,Urban evolution ,arquitectura ,lcsh:Arts in general ,Constructive ,law.invention ,Shareholder ,Order (business) ,law ,compañía telefónica española ,Telephone exchange ,Political science ,central telefónica ,Architecture ,lcsh:NX440-632 ,lcsh:History of the arts - Abstract
Entre 1935 y 1938-1939 la Compañía Telefónica Española construyó una central en Cáceres para instalar los equipos de la nueva red automática de telefonía. Fue diseñada por Paulino Justo Gayo Marín, arquitecto que tuvo gran protagonismo en el desarrollo de este tipo de arquitectura en España. Las centrales telefónicas fueron edificios diseñados con una doble intención: incorporar modernos sistemas de comunicación y proyec-tar edificios con una estética «propagandística», cuya finalidad era atraer a inversores y accionistas. Este ar-tículo trata de explicar tras un pequeño recorrido histórico y arquitectónico, la creación y las ideas constructi-vas de la compañía española, para conocer el valor que tiene la obra de Cáceres en el desarrollo urbano de la ciudad.
- Published
- 2019
16. An Analysis of DDoS Attacks on the Instant Messengers
- Author
-
Muhammad Zahid Khan, Sohail Abbas, Haseeb Ur Rahman, Mohammad Faisal, and Arif Ur Rahman
- Subjects
Unix ,Voice over IP ,Telephone network ,Article Subject ,Game theoretic ,Computer Networks and Communications ,business.industry ,Computer science ,Denial-of-service attack ,Computer security ,computer.software_genre ,Domain (software engineering) ,lcsh:Technology (General) ,lcsh:T1-995 ,Apple macintosh ,lcsh:Science (General) ,business ,computer ,lcsh:Q1-390 ,Information Systems - Abstract
Latest technologies of voice over IP (VoIP) and mobile messaging for smartphones messengers such as WhatsApp, Viber, Skype, etc., offer free-of-charge facilities of worldwide SMS, MMS, and voice calls to their users, unlike the traditional and expensive cellular or telephone networks’ services. Customers of the formerly mentioned messengers are estimated in millions because of the attractive features offered by them. However, these messengers face many cyber security threats and the required security features are either not available at all or are insufficient for efficiently countering the threats. Professionals working in the domain of cyber security are challenged by the devastating effects of distributed denial of service (DDoS) attacks on all major platforms including Apple Macintosh, Windows, Unix, and Linux. In this paper, we demonstrate the effect of DDoS attack on the performance of an IRC server using a test bed. We use a game theoretic model to analyze the feasibility of DDoS attacks on the IRC platform, keeping in view the attacker’s objective. The analysis will help the security experts to propose appropriate countermeasures to reduce the attackers’ utility, thereby making it less attractive for those attackers to launch the attack.
- Published
- 2019
- Full Text
- View/download PDF
17. Analysis of Social Networks, Communication Networks and Shortest Path Problems in the Environment of Interval-Valued q-Rung Ortho Pair Fuzzy Graphs
- Author
-
José Carlos R. Alcantud, Lemnaouar Zedam, Tahir Mahmood, Kifayat Ullah, Naeem Jan, and Bijan Davvaz
- Subjects
Telephone network ,Theoretical computer science ,Degree (graph theory) ,Computer science ,Fuzzy set ,Computational intelligence ,Theoretical Computer Science ,Set (abstract data type) ,Computational Theory and Mathematics ,Artificial Intelligence ,Shortest path problem ,Path (graph theory) ,Software ,Complement (set theory) - Abstract
The ideas of q-rung ortho pair fuzzy set (q-ROPFS) and interval-valued q-rung ortho pair fuzzy set (IVq-ROPFS) are two major recent developments in the field of fuzzy set theory. A q-ROPFS and IVq-ROPFS improved the limited structures of Pythagorean fuzzy set, intuitionistic fuzzy set as well as fuzzy set by improving the conditions that makes these concepts restricted. The goal of this research is to introduce a new notion of interval-valued q-rung ortho pair fuzzy graph (IVQ-ROPFG) and to study the related graphical terms such as subgraph, complement, degree of vertices and path etc. Each of the graphical concept is demonstrated with an example. Another valuable contribution of this manuscript is the modeling of some traffic networks, telephone networks and social networks using the concepts of IVQ-ROPFGs. First, the famous problem of finding a shortest path in a traffic network is studied using two different approaches. A study of social network describing the strength of co-authorship between different researchers from several countries is also established using the concept of IVq-ROPFGs. Finally, a telephone networking problem is demonstrated showing the calling ratios of incoming and outgoing calls among a group of people. Two engineering decision-making problems are also studied using some aggregation operators and the concepts of IVq-ROPFGs. Through comparative study, the advantages of working in the environment of IVq-ROPFG are specified.
- Published
- 2019
- Full Text
- View/download PDF
18. Design and reliability analysis of fault-tolerant shuffle exchange gamma logical neighborhood interconnection network
- Author
-
Dilip Kumar Yadav and Amit Prakash
- Subjects
020203 distributed computing ,Interconnection ,Telephone network ,Computer science ,business.industry ,Reliability (computer networking) ,Multistage interconnection networks ,Multiprocessing ,Fault tolerance ,02 engineering and technology ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Theoretical Computer Science ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Crossbar switch ,business ,Software ,Information Systems ,Computer network - Abstract
Multistage interconnection networks are used as a medium for interconnecting processors and memories in multiprocessor systems. Multistage interconnection networks are an effective substitute for crossbar switches, used in telephone network systems and parallel computers, due to their low cost, better performance and easy maintainability. In this paper, we propose new fault-tolerant hybrid multistage interconnection networks obtained from shuffle exchange gamma interconnection network (SEGIN) and logical neighborhood network named as shuffle exchange gamma logical neighborhood interconnection network (SEGLNIN). We evaluated the performance of SEGLNIN in terms of disjoint paths, reliability and hardware cost and compared it with some well-known MINs like shuffle exchange network (SEN), shuffle exchange network with one extra stage (SEN +) and shuffle exchange network with two extra stages (SEN + 2), SEGIN-1, and SEGIN-2. The results illustrate that the performance of the proposed SEGLNIN is better than that of the compared networks in terms of reliability and disjoint paths.
- Published
- 2019
- Full Text
- View/download PDF
19. Telephone networks, BBSes, and the emergence of the transnational ‘warez scene’
- Author
-
Patryk Wasiak
- Subjects
Telephone network ,Software ,History and Philosophy of Science ,business.industry ,Computer science ,Technological convergence ,Bulletin board system ,Telecommunications ,business ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) - Abstract
This article analyzes how software pirates who formed the ‘warez scene’ appropriated telephone network infrastructures and Bulletin Board System (or BBS) technology to circulate computer so...
