Results 141 to 150 of about 288,912 (293)
Estudio comparativo de la utilización de ancho de banda con los protocolos SIP e IAX
Within the VoIP networks environment, there are three protocols that solve the problem of voice packet signaling, known as “highlight protocols”: H323, SIP and IAX.
Octavio Salcedo +2 more
doaj
ABSTRACT Repairs are becoming more difficult to perform due to multiple factors, including obsolescence, complexity of designs, technological change and lack of information and spare parts. This underlines a conflict between repair and technological designs driven by accumulation logics that require increasing growth rates.
Francisco López‐Bermúdez +1 more
wiley +1 more source
Srividhya S.R, Anita Davamani K
openaire +3 more sources
Micro‐transitions and work identity: The case of academic entrepreneurs
Abstract Research Summary This paper examines how academic entrepreneurs—scientists who found research‐based startups while remaining in academia—construct and sustain their professional identities amid frequent transitions between academic and entrepreneurial roles.
Marouane Bousfiha, Henrik Berglund
wiley +1 more source
Characterizing the safety and efficacy of injection pharyngoplasty as a treatment for velopharyngeal insufficiency in adults. [PDF]
Kalra A +5 more
europepmc +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Theorizing Synchronization of Organizational Resources in Dynamic Environments
ABSTRACT Resource orchestration (RO) in dynamic environments poses challenges during strategic initiatives. Although prior research highlights RO's benefits, little is known about how managerial decisions influence RO over time, potentially leading to inefficiencies.
Haytham Siala +6 more
wiley +1 more source
The WeDDa framework for preventing smishing and vishing using protocol agnostic cryptographic trust. [PDF]
Salem MFM, Hamad EKI, El-Bendary MAM.
europepmc +1 more source
Venture Capital Practices in Saudi Arabia: The Views of Investors
ABSTRACT This study examines how venture capital (VC) investors in Saudi Arabia evaluate, negotiate, and support entrepreneurial ventures in a rapidly developing yet institutionally young setting. Drawing on 21 semi‐structured interviews with 24 investors, it offers rare insight into VC practices in the Middle East.
Tibah al‐Harbi +2 more
wiley +1 more source

