|
|
|
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization ...
ver más
|
|
|
|
|
|
|
Mohammad Tariq Meeran, Paul Annus, Muhammad Mahtab Alam and Yannick Le Moullec
The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP) solutions in wireless mesh network (WMN) scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose chall...
ver más
|
|
|
|
|
|
|
Jesús Manuel Paternina, Octavio Salcedo
Pág. 18 - 28
ResumenDescargasReferenciasCómo citar
|
|
|
|
|
|
|
Bader Methqal AlFawwaz
Pág. pp. 30 - 42
Cloud computing is a new paradigm in E-learning environment. It offers a wide range of facilities to students and teachers, especially in the universities to ease out their problem in terms of documents sharing, course material distribution and handling,...
ver más
|
|
|
|
|
|
|
Dominik Kovac,Pavel Masek,Jirí Ho?ek,Mariya Pavlova,Ondrej Krajsa
Pág. 122 - 128
Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP...
ver más
|
|
|
|
|
|
|
Surya Hendra Putra,Oris Krianto Sulaiman
Pág. 186 - 190
The use of communication media as a tool for activities and work at this time is very necessary, as for the technology used to support communication are PSTN (Public Switched Telephone Network), VoIP (Voice Over Internet Protocol) and so on. The Islamic ...
ver más
|
|
|
|