Results 51 to 60 of about 59,048 (264)

Novel Method of Reducing the Allocated Bandwidth by Voip

open access: yesTransport and Telecommunication, 2022
Old telecommunication systems are gradually being replaced by a new system that works over IP networks, which is known as voice over internet protocol (VoIP). VoIP has several merits (e.g., very cheap call rate), which make it increasingly popular in the
Abualhaj Mosleh M.   +3 more
doaj   +1 more source

KINERJA VOIP SIP DAN VOIP H.323

open access: yesJURNAL TEKNOLOGI TECHNOSCIENTIA, 2019
Development of voice over internet protocol technology is so fast because of  computer and internet technology.  The development of VoIP is caused by  high cost of communication using PSTN line telephone. Then an idea to change voice traffic to computer net which is cheaper appears.  To communicate  using VoIP needs some protocols.
openaire   +1 more source

A neuro‐evolutionary approach for software defined wireless network traffic classification

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper takes a Software‐Defined Wireless Network (SDWN) architecture for network traffic classification into account. The proposed system uses optimization methods and semi‐supervised machine learning to accurately classify traffic while minimizing communication overhead between the controller and the SDWN switches.
Buddhadeb Pradhan   +5 more
wiley   +1 more source

A Black Box Analysis of Webrtc Mouth-To-Ear Delays

open access: yesCommunications, 2016
Due to the recent shift toward cloud based computing, some of the world's leading standardization bodies have combined forces to provide guidelines and standards for native implementation of RealTime Communication (RTC) in the browsers.
Oliwia Komperda   +2 more
doaj   +1 more source

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

Voz IP seguras implementadas en Redes Definidas por Software

open access: yesRevista de Ciencias Sociales, 2021
Hablar sobre las redes definidas por software, es un paradigma, son más agiles, escalables y dinámicas, para un mejor aumento de programación y automatización.
Byron Oviedo-Bayas   +3 more
doaj  

Pembangunan Infrastruktur Voice Over Internet Protocol di Organisasi Perangkat Daerah Boyolali menggunakan Server Elastix

open access: yesEmitor: Jurnal Teknik Elektro, 2017
Perkembangan teknologi informasi dan komunikasi yang semakin maju, didukung dengan jaringan internet yang semakin sering digunakan dalam kehidupan sehari-hari serta pentingnya komunikasi dalam sebuah lingkungan pemerintahan, maka dalam penelitian ini ...
Maftufin Exsan, Umi Fadlilah
doaj   +1 more source

An Optimal Rejuvenation Strategy for Increasing Service Reliability of a VOIP System with Multiple Components [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2017
In this day and age Voice over Internet Protocol (VoIP) has turned out to be a revolutionary technology in the field of telecommunication. Because of the escalating number of users of VoIP, it is essential to intend for a reliable VoIP system providing ...
Vandana Gupta, Rahul Kumar
doaj   +1 more source

Pembuatan Jaringan Pabx Dengan Sistem Voip Menggunakan Sistem Operasi Linux Trixbox [PDF]

open access: yes, 2012
Voice over Internet Protocol (VoIP) merupakan teknologi yang digunakan untuk mengirimkan percakapan secara digital melalui jaringan berbasis IP serperti jaringan internet, Wide Area Network (WAN), atau Local Area Network (LAN).
Wijaksono, Dwi Aries
core  

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy