Results 11 to 20 of about 22,939 (222)

Nicotinamide riboside and pterostilbene reduces markers of hepatic inflammation in NAFLD: A double‐blind, placebo‐controlled clinical trial

open access: yesHepatology, EarlyView., 2022
NRPT 1X reduces ALT and ceramide 14:0 in 65% of subjects as compared to only 28% in the placebo group. Abstract Background and Aims The prevalence of NAFLD is increasing globally and on a path to becoming the most frequent cause of chronic liver disease. Strategies for the prevention and treatment of NAFLD are urgently needed.
Ryan W. Dellinger   +7 more
wiley   +1 more source

The diffusion of IP telephony and vendors' commercialisation strategies [PDF]

open access: yes, 2009
This is a post-peer-review, pre-copyedit version of an article published in the Journal of Information Technology. The definitive publisher-authenticated version is available at the link below.The Internet telephony (IP telephony) has been presented as a
Ahuja S.R.   +14 more
core   +1 more source

Perancangan Jaringan Voice Over Internet Protokol (Voip) Menggunakan Platform Asterisknow

open access: yesComputer Science, 2022
Communication is an important stage to support the running of a work program, without good communication it can cause misunderstandings between the two parties, the importance of the role of communication means several companies are growing rapidly in ...
Ahmad Fauzi   +2 more
doaj   +1 more source

Building blocks for IP telephony [PDF]

open access: yesIEEE Communications Magazine, 2000
Convergence between the existing telephone networks and data transfer over the Internet not only demands that new software be written to handle telephony applications which span both networks, but also makes new and innovative applications possible. Rather than writing these applications from the ground up, it would be helpful to have a relatively high-
D. Bergmark, S. Keshav
openaire   +1 more source

Comparing the Efficiency of IP and ATM Telephony [PDF]

open access: yes, 1999
Circuit switching, suited to providing real-time services due to the low and fixed switching delay, is not cost effective for building integrated services networks bursty data traffic because it is based on static allocation of resources which is not ...
Baldi, Mario   +1 more
core   +1 more source

Using Transcoding for Hidden Communication in IP Telephony [PDF]

open access: yes, 2011
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Pharmacy services and role development in UK general practice: a cross‐sectional survey

open access: yesInternational Journal of Pharmacy Practice, EarlyView., 2020
Abstract Background The ‘Clinical Pharmacists in General Practice’ (CPGP) pilot provided a template for general practice pharmacy professionals’ (GPPPs) roles encouraging NHS England to fund >2000 practice‐based pharmacists. However, many GPPPs work outside the CPGP initiative and little is known about the services they provide.
Vilius Savickas   +5 more
wiley   +1 more source

Comparative analysis of traditional telephone and VoIP systems

open access: yesJISR on Computing, 2014
Pakistan is in the period of upgrading communication infrastructure. Therefore many communication techniques are taking birth day by day and building the effective way of communication and one of many is IP Telephony system.
Syed Mohammad Raza Sajjad   +1 more
doaj   +1 more source

New security and control protocol for VoIP based on steganography and digital watermarking [PDF]

open access: yes, 2006
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core   +3 more sources

Automatic Classification of Attacks on IP Telephony

open access: yesAdvances in Electrical and Electronic Engineering, 2013
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network.
Jakub Safarik   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy