IoT traffic management and integration in the QoS supported network
BKJ Al-Shammari, N Al-Aboody… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
This paper proposes: 1) a traffic flow management policy, which allocates and organizes
machine type communication (MTC) traffic flows network resources sharing within evolved …
machine type communication (MTC) traffic flows network resources sharing within evolved …
A new algorithm for optimization of quality of service in peer to peer wireless mesh networks
Nowadays, wireless mesh networks are known as important parts of different commercial,
scientific, and industrial processes. Their prevalence increases day-by-day and the future of …
scientific, and industrial processes. Their prevalence increases day-by-day and the future of …
[PDF][PDF] A comprehensive review on VoIP over Wireless LAN networks
H Kazemitabar, S Ahmed, K Nisar… - Computer Science …, 2010 - scholar.archive.org
Abstract Voice over Internet Protocol (VoIP) is one of the most important technologies in the
world of communication. Around 20 years of research on VoIP, some Quality of Service …
world of communication. Around 20 years of research on VoIP, some Quality of Service …
Securing session initiation protocol
O Younes, U Albalawi - Sensors, 2022 - mdpi.com
The session initiation protocol (SIP) is widely used for multimedia communication as a
signaling protocol for managing, establishing, maintaining, and terminating multimedia …
signaling protocol for managing, establishing, maintaining, and terminating multimedia …
WiFi network virtualization to control the connectivity of a target service
K Nakauchi, Y Shoji - IEEE Transactions on Network and …, 2015 - ieeexplore.ieee.org
This paper proposes a WiFi network virtualization technique to control the connectivity of a
target service. The packet-level delay violation ratio can be reduced even in a congested …
target service. The packet-level delay violation ratio can be reduced even in a congested …
Performance analysis of VoIP over 3G and 4G LTE network
M Kassim, RA Rahman, MAA Aziz… - 2017 International …, 2017 - ieeexplore.ieee.org
Wireless mobile telecommunication has evolved from the Third Generation (3G) to Fourth
Generation (4G) network. Mobile WiMAX and Long Term Evolution are the first two platforms …
Generation (4G) network. Mobile WiMAX and Long Term Evolution are the first two platforms …
An experimental evaluation and characterization of VoIP over an LTE-A network
M Di Mauro, A Liotta - IEEE Transactions on Network and …, 2020 - ieeexplore.ieee.org
Mobile telecommunications are converging towards all-IP solutions. This is the case of the
Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support …
Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support …
[PDF][PDF] A survey on voice over ip over wireless lans
H Kazemitabar, S Ahmed, K Nisar, AB Said… - International Journal of …, 2010 - csd.uoc.gr
Voice over Internet Protocol (VoIP) is a form of voice communication that uses audio data to
transmit voice signals to the end user. VoIP is one of the most important technologies in the …
transmit voice signals to the end user. VoIP is one of the most important technologies in the …
A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering
F Bavifard, M Kheyrandish, M Mosleh - Cluster Computing, 2023 - Springer
Despite wide applicability of Voice over IP (VoIP), it's highly vulnerable to various attacks.
Most prominent ways to secure it employ intrusion detection systems (IDS); based on …
Most prominent ways to secure it employ intrusion detection systems (IDS); based on …
Functional and I/sub DDQ/testing on a static RAM
R Meershoek, B Verhelst, R McInerney… - Proceedings …, 1990 - ieeexplore.ieee.org
A layout defect analysis was performed on an 8K* 8 static RAM. Simulations were done to
determine the electrical behavior and detection possibilities of the defects. The authors …
determine the electrical behavior and detection possibilities of the defects. The authors …