The embracing of ICTs and related technologies has enhanced different approaches for governments worldwide to deliver services to their citizens in a smart way. However, the usage of e-government services by common ci...The embracing of ICTs and related technologies has enhanced different approaches for governments worldwide to deliver services to their citizens in a smart way. However, the usage of e-government services by common citizens is recognized as one of the major setbacks of e-government development in both developed and developing countries. Moreover, government agencies in these countries are facing great challenges in keeping the citizens motivated enough to continue to use e-government services. This research aims to investigate the factors that influence citizens’ trust towards continue use of e-government services in Cameroon. The proposed research model consisted of three main constructs including technological, governmental, risk factors as well as six demographic characteristics (age, gender, educational level, income, internet experience and cultural perception). A five-point Likert scale questionnaire was designed to collect data physically and electronically, 352 valid questionnaires were retrieved. Simple and Multiple regression analysis methods were applied to build an adequate model based on the verification of hypotheses proposed. Based on results obtained, four demographic characteristics (age, education, occupation and income) have influence on citizens’ trust in e-government meanwhile gender and cultural affiliation have no influence. Furthermore, technological factors and governmental factors positively influence trust level in e-government, whereas risk factors have a negative influence on trust level. Deducing from the results, a list of recommendations is proposed to the government of Cameroon in order to reinforce citizens’ trust in e-government services.展开更多
Digital television is part of our daily lives. We took an interest in the DVB-S2 standard in particular, because it is the one that governs the transmission by satellite of multimedia content from television programs....Digital television is part of our daily lives. We took an interest in the DVB-S2 standard in particular, because it is the one that governs the transmission by satellite of multimedia content from television programs. With ever-changing user needs, there are new challenges that the DVB-S2 standard is no longer able to meet due to errors caused by weather and hardware limitations. The main purpose of a satellite TV transmission is to obtain a video signal in reception of the best possible quality and at a high bit rate. It is therefore important to determine all the factors which could intervene in the process of transmission and which have a negative impact on the yield at the reception of the signal. We therefore designed and simulated the DVB-S and DVB-S2 transmission chains with QPSK modulation (and an FEC coding rate of 1/2), on MATLAB software (Simulink), and with an AWGN channel for the sake of comparison performance between these two chains. Then we carried out the design of the DVB-S2 transmission chain with an RF (Radio Frequency) satellite channel, by materializing all the elements which intervene in the downlink to evaluate the performance of this chain according to the factors which influence and/or degrade the signal quality between transmission and reception at the receiving earth station. The main results obtained relate to the DVB-S2 transmission chain and were interpreted using the visualization of the error rate blocks: With an AWGN channel, increasing the signal-to-noise ratio decreases the rate of erroneous packets and therefore improves the quality of the received signal. With an RF satellite channel on the downlink: increasing the transmit power improves the receive performance, this is useful for correcting most RF imperfections;having larger parabolic antennas is an advantage because they have greater gains;this makes it possible to minimize the rate of erroneous packets. These simulations allowed us to determine the precise and numerical impact of RF degradations on the performance of the downlink DVB-S2 transmission chain.展开更多
The present work aims is to propose a solution for automating updates (MAJ) of the radio parameters of the ATOLL database from the OSS NetAct using Parsing. Indeed, this solution will be operated by the RAN (Radio Acc...The present work aims is to propose a solution for automating updates (MAJ) of the radio parameters of the ATOLL database from the OSS NetAct using Parsing. Indeed, this solution will be operated by the RAN (Radio Access Network) service of mobile operators, which ensures the planning and optimization of network coverage. The overall objective of this study is to make synchronous physical data of the sites deployed in the field with the ATOLL database which contains all the data of the coverage of the mobile networks of the operators. We have made an application that automates, updates with the following functionalities: import of radio parameters with the parsing method we have defined, visualization of data and its export to the Template of the ATOLL database. The results of the tests and validations of our application developed for a 4G network have made it possible to have a solution that performs updates with a constraint on the size of data to be imported. Our solution is a reliable resource for updating the databases containing the radio parameters of the network at all mobile operators, subject to a limitation in terms of the volume of data to be imported.展开更多
