Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   10  
      ArabicSyriaGSM, WiMAX, LTEWiFI
"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more
    • by 
    •   19  
      Machine LearningData MiningCybercrimesAccess Control
    • by 
    •   5  
      Video ConferencingVideo ConferenceVideoconferenceVideoconferencing
    • by 
    •   2  
      VoIP/SIP/IMSINFORMATION SIP
    • by 
    •   50  
      Social MovementsComputer ScienceComputer Security And ReliabilityInformation Security
With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem... more
    • by 
    •   18  
      Information SecurityMachine LearningData MiningInternational Security
In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these... more
    • by 
    •   17  
      Computer ScienceInformation SecurityMachine LearningData Mining
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing
Depuis quelques années, la technologie VoIP commence à intéresser les entreprises, surtout celles de service comme les centres d’appels. La migration des entreprises vers ce genre de technologie n’est pas pour rien.
    • by 
    •   3  
      Voice over IPVoipVoIP/SIP/IMS
    • by 
    •   2  
      VoIP/SIP/IMSCommunications
Resumen El presente trabajo es una implementación de una aplicación para un centro de contacto. Consiste en la distribución de las llamadas entrantes al mismo, en base a parámetros estadísticos obtenidos de los registros de las llamadas... more
    • by 
    • VoIP/SIP/IMS
    • by 
    •   25  
      RoboticsMachine LearningData MiningRFID
It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As... more
    • by 
    •   43  
      Web 2.0Machine LearningData MiningAccess Control
In this paper, we aim to perform a SWOT analysis of Voice over Internet Protocol (VoIP) Technology. SWOT analysis is a powerful evaluation framework that is data-driven and fact-based and specifically useful for planning and informed... more
    • by 
    • VoIP/SIP/IMS
    • by 
    •   3  
      Health CareIvrVoIP/SIP/IMS
"Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of... more
    • by 
    •   5  
      MultimediaComputer NetworksIPTVIEEE 802.11 WLAN
Komunikasi merupakan hal yang paling utama dalam keberhasilan suatu kegiatan. Komunikasi yang terjadi dalam suatu jaringan komputer tidak hanya mengolah transfer paket data antar komputer, tapi teknologi komputer saat ini mampu melakukan... more
    • by  and +1
    • VoIP/SIP/IMS
    • by 
    •   180  
      Information SystemsElectronic EngineeringCommunication EngineeringSociology
    • by 
    •   33  
      CensorshipInformation SecurityMachine LearningData Mining
—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but... more
    • by 
    •   5  
      Tcp/IpSIPVoIP/SIP/IMSVoIP SIP y SDP
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing
Quizz et notions générales portant sur les réseaux et protocoles TCP UDP, kerberos protocole voieIP Ethernet, Wifi, support de transmissions, Cryptographie , cheval de Troie, ver et virus, attaques web , intrusions, pare-feu... more
    • by 
    •   11  
      Information TechnologyNetwork SecurityInternational SecurityComputer Networks
    • by 
    •   14  
      Machine LearningData MiningAccess ControlCloud Computing
    • by 
    • VoIP/SIP/IMS
“Human behaviour and lifestyle continue to change at a rapid pace, increasing over the past few years fuelled by the introduction of digital media and new technologies which have become embedded in the western culture to the degree that... more
    • by 
    •   36  
      Social MovementsPsychologyInformation TechnologyTechnology
    • by 
    •   16  
      Instructional DesignMachine LearningData MiningLearning Design
Providing engaging interpretation resources for museum and gallery visitors may have a great impact on the overall museum visiting experience all by assisting museums in maintaining long-term relationships with their public. This paper... more
    • by  and +2
    •   17  
      Eye trackingMachine LearningData MiningAugmented Reality
    • by 
    •   4  
      Protocol DesignSession Initiation ProtocolVoIP/SIP/IMSInternet Engineering Task Force
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing
    • by 
    •   17  
      Machine LearningData MiningSmall BusinessAccounting
The various convergent technologies nowadays in computer infrastructure, impose an additional burden on existing networks, the need to save technical and budgetary resources, lead companies and public agencies to verify the existence of... more
    • by  and +2
    •   7  
      Voice over IPVoipComputer NetworkingVoIP/SIP/IMS
Il lavoro esposto in questo elaborato si è focalizzato sull’analisi di sicurezza di cinque instant messaging app (Signal, WhatsApp, Telegram, Viber e LINE) ed è frutto dell’attività svolta durante il tirocinio interno all'Università degli... more
    • by 
    •   14  
      CommunicationWireless CommunicationsPrivacyMetadata
"In today’s information-driven business environment, enterprise systems and processes capture an ever-increasing amount of data. To derive meaningful and actionable information from this data, businesses are compelled to commit... more
    • by 
    •   40  
      Information SecurityMachine LearningData MiningNetwork Security
Diseño e implementación de una agenda telefónica en línea que permita al usuario llamar a sus contactos desde una página web.
