Results 121 to 130 of about 85,239 (405)

Protection of IP-telefony networks on the basis of Asterisk from interception of data

open access: yesҚарағанды университетінің хабаршысы. Физика сериясы, 2017
Nowadays the new round of technologies development on voice transfer, and IP-telephony is observed. In a type of the growing levels of demand and popularity of IP-telephony as bases of corporate communication infrastructure creation there is a question ...
M.Z. Yakubova   +3 more
doaj  

Flash-based Audio and Video Communication in the Cloud [PDF]

open access: yesarXiv, 2011
Internet telephony and multimedia communication protocols have matured over the last fifteen years. Recently, the web is evolving as a popular platform for everything we do on the Internet including email, text chat, voice calls, discussions, enterprise apps and multi-party collaboration. Unfortunately, there is a disconnect between web and traditional
arxiv  

“That grey area where no one can help”: The experience of younger people avoiding or leaving residential aged care who are not NDIS participants

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract Living in residential aged care (RAC) can have deleterious effects on the health, well‐being and social participation of younger people (<65 years of age). This research examined the barriers and enablers to leaving or avoiding RAC for Australian younger people who are not National Disability Insurance Scheme (NDIS) participants. It reports on
Barrie Shannon   +3 more
wiley   +1 more source

Long‐term outcome prediction for chronic thromboembolic pulmonary hypertension after pulmonary endarterectomy

open access: yesClinical Cardiology, Volume 45, Issue 12, Page 1255-1263, December 2022., 2022
Abstract Background The definitive treatment for chronic thromboembolic pulmonary hypertension (CTEPH) is pulmonary endarterectomy (PEA), which has good long‐term outcomes. However, after surgery, a quarter of the patients still have residual pulmonary hypertension (RPH). In pulmonary hemodynamics, there are no unified criteria for RPH, even though the
Wu Song   +4 more
wiley   +1 more source

Telephony Over IP: A QoS Measurement-Based End to End Control Algorithm [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
This paper presents a method for admitting voice calls in Telephony over IP (ToIP) scenarios. This method, called QoS-Weighted CAC, aims to guarantee Quality of Service to telephony applications.
Luigi Alcuri, Francesco Saitta
doaj  

Uses and attitudes of young people toward technology and mobile telephony [PDF]

open access: yes
This paper aims at showing how young people are developing new and innovative ways of interacting using technology. Previous literature shows that technology adoption depends not only on the technology per se, but also on situational and contextual ...
Sieber, Sandra, Valor, Josep
core  

The Introduction of Extended Out‐of‐Home Care (OOHC) Until 21 Years in Australia: A Mapping of Policy, Legislation and Programs in Each Jurisdiction

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT It is increasingly recognised by global research that extending out‐of‐home care (OOHC) until at least 21 years of age is the policy reform most likely to advance improved outcomes for care leavers. In recent years, all eight Australian jurisdictions (States and Territories) have introduced forms of extended care programs.
Philip Mendes   +7 more
wiley   +1 more source

Prognosis of PCI in AMI setting in the elderly population: Outcomes from the multicenter prospective e‐ULTIMASTER registry

open access: yesClinical Cardiology, Volume 45, Issue 12, Page 1211-1219, December 2022., 2022
Abstract Background Elderly patients with ST‐elevation myocardial infarction (STEMI) who undergo percutaneous coronary intervention (PCI) are usually excluded from major trials. Hyopthesis This study sought to assess 1‐year clinical outcomes following PCI with a drug‐eluting stent in patients older than 80 years old with STEMI.
Majdi Saada   +11 more
wiley   +1 more source

IP Telephony Applicability in Cloud Computing

open access: yesJournal of Science and Research, 2018
This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations.
Francisco Palacios   +3 more
doaj   +1 more source

Influence of Speech Codecs Selection on Transcoding Steganography [PDF]

open access: yesarXiv, 2012
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. TranSteg (Trancoding Steganography) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality.
arxiv  

Home - About - Disclaimer - Privacy