-
481
IEEE Access Special Section Editorial: Mission Critical Public-Safety Communications: Architectures, Enabling Technologies, and Future Applications
Published 2018-01-01“…LTE provides high bandwidth and low latency services to the customers using internet protocol-based LTE network. Since mission critical communication services have different demands and priorities for dynamically varying situations for disaster-hit areas, the architecture and the communication technologies of the existing LTE networks need to be upgraded with a system that has the capability to respond efficiently and in a timely manner during critical situations.…”
Get full text
Article -
482
Security and Integrity Attacks in Named Data Networking: A Survey
Published 2023-01-01“…It differs from host-centric standard Internet Protocol (IP) networking in of naming, routing, forwarding, and caching characteristics. …”
Get full text
Article -
483
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Published 2013-11-01“…Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. …”
Get full text
Article -
484
Use of QUIC for Mobile-Oriented Future Internet (Q-MOFI)
Published 2024-01-01“…The transport layer plays a crucial role in the internet protocol suite by enabling communication between applications running on different servers. …”
Get full text
Article -
485
Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs
Published 2024-02-01“…Named Data Networking (NDN) has emerged as a promising architecture to overcome the limitations of the conventional Internet Protocol (IP) architecture, particularly in terms of mobility, security, and data availability. …”
Get full text
Article -
486
Remote distributed monitoring system of switched reluctance motor
Published 2019-03-01“…In order to solve these problems, a new structure of the SRM monitoring system, which uses Digital Signal Processor (DSP) and the hardwired Transmission Control Protocol/Internet Protocol embedded Ethernet controller W5500, is presented in this paper. …”
Get full text
Article -
487
-
488
Development of (VOIP) applications for mobile devices
Published 2009“…In this project, Voice over Internet Protocol (VOIP) Program software is proposed to enable user to make free phone call via the Internet. …”
Get full text
Final Year Project (FYP) -
489
Outreach-focused enterprise network design I
Published 2024“…The outreach program is meticulously structured to cover crucial topics such as Internet Protocol (IP) addressing, Switchport Security, Virtual Local Area Networks (VLANs), Routing Protocols, Access Control Lists (ACLs) and the utilization of Cisco Packet Tracer simulation software for practical, hands-on learning experiences. …”
Get full text
Final Year Project (FYP) -
490
Security platform in next generation communications (part 4)
Published 2009“…In the past 2 or 3 decades, IPv4 proves it as a dominant Internet protocol. Nowadays, with the growth of network usage worldwide, IPv4 address is going to be exhausted soon. …”
Get full text
Final Year Project (FYP) -
491
Robotic gesture-speech synchronization
Published 2011“…The method used for communication was via transmission control protocol/internet protocol. A text engine was created to prepare the modified text format to be processed by the text to speech engine. …”
Get full text
Final Year Project (FYP) -
492
Encryption method for SCADA security enhancement
Published 2014“…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
Get full text
Article -
493
ANALISIS MANAJEMEN BANDWIDTH UNTUK PERANCANGAN VOIP (KASUS MTI JTETI FT UGM)
Published 2011“…VOIP (Voice over IP) is a technology that utilizes the Internet Protocol to provide voice communications electronically and in real-time. …”
Thesis -
494
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Thesis -
495
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…A new technology which named as Voice over Internet Protocol brings a new dimension in the communication technology. …”
Get full text
Student Project -
496
DDoS attacks in VoIP: a brief review of detection and mitigation techniques
Published 2016“…Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. …”
Get full text
Get full text
Article -
497
A simulative study on the performance evaluation for simultaneous and successive mobility for mobile IPv6
Published 2010“…Mobile Internet Protocol (MIP) is the forms of the backbone for next generation wireless internet technology to provide uninterrupted network service while a node on the move. …”
Get full text
Article -
498
Mutual remote attestation in IPSec based VPN.
Published 2012“…Secure communication between computer systems is normally established using secure tunnel technologies such as Internet Protocol Security (IPSec). IPSec protocol guarantees authenticity of communication and secure the data at each gateway but it does not provide any assurance on the entity authentication. …”
Get full text
Conference or Workshop Item -
499
A Matrix Usage for Load Balancing in Shortest Path Routing
Published 2009“…The Open Shortest Path First (OSPF) protocol is a hierarchical interior gateway protocol (IGP) for routing in Internet Protocol. Traffic flows routed along shortest path and splits the load equally at nodes where a number of outgoing links on the shortest paths to the same destination IP address. …”
Get full text
Thesis -
500
Energy conservation strategies in Host Centric Networking based MANET: A review
Published 2018“…Next follows a review on the limitations of using Host Centric Networking (HCN) in MANET to expound why such protocols like TCP/IP (Transmission Control Protocol/Internet Protocol) is inefficient for use in MANET implementation. …”
Article