Results 61 to 70 of about 578 (137)
A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection
As the ability to circumvent internet censorship, encrypted proxies are widely used by criminals in illegal activities (e.g., online gambling and darknet transactions). Thus, detection of encrypted proxy traffic is important. In recent years, deep learning‐based approaches have become mainstream approaches. Many deep learning‐based approaches transform
Yanjie He, Wei Li, Vincenzo Conti
wiley +1 more source
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet.
David Irwin, arek dadej, jill slay
doaj
Implementasi Manajemen Bandwidth VoIP Pada IP-PBX Menggunakan Routerboard di Jaringan Intranet
Semakin berkembangnya aplikasi internet dan penggunanya yang semakin banyak dapat mempengaruhi kualitas jaringan internet, setiap aplikasi internet memiliki kebutuhan trafik yang berbeda-beda.
Nadhirotun Maulidiyah+2 more
doaj +1 more source
Unlocking inpatient workload insights with electronic health record event logs
Journal of Hospital Medicine, Volume 20, Issue 1, Page 79-84, January 2025.
Marisha Burden+5 more
wiley +1 more source
Scalable data management in global health crises: Leveraging blockchain technology
The authors proposed an innovative blockchain‐enabled scalable data management scheme for navigating global health crises. To handle the massive growth of health data efficiently and cost‐effectively, the proposed scheme divides the blockchain nodes into clusters and incorporates an off‐chaining mechanism in each node to reduce the storage requirement.
Sakib Al Jobaid+2 more
wiley +1 more source
Abstract The utilisation of P2P tech in streaming media live broadcasting algorithm can effectively link the nodes in the endpoint and accelerate the establishment of efficient transmission channels between nodes, so as to ensure the data feasibility of video live broadcasting of terminal nodes.
Hu Jin, Rong Zheng
wiley +1 more source
A predictive SD‐WAN traffic management method for IoT networks in multi‐datacenters using deep RNN
An SDWAN‐based predictive traffic management policy using deep learning for IoT is proposed that minimizes the end‐to‐end delay and distribute the available bandwidths fairly among network links. Abstract Deploying the Internet of Things (IoT) in integrated edge‐cloud environments exposes the IoT traffic data to performance issues such as delay ...
Zeinab Nazemi Absardi, Reza Javidan
wiley +1 more source
ENHANCEMENT OF VoIP PERFROMANCE IN MANET USING FUZZY LOGIC
Voiceover Internet Protocol (VoIP) application is a vital technology that is quickly growing in the Mobile Ad hoc NETwork (MANET). Packet loss is a factor that can significantly affect the Quality of Service (QoS) for VoIP performance. Due to the dynamic
Abdusalam Yahya+1 more
doaj +1 more source
Review of methodology and best practice of power system restoration plan
Abstract With the increasing penetration of renewable energy and inverter‐based resource (IBR) generation, modern power systems are facing new challenges and issues in the system restoration process, such as the needs of fast response and adaptive protection and control during the restoration.
Yiliang Fan+5 more
wiley +1 more source
Validation of mobile phone use recall in the multinational MOBI‐kids study
Abstract Potential differential and non‐differential recall error in mobile phone use (MPU) in the multinational MOBI‐Kids case–control study were evaluated. We compared self‐reported MPU with network operator billing record data up to 3 months, 1 year, and 2 years before the interview date from 702 subjects aged between 10 and 24 years in eight ...
Luuk van Wel+28 more
wiley +1 more source