Showing 481 - 500 results of 809 for search '"Internet Protocol"', query time: 0.86s Refine Results
  1. 481

    IEEE Access Special Section Editorial: Mission Critical Public-Safety Communications: Architectures, Enabling Technologies, and Future Applications by Zeeshan Kaleem, Mubashir Husain Rehmani, Muhammad Ali Imran, Muhammad Zeeshan Shakir, Abbas Jamalipour, Ejaz Ahmed

    Published 2018-01-01
    “…LTE provides high bandwidth and low latency services to the customers using internet protocol-based LTE network. Since mission critical communication services have different demands and priorities for dynamically varying situations for disaster-hit areas, the architecture and the communication technologies of the existing LTE networks need to be upgraded with a system that has the capability to respond efficiently and in a timely manner during critical situations.…”
    Get full text
    Article
  2. 482

    Security and Integrity Attacks in Named Data Networking: A Survey by Mohammad Shahrul Mohd Shah, Yu-Beng Leau, Mohammed Anbar, Ali Abdulqader Bin-Salem

    Published 2023-01-01
    “…It differs from host-centric standard Internet Protocol (IP) networking in of naming, routing, forwarding, and caching characteristics. …”
    Get full text
    Article
  3. 483

    PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices by Antonio F. Gomez Skarmeta, Rafa Marin Lopez, Pedro Moreno Sanchez

    Published 2013-11-01
    “…Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. …”
    Get full text
    Article
  4. 484

    Use of QUIC for Mobile-Oriented Future Internet (Q-MOFI) by Muhammad Tauqeer, Moneeb Gohar, Seok Joo Koh, Hani Alquhayz

    Published 2024-01-01
    “…The transport layer plays a crucial role in the internet protocol suite by enabling communication between applications running on different servers. …”
    Get full text
    Article
  5. 485

    Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs by Mohammed Bellaj, Najib Naja, Abdellah Jamali

    Published 2024-02-01
    “…Named Data Networking (NDN) has emerged as a promising architecture to overcome the limitations of the conventional Internet Protocol (IP) architecture, particularly in terms of mobility, security, and data availability. …”
    Get full text
    Article
  6. 486

    Remote distributed monitoring system of switched reluctance motor by Yan Cai, Wenlong Xie, Haihua Zhang

    Published 2019-03-01
    “…In order to solve these problems, a new structure of the SRM monitoring system, which uses Digital Signal Processor (DSP) and the hardwired Transmission Control Protocol/Internet Protocol embedded Ethernet controller W5500, is presented in this paper. …”
    Get full text
    Article
  7. 487
  8. 488

    Development of (VOIP) applications for mobile devices by Lee, Heng Leong.

    Published 2009
    “…In this project, Voice over Internet Protocol (VOIP) Program software is proposed to enable user to make free phone call via the Internet. …”
    Get full text
    Final Year Project (FYP)
  9. 489

    Outreach-focused enterprise network design I by Soh, Yong Kiat

    Published 2024
    “…The outreach program is meticulously structured to cover crucial topics such as Internet Protocol (IP) addressing, Switchport Security, Virtual Local Area Networks (VLANs), Routing Protocols, Access Control Lists (ACLs) and the utilization of Cisco Packet Tracer simulation software for practical, hands-on learning experiences. …”
    Get full text
    Final Year Project (FYP)
  10. 490

    Security platform in next generation communications (part 4) by Nguyen, Tat Thang.

    Published 2009
    “…In the past 2 or 3 decades, IPv4 proves it as a dominant Internet protocol. Nowadays, with the growth of network usage worldwide, IPv4 address is going to be exhausted soon. …”
    Get full text
    Final Year Project (FYP)
  11. 491

    Robotic gesture-speech synchronization by Lim, Keck Soon.

    Published 2011
    “…The method used for communication was via transmission control protocol/internet protocol. A text engine was created to prepare the modified text format to be processed by the text to speech engine. …”
    Get full text
    Final Year Project (FYP)
  12. 492

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
    Get full text
    Article
  13. 493

    ANALISIS MANAJEMEN BANDWIDTH UNTUK PERANCANGAN VOIP (KASUS MTI JTETI FT UGM) by , Ferra Rahadian, , Widyawan, S.T., M.Sc., Ph.D.

    Published 2011
    “…VOIP (Voice over IP) is a technology that utilizes the Internet Protocol to provide voice communications electronically and in real-time. …”
    Thesis
  14. 494

    Software reusability in green computing / Ibraheem Y. Y. Ahmaro by Y. Y. Ahmaro, Ibraheem

    Published 2013
    “…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
    Get full text
    Thesis
  15. 495

    The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria by Zakaria, Ahmad Zulkhair

    Published 2006
    “…A new technology which named as Voice over Internet Protocol brings a new dimension in the communication technology. …”
    Get full text
    Student Project
  16. 496

    DDoS attacks in VoIP: a brief review of detection and mitigation techniques by Sambath Narayanan, Selvakumar Manickam, Leau, Yu Beng

    Published 2016
    “…Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. …”
    Get full text
    Get full text
    Article
  17. 497

    A simulative study on the performance evaluation for simultaneous and successive mobility for mobile IPv6 by Abdullah, Ibrahim, Othman, Mohamed

    Published 2010
    “…Mobile Internet Protocol (MIP) is the forms of the backbone for next generation wireless internet technology to provide uninterrupted network service while a node on the move. …”
    Get full text
    Article
  18. 498

    Mutual remote attestation in IPSec based VPN. by Abd Aziz, Norazah, Setapa, Sharipah, Udzir, Nur Izura

    Published 2012
    “…Secure communication between computer systems is normally established using secure tunnel technologies such as Internet Protocol Security (IPSec). IPSec protocol guarantees authenticity of communication and secure the data at each gateway but it does not provide any assurance on the entity authentication. …”
    Get full text
    Conference or Workshop Item
  19. 499

    A Matrix Usage for Load Balancing in Shortest Path Routing by Mustafa, Nor Musliza

    Published 2009
    “…The Open Shortest Path First (OSPF) protocol is a hierarchical interior gateway protocol (IGP) for routing in Internet Protocol. Traffic flows routed along shortest path and splits the load equally at nodes where a number of outgoing links on the shortest paths to the same destination IP address. …”
    Get full text
    Thesis
  20. 500

    Energy conservation strategies in Host Centric Networking based MANET: A review by Muchtar, Farkhana, Abdullah, Abdul Hanan, Hassan, Suhaidi, Masud, Farhan

    Published 2018
    “…Next follows a review on the limitations of using Host Centric Networking (HCN) in MANET to expound why such protocols like TCP/IP (Transmission Control Protocol/Internet Protocol) is inefficient for use in MANET implementation. …”
    Article