• No results found

VoIP service

Survey of Data-Driven Composition for Service-Oriented Situational Web Application

Survey of Data-Driven Composition for Service-Oriented Situational Web Application

... Search service can be introduced, since it can generate the routine between two spots on the ...in VoIP service (such as AIM Phone Line) to make call reservation of hotel and restaurant, when he ...

6

Securing VoIP Networks   Threats, Vulnerabilities, & Countermeasures pdf

Securing VoIP Networks Threats, Vulnerabilities, & Countermeasures pdf

... a VoIP service provider (it provides a layer of believability to the spoofed message being sent because users are accustomed to calling toll-free numbers to contact customer ...a VoIP toll-free ...

384

Vol 15, No 5 (2015)

Vol 15, No 5 (2015)

... the VoIP service is gaining ...The service providers in Pakistan continue to invest in infrastructure and supporting regulatory policies fueling the development of ...VoIP service. The ...

10

Performance Analysis Of Active Queue Management (AQM) In VOIP Using Different Voice Encoder Scheme

Performance Analysis Of Active Queue Management (AQM) In VOIP Using Different Voice Encoder Scheme

... [2]. VoIP application typically works as ...echo.in VoIP voice signal is compressed and converted to digital voice packets, VoIP then uses the Internet Protocol (IP) for managing voice packets over ...

6

Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system

Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system

... In that respect, providing stakeholders with quantifiable evidences that the security countermeasures deployed on the system are operating adequately is an important step towards better control of security failures for ...

17

Customer management solutions for voice over internet protocol (VOIP) services

Customer management solutions for voice over internet protocol (VOIP) services

... VoIP comprises of two major parts; technical part and management part. Technical part involves tasks such as setting up servers, managing servers and setting up networks for VoIP implementation. The second ...

17

A proportional fair scheduling algorithm based on QoS utility function in wireless networks

A proportional fair scheduling algorithm based on QoS utility function in wireless networks

... business service (VoIP service) in this paper, the PF algorithm and PF - A algorithm based on service quality utility function are comparison the performance in 5 aspects of the overall ...

7

State Regulatory Approaches to VoIP: Policy, Implementation, and Outcome

State Regulatory Approaches to VoIP: Policy, Implementation, and Outcome

... Implementing a Functional Approach, 45 the Commission tentatively concluded that "VOIP service[s] interconnected with the PSTN [Public Switched Telephone Network] ar[r] ...

33

17. Implementing VoIP In a Small Enterprise Network

17. Implementing VoIP In a Small Enterprise Network

... A VoIP service provided by an Internet Telephony Service Provider to virtually connect an enterprise and Public Switched Telephone Network (PSTN), by replacing the physical connectivity provided by ...

10

Security on VoIP

Security on VoIP

... IP, VoIP technology is ...local service traditional providers and ISPs (Internet Service ...Basic VoIP access usually allows you to call others who are also receiving calls over the ...

8

ch8.pdf

ch8.pdf

... • Separate voice and data traffic on different VLANs • Separate VoIP servers from VoIP phones on different. VLANs.[r] ...

39

Title: REDUCTION OF NOISE TO IMPROVE QUALITY OF VOICE SIGNAL DATA USING NEURAL NETWORKS

Title: REDUCTION OF NOISE TO IMPROVE QUALITY OF VOICE SIGNAL DATA USING NEURAL NETWORKS

... in VoIP in combination with quality ...improve VoIP quality in wireless ...the VoIP application to manage the jitter buffer to maintain a minimum play out buffer, while keeping the packet loss rate ...

8

VoIP for Dummies.pdf

VoIP for Dummies.pdf

... her VoIP telephone buddy group and makes full use of the presence feature indicator on her VoIP tele- ...the VoIP telephone number with one ...the VoIP speech-access appli- cation dials ...

313

Securing SIP Servers from DDoS Attacks – A Literature Survey

Securing SIP Servers from DDoS Attacks – A Literature Survey

... Muthu Ganesh et al. [M+14] has illustrated in a research article published in 2014 International Conference on Innovations in Engineering and Technology (ICIET’14) about the detection and prevention methods for various ...

5

Motion Sensing Based Management System for Smart Context Awareness Rehabilitation Healthcare

Motion Sensing Based Management System for Smart Context Awareness Rehabilitation Healthcare

... munication technology. By integrating physiological mo- nitoring and feedback coaching with a telecare center that enables real-time one-to-multiple personal exercise onitoring by case managers, this home-end rehabilita- ...

7

VOIP Primer

VOIP Primer

... The MultiVOIP family of Voice over IP gateways is available in analog and digital models ranging from one to 60 ports. MultiVOIP gateways connect directly to phones, fax machines, key systems, or a PBX and plug into the ...

29

Empirical Modelling of the Mobile VoIP Demand

Empirical Modelling of the Mobile VoIP Demand

... The world of Internet has faced a much different industry evolution. Instead of network centricity (cellular operators in the mobile industry have still retained much of the control and intelligence in the network), the ...

6

Seamless Vertical Handoff between WLAN and WiMAX

Seamless Vertical Handoff between WLAN and WiMAX

... (Access Service Network) anchored mobility for which GRE Tunnels are set up between the Base Stations and the ASN ...evaluation VoIP application is chosen For improving QOS we have introduced QOS ...

9

Voice over IP Via IEEE 802.11 Wireless LAN

Voice over IP Via IEEE 802.11 Wireless LAN

... [6] Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno (2015),” Reliable Voice-based Transactions over VoIP Communications” International Conference on Innovative Mobile and Internet Services in ...

5

Security on Voice over Internet Protocol from Spoofing Attacks

Security on Voice over Internet Protocol from Spoofing Attacks

... These devices allow any user to use its own traditional phone to place VoIP calls. They are connected to cable and allow any user to attach an ordinary telephone. Once these routers are configured with an ...

9

Show all 10000 documents...

Related subjects