Abstract:
Velocity-weighted analysis of UE location data is disclosed. UE velocity can be determined from the change in position and time. UE dwell can also be determined from the change in position and time. UE dwell and UE velocity can be inversely related. UE dwell an UE velocity can be correlated to a likelihood that an event occurrence related to a point of interest affects UE travel between a first and second location. A location of the point of interest can be determined to be in a region corresponding to a path between the first and second location. The region can be associated with the UE dwell and/or UE velocity, such that a probability of interaction can be determined for the event occurrence for the point of interest. The region can comprise a probable UE path based on historical UE data.
Abstract:
A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials.
Abstract:
A method of managing network resource usage of a mobile communications device includes initiating registration of the mobile communications device with a wireless wide area communications network. The method includes receiving a region indicator from the wireless wide area communications network in response to the initiating. The method includes selectively communicating by the mobile communications device with a second communications network according to a rules profile associated with the region indicator. The region indicator may be a country code or network code. The rules profile may be one of a plurality of rules profiles identified based on the region indicator. Individual rules profiles of the plurality of rules profiles specify at least one of time of day constraints, access point identifier constraints, and performance threshold constraints.
Abstract:
Concepts and technologies are described herein for managing network load using device application programs. An illustrative method includes receiving, at a mobile device, a list of preferred combinations of location area codes (“LACs”), cell identifiers (“CIDs”), and times that data access by the mobile device is to be incentivized, determining a current LAC associated with a location area within which the mobile device is currently located, determining a current CID associated with a base transceiver station to which the mobile device is currently connected, determining a current time, and determining if the current LAC, the current cell ID, and the current time are included as a preferred combination in the list. The method also includes providing an indication that data access by the mobile device is incentivized if the current LAC, the current cell ID, and the current time are included in the list as a preferred combination.
Abstract:
A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials.
Abstract:
Aspects relate to automatically establishing neighbor relations for adjacent sectors based on one or more network events. The neighbor relations can be established between sectors that can be identified as inter-frequency neighbors or intra-frequency neighbors. In an aspect, the network events can be active call data events received from one or more mobile devices. The active call data events can be radio access bearer establishments and internal system releases. In another aspect, the network events can be idle call data events received from one or more mobile devices. If a first event ended on a first sector and a second event started on a second sector before expiration of an interval that started when the first event ended, the first sector and second sector can be defined as neighbors.
Abstract:
A method includes receiving, at a first computing device, first data associated with a performance indicator of a wireless wide area network for a first time period. The method also includes determining, at the first computing device, whether the performance indicator satisfies a performance threshold. The method further includes, based on determining that the performance indicator does not satisfy the performance threshold, offloading one or more communication devices from the wireless wide area network so that the performance indicator satisfies the performance threshold. The method finally includes sending a first instruction to a second computing device. The second computing device enables one or more access points to provide mobile communication services to the one or more communication devices.
Abstract:
A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials.
Abstract:
Scrambling code conflicts can be mitigated by primary scrambling code reuse that minimizing a potential interference Primary scrambling codes are applied to a first set of cells located in a portion of the network being considered. A second set of cells are evaluated for primary scrambling code reuse based on a distance parameter and/or a coverage area. If the distance parameter is greater than a defined distance, primary scrambling code reuse can be applied. If all distance parameters evaluated are less than the distance parameter, a length of the distance parameter is reduced and the distance between cells is reevaluated.
Abstract:
Aspects of the subject disclosure may include systems and methods, for example, including receiving a user input in natural language, retrieving a first answer including a list of a first number of documents relevant to the user input by searching indexed documents in a knowledge base, applying the first answer to a large language model reader, resulting in a second answer, re-ranking the first answer by using the second answer, resulting in a third answer including a re-ranked list of the first number of documents, and generating a final response including the second answer and one or more documents among the third answer.