- Published
- 2019
- Full Text
- View/download PDF
20. Phone of Things (PoT) : Empowering IoT Systems Through the Ubiquitous Telephone Network Infrastructure and Voice Commands
- Author
-
Khalid Elgazzar and Haytham Khalil
- Subjects
Public switched telephone network ,Voice over IP ,Telephone network ,business.industry ,Computer science ,Phone ,Usability ,Landline ,Voice command device ,Modular design ,business ,Computer network - Abstract
This paper introduces the concept of Phone of Things (PoT), a novel approach to extend the connectivity options for IoT systems through the pervasive telephone network infrastructure. This is a paradigm shift that integrates traditional telephones to monitor and control IoT-enabled devices via VoIP protocols and public switched telephone network (PSTN). This integration democratizes IoT through the promotion of a Do-It-Yourself (DIY) IoT system that takes advantage of the freedom the comes with open-source technologies and leverages the emerging cloud-hosted services to build customized IoT solutions while accentuating affordability, accessibility, performance, ease of use, and security. Nevertheless, the proposed system inhibits a modular design philosophy that allows the system to be tailored and scaled according to the application needs with minimum hardware and software modification requirements. The proposed paradigm provides an arbitrarily shared data space between IoT systems which would coalesce into a social network of things (SNT) and support assistive services in public sensing.
- Published
- 2021
- Full Text
- View/download PDF
21. Detection of Telephony Spam and Scams using Recurrent Neural Network (RNN) Algorithm
- Author
-
S. Mohana Gowri, T Tharani, G Sharang Ramana, and M Sree Ranjani
- Subjects
Telephone network ,business.industry ,Computer science ,Deep learning ,020206 networking & telecommunications ,02 engineering and technology ,Support vector machine ,Recurrent neural network ,Phone ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Telephony ,State (computer science) ,business ,Algorithm - Abstract
Malicious phone calls, including spam and scams, caused millions of global financial losses every year and was a difficult problem over many years. This work introduces the solution based on machine learning for telecommunications without underlying the telephone network infrastructure. The major obstacle of this ten years old problem is building efficient functions without access to the telephony network infrastructures. The previous Spam Call data set is collected first. The dataset includes several labelbased features to predict malicious calling. We primarily focus on using Recurrent Neural Network (RNN) algorithm to detect the malicious calls. With the proposed features, we review different state of the art methods of machine-learning, and it is inferred that the most optimal approach can minimize malicious calls to 90% while keeping over 90% of the binary call accuracy. The outcomes also show that without significant overhead latency the models can be implemented effectively with the help of an evaluation analysis.
- Published
- 2021
- Full Text
- View/download PDF
22. X-Vectors: new quantitative biomarkers for early Parkinson's disease detection from speech
- Author
-
Laetitia Jeancolas, Dijana Petrovska-Delacrétaz, Graziella Mangone, Badr-Eddine Benkelfat, Jean-Christophe Corvol, Marie Vidailhet, Stéphane Lehéricy, Habib Benali, Institut du Cerveau et de la Moëlle Epinière = Brain and Spine Institute (ICM), Institut National de la Santé et de la Recherche Médicale (INSERM)-CHU Pitié-Salpêtrière [AP-HP], Assistance publique - Hôpitaux de Paris (AP-HP) (AP-HP)-Sorbonne Université (SU)-Assistance publique - Hôpitaux de Paris (AP-HP) (AP-HP)-Sorbonne Université (SU)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Institut Polytechnique de Paris (IP Paris), Département Electronique et Physique (EPH), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), ARMEDIA (ARMEDIA-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Service de Neuroradiologie [CHU Pitié-Salpêtrière], CHU Pitié-Salpêtrière [AP-HP], Assistance publique - Hôpitaux de Paris (AP-HP) (AP-HP)-Sorbonne Université (SU)-Assistance publique - Hôpitaux de Paris (AP-HP) (AP-HP)-Sorbonne Université (SU), Traitement de l'Information Pour Images et Communications (TIPIC-SAMOVAR), Concordia University [Montreal], Jeancolas, Laetitia, Institut du Cerveau = Paris Brain Institute (ICM), Assistance publique - Hôpitaux de Paris (AP-HP) (AP-HP)-Institut National de la Santé et de la Recherche Médicale (INSERM)-CHU Pitié-Salpêtrière [AP-HP], Assistance publique - Hôpitaux de Paris (AP-HP) (AP-HP)-Sorbonne Université (SU)-Sorbonne Université (SU)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), and Département Electronique et Physique (TSP - EPH)
- Subjects
FOS: Computer and information sciences ,Sound (cs.SD) ,Computer science ,Speech recognition ,Parkinson's disease ,02 engineering and technology ,[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE] ,Quantitative Biology - Quantitative Methods ,Computer Science - Sound ,Voice analysis ,0302 clinical medicine ,[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing ,Audio and Speech Processing (eess.AS) ,Deep neural networks ,Quantitative Methods (q-bio.QM) ,Original Research ,Artificial neural network ,Early detection ,Speaker recognition ,[INFO.INFO-SD] Computer Science [cs]/Sound [cs.SD] ,Computer Science Applications ,MFCC ,[INFO.INFO-SD]Computer Science [cs]/Sound [cs.SD] ,[SDV.NEU]Life Sciences [q-bio]/Neurons and Cognition [q-bio.NC] ,Mel-frequency cepstrum ,Electrical Engineering and Systems Science - Audio and Speech Processing ,X-vectors ,[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing ,Microphone ,0206 medical engineering ,[INFO.INFO-NE] Computer Science [cs]/Neural and Evolutionary Computing [cs.NE] ,Biomedical Engineering ,Neuroscience (miscellaneous) ,Context (language use) ,lcsh:RC321-571 ,03 medical and health sciences ,[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG] ,Classifier (linguistics) ,FOS: Electrical engineering, electronic engineering, information engineering ,[SDV.NEU] Life Sciences [q-bio]/Neurons and Cognition [q-bio.NC] ,lcsh:Neurosciences. Biological psychiatry. Neuropsychiatry ,Telediagnosis ,Telephone network ,[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG] ,020601 biomedical engineering ,ComputingMethodologies_PATTERNRECOGNITION ,FOS: Biological sciences ,Automatic detection ,030217 neurology & neurosurgery ,Neuroscience - Abstract
Many articles have used voice analysis to detect Parkinson's disease (PD), but few have focused on the early stages of the disease and the gender effect. In this article, we have adapted the latest speaker recognition system, called x-vectors, in order to detect an early stage of PD from voice analysis. X-vectors are embeddings extracted from a deep neural network, which provide robust speaker representations and improve speaker recognition when large amounts of training data are used. Our goal was to assess whether, in the context of early PD detection, this technique would outperform the more standard classifier MFCC-GMM (Mel-Frequency Cepstral Coefficients - Gaussian Mixture Model) and, if so, under which conditions. We recorded 221 French speakers (including recently diagnosed PD subjects and healthy controls) with a high-quality microphone and with their own telephone. Men and women were analyzed separately in order to have more precise models and to assess a possible gender effect. Several experimental and methodological aspects were tested in order to analyze their impacts on classification performance. We assessed the impact of audio segment duration, data augmentation, type of dataset used for the neural network training, kind of speech tasks, and back-end analyses. X-vectors technique provided better classification performances than MFCC-GMM for text-independent tasks, and seemed to be particularly suited for the early detection of PD in women (7 to 15% improvement). This result was observed for both recording types (high-quality microphone and telephone)., Submitted
- Published
- 2021
- Full Text
- View/download PDF
