Results 41 to 50 of about 21,969 (207)

Development and Application of a Simplified Method for Preliminary Assessment of Enhanced Oil Recovery and CO2 Geological Storage in Petroleum Reservoirs

open access: yesGreenhouse Gases: Science and Technology, Volume 16, Issue 2, Page 238-252, April 2026.
ABSTRACT Geologic carbon storage in depleted oil and gas reservoirs is a key CO2 mitigation strategy, utilizing existing infrastructure such as injection wells and pipelines, while capitalizing on well‐characterized subsurface properties. This article introduces a versatile methodology designed to estimate critical parameters, including the number of ...
Nívia Morgana de Oliveira   +2 more
wiley   +1 more source

IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network

open access: yesCommunications, 2013
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal ...
Jakub Safarik   +3 more
doaj   +1 more source

Blockchain and Digital Technologies in the Telecommunications Industry

open access: yesThunderbird International Business Review, Volume 68, Issue 2, Page 139-163, March/April 2026.
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia   +3 more
wiley   +1 more source

Presenting a Method for Improving Echo Hiding [PDF]

open access: yesComputer and Knowledge Engineering, 2019
In this article, one of the most important methods of steganography on VoIP called echo hiding is improved. This method has advantages in maintaining the statistical and perceptual characteristics of audio signals as well as security against the ...
hanieh rafiee, mohammad fakhredanesh
doaj   +1 more source

Towards Steganography Detection Through Network Traffic Visualisation

open access: yes, 2012
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz   +2 more
core   +1 more source

Mobile consultant: Evaluation of additional services [PDF]

open access: yes, 2007
As the need for mobility in the medical world increases, newer systems and applications came to light; many of them based on wireless and mobile networks.
Banitsas, KA   +3 more
core   +1 more source

Frequency of consumption of different fish, crustacean and mollusc species contributing to methylmercury exposure and consumer awareness of national advice on their consumption

open access: yesEFSA Journal, Volume 24, Issue 2, February 2026.
Abstract Following a request of the European Commission, EFSA assessed fish and other seafood consumption patterns and consumer awareness of related health risks and benefits across the 27 Member States, Iceland and Norway. Awareness of existence of consumption national advice and to which extent this advice influence consumers consumption behaviour ...
European Food Safety Authority (EFSA)   +13 more
wiley   +1 more source

Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]

open access: yes, 2008
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid   +5 more
core  

Artificial Intelligence Applications in Smart Cities: Integrating Communication, Energy Management, Cybersecurity and Internet of Things

open access: yesThe Journal of Engineering, Volume 2026, Issue 1, January/December 2026.
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik   +5 more
wiley   +1 more source

Secure Live Streaming: Implementing Security in Adaptive Video Streaming via Watermarking Techniques While Preserving Quality

open access: yesInternational Journal of Digital Multimedia Broadcasting, Volume 2026, Issue 1, 2026.
The heterogeneity of the network at the edge creates unequal bandwidth availability for clients connected through diverse networks and devices. This variability can lead to bandwidth fluctuations and slow response times, resulting in buffering or degraded streaming performance.
Reza Kalan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy