Results 41 to 50 of about 288,912 (293)

Utilizing Voip Packet Header’s Fields to Save the Bandwidth

open access: yesTransport and Telecommunication, 2023
Voice over IP (VoIP) is widely utilized by organizations, schools, colleges, and so on. Nevertheless, VoIP numerous challenges that hinder its spread.
Abualhaj Mosleh M.   +2 more
doaj   +1 more source

Voice over IP Forensics [PDF]

open access: yes, 2021
Ο σκοπός της παρούσας διατριβής είναι διττός. Από τη μία πλευρά γίνεται διερεύνηση των δυνατοτήτων ανάκτησης ψηφιακών πειστηρίων (forensics) που υπάρχουν σε επικοινωνίες μετάδοσης φωνής πάνω από το διαδίκτυο (VoIP). Από την άλλη πλευρά διερευνάται η χρήση τεχνικών απόκρυψης (anti-forensics) σε ένα ετερογενές δίκτυο επικοινωνιών.Οι δύο αυτοί φαινομενικά
openaire   +1 more source

Synthesizing 802.11B and Voice-over-IP Using Claps [PDF]

open access: yes, 2018
Many security experts would agree that, had it not been for gigabit switches, the study of object-oriented languages might never have oc- curred. We omit a more thorough discussion for anonymity.
Forrest, M. (Martin)   +3 more
core  

Toward Next‐Generation High‐Speed Communication and Imaging: Solution‐Processed Sb2(S,Se)3/CdS Heterojunction for Ultrafast Self‐Powered Photodetector

open access: yesAdvanced Science, EarlyView.
A high‐quality solution‐processed Sb2(S,Se)3/CdS heterojunction is designed to overcome the intrinsic limitations of conventional photodetectors. The fabricated device achieves an excellent self‐powered performance, including a high responsivity of 0.6 A W−1, an ultrahigh specific detectivity of 7.68 × 1012 Jones, and a wide 3db bandwidth of 175 kHz ...
Xuhua Xiao   +6 more
wiley   +1 more source

IP over Voice-over-IP for censorship circumvention

open access: yes, 2012
Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy network-based censorship mechanisms within their networks. Existing censorship circumvention systems face different difficulties in providing unobservable communication with their clients; this limits their availability ...
Houmansadr, Amir   +3 more
openaire   +2 more sources

Towards the Evaluation of Voice-over-IP [PDF]

open access: yes, 2018
RAID must work. Given the current status of concurrent configurations, scholars daringly desire the construction of telephony. In order to accomplish this aim, we use interactive in- formation to prove that the World Wide Web can be made linear-time ...
Lenihan, J. (Jennifer)
core  

Gasdermin D‐Mediated Release of IL‐33 Results in Fetal Brain Developmental Abnormalities During Maternal Colitis

open access: yesAdvanced Science, EarlyView.
Under colitis, Gsdmd mediates the release of IL‐33 from the epithelium of pregnant mice. IL‐33 can cross the placenta and enhance the proliferative capacity of neural stem cells, ultimately resulting in behavioral deficits in the offspring. Excessive pyroptosis in the colonic epithelium also triggers the translocation of LPS, which in turn increases ...
Huiyang Jia   +4 more
wiley   +1 more source

Anti-packet-loss joint encoding for voice-over-IP steganography

open access: yesTongxin xuebao, 2016
VoIP (voice over IP) is a kind of voice communication technology based on UDP/IP protocols. Packet loss will inevitably happen when the channel environment deteriorates, which can pose challenges to the reliable transmission of VoIP steganography.
Zhan-zhan GAO   +2 more
doaj   +2 more sources

The Effect of Voice over IP Transmission Degradations on MAP-EM-GMM Speaker Verification Performance

open access: yesArchives of Acoustics, 2015
Despite the growing importance of packet switching systems, there is still a shortage of thorough analyses of VoIP transmission effect on speech and speaker recognition performance. Voice over IP transmission systems use packet switching.
Waldemar MACIEJKO
doaj   +1 more source

Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]

open access: yes, 2008
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid   +5 more
core  

Home - About - Disclaimer - Privacy