23. The Origin and Evolution of Open Programmable Networks and SDN
- Author
-
Nikos Anerousis, Stephen B. Weinstein, Aurel A. Lazar, Nelu Mihai, Prosper Chemouil, Auteur indépendant, CEDRIC. Réseaux et Objets Connectés (CEDRIC - ROC), Centre d'études et de recherche en informatique et communications (CEDRIC), Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)-Conservatoire National des Arts et Métiers [CNAM] (CNAM)-Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)-Conservatoire National des Arts et Métiers [CNAM] (CNAM), and Columbia University [New York]
- Subjects
OpenFlow ,Telephone network ,business.industry ,Computer science ,Network packet ,Control (management) ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Term (time) ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF] ,0202 electrical engineering, electronic engineering, information engineering ,Forwarding plane ,020201 artificial intelligence & image processing ,The Internet ,Electrical and Electronic Engineering ,business ,Telecommunications ,ComputingMilieux_MISCELLANEOUS - Abstract
The term “SDN” represents a significant evolution in networking technology and draws attention and support from network operators, vendors, researchers and industry regulators. Contrary to popular belief that SDN is a recent invention, or is related only to IP technologies, the concept of network programmability and control/data plane separation has its roots in the 1960s and 1970s when the telephone network started its transition to digital. Many iterations followed, leading to applications in packet networks and today’s Internet. In this article, we review a number of early works on network programmability that illustrate how several features of SDN emerged progressively over several decades. Our review starts from the early concepts of network control in the telephone network and continues to examine a prolific period of research advancements in the 1990s and early 2000s that led to a number of startup companies that followed, IEEE’s own efforts in standardizing network programmability, and finally the arrival of the OpenFlow standard. We study the importance of this architectural transformation and its influences on modern cloud computing and next-generation networking.
- Published
- 2021
- Full Text
- View/download PDF
24. Introduction to Telecommunication Networks
- Author
-
Giovanni Giambene
- Subjects
Telephone network ,business.industry ,Computer science ,Coaxial cable ,Frame Relay ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Integrated Services Digital Network ,Passive optical network ,Telecommunications network ,Teletraffic engineering ,law.invention ,X.25 ,law ,Telecommunications ,business - Abstract
Before focusing our interest on telecommunication networks, it is important to take a brief look at the history of telecommunications, referring to the most important steps, which are at the basis of modern transmissions of signals at distance.
- Published
- 2021
- Full Text
- View/download PDF
25. Modeling the Acoustoelectric Effect in a Telephone Using COMSOL Multiphysics
- Author
-
Anatoly Horev and Lukmanova Oksana
- Subjects
Telephone network ,Piezoelectric speaker ,Computer science ,Microphone ,Buzzer ,Acoustics ,Multiphysics ,Information leakage ,Actuator ,Communication channel - Abstract
Telephones are one of the most common telecommunication devices in the protected premises. The telephone includes various acoustic transducers (speaker, microphone), as a result of which these devices have a microphone effect and can cause leakage of speech information into the telephone network. This paper describes the model of the piezoelectric speaker of the Gigaset DA210 telephone connected to the buzzer circuit using simulations in COMSOL Multiphysics. The piezoelectric (Lead Zirconate Titanate 8) actuator is investigated, a comparison based on the obtained results of acoustic transducers is made with the parameters specified by the piezoelectric speaker designers. The paper studies the characteristics of this piezoelectric speaker as a sensor under the influence of an acoustic field, as a result of which a technical channel of speech information leakage channel. Based on the data obtained, the speech intelligibility assessment in the telephone network is made using the developed model. The results can be used in the development of secure telephones and the educational process in the training of specialists in the area of information security.
- Published
- 2021
- Full Text
- View/download PDF
26. Research on 5G-based Network Nuclear Phase Phasing Technology
- Author
-
Niu Jian, Sun Dawei, He Jianan, Liu Haitao, Li Xutao, and Liu Gang
- Subjects
Telephone network ,Computer science ,business.industry ,Electrical engineering ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Network layer ,Application layer ,Electric power system ,Base station ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Electric power ,business ,Wireless sensor network - Abstract
The 5G network phasing system is a remote phasing system that uses 5G network timing technology, wireless transmission technology, telephone network, ultrahigh voltage spark discharge processing, and phasing recognition to be applied to power systems. It can achieve ultra-high voltage and remote phasing in a few seconds. Measurement of distance, phase difference between power systems in different places, determination of phase, and calculation of phase angle. This system is mainly composed of server (platform layer) base station group (sensing layer), handheld terminal (sensing layer and application layer) and network layer (LAN/WIFI/5G network or electric power network). After testing, the system has been successfully applied in the power supply company's operation, maintenance, and technological transformation projects, and the application situation is explained in detail.
- Published
- 2021
- Full Text
- View/download PDF
27. Optimization of Internet of Things E-Commerce Logistics Cloud Service Platform Based on Mobile Communication
- Author
-
Xi Zhou, Chenyang Zhao, Shiyan Xu, Maoguo Wu, Huan Wu, and Jun Chen
- Subjects
Service (business) ,Multidisciplinary ,Telephone network ,General Computer Science ,Article Subject ,business.industry ,05 social sciences ,Cloud computing ,02 engineering and technology ,E-commerce ,QA75.5-76.95 ,Bottleneck ,Data flow diagram ,Order (business) ,Electronic computers. Computer science ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Mobile telephony ,business ,Telecommunications ,050203 business & management - Abstract
E-commerce conceivable future trade, consumption, and service is a new digital employer mode. Therefore, in order to decorate the customary natural environment of operation, it is quintessential to get rid of the preferred desktop in the true field, create a social logistics and transportation administration computing device with commodity agents and distributors as the key features, and mix freight logistics, business enterprise approach waft and data waft advertising and marketing, and advertising and marketing organically. The notion of e-commerce logistics looks alongside the enchantment vogue of neighborhood technological knowledge and social demand. It is an integral part of ending e-commerce authentic economic value. All kinds of cell networks clear up the problem of data flow communication; in the technological know-how of telephone network, digital cost solves the bother of capital flow; at present, logistics is however a long-standing problem of e-commerce. Logistics has grown to be the last and entirely bottleneck of e-commerce. If logistics cannot adapt to the enchantment of e-commerce, it may also additionally lead to the slow enchantment of e-commerce. The purpose of this paper is to supply an Internet of things (IoT) e-commerce logistics cloud provider platform based totally absolutely on cell communication, which can be combined with e-commerce and beautify the transport tempo of e-commerce. This paper moreover optimizes the e-commerce logistics system, so that it can combine with e-commerce to increase out the distribution of goods, the distribution tempo of e-commerce is doubled, and e-commerce can in a similar fashion develop rapidly.
