Radio environment maps (REMs) and geolocation database represent an important source of information for the operation of cognitive radio networks, replacing or complementing spectrum sensing ...information. This paper provides a survey of methods for constructing the radio frequency layer of radio environment map (RF-REM) using distributed measurements of the signal levels at a given frequency in space and time. The signal level measurements can be obtained from fixed or mobile devices capable of sensing radio environment and sending this information to the REM. The signal measurements are complemented with information already stored in different REM content layers. The combined information is applied for estimation of the RF-REM layer. The RF-REM construction methods are compared, and their advantages and disadvantages with respect to the spatial distribution of signal measurements and computational complexity is given. This survey also indicates possible directions of further research in indirect RF-REM construction methods. It emphasizes that accurate RF-REM construction methods should in the best case support operation with random and clustered signal measurements, their operation should not be affected by measurements outliers, and it must estimate signal levels comparably on all RF-REM locations with moderate computational effort. Keywords: Cognitive radio, REM, RF-REM, construction methods
In this paper, we propose a new indirect method for constructing the radio frequency layer of radio environment map (RF-REM) called self-tuning method (STM). The proposed STM takes into account the ...characteristics of the operating environment and performs estimation of the transmitter parameters, i.e. its location, antenna diagram, antenna azimuth, transmit power, as well the parameters of the propagation model to obtain the best match between the available measurements and the predicted signal levels. We compare STM to several most often considered existing methods using different numbers of randomly distributed measurements, which could in practice be obtained in a participatory-like manner. The performance evaluation of the methods is performed in terms of averaged root mean square error (
RMSE
¯
) and 95% confidence interval (CI) calculated between the constructed RF-REMs and the reference RF-REM, as well as in terms of false alarm zone ratio (FAZR) and correct detection zone ratio (CDZR
1
). The analysis shows the robustness of the STM to various spatial distributions of measurements and its fast convergence and low residual root mean square error compared to the inverse distance weighted (IDW) method, the inverse distance square weighted method (IDW2), the Kriging method, and the location estimation-based method (LIvE).
Full text
Available for:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
With the analysis of various sensor data from the mobile devices, it is possible to extract user situations, so-called user context. This is needed for the development of modern, user-friendly ...services. Therefore, we developed a simple, nonintrusive, and automatic method based on the Wi-Fi fingerprints and GPS. The method finds user stay points, aggregates them into meaningful stay regions, and assigns them four general user contexts: home, work, transit, and free time. We evaluated its performance on the real traces of six different users who annotated their contexts over eight days. The method determined the stay mode of the users with accuracy, precision, and recall of above 96%. In combination with the novel approach for aggregation, all regions relevant to the users were determined. Among the tested aggregation schemes, the fingerprint similarity approach worked the best. The context of the determined stay regions was on average accurately inferred in 98% of the time. For the contexts home, work, and free time, the precision and recall exceeded 86%. The results indicate that the method is robust and can be deployed in various fields where context awareness is desired.
Churn prediction has received much attention in the last decade. With the evolution of social networks and social network analysis tools in recent years, the consideration of social ties in churn ...prediction has proven promising. One possibility is to use energy diffusion models to model the spread of influence through a social network. This paper proposes a novel churn prediction diffusion model based on sociometric clique and social status theory. It describes the concept of energy in the diffusion model as an opinion of users, which is transformed to user influence using the derived social status function. Furthermore, a novel diffusion model prediction scheme applicable to a single user or a small subset of users is described: the Targeted User Subset Churn Prediction Scheme. The scheme allows fast churn prediction using limited computing resources. The diffusion model is evaluated on a real dataset of users obtained from the largest Slovenian mobile service provider, using the F-measure and lift curve. The empirical results show a significant improvement in prediction accuracy of the proposed method compared with the basic spreading activation technique (SPA) diffusion model. More specifically, our approach outperforms a basic SPA diffusion model by 116 % in terms of lift in the fifth percentile.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
This paper evaluates the impact of combined transcoding and packet loss degradation on speech as input for the interactive voice response service (IVR) and proposes a method for classification of ...user input according to speech quality. Careful optimization of a communication system and all of its segments need to be considered, as the quality of the user’s experience is becoming a more prominent part of the overall acceptance and desirability of modern service. Within our research, emulation environment was developed and the behavior of IVR analyzed under different packet loss and transcoding conditions. A set of frequently-used vocoders was tested on its performance with an automatic speech recognition module under degraded conditions. Further, quality estimation classifier was proposed, based on the Gaussian mixture models to determine best user’s input modality. Various train and test parameters were investigated to provide more detailed insight of input quality estimation for IVR service working under error prone conditions.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
