Results 61 to 70 of about 578 (137)

A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
As the ability to circumvent internet censorship, encrypted proxies are widely used by criminals in illegal activities (e.g., online gambling and darknet transactions). Thus, detection of encrypted proxy traffic is important. In recent years, deep learning‐based approaches have become mainstream approaches. Many deep learning‐based approaches transform
Yanjie He, Wei Li, Vincenzo Conti
wiley   +1 more source

Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

open access: yesJournal of Digital Forensics, Security and Law, 2012
The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet.
David Irwin, arek dadej, jill slay
doaj  

Implementasi Manajemen Bandwidth VoIP Pada IP-PBX Menggunakan Routerboard di Jaringan Intranet

open access: yesJurnal Jaringan Telekomunikasi, 2020
Semakin berkembangnya aplikasi internet dan penggunanya yang semakin banyak dapat mempengaruhi kualitas jaringan internet, setiap aplikasi internet memiliki kebutuhan trafik yang berbeda-beda.
Nadhirotun Maulidiyah   +2 more
doaj   +1 more source

Unlocking inpatient workload insights with electronic health record event logs

open access: yes
Journal of Hospital Medicine, Volume 20, Issue 1, Page 79-84, January 2025.
Marisha Burden   +5 more
wiley   +1 more source

Scalable data management in global health crises: Leveraging blockchain technology

open access: yesIET Blockchain, Volume 4, Issue S1, Page 596-615, December 2024.
The authors proposed an innovative blockchain‐enabled scalable data management scheme for navigating global health crises. To handle the massive growth of health data efficiently and cost‐effectively, the proposed scheme divides the blockchain nodes into clusters and incorporates an off‐chaining mechanism in each node to reduce the storage requirement.
Sakib Al Jobaid   +2 more
wiley   +1 more source

Research on the design and simulation of immersive VR considering peer‐to‐peer streaming media live broadcasting algorithm

open access: yesCognitive Computation and Systems, Volume 6, Issue 4, Page 65-73, December 2024.
Abstract The utilisation of P2P tech in streaming media live broadcasting algorithm can effectively link the nodes in the endpoint and accelerate the establishment of efficient transmission channels between nodes, so as to ensure the data feasibility of video live broadcasting of terminal nodes.
Hu Jin, Rong Zheng
wiley   +1 more source

A predictive SD‐WAN traffic management method for IoT networks in multi‐datacenters using deep RNN

open access: yesIET Communications, Volume 18, Issue 18, Page 1151-1165, November 2024.
An SDWAN‐based predictive traffic management policy using deep learning for IoT is proposed that minimizes the end‐to‐end delay and distribute the available bandwidths fairly among network links. Abstract Deploying the Internet of Things (IoT) in integrated edge‐cloud environments exposes the IoT traffic data to performance issues such as delay ...
Zeinab Nazemi Absardi, Reza Javidan
wiley   +1 more source

ENHANCEMENT OF VoIP PERFROMANCE IN MANET USING FUZZY LOGIC

open access: yesInternational Journal of Advances in Signal and Image Sciences, 2020
Voiceover Internet Protocol (VoIP) application is a vital technology that is quickly growing in the Mobile Ad hoc NETwork (MANET). Packet loss is a factor that can significantly affect the Quality of Service (QoS) for VoIP performance. Due to the dynamic
Abdusalam Yahya   +1 more
doaj   +1 more source

Review of methodology and best practice of power system restoration plan

open access: yesEnergy Internet, Volume 1, Issue 2, Page 123-140, November 2024.
Abstract With the increasing penetration of renewable energy and inverter‐based resource (IBR) generation, modern power systems are facing new challenges and issues in the system restoration process, such as the needs of fast response and adaptive protection and control during the restoration.
Yiliang Fan   +5 more
wiley   +1 more source

Validation of mobile phone use recall in the multinational MOBI‐kids study

open access: yesBioelectromagnetics, Volume 45, Issue 7, Page 313-328, October 2024.
Abstract Potential differential and non‐differential recall error in mobile phone use (MPU) in the multinational MOBI‐Kids case–control study were evaluated. We compared self‐reported MPU with network operator billing record data up to 3 months, 1 year, and 2 years before the interview date from 702 subjects aged between 10 and 24 years in eight ...
Luuk van Wel   +28 more
wiley   +1 more source

Home - About - Disclaimer - Privacy