- Published
- 2021
- Full Text
- View/download PDF
28. An Analysis of Applying STIR/SHAKEN to Prevent Robocalls
- Author
-
James Yu
- Subjects
Telephone network ,Voice over IP ,business.industry ,Commission ,Service provider ,Computer security ,computer.software_genre ,law.invention ,Caller ID ,law ,Phone ,Internet Protocol ,Telephony ,business ,computer - Abstract
The robocall epidemic has caused millions of phone scam victims resulting in billions of financial loss in the USA. To address this issue, Federal Communication Commission (FCC) mandates all Internet Telephony Service Providers (ITSP) to implement Secure Telephony Identity Revisited (STIR) with the Signature-based Handling of Asserted information using toKENs (SHAKEN) to authenticate Voice of Internet Protocol (VoIP) calls on their networks. This chapter provides an analysis of the effectiveness of STIR/SHAKEN in protecting users from being victims of robocalls which are mostly scam calls with fake caller ID. Our analysis shows three majors issues that could have impact on the effectiveness of STIR/SHAKEN. These issues are (a) poorly protected enterprise IP-PBX, (b) unscrupulous service providers, and (c) lack of support of Q.1912.5, which is the interworking standard between IP and Public Switch Telephone Network (PSTN).
- Published
- 2021
- Full Text
- View/download PDF
29. Design and Implementation of a EWBS Gateway over an IP Telephone Network
- Author
-
Yeslie Sambrano, Nancy Paredes, Freddy Acosta, and Gonzalo Olmedo
- Subjects
education.field_of_study ,Telephone network ,Voice over IP ,Event (computing) ,Computer science ,business.industry ,Population ,Digital terrestrial television ,Default gateway ,Digital broadcasting ,education ,business ,Telecommunications ,Vulnerability (computing) - Abstract
Being part of the so-called “Pacific Ring of Fire” and “Belt of Low Pressure,” Ecuador is located in one area most likely to suffer seismic, volcanic, and hydrometeorological threats, which make it possible to catalog as a country with a high vulnerability. For this reason, the use of alert systems such as Emergency Warning Broadcasting System EWBS is necessary for the face of one of these threats, which can be implemented in analog and digital broadcast signals such as Digital Terrestrial Television. In an emergency, the receivers compatible with the EWBS are currently the decoders or digital televisions that include this system. They turn on automatically and emit a visual and audible alert signal that gives time to the population to act more quickly to an event. This article presents the design proposal of a receiver that replicates the warning emergency alert EWBS for digital terrestrial television with the ISDB-Tb standard, through an institutional telephone PBX, implementing an IP telephony server that receives the EWBS system and replicates it to landlines, infocast systems, and mobile phones connected to it, thus avoiding a percentage of losses in the economic and human fields.
- Published
- 2021
- Full Text
- View/download PDF
30. Multicarrier Modulation and OFDM
- Author
-
Joachim Speidel
- Subjects
Telephone network ,business.industry ,Computer science ,Orthogonal frequency-division multiplexing ,Modulation ,Cellular network ,Electronic engineering ,Digital television ,Telephony ,Broadcasting ,business ,Multiplexing - Abstract
The division of a frequency band into dedicated channels by modulation, called frequency-division multiplexing (FDM), has a long history. Prominent examples are the analog telephone networks until the 1970s. They were replaced by digital telephony, operating with time-division multiplex (TDM), in which dedicated time slot are allocated to each application. Moreover, the analog and later the digital television broadcasting networks—terrestrial, satellite and cable based—operate with FDM. Most mobile and cellular networks today utilize combinations of FDM and TDM.
- Published
- 2021
- Full Text
- View/download PDF
31. Answering the Call of Automation: How the Labor Market Adjusted to the Mechanization of Telephone Operation
- Author
-
Daniel P. Gross and James Feigenbaum
- Subjects
Labour economics ,Telephone network ,Work (electrical) ,business.industry ,media_common.quotation_subject ,Service (economics) ,Unemployment ,Business ,Census ,Affect (psychology) ,Automation ,media_common - Abstract
Telephone operation, one of the most common jobs for young American women in the early 1900s, provided hundreds of thousands of female workers a pathway into the labor force. Between 1920 and 1940, AT&T adopted mechanical switching technology in more than half of the U.S. telephone network, replacing manual operation. We show that although automation eliminated most of these jobs, it did not affect future cohorts' overall employment: the decline in demand for operators was counteracted by growth in both middle-skill jobs like secretarial work and lower-skill service jobs, which absorbed future generations. Using a new genealogy-based census linking method, we show that incumbent telephone operators were most impacted by automation, and a decade later were more likely to be in lower-paying occupations or have left the labor force entirely.
- Published
- 2020
- Full Text
- View/download PDF
32. Voice Cipher Using Rc4 Algorithm
- Author
-
Marwah Kamil Hussein
- Subjects
Cellular communication ,Telephone network ,Cipher ,Computer science ,GSM ,Mobile phone ,business.industry ,RC4 ,Sound quality ,Encryption ,business ,Algorithm - Abstract
Encryption plays a major role in achieving privacy, especially in communications and information systems such as military systems, banks, telecommunications and individuals, and in mobile phone networks in particular. The (GSM) standard provides a level of privacy that may not be sufficient for some users, as this study is presented a proposed system for applying audio coding in cellular communication networks from the beginning (mobile) to the end (mobile (via the standard mobile communications system) GSM), and in this standard is used the A5 algorithm for audio coding is only for transmitting stations, while for the rest of the network it is without transmitting coding the data as it is, so we in this study proposed the application of RC4 algorithm with A5 algorithm through encryption keys controlled by the sender and receiver in audio coding from start to finish to ensure complete encryption and privacy in network phone calls and the tool used in this the research is a matlab program to create a simulated environment for the transmission between the sender and the receiver to add the RC4 algorithm for these stages and one of the results of the study using the RC4 algorithm in the transmission model in the telephone network can achieve greater privacy in telephone calls communication without affecting the sound quality through the two encryption keys controlled by both ends connection.
- Published
- 2020
- Full Text
- View/download PDF
33. La red telefónica insular del Cabildo de Tenerife (1914-1938): del sistema aislado a la convivencia con el monopolio
- Author
-
Pérez Jiménez, Rafael and QUINTANA NAVARRO, FRANCISCO
- Subjects
Red telefónica ,Cabildo Insular ,Tenerife ,CTNE ,RTIT ,telephone network ,Cabildo - Abstract
This paper presents a review of the history of the insular telephone network of Tenerife (RTIT). The development of this telephone service was the best example in the Canary Islands of the commitment of a local administration, as its implementation represented a great economic effort at a time when the economy of the archipelago had not yet recovered from the crisis of the Great War. With this, it was possible to create a communication ring that managed to connect almost all the inhabited nuclei on the island, which continued even beyond the concession of the telephone monopoly in Spain to the CTNE in 1924., En este trabajo se analiza, por primera vez, la trayectoria histórica de la Red Telefónica Insular de Tenerife (RTIT), que constituyó el mejor ejemplo en Canarias de compromiso de la administración local con el desarrollo del servicio telefónico desde una perspectiva social, y su tendido supuso un gran esfuerzo económico en una etapa en que la economía del Archipiélago aún no se había recuperado de la crisis de la Gran Guerra. De este modo se consiguió crear un anillo de comunicaciones que consiguió conectar prácticamente todos los núcleos habitados de la isla, y que tuvo permanencia incluso más allá de la concesión del monopolio de servicio a la Compañía Telefónica Nacional de España (CTNE) en 1924.
- Published
- 2020
34. Osmanlı Devleti’nde İletişim Araçlarının Kontrolü: 'Telefon Tevkifleri'
- Author
-
Şeyhmus Bingül
- Subjects
Reign ,teknoloji tarihi ,seizure of telephones ,prohibition of telephones ,telefon tevkifi ,osmanlı i̇mparatorluğu ,media_common.quotation_subject ,i̇catlar ,History (General) ,ottoman empire ,second constitution ,Political science ,D1-2009 ,Economic history ,telefon yasağı ,telegraph ,media_common ,Telephone network ,telgraf ,Constitution ,inventions ,History of technology ,Empire ,ii. meşrutiyet ,history of technology ,Ottoman empire ,History (General) and history of Europe ,Technological advance ,Bureaucracy - Abstract
On dokuzuncu yüzyılın bilim ve teknik alanındaki başlıca icatlarından biri telefondur. 1875’teki icadından sonra dünya ülkelerine hızla yayılmıştır. Osmanlılar, patenti Alexander Graham Bell tarafından 1876’de alınan telefon ile II. Abdülhamid döneminde, 1881’de tanışmıştır. Ancak telefonla ilk deneyimleri çok kısa sürmüştür: Telefon, “gizli-saklı” işlerde kullanılma ihtimali üzerine, 1886’da yasaklanmıştır. Avrupa’dan Osmanlı liman kentlerine gelen telefonlar gümrüklerde “tevkif edilerek” muhafaza altına alınmıştır. Bu tedbirlere rağmen telefonun kaçak yollarla ülkeye girişi engellenememiş ve zaman içerisinde kullanımına yönelik talepler artmıştır. II. Meşrutiyet’in liberal politikaları çerçevesinde yabancı şirketlere imtiyaz verilerek telefon kullanımı teşvik edilmiştir. İstanbul, telefon ile özdeşleşen başlıca Osmanlı kenti olmuştur. İzmir ve Aydın gibi ticaret kentleri ile Anadolu’nun muhtelif yerlerindeki kullanımı sınırlı kalmıştır. Telefonun Osmanlı’ya ilk girişinden serbest bırakılmasına kadar geçen sürede, popüler süreli yayınlarda telefona dair geniş bir literatür oluşmuştur. Bu süre içerisinde, telefon kullanımı konusunda gelişmiş ülkelere nazaran oldukça geri kalan Osmanlı’nın telefonla imtihanı yoğun bürokratik yazışmalarda da kendini göstermiştir. An important technological advance of the nineteenth century, the telephone, spread throughout the world following its invention in 1875. Patented by Alexander Graham Bell in 1876, it was introduced in the Ottoman Empire in 1881 during Abdulhamid II’s reign. The Ottomans’ experience with the device was rather short: It was prohibited because of possible clandestine uses. Devices arriving in Ottoman harbours were seized and stored. However, the illegal import of the telephones could not be prevented because of increasing demands. The liberalistic policies of the Second Constitution that extended privileges to foreign companies, encouraged its use. Istanbul had the largest telephone network but its use was limited in İzmir, Aydın and other Anatolian cities. From its introduction to its free use in 1908, a large amount of literature appeared in popular periodicals. Telephone-related issues were discussed in many bureaucratic documents which witnessed its delayed adoption in the Empire, compared to developed countries of the time.
- Published
- 2020
35. Development of a System of Anonymizing Mobile Calls
- Author
-
Nikita S. Ivanov, Irina F. Babalova, and Alyona V. Borushnova
- Subjects
Service (systems architecture) ,Voice over IP ,Telephone network ,business.industry ,GSM ,Computer science ,The Internet ,Telephony ,business ,Anonymity ,Asterisk ,Computer network - Abstract
Voice over Internet Protocol (VoIP) is a technology that allows people to use the Internet, rather than a traditional telephone network. VoIP is becoming more and more popular due to its significant advantages. VoIP telephony has become the most developed and frequently used cellular service. It also created new threats to caller’s privacy. Due to the high degree of interest in ensuring anonymization of calls in the GSM network. Previous research on the development of algorithms to increase anonymization in IP-telephony and their implementation. In this work, we developed a new mechanism for achieving anonymity in the Global System for Mobile Communications (GSM - Global System for Mobile Communications). The lowest probability of anonymity disclosure in this algorithm is achieved by redirecting calls from one mobile operator to another. In addition, GPSS-Studio implements a model for redirecting incoming calls using multi-channel modeling. Probabilistic-temporal characteristics of the distribution of incoming calls to specific nodes.
- Published
- 2020
- Full Text
- View/download PDF
36. Моделювання та аналіз роботи внутрішньої телефонної мережі на базі IP-станції з використанням протоколу SIP
- Subjects
Session Initiation Protocol ,Technology ,протоколи SIP та H.323 ,Telephone network ,Voice over IP ,SIP & H.323 SIP protocols ,business.industry ,Computer science ,computer.internet_protocol ,моделювання навантажень ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IP-телефонія ,Telecommunications network ,Telephone line ,IP-telephony ,VoIP ,load simulation ,Codec ,The Internet ,business ,computer ,Computer network ,Data transmission - Abstract
Розвиток Інтернет технологій характеризується широкими можливостями впровадження різноманітних телекомунікаційних послуг, зокрема IP-телефонії, що надає користувачам нову технологію передачі мультимедійного трафіку з використанням Інтернет мереж. Для застосування цієї технології активно проваджуються спеціальні протоколи передачі даних – SIP та H.323, що надає можливість організовувати приватні та корпоративні мережі передачі даних. У статті проведений аналіз застосування даних протоколів на базі IP-станції Panasonic KX-NS500, що дало змогу надати рекомендації щодо підвищення ефективності функціонування внутрішньої телефонної мережі для передачі голосового трафіку при різних типах кодеків. Авторами розглядається задача підвищення ефективності функціонування мережі голосового зв’язку на базі IP-станції із застосуванням протоколів SIP та H.323. Запропоновано модель зв’язку, у якій використовуються три аналогові телефонні апарати та три IPтелефони, обслуговуванням яких займається ІР-станція. Телефонна лінія використовує протокол SIP. Для дослідження характеристик роботи запропонованої моделі мережі використовується програмне середовище OPNET Modeler. Визначено оптимальний тип голосового кодеку для протоколу SIP та можливості використання застосовуваного протоколу в організації внутрішньої телефонної мережі з використанням IP-станції. Проведено моделювання сегменту телекомунікаційної мережі із застосуванням протоколу SIP та проведено аналіз характеристик двох кодеків зв’язку, що найчастіше використовуються у технології VoIP. На основі проведеного моделювання здійснено оцінку якості мовного сигналу за рейтингом MOS, діапазону затримки мовного сигналу та вибір кодеку для відтворення голосового сигналу для запропонованої моделі мережі. The development of Internet technologies is characterized by wide possibilities for introducing various telecommunication services, in particular IP telephony, which provides users with a new technology for multimedia traffic transmittion using Internet networks. Special data transfer protocols (SIP and H.323) are being actively developed to apply this technology, which enables the organization of private and corporate data networks. The paper analyzes the use of these protocols based on the Panasonic KX-NS500 IP station, which has made it possible to give recommendations on improving the operation of internal telephone network for the transmission of voice traffic for various types of codecs. The article discusses the problem of improving the efficiency of IP based voice communications using SIP and H.323 protocols. A communication model, that uses three analog phones and three IP phones serviced by an IP station, is proposed. The telephone line uses SIP protocol. The OPNET Modeler software environment is used to investigate the performance of the proposed network model. The optimal type of voice codec for SIP protocol and the possibilities of using the protocol in the organization of internal telephone network using the IP station are determined. The telecommunication network segment using SIP protocol has been simulated and the characteristics of two communication codecs most commonly used in VoIP technology have been analyzed. Based on the simulation, the assessment of the quality of the speech signal by the MOS rating, the range of delay of the speech signal and the choice of a codec to play a voice signal for the proposed network model have been made
- Published
- 2020
37. Virtual Patent Networks and Their Network Effects
- Author
-
Alexander Peukert
- Subjects
Value (ethics) ,Telephone network ,Returns to scale ,Willingness to pay ,Social media ,Business ,Network theory ,Tipping point (climatology) ,Virtual network ,Industrial organization - Abstract
On the basis of the economic theory of network effects, this article provides a novel explanation of the so-called patent paradox, i.e. the question why the propensity to patent is so strong when the expected average value of most patents is low. It demonstrates that the patent system of a country resembles a telephone network or a social media platform. Patents are perceived as nodes in a virtual network that, as a whole, exhibits network effects. It is explained why patents are not independent of other patents but that they complement each other in several ways both within and beyond markets and fields of technology, and that patents thus create synchronization value over and above individual interests of patent holders in exclusivity. As a consequence, the more patents there are, the more valuable it is to also seek patents, and vice versa. Since patents thus display increasing returns to adoption, the willingness to pay for the next patent slopes upwards. This explains why, after a phase of early instability and a certain tipping point, many countries’ patent systems expanded quickly and eventually became a rigid standard (“lock-in”). The concluding section raises the question what regulatory measures are suitable to effectively address the ensuing anticommons effects.
- Published
- 2020
- Full Text
- View/download PDF
38. DNN No-Reference PSTN Speech Quality Prediction
- Author
-
Sriram Srinivasan, Ross Cutler, Gabriel Mittag, Naglakshmi Chande, Michael Revow, Robert Aichner, and Yasaman Hosseinkashi
- Subjects
Black box (phreaking) ,FOS: Computer and information sciences ,Sound (cs.SD) ,Telephone network ,Voice over IP ,Computer science ,business.industry ,Speech recognition ,POLQA ,Computer Science - Sound ,Phone ,Packet loss ,Audio and Speech Processing (eess.AS) ,Test set ,FOS: Electrical engineering, electronic engineering, information engineering ,Performance indicator ,business ,Electrical Engineering and Systems Science - Audio and Speech Processing - Abstract
Classic public switched telephone networks (PSTN) are often a black box for VoIP network providers, as they have no access to performance indicators, such as delay or packet loss. Only the degraded output speech signal can be used to monitor the speech quality of these networks. However, the current state-of-the-art speech quality models are not reliable enough to be used for live monitoring. One of the reasons for this is that PSTN distortions can be unique depending on the provider and country, which makes it difficult to train a model that generalizes well for different PSTN networks. In this paper, we present a new open-source PSTN speech quality test set with over 1000 crowdsourced real phone calls. Our proposed no-reference model outperforms the full-reference POLQA and no-reference P.563 on the validation and test set. Further, we analyzed the influence of file cropping on the perceived speech quality and the influence of the number of ratings and training size on the model accuracy.
- Published
- 2020
- Full Text
- View/download PDF
39. Interactivity-Based Quality Prediction of Conversations with Transmission Delay
- Author
-
Thilo Michael and Sebastian Möller
- Subjects
Telephone network ,Transmission delay ,Computer science ,media_common.quotation_subject ,Speech recognition ,05 social sciences ,050801 communication & media studies ,0508 media and communications ,Conversation analysis ,Interactivity ,Transmission (telecommunications) ,0502 economics and business ,050211 marketing ,Quality (business) ,Conversation ,media_common ,Parametric statistics - Abstract
While the experienced quality of a conversation transmitted over a telephone network is dependent on the parameters of the network and possible degradations, it has been shown that the sensitivity to these degradations is influenced by the type of the conversation and its contents. Especially for delayed speech transmission the conversational scenario and the adaption of turn-taking behavior of the interlocutors factor into the conversational quality rating of a specific conversation. Parametric Conversation Analysis has been proven to be a good method to extract parameters from a recorded conversation that are representable of the interactivity. While the narrowband version of a popular and standardized quality prediction model, the E-model, uses the interactivity to predict a conversational quality MOS for the given conditions, there are no attempts to predict the conversational quality of individual conversations so far. In this paper, we propose a model to predict the quality of a conversation under the influence of transmission delay based on the interactivity parameters extracted from that conversation. We evaluate which parameters are most suited for such a prediction, and compare our results to the parameter-based predictions of the E-model.
