Results 61 to 70 of about 51,651 (214)
Development and Performance Analysis of a Lossless Data Reduction Algorithm for VoIP [PDF]
VoIP (Voice Over IP) is becoming an alternative way of voice communications over the Internet. To better utilize voice call bandwidth, some standard compression algorithms are applied in VoIP systems.
Syed Misbahuddin, Noureddine Boulejfen
doaj
ANALISIS PRODUKSI SUSU SAPI PERAH DI INDONESIA [PDF]
Cow's milk is large in contributing to meeting the needs of people in developing countries to meet nutritional fulfillment. Cow's milk has increased imports due to the problem of cow disease which cannot meet the needs of the Indonesian people who ...
Khairunnisa, Yanita Melga Fitria
core
The heterogeneity of the network at the edge creates unequal bandwidth availability for clients connected through diverse networks and devices. This variability can lead to bandwidth fluctuations and slow response times, resulting in buffering or degraded streaming performance.
Reza Kalan +3 more
wiley +1 more source
Leveraging Gaussian Attention for Adapter‐Based Fine‐Tuning of WavLM in Audio Deepfake Detection
The advancement of deepfake technology has enabled deepfake audio to achieve unprecedented realism, posing significant challenges to automatic speaker verification (ASV) systems and threatening information security in critical sectors such as telecommunications and banking.
Yuhan Wang +4 more
wiley +1 more source
EVALUASI INFRASTRUKTUR VOIP PADA NETWORK JARINGAN SOHO
VOIP merupakan bentuk perkembangan komunikasi yang digunakan oleh beberapa perusahaan. Keuntungan mengimplementasikan VOIP mampu memberikan proses komunikasi yang lebih efisien.
Dandy Pramana Hostiadi
doaj
Interviews via VoIP: benefits and disadvantages within a PhD study of SMEs [PDF]
The benefits and disadvantages of Voice over Internet Protocol (VoIP) are explored as part of a PhD study to conduct qualitative interviews to discuss risk management within records management.
Hay-Gibson, Naomi
core
Reliable and secure routing is required in mission‐critical wireless sensor networks (MC‐WSNs), but currently trust‐based protocols such as ATRP are limited by their inability to adapt effectively to attack intensity and their fixed trust weighting.
Omar Ibrahim Mustafa +3 more
wiley +1 more source
Optimizing Service Differentiation Scheme with Sized-based Queue Management in DiffServ Networks [PDF]
In this paper we introduced Modified Sized-based Queue Management as a dropping scheme that aims to fairly prioritize and allocate more service to VoIP traffic over bulk data like FTP as the former one usually has small packet size with less impact to ...
Madi, Nadim K. M., Othman, Mohamed
core +1 more source
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson +3 more
core +1 more source
Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili +2 more
wiley +1 more source

