Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili +2 more
wiley +1 more source
Evaluation of eHealth Interventions to Prevent Pressure Injuries: A Scoping Review
ABSTRACT The aim of this scoping review was to map the literature pertaining to the use of eHealth interventions to prevent pressure injuries in populations at risk of the complication, and describe the interventions encountered with the help of Greenhalgh et al.'s Nonadoption, Abandonment, Scale‐up, Spread and Sustainability framework.
Arif Ahmad Kamil Ahmad +4 more
wiley +1 more source
MVF: A Novel Technique to Reduce the Voip Packet Payload Length
The adoption of the Voice over Internet Protocol (VoIP) system is growing due to several factors, including its meagre rate and the numerous contours that can be joined with VoIP systems.
Abualhaj Mosleh M. +3 more
doaj +1 more source
Development and Performance Analysis of a Lossless Data Reduction Algorithm for VoIP [PDF]
VoIP (Voice Over IP) is becoming an alternative way of voice communications over the Internet. To better utilize voice call bandwidth, some standard compression algorithms are applied in VoIP systems.
Syed Misbahuddin, Noureddine Boulejfen
doaj
Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid +5 more
core
SecSip: A Stateful Firewall for SIP-based Networks [PDF]
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core +5 more sources
Monitoring Poverty in a Data‐Deprived Environment: The Case of Lebanon
Abstract This paper addresses the lack of data and limited statistical capacity in the Middle East and North Africa, particularly amid Lebanon's economic collapse. We apply a novel data augmentation technique to analyze poverty when traditional income data are limited or unavailable.
Paul Makdissi +2 more
wiley +1 more source
An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink
An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-
Kim Yong-Seok
doaj +2 more sources
The voice activity detection (VAD) recorder and VAD network recorder : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Computer Science at Massey University [PDF]
The project is to provide a feasibility study for the AudioGraph tool, focusing on two application areas: the VAD (voice activity detector) recorder and the VAD network recorder.
Liu, Feng
core
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary +3 more
wiley +1 more source

