Results 101 to 110 of about 197,924 (296)

UNJUK KERJA VOICE OVER INTERNET PROTOCOL PADA JARINGAN LOKAL UNIVERSITAS JENDERAL SOEDIRMAN

open access: yesDinamika Rekayasa, 2012
Jenderal Soedirman University (UNSOED) LAN covers all of its units that spread not only in Purwokerto area, but also in Purbalingga. Therefore, it may be possible to implement VoIP system in order to replace the internal campus voice telecommunication ...
Alfa Pradipta   +2 more
doaj  

A Survey Paper on Voice over Internet Protocol (VOIP)

open access: yesInternational Journal of Computer Applications, 2016
over Internet protocol (VoIP), which is a communication protocol existing over a network. The IP network can makes it possible for users to make telephone calls using the VoIP technology. Use of VoIP and Internet telephony has increased significantly in the recent years.
Bobby Sharma, Urjashee Shaw
openaire   +1 more source

Analisis Performansi Voice Over Internet Protocol (Voip) Berbasis Session Initiation Protocol (Sip) Pada Jaringan Wireless Lan Ieee 802.11 Universitas Lampung [PDF]

open access: yes, 2014
Nowadays Voice over Internet Protocol (VoIP) technology are widely used by humans being to communicate. VoIP allows the transmission of voice data packets from one place to another, over an Internet Protocol (IP), VoIP technology was adopted in Lampung ...
Nama, G. F. (Gigih)   +1 more
core  

Activism as education in and through the youth climate justice movement

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Young people worldwide are increasingly participating in a global movement for climate justice, yet to date, little research has examined how youth climate justice activists conceive of and experience activism as education. The present study used in‐depth, semi‐structured interviews with 16 US climate justice activists (aged 15–17) to address ...
Carlie D. Trott
wiley   +1 more source

On the analytical model for jitter

open access: yesFrontiers in Communications and Networks
Jitter in Internet Protocol (IP) networks refers to the variation in packet arrival times, which can cause delays or disruptions in real-time communications like voice or video calls.
Saralees Nadarajah, Alassane Ba
doaj   +1 more source

Analisa Kinerja VoIP Client dengan Menggunakan Modul RTP Terenkripsi dan SRTP pada Jaringan VoIP [PDF]

open access: yes, 2014
Seiring dengan berkembangnya teknologi telekomunikasi dan komputer, banyak aplikasi-aplikasi yang mendukung komunikasi telepon melalui jaringan internet tumbuh dan berkembang.
Prastiawan, H. (Hendra)
core  

AI voice journaling for future language teachers: A path to well‐being through reflective practices

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This study aimed to explore the perceived impact of using an AI‐powered voice journaling app in overcoming the challenges and stressors encountered by senior students enrolled in teaching practicum at an English Language Teaching Bachelor's programme.
Bora Demir, Duygu Özdemir
wiley   +1 more source

Unveiling student sentiment dynamics toward AI‐based education through statistical analysis and Monte Carlo simulation

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This study explores the multifaceted dynamics of student sentiment towards artificial intelligence (AI)‐based education by integrating sentiment analysis techniques with statistical methods, including Monte Carlo simulations and decision tree modelling, alongside qualitative grounded theory analysis.
Volkan Duran   +2 more
wiley   +1 more source

Academic misconduct appeal services in China: Platform logics, self‐platformization and implications for integrity education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Academic misconduct appeal services have quietly emerged within China's education marketplace, with commercial agencies promoting themselves on social media to assist international students facing misconduct hearings. While existing research on academic integrity has emphasized prevention and detection, far less attention has been paid to what
Gengyan Tang   +2 more
wiley   +1 more source

Desktop application for crypto-protected voice communication

open access: yesVojnotehnički Glasnik
Introduction/purpose: All data exchanged over the Internet as well as other computer networks should be considered exposed to various types of security threats.
Stefan M. Ivanović   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy