Results 31 to 40 of about 852,517 (241)
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane +3 more
doaj +1 more source
Effective IoT Congestion Control Algorithm
The Internet of Things (IoT) connects devices via the Internet. Network congestion is one of the key problems that has been identified by researchers in the IoT field.
Husam H. Hasan, Zainab T. Alisa
doaj +1 more source
Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing
Data transfer is one of the main functions of the Internet. The Internet consists of a large number of interconnected subnetworks or domains, known as Autonomous Systems.
Elmokashfi, Ahmed +3 more
core +3 more sources
Multi-user Internet environment for gear design optimization [PDF]
A Web based multi-user system has been developed to remotely execute a large size software package via the Internet. The software implements genetic algorithm to optimize the design of spur and helical gears.
Amin, N, Hull, BN, Ji, S, Su, D
core +1 more source
New security and control protocol for VoIP based on steganography and digital watermarking [PDF]
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core +3 more sources
– The development of technology, gives many effects for human life. Many things can be controlled automatically and remotely. Internet of Things is as one of technology development which can be a solution to make human life easier. Internet of Things can
Sidiq Rilo Pambudi, Alif Subardono
doaj +1 more source
Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection
To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA).
O. W. Salami, I. J. Umoh, E. A. Adedokun
doaj +1 more source
Protocol describes a cascade of formalised standards or agreements to be implemented as control regimes for flexible material and/or semiotic organisation.
Gerd Beuster +2 more
doaj +1 more source
KISS: Stochastic Packet Inspection Classifier for UDP Traffic [PDF]
This paper proposes KISS, a novel Internet classifica- tion engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of Peer-to-Peer (P2P) streaming appli- cations, we propose a novel classification framework that leverages ...
Finamore, Alessandro +3 more
core +2 more sources
IP Address Allocation through the Lenses of Public Goods and Scarce Resources Theories
The current Internet Protocol (IP) addressing system, Internet Protocol version 4 (IPv4), is a resource with limitations. All IPv4 address blocks have now been allocated, posing a risk that not all IP address requests will be satisfied.
Rolf H. Weber and Ulrike I. Heinrich
doaj +1 more source

