-
421
The Influence of SIP Call Control Signalling on VoIP Quality of Experience
Published 2019-01-01“…This paper provides an analysis of influence of SIP call control signalling on QoE for Voice over Internet Protocol (VoIP) service. The aim was to investigate whether SIP call control signalling load has the influence on the human perception of SIP signalling performances and QoE, and to identify the importance of distinct SIP-based signalling performance metrics. …”
Get full text
Article -
422
Speech Information Hiding Algorithm Based on Complete Binary Tree Dynamic Codebook Grouping
Published 2019-01-01“…In order to protect the data security and privacy of Voice over Internet Protocol (VoIP), a new algorithm for speech information hiding is proposed based on complete binary tree dynamic codebook grouping (CBTDCG). …”
Get full text
Article -
423
Traffic prediction in SDN for explainable QoS using deep learning approach
Published 2023-11-01“…Abstract The radical increase of multimedia applications such as voice over Internet protocol (VOIP), image processing, and video-based applications require better quality of service (QoS). …”
Get full text
Article -
424
Protection of Video Packets over a Wireless Rayleigh Fading Link: FEC versus ARQ
Published 2008-07-01“…Video content can be provided to an end user by transmitting video data as a sequence of internet protocol (IP) packets over the network. When the network contains a wireless link, packet erasures occur because of occasional deep fades. …”
Get full text
Article -
425
Analisis Performansi Algoritma Penjadwalan Log Rule dan Frame Level Schedule Skenario Multicell Pada Layer Mac LTE
Published 2016-03-01“…LTE (Long Term Evolution) is a network based on Internet Protocol (IP) standardized by 3rd Generation Partnership Project (3GPP). …”
Get full text
Article -
426
Study of Mobility Enhancements for RPL in Convergecast Scenarios
Published 2017-11-01“…The Routing Protocol for Low-Power and Lossy Networks (RPL) is a routing protocol for LLNs that adapts IPv6 (Internet Protocol version 6) and runs on top of the IEEE (Institute of Electrical and Electronics Engineers) 802.15.4 standard. …”
Get full text
Article -
427
Possible Collision Avoidance with Off-line Route Selection
Published 2009-11-01“…The paper describes the traffic flow problems in telecommunication networks based on the Internet protocol. The main aim of telecommunication network operator today is to offer an SLA (Service Level Agreement) contract to end users, with provided QoS (Quality of Service) for different classes of services. …”
Get full text
Article -
428
A Novel Method for IPTV Customer Behavior Analysis Using Time Series
Published 2022-01-01“…Internet Protocol Television (IPTV) has had a significant impact on live TV content consumption in the past decade, as improvements in the broadband speed have allowed more data volume to be delivered. …”
Get full text
Article -
429
Detecting Different Types of Distributed Denial of Service Attacks
Published 2021-03-01“…For the proposed system, experiment mechanisms for Transmission Control Protocol (TCP) Flooding, Spoofing Internet Protocol (IP), SYN Flood with Spoofed IP, and User Datagram Protocol (UDP) Flooding, which are among the DDoS attack types, were established and the attacks were performed to obtain network flow data. …”
Article -
430
Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel
Published 2013-03-01“…<p class="IEEEAbtract"><em><span lang="IN">Voice over Internet Protocol</span></em><span lang="IN"> (VoIP) merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. …”
Get full text
Article -
431
Grid Cyber-Security Strategy in an Attacker-Defender Model
Published 2021-04-01“…Specifically, our research provides insight into when to reset access controls (such as passwords, internet protocol addresses, and session keys), to minimize the probability of a successful attack. …”
Get full text
Article -
432
Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
Published 2020-01-01“…This paper presents an approach to detect the quantization index modulation (QIM) of steganography in G.723.1 based on the analysis of the probability of occurrence of index values before and after steganography and studying the influence of adjacent index values in voice over internet protocol (VoIP). According to the change of index value distribution characteristics, this approach extracts the distribution probability matrix and the transition probability matrix as feature vectors, and uses principal component analysis (PCA) to reduce the dimensionality. …”
Get full text
Article -
433
Analysis of packet switching in VoIP telephony at the command post of tactical level units
Published 2024-01-01“…Introduction/purpose: This paper conducts a comprehensive analysis of a potential implementation of Voice over Internet Protocol (VoIP) systems, focusing on network architecture, VoIP phones, and servers. …”
Get full text
Article -
434
An IoT-Based Solution for Intelligent Farming
Published 2019-01-01“…Due to its rigid requirements, particularly regarding the deployment of the Wireless Sensor Network, Machine-2-Machine communications and necessary interactions with a computational platform available through the Internet, Internet Protocol-based solutions are not suitable. Consequently, a customized communication stack has been developed, that intends to meet the project requirements, from the physical to the Application Layers. …”
Get full text
Article -
435
Design and Implementation of Controlling and Monitoring System Based on Wireless VPN
Published 2013-02-01“…PPTP (Point to Point Tunneling Protocol), IPSec. (Internet Protocol Security) was configured to give secret authentication for virtual private network. …”
Get full text
Article -
436
Predictive Maintenance with Sensor Data Analytics on a Raspberry Pi-Based Experimental Platform
Published 2019-09-01“…The information transmission of sensors was based on Raspberry Pi via the TCP/IP (Transmission Control Protocol/Internet Protocol) communication protocol. The sensors used for environmental sensing were implemented on the programmable interface controller and the data were stored in time sequence. …”
Get full text
Article -
437
Implementation of auto failover on SD-WAN technology with BGP routing method on Fortigate routers at XYZ company
Published 2024-03-01“…This research plan consists of ISP-A using IP-VPN (Internet Protocol-Virtual Private Network) and ISP-B using broadband Internet. …”
Get full text
Article -
438
Mobile application development for CCTV system
Published 2013“…Analogue Closed Circuit Television (CCTV) systems have historically been deployed for security concerns. Internet Protocol (IP) CCTV cameras followed soon after, allowing CCTV footage to be viewed using a computer. …”
Get full text
Final Year Project (FYP) -
439
Capacity and Quality of Single Cell WiMAX Network for VoIP Application
Published 2012“…Voice over Internet Protocol (VoIP) is expected to be implemented in the next generation communication networks. …”
Get full text
Conference or Workshop Item -
440
Security measures for VoIP application: a state of the art review
Published 2011“…Voice over internet protocol (VoIP) is being widely used, while the integration of voice and data provide several opportunities. …”
Get full text
Article