The paper evaluates the human directional resolution of virtual sound sources synthesised with the aid of a generalised head related impulse response (HRIR) library, i.e., an HRIR library measured ...using a dummy head and torso. The original HRIR set is first expanded using linear interpolation, and then directional resolution measurements are performed for playback through headphones. These results are compared to the results obtained using loudspeakers as sound sources in an anechoic chamber. Directional resolution is the ability of listeners to distinguish two closely-spaced sound sources alternately playing the same signal. Experiments show that two sound sources with insufficient spacing appear as a single source to the listener. Directional resolution for small azimuth changes is relatively high for both virtual and real sound sources. Most test subjects have no problem resolving two sound sources only 5° apart. Compared to real sound sources, detecting changes in elevation of virtual sound sources is much less accurate, which may be the main drawback of using a generalised HRIR library.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
In this paper a static network simulator is used to find downlink and uplink SHO areas. By introducing a penalty-based objective function and some hard constraints, we formally define the problem of ...balancing SHO areas in UMTS networks. The state-of-the-art mathematical model used and the penalty scores of the objective function are set according to the configuration and layout of a real mobile network, deployed in Slovenia by Telekom Slovenije, d.d.. The balancing problem is then tackled by three optimization algorithms, each of them belonging to a different category of metaheuristics. We report and analyze the optimization results, as well as the performance of each of the optimization algorithms used.
Radio environment maps (REMs) and geolocation database represent an important source of information for the operation of cognitive radio networks, replacing or complementing spectrum sensing ...information. This paper provides a survey of methods for constructing the radio frequency layer of radio environment map (RF-REM) using distributed measurements of the signal levels at a given frequency in space and time. The signal level measurements can be obtained from fixed or mobile devices capable of sensing radio environment and sending this information to the REM. The signal measurements are complemented with information already stored in different REM content layers. The combined information is applied for estimation of the RF-REM layer. The RF-REM construction methods are compared, and their advantages and disadvantages with respect to the spatial distribution of signal measurements and computational complexity is given. This survey also indicates possible directions of further research in indirect RF-REM construction methods. It emphasizes that accurate RF-REM construction methods should in the best case support operation with random and clustered signal measurements, their operation should not be affected by measurements outliers, and it must estimate signal levels comparably on all RF-REM locations with moderate computational effort.
In the last years, customer churn prediction has been very high on the agenda of telecommunications service providers. Among customers predicted as churners, highly influential customers deserve ...special attention, since their churns can also trigger churns of their peers. The aim of this study is to find good predictors of churn influence in a mobile service network. To this end, a procedure for determining the weak ground truth on churn influence is presented and used to determine the churn influence of prepaid customers. The determined scores are used to identify good churn-influence predictors among 74 candidate features. The identified predictors are finally used to build a churn-influence-prediction model. The results show that considerably better churn prediction results can be achieved using the proposed model together with the classical churn-prediction-model than by using the classical churn-prediction model alone. Moreover, the successfully predicted churners by the combined approach also have a greater number of churn followers. A successful retention of the predicted churners could greatly affect churn reduction since it could also prevent the churns of these followers.
Broadband access network planning strategies with techno-economic calculations are important topics when optimal broadband network deployments are considered. This paper analyzes optimal deployment ...combination of digital subscriber line (xDSL) and fiber to the home (FTTx) technologies, considering real copper cable lengths. For this reason, optimal placement of remote digital subscriber line multiplexer (rDSLAM) with corresponding combination of FTTx is examined. Furthermore, the article discusses the payback period and net present value of various broadband network deployments, considering the existent copper network. A tree structure network model of a traditional copper access network is introduced. A dynamic programming logic, with recursion as a basis of a tree structure examination and evaluation of optimal network elements placement is used. The tree structure network model considers several real network parameters (e.g., copper cable lengths, user coordinates, node coordinates). The main input for the calculation is a local loop distance between each user and a candidate node for rDSLAM placement. Modeling of copper access networks with a tree structure makes new extensions in planning of broadband access networks. Therefore Broadband Access Network planning Tool (BANeT) was developed by Laboratory for telecommunications, University of Ljubljana, Faculty of Electrical Engineering.