Search Result

31

Results Found

Relevance

Filter

Newest

Filter

Most Viewed

Filter

Most Downloaded

Filter

Most Cited

Filter

Pages Count

4

Go To Page

Search Results/Filters    

Filters

Year

Banks



Expert Group






Full-Text


مرکز اطلاعات علمی SID1
اسکوپوس
دانشگاه غیر انتفاعی مهر اروند
ریسرچگیت
strs
Author(s): 

RAJAEE MERAJ

Journal: 

KARAFAN

Issue Info: 
  • Year: 

    2020
  • Volume: 

    17
  • Issue: 

    1 (47)
  • Pages: 

    43-59
Measures: 
  • Citations: 

    0
  • Views: 

    219
  • Downloads: 

    168
Abstract: 

This article analyzes the performance comparison of scheduling algorithms WFQ, PQ and FIFO using simulation of various scenarios such as (traffic crashes, incoming traffic, end-to-end delays, etc. ) is covered in a wire network under VoIP. The active MSRP method has been suggested as a bandwidth reservation method. In this research, different queuing methods are evaluated with the help of OPNET simulator to manage, adjust and prioritize the packages in the buffers before sending them. Various parameters such as vibration, package’ s delay changes, package’ s end-to-end delay changes, and traffic of sent and received packages have been investigated. Also, the performance of different queuing designs is affected by different numbers of nodes. Finally, the best queuing scheme has been selected from this analysis and evaluation.

Yearly Impact:

View 219

Download 168 Citation 0 Refrence 0
Author(s): 

FANKHAUSER F. | RONNIGER M.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    1
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    450
  • Views: 

    21367
  • Downloads: 

    27017
Keywords: 
Abstract: 

Yearly Impact:

View 21367

Download 27017 Citation 450 Refrence 0
Issue Info: 
  • Year: 

    2008
  • Volume: 

    7
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    461
  • Views: 

    17499
  • Downloads: 

    29245
Keywords: 
Abstract: 

Yearly Impact:

View 17499

Download 29245 Citation 461 Refrence 0
گارگاه ها آموزشی
Issue Info: 
  • Year: 

    1392
  • Volume: 

    11
  • Issue: 

    3 (الف)
  • Pages: 

    1-9
Measures: 
  • Citations: 

    0
  • Views: 

    258
  • Downloads: 

    285
Keywords: 
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:

View 258

Download 285 Citation 0 Refrence 0
Author(s): 

Bakhtiari saeid | Zare Esmaeil

Issue Info: 
  • Year: 

    2018
  • Volume: 

    7
  • Issue: 

    25
  • Pages: 

    183-218
Measures: 
  • Citations: 

    0
  • Views: 

    362
  • Downloads: 

    238
Abstract: 

P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application.

Yearly Impact:

View 362

Download 238 Citation 0 Refrence 0
Author(s): 

MAZURCZYK W. | SZCZYPIORSKI K.

Issue Info: 
  • Year: 

    2008
  • Volume: 

    -
  • Issue: 

    4
  • Pages: 

    0-0
Measures: 
  • Citations: 

    469
  • Views: 

    18323
  • Downloads: 

    30797
Keywords: 
Abstract: 

Yearly Impact:

View 18323

Download 30797 Citation 469 Refrence 0
strs
Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    3
  • Pages: 

    175-182
Measures: 
  • Citations: 

    0
  • Views: 

    50901
  • Downloads: 

    18345
Abstract: 

In this article, a new stream steganography method for real time digital data network environment with the focus on VoIP is presented. This method consists of a combination of Least Signi cant Bits (LSB) algorithm and an algorithm called LACK, which is based on the delayed packets in VoIP streams, and forms a new algorithm called LASB (LACK-LSB combination). The combination allows both the reduction of detection probability of stegano data and the use of LSB high capacity as well as being more robust because of diversifying the source of data embedding. That is, by combing these two methods the probability of detection existing steganography data is reduced extensively. Moreover, in the case of detecting stegano data, the potential eavesdropper is not able to easily reconstruct it. To show the performance, both LACK and LSB algorithms are implemented and are compared with the new LASB algorithm in the VoIP environment in terms of capacity, eavesdropping and robustness under several attacks. The experimental results show that LASB is superior to both LACK and LSB in many aspects.

Yearly Impact:

View 50901

Download 18345 Citation 0 Refrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    11
  • Issue: 

    1
  • Pages: 

    49-73
Measures: 
  • Citations: 

    0
  • Views: 

    73178
  • Downloads: 

    29056
Abstract: 

This paper presents a novel method for modeling the one-way quality prediction of VoIP, non-intrusively. Intrusive measures of voice quality suffer from common deficiency that is the need of reference signal for evaluating the quality of voice. Owing to this lack, a great deal of effort has been recently devoted for modeling voice quality prediction non-intrusively according to quality degradation parameters, while among the past proposed methods, intelligent techniques have been remarkably successful due to their abilities for modeling the non-linear processes. The present study introduces a procedure for developing fuzzy models, employing Genetic Algorithm (GA) and Adaptive Neuro-Fuzzy Inference System (ANFIS). The proposed method is able to generate optimized fuzzy models in terms of accuracy and complexity. The efficiency of this procedure is compared with and contrasted against 13 regression methods implemented in KEEL as one machine learning tool. Moreover, several experimental results are performed over voice data from 10 different languages. In order to complete the experiment, a comprehensive statistical comparison is also drawn between our proposed method and other previous ones. The results apparently show the efficiency and applicability of this novel method in terms of generating accurate and simple fuzzy models for estimating the VoIP quality.

Yearly Impact:

View 73178

Download 29056 Citation 0 Refrence 0
Author(s): 

ASGHARIAN H. | AKBARI A. | RAAHEMI B.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    61-69
Measures: 
  • Citations: 

    0
  • Views: 

    766
  • Downloads: 

    289
Abstract: 

The main signaling protocol of next generation networks especially in multimedia applications (e.g. video conference, IPTV and VoIP) is session initiation protocol (SIP). Different types of Denial of Service (DoS) attacks are applicable to SIP entities because of the stateful functionality and text based nature of SIP. More than 98 percent of these attacks against SIP entities are caused by misconfiguration and implementation shortcomings. In this paper, a feature set for using in anomaly detection systems by feature engineering approach is generated. The knowledge of SIP packets, SIP internal state machine and normal behavior of this protocol were employed to create features that make machine learning algorithms work. The performance of the engineered feature set is evaluated with two different classifiers by applying three different data sets. The experimental results show the performance of proposed feature set in terms of detection and false alarm rate.

Yearly Impact:

View 766

Download 289 Citation 0 Refrence 0
Author(s): 

ISLAM R. | GHOSH S.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    1
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    470
  • Views: 

    29351
  • Downloads: 

    30995
Keywords: 
Abstract: 

Yearly Impact:

View 29351

Download 30995 Citation 470 Refrence 0
litScript