Showing 381 - 400 results of 809 for search '"Internet Protocol"', query time: 0.36s Refine Results
  1. 381

    Smart home security with dual modes by Mohd. Razali, Muhammad Naim, Abdul Kadir, Nurul Ashikin, Kasim, Johari

    Published 2020
    “…The NVR camera system is widely known as Internet Protocol Camera (IP Camera). This project is mainly focusing on the security system which could be implemented by community, either in-house or workplace, as the system has dual modes of operation (security mode and calibration mode). …”
    Conference or Workshop Item
  2. 382

    A system of collaborative writing among writers through the internet by Masrom, Suraya, Abas, Hafiza

    Published 2002
    “…In order to develop connection between client and server, this system uses Java's Internet Protocol Suite provided in java.net package. This package provides a set of classes that support network programming using the communication protocols employed by that Internet mcludes TCP/IP…”
    Get full text
    Article
  3. 383

    Remote process control and monitoring by using TCP/IP by Nurul Izyan, Ahmad Tarmizi

    Published 2008
    “…Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the protocols for communication on the Internet where a stream of data that is sent over the Internet is first broken down into packets by the TCP and IP is responsible for sending the packet to its destination along a route. …”
    Get full text
    Undergraduates Project Papers
  4. 384

    A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages by Abdallah Ghourabi, Mahmood A. Mahmood, Qusay M. Alzubi

    Published 2020-09-01
    “…Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. …”
    Get full text
    Article
  5. 385

    Experimental Analysis of Energy Efficient and QoS Aware Objective Functions for RPL Algorithm in IoT Networks by Ferhat Arat, Sercan Demirci

    Published 2021-08-01
    “…Basically, it is the Internet Protocol Version 6 (IPv6) protocol developed based on the energy consumed by devices. …”
    Get full text
    Article
  6. 386

    Risk Assessment and Recommendation Strategy Based on COBIT 5 For Risk - A Case Study of an Internet Service Provider Company by Jeremy Setiawan, Melissa Indah Fianty

    Published 2023-03-01
    “…A good business case will include the problem in information technology governance, especially when it comes to maintenance related to POP or Post Office Protocol which is the internet protocol used on TCP/IP networks such as the internet. …”
    Get full text
    Article
  7. 387

    Symmetry-Adapted Machine Learning for Information Security by Jong Hyuk Park

    Published 2020-06-01
    “…These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis.…”
    Get full text
    Article
  8. 388

    Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk by Sharad Agarwal, Pascal Oser, Stefan Lueders

    Published 2019-09-01
    “…The convenience of IoT products, like closed circuit television (CCTV) cameras, internet protocol (IP) phones, and oscilloscopes, is overwhelming for end users. …”
    Get full text
    Article
  9. 389

    RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking by Ramachandira Moorthy Buvanesvari, Kanagaraj Suresh Joseph

    Published 2020-09-01
    “…Future internet architecture is modelled to overcome the fundamental limitations of the present internet protocol‐based internet and to provide specific strong security. …”
    Get full text
    Article
  10. 390

    Agile Management and Interoperability Testing of SDN/NFV‐Enriched 5G Core Networks by Taesang Choi, TaeYeon Kim, Wouter Tavernier, Aki Korvala, Jussi Pajunpää

    Published 2018-02-01
    “…In the fifth generation (5G) era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. …”
    Get full text
    Article
  11. 391

    Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments by Kyung-Il Kim, Taegu Kim, Nam-Wook Cho, Minsoo Kim

    Published 2015-09-01
    “…Voice over Internet Protocol (VoIP) is an emerging communication service that has advanced in ubiquitous computing environments. …”
    Get full text
    Article
  12. 392

    Vectored-Bloom Filter for IP Address Lookup: Algorithm and Hardware Architectures by Hayoung Byun, Qingling Li, Hyesook Lim

    Published 2019-10-01
    “…The Internet Protocol (IP) address lookup is one of the most challenging tasks for Internet routers, since it requires to perform packet forwarding at wire-speed for tens of millions of incomming packets per second. …”
    Get full text
    Article
  13. 393

    Survey on Measurement Methods for IPv6 Deployment by Viktória Iró, Gábor Lencse

    Published 2020-05-01
    “…Nowadays we use Internet Protocol (IP) versions 4 (IPv4) and 6 (IPv6) at the same time. …”
    Get full text
    Article
  14. 394

    Face recognition of remote monitoring under the Ipv6 protocol technology of Internet of Things architecture by Fu Bo

    Published 2023-10-01
    “…Therefore, under the technical support of the IoTs, the research uses internet protocol cameras to collect face information, improves the principal component analysis (PCA), poses a PLV algorithm, and then applies it to the face recognition system for remote monitoring. …”
    Get full text
    Article
  15. 395

    Assessment of an implementation project for a voip system: a case in the food industry by Tiago José Menezes Gonçalves, Armando Gonçalves Madeira-Junior, Alcimar das Chagas Ribeiro

    Published 2011-09-01
    “…In this context, this study analyzes the economic viability for the implementation of a communication system based on VoIP (Voice on Internet Protocol) in a food company of the industrial sector. …”
    Get full text
    Article
  16. 396

    Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test by Yogi Kristiyanto, Ernastuti Ernastuti

    Published 2020-05-01
    “…To record WiFi activities, the researchers use CommView for WiFi V. 7.0, and the target is Internet Protocol (IP) camera device. The result shows that the communication of the test target with the gateway is lost, but the Media Access Control (MAC) of the test target is still registered at the gateway. …”
    Get full text
    Article
  17. 397

    QoS Measurement of VoIP Codec Usage on Limited Bandwidth Network over UDP-based VPN by B. S. Panca

    Published 2020-07-01
    “…The usage of internet protocol for voice communication is widely used and more efficient rather than an analog signal. …”
    Get full text
    Article
  18. 398

    Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays by José María Pousada-Carballo, Francisco Javier González-Castaño, Rafael Asorey-Cacheda, Felipe Gómez-Cuba, Pablo Sendín-Raña

    Published 2013-11-01
    “…Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). …”
    Get full text
    Article
  19. 399

    WHATSAPP FORENSICS PADA ANDROID SMARTPHONE : A SURVEY by Zulkarnaen Akbar, Beny Nugraha, Mudrik Alaydrus

    Published 2016-12-01
    “…Dalam sebuah proses mobile metoda yang digunakan dalam proses forensics antara lain menggunakan internet protocol dan live memory. Untuk proses mobile forensics khususnya pada applikasi WhatsApp dapat dilakukan dengan menggunakan metoda tersebut untuk memperoleh data informasi yang dibutuhkan.…”
    Get full text
    Article
  20. 400

    IEEE Access Special Section Editorial: Information Centric Wireless Networking With Edge Computing for 5G and IoT by Byung-Seo Kim, Chi Zhang, Yuanxiong Guo, Muhammad Khalil Afzal, Balazs Sonkoly

    Published 2020-01-01
    “…Some issues, for example, are Transmission Control Protocol/Internet Protocol (TCP/IP)-based and end-to-end-based centralized and rigid network structure, the lack and allocation difficulties of IP addresses, increasing network traffic forwarding massive data to the cloud at remote locations for high-capacity data processing, as well as increasing delays in receiving effective analytic results from the remote cloud server.…”
    Get full text
    Article