- Published
- 2020
- Full Text
- View/download PDF
40. The Development Characteristics of Public Telephony in Croatia from 1990 to 1998
- Author
-
Goran Rajič
- Subjects
Croatian ,History ,Telephone network ,business.industry ,telefon ,telefonija ,mobitel ,telekomunikacije ,Hrvatska pošta i telekomunikacije ,media_common.quotation_subject ,telephone ,telephony ,mobile phone ,telecommunications ,HPT (Croatian Post and Telecommunications) ,Homeland ,06 humanities and the arts ,language.human_language ,Telephone line ,Independence ,060104 history ,Mobile phone ,language ,Cellular network ,0601 history and archaeology ,Business ,Telephony ,Telecommunications ,media_common - Abstract
Tema članka je razvoj javne nepokretne i pokretne telefonije u Hrvatskoj pod okriljem novoosnovane nacionalne javne poštansko-telekomunikacijske tvrtke Hrvatska pošta i telekomunikacije od 1990. pa sve do njezina razdruživanja na dvije zasebne tvrtke: Hrvatska pošta d.d. i Hrvatske telekomunikacije d.d. početkom 1999. godine. Hrvatska je u razvoju javne telefonske mreže znatno zaostajala za razvijenim europskim zemljama, a izbijanje Domovinskoga rata i oružana agresija na Republiku Hrvatsku izložili su ju mogućnosti telekomunikacijske i informacijske blokade. Budući da su se građani Hrvatske opredijelili za tržišnu ekonomiju, politički pluralizam i demokratsko društveno uređenje, u načelu se podrazumijevala i poticala sloboda neposrednoga komuniciranja, a ona je, telekomunikacijski gledano, na razini pojedinca ponajviše bila izražena u dostupnosti domaćih i međunarodnih javnih telefonskih veza. U obrađenom su razdoblju na nacionalnom planu napravljeni ključni infrastrukturni zahvati i uvedena je suvremena tehnologija s novim telekomunikacijskim uslugama, što je omogućilo da Hrvatska prestane biti telekomunikacijski nerazvijena, a na međunarodnom planu postala je prepoznatljiv telekomunikacijski partner te dio tranzitnoga telekomunikacijskog mosta između istočne i zapadne te sjeverne i južne Europe., After the independence of the Republic of Croatia was declared in 1991, the newly-formed national postal and telecommunications company HPT (Croatian Post and Telecommunications) found itself in an unenviable position. Croatia was in the group of countries at the forefront of telecommunications development in Europe. In 1990, it had only 17 telephone connections per 100 inhabitants. However, in the next eight years it moved closer to the European average, doubling its capacity to 35 telephone lines per 100 inhabitants by 1999. It did so despite the devastation of the Homeland War and the enormous damage suffered by its public telephone network. Croatia managed to negate the telecommunications blockade by finding alternative telecommunication routes, and then set out to build an efficient telephony and transmission system based on the use of fibre-optic cables and modern switching equipment. By the end of 1993, international switching hubs in Zagreb, Split, Rijeka, and Đakovo using AXE 10 technology were built, and the following year cities on the Croatian Adriatic coast were connected with cities in continental Croatia by fibre-optic cable. During this process, Croatia received its one-millionth telephone subscriber. Thanks to its participation in the TEL (Trans Europe Line) project, it became part of the telecommunication bridge between Eastern and Western Europe. In addition to the fixed public telephone network, it simultaneously developed a mobile public telephone network, first an analogue mobile network aptly named MOBITEL in 1991, and then the CRONET digital mobile network in 1996. These steps resulted in a significant increase in telephone traffic and the widespread availability of fixed and mobile telephone connections, which completely revolutionised public telephony in Croatia.
- Published
- 2020
41. Simulation of the Active Protection Device in the Acoustoelectric Leakage Channel
- Author
-
Anatoliy A. Horev, Denis Smirnov, Oksana Lukmanova, and Gorelik Aleksandr
- Subjects
Telephone network ,business.industry ,Computer science ,Low-pass filter ,05 social sciences ,0211 other engineering and technologies ,Electrical engineering ,021107 urban & regional planning ,02 engineering and technology ,Noise generator ,0502 economics and business ,Information leakage ,Diode bridge ,business ,050203 business & management ,Communication channel ,Leakage (electronics) - Abstract
One of the most frequently encountered auxiliary technical devices installed in a protected room is a telephone that created acoustoelectric leakage channels of the acoustic speech information. In the NI Multisim simulation environment, typical models of passive telephone protection devices have been designed. The device protects a telephone set of the speech information leakage arising from the acoustoelectric effect and «high-frequency injection». The study was carried out of the main characteristics of the developed protection device and an assessment of the performance when connected to a telephone network using the virtual laboratory bench.
- Published
- 2020
- Full Text
- View/download PDF
42. Broadband infrastructure, ICT use and firm performance: Evidence for UK firms
- Author
-
Timothy DeStefano, Richard Kneller, and Jonathan Timmis
- Subjects
Organizational Behavior and Human Resource Management ,Economics and Econometrics ,Telephone network ,Asymmetric digital subscriber line ,business.product_category ,business.industry ,05 social sciences ,Sample (statistics) ,instrumental variable ,law.invention ,firms ,law ,Information and Communications Technology ,ICT ,Telephone exchange ,0502 economics and business ,Broadband ,Internet access ,broadband ,Endogeneity ,050207 economics ,Telecommunications ,business ,050205 econometrics - Abstract
The recent economics literature has begun to recognise that ICT is a heterogeneous technology altering information storage, processing and communication in distinct ways. In this paper we use the arrival of a new communication technology, ADSL broadband, to study the effects of heterogeneous types of ICT on firm performance. To do so free from endogeneity bias, we construct instruments using postcode-level geographic variation in the infrastructure underlying broadband internet – the pre-existing telephone network. We show that after placing various restrictions on the sample, instruments based on the timing of ADSL broadband enablement and the cable distance to the local telephone exchange satisfy the conditions for instrument relevancy and validity. We find in turn, that ICT causally affects firm size (captured by either sales or employment) but not productivity.
- Published
- 2018
- Full Text
- View/download PDF
43. Ways of modernization of the city telephone networks of the USSR in the post-war period (1945-1965)
- Author
-
Vladimir V. Mirkin
- Subjects
Telephone network ,History ,Post war ,Economic history ,Modernization theory ,Period (music) - Published
- 2018
- Full Text
- View/download PDF
44. Efficiency evaluation of the 'vectoring' system application on the connecting lines during modernization of the rural telephone network
- Author
-
V.I. Оreshkov
- Subjects
Telephone network ,Computer science ,business.industry ,General Medicine ,Modernization theory ,Telecommunications ,business - Published
- 2018
- Full Text
- View/download PDF
45. TERRITORIALIDADE DA INFORMAÇÃO, PELAS REDES TELEFÔNICAS, NA CIDADE DE SENADOR CANEDO EM GOIÁS: ESTUDO DE CASO
- Author
-
Vitor Ribeiro Filho, Antônio Henrique Capuzzo Martins, and João Dib Filho
- Subjects
Telephone network ,Welfare economics ,Capital (economics) ,Telephone Networks ,Urban Spaces ,Senador Canedo ,Regulatory agency ,Business - Abstract
Verificando as estruturas da cidade, percebe-se a condição e presença de perfis de renda diferenciados, o que leva a avaliação, a um paralelo que pode representar melhor a própria diferença da renda (ou aparência de renda) nas áreas cobertas pelo capital, aqui representados pelas operadoras de telefonia (fixa e até mesmo as de celulares) e pelas manchas de cobertura das mesmas. A mancha de cobertura em análise foi tirada do link da Anatel, que é o órgão que representa o Estado/União, como agência reguladora que fiscaliza o segmento de telecomunicações, e consequentemente, das áreas de cobertura estabelecidas pelas empresas de telefonia aqui tratadas., The paper reports a study case, checking the city's structures, we see the condition and presence of different income profiles, which leads the assessment, a parallel that can better represent the own income difference (or income appearance) in the areas covered by the capital here represented by the telephone operators (fixed and even mobile) and for the same coverage of stains. The spot coverage analysis was taken from Anatel link, which is the body representing the State / Union as a regulatory agency that oversees the telecommunications segment, and consequently, the coverage areas established by telephone companies addressed here
- Published
- 2018
- Full Text
- View/download PDF
46. Reduction of communication demand under disaster congestion using control to change human communication behavior without direct restriction
- Author
-
Daisuke Satoh, Takemi Mochida, Yuji Takano, and Ryunosuke Sudo
- Subjects
Telephone network ,Computer Networks and Communications ,Computer science ,Control (management) ,Rationing ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Network congestion ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Human communication ,Call duration - Abstract
When a disaster strikes, many people make calls to their loved ones in the affected area. As a result, telephone networks become congested, making it difficult for people to contact each other. This congestion continues in the aftermath of a large-scale disaster. The sooner the congestion is eased, the sooner and easier people can contact each other. We accomplish this by reducing communication demand without directly restricting call duration. We propose a congestion control method, called the road space rationing (RSR) method (RSR was originally designed for transportation and restricts access to congested areas on the basis of the last digit of a vehicle’s license plate or license number). Our RSR method only restricts the period in which to make a call on the basis of the last digits of calling parties’ phone numbers (e.g., only people with phone numbers ending in 1 can make calls between XX:06 and XX:12). It not only avoids restricting the overall number of calling parties but also prompts people to reduce their call duration consciously despite it being unrestricted. It thus has a mechanism to change human communication behavior without directly restricting call duration. This consciously willed reduction is effective against disaster congestion because there are no redials to the same called parties. This reduction in call duration in turn decreases congestion. Experimental results revealed that the RSR method reduced call duration by 30%.
- Published
- 2018
- Full Text
- View/download PDF
47. Ensuring protection of information from facebook profile threats in computer and telephone networks
- Author
-
A. Zidan
- Subjects
Telephone network ,Computer science ,business.industry ,Internet privacy ,business - Published
- 2018
- Full Text
- View/download PDF
48. Research on Fault Diagnosis of Telephone Network Equipment Based on Case-Based Reasoning
- Author
-
Wenhua Bai, Lihua Su, Lemeng Guo, and Feng Zhu
- Subjects
History ,Telephone network ,Computer science ,business.industry ,Case-based reasoning ,business ,Fault (power engineering) ,Computer Science Applications ,Education ,Computer network - Published
- 2021
- Full Text
- View/download PDF
49. Evaluasi Gangguan Jaringan Telepon dengan Kombinasi Metode Fault Tree Analysis dan Failure Mode And Effect Analysis
- Author
-
Andung Jati Nugroho
- Subjects
Fault tree analysis ,Telephone network ,jarlokaf ,lcsh:T55.4-60.8 ,Computer science ,basic event ,Reliability engineering ,fault tree analysis ,jarlokat ,Drop (telecommunication) ,lcsh:Industrial engineering. Management engineering ,Failure mode and effects analysis ,failure mode and effect analysis ,risk priority number - Abstract
Evaluation the disruptions of telephone network uses a method fault tree analysis (FTA) and failure mode and effect analysis (FMEA). By using FTA, the fault events are identified, which contribute causing top level event of jarlokat isolation, jarlokaf isolation, and devices can’t function jarlokar. The results of FTA; 8 basic events for jarlokat isolation, 7 basic events for jarlokaf isolation, and 6 basic events for jarlokar devices can’t function, that is smallest events. These basic events are analyzed by FMEA it based on value of the risk priority number by knowing severity from failure effect scale, occurrence from causes scale, and detection from control scale. The result FMEA is priorities problem solving in the following order: the drop wire 1x2 broken, the short circuit of housing wire, the short circuit of distribution point, the trans radio broken, the telephone instrument damaged, the primary wire broken, and the secondary wire broken.
- Published
- 2017
50. Multi-style speaker recognition database in practical conditions
- Author
-
Rohan Kumar Das, S. R. Mahadeva Prasanna, and Sarfaraz Jelil
- Subjects
Linguistics and Language ,Speaker verification ,Computer science ,Speech recognition ,02 engineering and technology ,computer.software_genre ,Language and Linguistics ,Style (sociolinguistics) ,030507 speech-language pathology & audiology ,03 medical and health sciences ,0202 electrical engineering, electronic engineering, information engineering ,Session (computer science) ,Telephone network ,Database ,business.industry ,Process (computing) ,020206 networking & telecommunications ,Speaker recognition ,Human-Computer Interaction ,Speaker diarisation ,Computer Vision and Pattern Recognition ,Artificial intelligence ,0305 other medical science ,business ,computer ,Software ,Utterance ,Natural language processing - Abstract
This work describes the process of collection and organization of a multi-style database for speaker recognition. The multi-style database organization is based on three different categories of speaker recognition: voice-password, text-dependent and text-independent framework. Three Indian institutes collaborated for the collection of the database at respective sites. The database is collected over an online telephone network that is deployed for speech based student attendance system. This enables the collection of data for a longer period from different speakers having session variabilities, which is useful for speaker verification (SV) studies in practical scenario. The database contains data of 923 speakers for the three different modes of SV and hence termed as multi-style speaker recognition database. This database is useful for session variability, multi-style speaker recognition and short utterance based SV studies. Initial results are reported over the database for the three different modes of SV. A copy of the database can be obtained by contacting the authors.
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.