    • by 
    • VoIP/SIP/IMS
This review focuses on instructional design literature for the MACE project. It shows the plenty of research in instructional design era for more than 20 years, and offers various approaches, concepts and models in this field. The... more
    • by 
    •   16  
      Instructional DesignMachine LearningData MiningLearning Design
Voice over IP (VoIP), a modern form of telecommunications, requires real-time transmission. However, there are limitations (e.g., packet loss and delay) which result in degradation in quality of voice transmission over an IP network.... more
    • by 
    •   5  
      Voice over IPQoS and QoEQoEMeasurement of Speech Quality and Intelligibility
Depuis les années 1990, Internet a été utilisé afin de diminuer les coûts des communications téléphoniques. Les communications ainsi établies coûtent seulement le prix de deux communications locales (une communication locale à chaque... more
    • by 
    •   6  
      Telecommunications EngineeringNetwork SecurityComputer NetworksVoice over IP
This article is an exploration of the recent phenomenon of " lottery scam-ming " in Jamaica. By using black market data to identify targets and presenting as call center employees, scammers subversively manipulate the development... more
    • by 
    •   8  
      Development StudiesPostcolonial StudiesBlack/African DiasporaJamaica
"It's a Microcontroller Based DIY Electronics Project. Named Wireless RF Module Using PIC Microcontroller. The RF module is a small electronic circuit used to transmit, receive, or transceive radio waves on one of a number of carrier... more
    • by 
    •   62  
      ScreenwritingCommunicationEducationJournalism
    • by 
    •   6  
      VoipAsteriskVoIP over WiFiVoice over internet protocol with Asterisk
    • by  and +1
    •   19  
      CyberlawMachine LearningData MiningAccess Control
Configuración de una máquina virtual (VirtualBox) para instalar Trixbox, un servidor de Voz PBX y VoIP,  configurandolo para usar VoIP de manera local, capturas en forma de tutorial.
    • by 
    •   11  
      VirtualizationLinuxNetworkingPBX systems
Elastix PBX Default Login Details and Default Passwords
    • by 
    •   4  
      PBX systemsAsteriskVoIP/SIP/IMSElastix PBX
Tahun Baru 2015 Masehi di bulan januari ini kita mulai mendalami tentang VoIP biar bisa telponan hemat biaya bahkan bisa di bilang bisa gratis. Kali ini kita coba bahas tentang cara menggunakan VoIP Client contohnya ZoIPer, cek aja di... more
    • by 
    •   2  
      AsteriskVoIP/SIP/IMS
"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range... more
    • by  and +2
    •   17  
      Mobile LearningMachine LearningData MiningSocial Networking
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal... more
    • by 
    •   18  
      Network SecurityVehicular Ad Hoc NetworksIndustrial AutomationIntrusion Detection Systems
In this project study of the LTE and its architecture is considered and understand the mechanism of QoS deployment in LTE which introduce the main concept of traffic classification. A simulation based study is performed in OPNET by... more
    • by 
    •   7  
      IEEE 802.16 (WiMAX)OpnetWimaxQuality of Service (QoS)
    • by 
    •   4  
      Protocol DesignSession Initiation ProtocolVoIP/SIP/IMSInternet Engineering Task Force
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing