Showing 421 - 440 results of 809 for search '"Internet Protocol"', query time: 0.20s Refine Results
  1. 421

    The Influence of SIP Call Control Signalling on VoIP Quality of Experience by Jasmina Baraković Husić*, Sabina Baraković, Seudin Kasumović

    Published 2019-01-01
    “…This paper provides an analysis of influence of SIP call control signalling on QoE for Voice over Internet Protocol (VoIP) service. The aim was to investigate whether SIP call control signalling load has the influence on the human perception of SIP signalling performances and QoE, and to identify the importance of distinct SIP-based signalling performance metrics. …”
    Get full text
    Article
  2. 422

    Speech Information Hiding Algorithm Based on Complete Binary Tree Dynamic Codebook Grouping by Wu Zhijun, Li Changliang, Sha Yongpeng

    Published 2019-01-01
    “…In order to protect the data security and privacy of Voice over Internet Protocol (VoIP), a new algorithm for speech information hiding is proposed based on complete binary tree dynamic codebook grouping (CBTDCG). …”
    Get full text
    Article
  3. 423

    Traffic prediction in SDN for explainable QoS using deep learning approach by Getahun Wassie, Jianguo Ding, Yihenew Wondie

    Published 2023-11-01
    “…Abstract The radical increase of multimedia applications such as voice over Internet protocol (VOIP), image processing, and video-based applications require better quality of service (QoS). …”
    Get full text
    Article
  4. 424

    Protection of Video Packets over a Wireless Rayleigh Fading Link: FEC versus ARQ by Marc Moeneclaey, Danny De Vleeschauwer, Frederik Vanhaverbeke, Julie Neckebroek

    Published 2008-07-01
    “…Video content can be provided to an end user by transmitting video data as a sequence of internet protocol (IP) packets over the network. When the network contains a wireless link, packet erasures occur because of occasional deep fades. …”
    Get full text
    Article
  5. 425

    Analisis Performansi Algoritma Penjadwalan Log Rule dan Frame Level Schedule Skenario Multicell Pada Layer Mac LTE by Ridwan, Indrarini Dyah Irawati, Ridha Muldina Negara

    Published 2016-03-01
    “…LTE (Long Term Evolution) is a network based on Internet Protocol (IP) standardized by 3rd Generation Partnership Project (3GPP). …”
    Get full text
    Article
  6. 426

    Study of Mobility Enhancements for RPL in Convergecast Scenarios by Jinpeng Wang, Gérard Chalhoub

    Published 2017-11-01
    “…The Routing Protocol for Low-Power and Lossy Networks (RPL) is a routing protocol for LLNs that adapts IPv6 (Internet Protocol version 6) and runs on top of the IEEE (Institute of Electrical and Electronics Engineers) 802.15.4 standard. …”
    Get full text
    Article
  7. 427

    Possible Collision Avoidance with Off-line Route Selection by Srećko Krile, Dragan Peraković, Vladimir Remenar

    Published 2009-11-01
    “…The paper describes the traffic flow problems in telecommunication networks based on the Internet protocol. The main aim of telecommunication network operator today is to offer an SLA (Service Level Agreement) contract to end users, with provided QoS (Quality of Service) for different classes of services. …”
    Get full text
    Article
  8. 428

    A Novel Method for IPTV Customer Behavior Analysis Using Time Series by Tomislav Hlupic, Drazen Orescanin, Mirta Baranovic

    Published 2022-01-01
    “…Internet Protocol Television (IPTV) has had a significant impact on live TV content consumption in the past decade, as improvements in the broadband speed have allowed more data volume to be delivered. …”
    Get full text
    Article
  9. 429

    Detecting Different Types of Distributed Denial of Service Attacks by Esra SÖĞÜT, Saadin OYUCU, O. Ayhan ERDEM

    Published 2021-03-01
    “…For the proposed system, experiment mechanisms for Transmission Control Protocol (TCP) Flooding, Spoofing Internet Protocol (IP), SYN Flood with Spoofed IP, and User Datagram Protocol (UDP) Flooding, which are among the DDoS attack types, were established and the attacks were performed to obtain network flow data. …”
    Article
  10. 430

    Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel by Mohammad Shoffa Al Arofat, Nurdin Bahtiar, Ragil Saputra

    Published 2013-03-01
    “…<p class="IEEEAbtract"><em><span lang="IN">Voice over Internet Protocol</span></em><span lang="IN"> (VoIP) merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. …”
    Get full text
    Article
  11. 431

    Grid Cyber-Security Strategy in an Attacker-Defender Model by Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva

    Published 2021-04-01
    “…Specifically, our research provides insight into when to reset access controls (such as passwords, internet protocol addresses, and session keys), to minimize the probability of a successful attack. …”
    Get full text
    Article
  12. 432

    Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec by Zhijun Wu, Rong Li, Panpan Yin, Changliang Li

    Published 2020-01-01
    “…This paper presents an approach to detect the quantization index modulation (QIM) of steganography in G.723.1 based on the analysis of the probability of occurrence of index values before and after steganography and studying the influence of adjacent index values in voice over internet protocol (VoIP). According to the change of index value distribution characteristics, this approach extracts the distribution probability matrix and the transition probability matrix as feature vectors, and uses principal component analysis (PCA) to reduce the dimensionality. …”
    Get full text
    Article
  13. 433

    Analysis of packet switching in VoIP telephony at the command post of tactical level units by Marko R. Marković, Stefan M. Ivanović, Sava S. Stanišić

    Published 2024-01-01
    “…Introduction/purpose: This paper conducts a comprehensive analysis of a potential implementation of Voice over Internet Protocol (VoIP) systems, focusing on network architecture, VoIP phones, and servers. …”
    Get full text
    Article
  14. 434

    An IoT-Based Solution for Intelligent Farming by Luís Nóbrega, Pedro Gonçalves, Paulo Pedreiras, José Pereira

    Published 2019-01-01
    “…Due to its rigid requirements, particularly regarding the deployment of the Wireless Sensor Network, Machine-2-Machine communications and necessary interactions with a computational platform available through the Internet, Internet Protocol-based solutions are not suitable. Consequently, a customized communication stack has been developed, that intends to meet the project requirements, from the physical to the Application Layers. …”
    Get full text
    Article
  15. 435

    Design and Implementation of Controlling and Monitoring System Based on Wireless VPN by Siraj Qays Mahdi

    Published 2013-02-01
    “…PPTP (Point to Point Tunneling Protocol), IPSec. (Internet Protocol Security) was configured to give secret authentication for virtual private network. …”
    Get full text
    Article
  16. 436

    Predictive Maintenance with Sensor Data Analytics on a Raspberry Pi-Based Experimental Platform by Shang-Yi Chuang, Nilima Sahoo, Hung-Wei Lin, Yeong-Hwa Chang

    Published 2019-09-01
    “…The information transmission of sensors was based on Raspberry Pi via the TCP/IP (Transmission Control Protocol/Internet Protocol) communication protocol. The sensors used for environmental sensing were implemented on the programmable interface controller and the data were stored in time sequence. …”
    Get full text
    Article
  17. 437

    Implementation of auto failover on SD-WAN technology with BGP routing method on Fortigate routers at XYZ company by Lukman Medriavin Silalahi, Vahira Amaada, Setiyo Budiyanto, Imelda Uli Vistalina Simanjuntak, Agus Dendi Rochendi

    Published 2024-03-01
    “…This research plan consists of ISP-A using IP-VPN (Internet Protocol-Virtual Private Network) and ISP-B using broadband Internet. …”
    Get full text
    Article
  18. 438

    Mobile application development for CCTV system by Chen, Noel Yingsheng.

    Published 2013
    “…Analogue Closed Circuit Television (CCTV) systems have historically been deployed for security concerns. Internet Protocol (IP) CCTV cameras followed soon after, allowing CCTV footage to be viewed using a computer. …”
    Get full text
    Final Year Project (FYP)
  19. 439

    Capacity and Quality of Single Cell WiMAX Network for VoIP Application by Setiyanto, Budi, mintarum, esmining, Wibowo, Sigit Basuki

    Published 2012
    “…Voice over Internet Protocol (VoIP) is expected to be implemented in the next generation communication networks. …”
    Get full text
    Conference or Workshop Item
  20. 440

    Security measures for VoIP application: a state of the art review by Jahanirad, M., Yahya, A.L.N., Noor, R.M.

    Published 2011
    “…Voice over internet protocol (VoIP) is being widely used, while the integration of voice and data provide several opportunities. …”
    Get full text
    Article