Due to the very high demand for Internet data capacity from mobile and fixed customers as well as the saturation of conventional frequency bands by numerous services, many countries have opened the E band, for broadca...Due to the very high demand for Internet data capacity from mobile and fixed customers as well as the saturation of conventional frequency bands by numerous services, many countries have opened the E band, for broadcasting services. E-band involves the creation of a significant number of links in a given area. The present work addressed the problem that arises in the context of transmission is that of assigning the frequencies of this band to these multiple transmission links. The aim of this work is to study and plan the radio links of the 80 GHz frequency and to implement them in a tool in order to define an optimal distribution on the telecommunications network by guaranteeing maximum flow of data traffic while minimizing the interference. The contribution of this work is part of its unique subject: the planning of E-band frequencies for improving the quality of service of transmission in the network of telecommunications operators. Also, it intends to contribute to the resolution of unsatisfied situations of poor planning of E-band radio frequencies in telecommunications networks. With the aim of opening several opportunities for alternative high-speed data transport solutions, our work has helped prove that E-band transmission links are very efficient with capacities in the gigabyte range.展开更多
In recent years, the place occupied by the various manifestations of cyber-crime in companies has been considerable. Indeed, due to the rapid evolution of telecommunications technologies, companies, regardless of thei...In recent years, the place occupied by the various manifestations of cyber-crime in companies has been considerable. Indeed, due to the rapid evolution of telecommunications technologies, companies, regardless of their size or sector of activity, are now the target of advanced persistent threats. The Work 2035 study also revealed that cyber crimes (such as critical infrastructure hacks) and massive data breaches are major sources of concern. Thus, it is important for organizations to guarantee a minimum level of security to avoid potential attacks that can cause paralysis of systems, loss of sensitive data, exposure to blackmail, damage to reputation or even a commercial harm. To do this, among other means, hardening is used, the main objective of which is to reduce the attack surface within a company. The execution of the hardening configurations as well as the verification of these are carried out on the servers and network equipment with the aim of reducing the number of openings present by keeping only those which are necessary for proper operation. However, nowadays, in many companies, these tasks are done manually. As a result, the execution and verification of hardening configurations are very often subject to potential errors but also highly consuming human and financial resources. The problem is that it is essential for operators to maintain an optimal level of security while minimizing costs, hence the interest in automating hardening processes and verifying the hardening of servers and network equipment. It is in this logic that we propose within the framework of this work the reinforcement of the security of the information systems (IS) by the automation of the mechanisms of hardening. In our work, we have, on the one hand, set up a hardening procedure in accordance with international security standards for servers, routers and switches and, on the other hand, designed and produced a functional application which makes it possible to: 1) Realise the configuration of the hardening;2) Verify them;3) Correct the non conformities;4) Write and send by mail a verification report for the configurations;5) And finally update the procedures of hardening. Our web application thus created allows in less than fifteen (15) minutes actions that previously took at least five (5) hours of time. This allows supervised network operators to save time and money, but also to improve their security standards in line with international standards.展开更多
文摘The embracing of ICTs and related technologies has enhanced different approaches for governments worldwide to deliver services to their citizens in a smart way. However, the usage of e-government services by common citizens is recognized as one of the major setbacks of e-government development in both developed and developing countries. Moreover, government agencies in these countries are facing great challenges in keeping the citizens motivated enough to continue to use e-government services. This research aims to investigate the factors that influence citizens’ trust towards continue use of e-government services in Cameroon. The proposed research model consisted of three main constructs including technological, governmental, risk factors as well as six demographic characteristics (age, gender, educational level, income, internet experience and cultural perception). A five-point Likert scale questionnaire was designed to collect data physically and electronically, 352 valid questionnaires were retrieved. Simple and Multiple regression analysis methods were applied to build an adequate model based on the verification of hypotheses proposed. Based on results obtained, four demographic characteristics (age, education, occupation and income) have influence on citizens’ trust in e-government meanwhile gender and cultural affiliation have no influence. Furthermore, technological factors and governmental factors positively influence trust level in e-government, whereas risk factors have a negative influence on trust level. Deducing from the results, a list of recommendations is proposed to the government of Cameroon in order to reinforce citizens’ trust in e-government services.
文摘Digital television is part of our daily lives. We took an interest in the DVB-S2 standard in particular, because it is the one that governs the transmission by satellite of multimedia content from television programs. With ever-changing user needs, there are new challenges that the DVB-S2 standard is no longer able to meet due to errors caused by weather and hardware limitations. The main purpose of a satellite TV transmission is to obtain a video signal in reception of the best possible quality and at a high bit rate. It is therefore important to determine all the factors which could intervene in the process of transmission and which have a negative impact on the yield at the reception of the signal. We therefore designed and simulated the DVB-S and DVB-S2 transmission chains with QPSK modulation (and an FEC coding rate of 1/2), on MATLAB software (Simulink), and with an AWGN channel for the sake of comparison performance between these two chains. Then we carried out the design of the DVB-S2 transmission chain with an RF (Radio Frequency) satellite channel, by materializing all the elements which intervene in the downlink to evaluate the performance of this chain according to the factors which influence and/or degrade the signal quality between transmission and reception at the receiving earth station. The main results obtained relate to the DVB-S2 transmission chain and were interpreted using the visualization of the error rate blocks: With an AWGN channel, increasing the signal-to-noise ratio decreases the rate of erroneous packets and therefore improves the quality of the received signal. With an RF satellite channel on the downlink: increasing the transmit power improves the receive performance, this is useful for correcting most RF imperfections;having larger parabolic antennas is an advantage because they have greater gains;this makes it possible to minimize the rate of erroneous packets. These simulations allowed us to determine the precise and numerical impact of RF degradations on the performance of the downlink DVB-S2 transmission chain.
文摘The present work aims is to propose a solution for automating updates (MAJ) of the radio parameters of the ATOLL database from the OSS NetAct using Parsing. Indeed, this solution will be operated by the RAN (Radio Access Network) service of mobile operators, which ensures the planning and optimization of network coverage. The overall objective of this study is to make synchronous physical data of the sites deployed in the field with the ATOLL database which contains all the data of the coverage of the mobile networks of the operators. We have made an application that automates, updates with the following functionalities: import of radio parameters with the parsing method we have defined, visualization of data and its export to the Template of the ATOLL database. The results of the tests and validations of our application developed for a 4G network have made it possible to have a solution that performs updates with a constraint on the size of data to be imported. Our solution is a reliable resource for updating the databases containing the radio parameters of the network at all mobile operators, subject to a limitation in terms of the volume of data to be imported.
文摘Due to the very high demand for Internet data capacity from mobile and fixed customers as well as the saturation of conventional frequency bands by numerous services, many countries have opened the E band, for broadcasting services. E-band involves the creation of a significant number of links in a given area. The present work addressed the problem that arises in the context of transmission is that of assigning the frequencies of this band to these multiple transmission links. The aim of this work is to study and plan the radio links of the 80 GHz frequency and to implement them in a tool in order to define an optimal distribution on the telecommunications network by guaranteeing maximum flow of data traffic while minimizing the interference. The contribution of this work is part of its unique subject: the planning of E-band frequencies for improving the quality of service of transmission in the network of telecommunications operators. Also, it intends to contribute to the resolution of unsatisfied situations of poor planning of E-band radio frequencies in telecommunications networks. With the aim of opening several opportunities for alternative high-speed data transport solutions, our work has helped prove that E-band transmission links are very efficient with capacities in the gigabyte range.
文摘In recent years, the place occupied by the various manifestations of cyber-crime in companies has been considerable. Indeed, due to the rapid evolution of telecommunications technologies, companies, regardless of their size or sector of activity, are now the target of advanced persistent threats. The Work 2035 study also revealed that cyber crimes (such as critical infrastructure hacks) and massive data breaches are major sources of concern. Thus, it is important for organizations to guarantee a minimum level of security to avoid potential attacks that can cause paralysis of systems, loss of sensitive data, exposure to blackmail, damage to reputation or even a commercial harm. To do this, among other means, hardening is used, the main objective of which is to reduce the attack surface within a company. The execution of the hardening configurations as well as the verification of these are carried out on the servers and network equipment with the aim of reducing the number of openings present by keeping only those which are necessary for proper operation. However, nowadays, in many companies, these tasks are done manually. As a result, the execution and verification of hardening configurations are very often subject to potential errors but also highly consuming human and financial resources. The problem is that it is essential for operators to maintain an optimal level of security while minimizing costs, hence the interest in automating hardening processes and verifying the hardening of servers and network equipment. It is in this logic that we propose within the framework of this work the reinforcement of the security of the information systems (IS) by the automation of the mechanisms of hardening. In our work, we have, on the one hand, set up a hardening procedure in accordance with international security standards for servers, routers and switches and, on the other hand, designed and produced a functional application which makes it possible to: 1) Realise the configuration of the hardening;2) Verify them;3) Correct the non conformities;4) Write and send by mail a verification report for the configurations;5) And finally update the procedures of hardening. Our web application thus created allows in less than fifteen (15) minutes actions that previously took at least five (5) hours of time. This allows supervised network operators to save time and money, but also to improve their security standards in line with international standards.