-
381
Smart home security with dual modes
Published 2020“…The NVR camera system is widely known as Internet Protocol Camera (IP Camera). This project is mainly focusing on the security system which could be implemented by community, either in-house or workplace, as the system has dual modes of operation (security mode and calibration mode). …”
Conference or Workshop Item -
382
A system of collaborative writing among writers through the internet
Published 2002“…In order to develop connection between client and server, this system uses Java's Internet Protocol Suite provided in java.net package. This package provides a set of classes that support network programming using the communication protocols employed by that Internet mcludes TCP/IP…”
Get full text
Article -
383
Remote process control and monitoring by using TCP/IP
Published 2008“…Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the protocols for communication on the Internet where a stream of data that is sent over the Internet is first broken down into packets by the TCP and IP is responsible for sending the packet to its destination along a route. …”
Get full text
Undergraduates Project Papers -
384
A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages
Published 2020-09-01“…Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. …”
Get full text
Article -
385
Experimental Analysis of Energy Efficient and QoS Aware Objective Functions for RPL Algorithm in IoT Networks
Published 2021-08-01“…Basically, it is the Internet Protocol Version 6 (IPv6) protocol developed based on the energy consumed by devices. …”
Get full text
Article -
386
Risk Assessment and Recommendation Strategy Based on COBIT 5 For Risk - A Case Study of an Internet Service Provider Company
Published 2023-03-01“…A good business case will include the problem in information technology governance, especially when it comes to maintenance related to POP or Post Office Protocol which is the internet protocol used on TCP/IP networks such as the internet. …”
Get full text
Article -
387
Symmetry-Adapted Machine Learning for Information Security
Published 2020-06-01“…These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis.…”
Get full text
Article -
388
Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk
Published 2019-09-01“…The convenience of IoT products, like closed circuit television (CCTV) cameras, internet protocol (IP) phones, and oscilloscopes, is overwhelming for end users. …”
Get full text
Article -
389
RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking
Published 2020-09-01“…Future internet architecture is modelled to overcome the fundamental limitations of the present internet protocol‐based internet and to provide specific strong security. …”
Get full text
Article -
390
Agile Management and Interoperability Testing of SDN/NFV‐Enriched 5G Core Networks
Published 2018-02-01“…In the fifth generation (5G) era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. …”
Get full text
Article -
391
Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments
Published 2015-09-01“…Voice over Internet Protocol (VoIP) is an emerging communication service that has advanced in ubiquitous computing environments. …”
Get full text
Article -
392
Vectored-Bloom Filter for IP Address Lookup: Algorithm and Hardware Architectures
Published 2019-10-01“…The Internet Protocol (IP) address lookup is one of the most challenging tasks for Internet routers, since it requires to perform packet forwarding at wire-speed for tens of millions of incomming packets per second. …”
Get full text
Article -
393
Survey on Measurement Methods for IPv6 Deployment
Published 2020-05-01“…Nowadays we use Internet Protocol (IP) versions 4 (IPv4) and 6 (IPv6) at the same time. …”
Get full text
Article -
394
Face recognition of remote monitoring under the Ipv6 protocol technology of Internet of Things architecture
Published 2023-10-01“…Therefore, under the technical support of the IoTs, the research uses internet protocol cameras to collect face information, improves the principal component analysis (PCA), poses a PLV algorithm, and then applies it to the face recognition system for remote monitoring. …”
Get full text
Article -
395
Assessment of an implementation project for a voip system: a case in the food industry
Published 2011-09-01“…In this context, this study analyzes the economic viability for the implementation of a communication system based on VoIP (Voice on Internet Protocol) in a food company of the industrial sector. …”
Get full text
Article -
396
Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test
Published 2020-05-01“…To record WiFi activities, the researchers use CommView for WiFi V. 7.0, and the target is Internet Protocol (IP) camera device. The result shows that the communication of the test target with the gateway is lost, but the Media Access Control (MAC) of the test target is still registered at the gateway. …”
Get full text
Article -
397
QoS Measurement of VoIP Codec Usage on Limited Bandwidth Network over UDP-based VPN
Published 2020-07-01“…The usage of internet protocol for voice communication is widely used and more efficient rather than an analog signal. …”
Get full text
Article -
398
Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays
Published 2013-11-01“…Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). …”
Get full text
Article -
399
WHATSAPP FORENSICS PADA ANDROID SMARTPHONE : A SURVEY
Published 2016-12-01“…Dalam sebuah proses mobile metoda yang digunakan dalam proses forensics antara lain menggunakan internet protocol dan live memory. Untuk proses mobile forensics khususnya pada applikasi WhatsApp dapat dilakukan dengan menggunakan metoda tersebut untuk memperoleh data informasi yang dibutuhkan.…”
Get full text
Article -
400
IEEE Access Special Section Editorial: Information Centric Wireless Networking With Edge Computing for 5G and IoT
Published 2020-01-01“…Some issues, for example, are Transmission Control Protocol/Internet Protocol (TCP/IP)-based and end-to-end-based centralized and rigid network structure, the lack and allocation difficulties of IP addresses, increasing network traffic forwarding massive data to the cloud at remote locations for high-capacity data processing, as well as increasing delays in receiving effective analytic results from the remote cloud server.…”
Get full text
Article