Skip to main content
"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more
With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem... more
In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these... more
Depuis quelques années, la technologie VoIP commence à intéresser les entreprises, surtout celles de service comme les centres d’appels. La migration des entreprises vers ce genre de technologie n’est pas pour rien.
Resumen El presente trabajo es una implementación de una aplicación para un centro de contacto. Consiste en la distribución de las llamadas entrantes al mismo, en base a parámetros estadísticos obtenidos de los registros de las llamadas... more
It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As... more
In this paper, we aim to perform a SWOT analysis of Voice over Internet Protocol (VoIP) Technology. SWOT analysis is a powerful evaluation framework that is data-driven and fact-based and specifically useful for planning and informed... more
"Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of... more
Komunikasi merupakan hal yang paling utama dalam keberhasilan suatu kegiatan. Komunikasi yang terjadi dalam suatu jaringan komputer tidak hanya mengolah transfer paket data antar komputer, tapi teknologi komputer saat ini mampu melakukan... more
—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but... more
Quizz et notions générales portant sur les réseaux et protocoles TCP UDP, kerberos protocole voieIP Ethernet, Wifi, support de transmissions, Cryptographie , cheval de Troie, ver et virus, attaques web , intrusions, pare-feu... more
“Human behaviour and lifestyle continue to change at a rapid pace, increasing over the past few years fuelled by the introduction of digital media and new technologies which have become embedded in the western culture to the degree that... more
Providing engaging interpretation resources for museum and gallery visitors may have a great impact on the overall museum visiting experience all by assisting museums in maintaining long-term relationships with their public. This paper... more
The various convergent technologies nowadays in computer infrastructure, impose an additional burden on existing networks, the need to save technical and budgetary resources, lead companies and public agencies to verify the existence of... more
Il lavoro esposto in questo elaborato si è focalizzato sull’analisi di sicurezza di cinque instant messaging app (Signal, WhatsApp, Telegram, Viber e LINE) ed è frutto dell’attività svolta durante il tirocinio interno all'Università degli... more
"In today’s information-driven business environment, enterprise systems and processes capture an ever-increasing amount of data. To derive meaningful and actionable information from this data, businesses are compelled to commit... more
Diseño e implementación de una agenda telefónica en línea que permita al usuario llamar a sus contactos desde una página web.
This review focuses on instructional design literature for the MACE project. It shows the plenty of research in instructional design era for more than 20 years, and offers various approaches, concepts and models in this field. The... more
Voice over IP (VoIP), a modern form of telecommunications, requires real-time transmission. However, there are limitations (e.g., packet loss and delay) which result in degradation in quality of voice transmission over an IP network.... more
Depuis les années 1990, Internet a été utilisé afin de diminuer les coûts des communications téléphoniques. Les communications ainsi établies coûtent seulement le prix de deux communications locales (une communication locale à chaque... more
This article is an exploration of the recent phenomenon of " lottery scam-ming " in Jamaica. By using black market data to identify targets and presenting as call center employees, scammers subversively manipulate the development... more
"It's a Microcontroller Based DIY Electronics Project. Named Wireless RF Module Using PIC Microcontroller. The RF module is a small electronic circuit used to transmit, receive, or transceive radio waves on one of a number of carrier... more
Configuración de una máquina virtual (VirtualBox) para instalar Trixbox, un servidor de Voz PBX y VoIP,  configurandolo para usar VoIP de manera local, capturas en forma de tutorial.
Elastix PBX Default Login Details and Default Passwords
Tahun Baru 2015 Masehi di bulan januari ini kita mulai mendalami tentang VoIP biar bisa telponan hemat biaya bahkan bisa di bilang bisa gratis. Kali ini kita coba bahas tentang cara menggunakan VoIP Client contohnya ZoIPer, cek aja di... more
"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal... more
In this project study of the LTE and its architecture is considered and understand the mechanism of QoS deployment in LTE which introduce the main concept of traffic classification. A simulation based study is performed in OPNET by... more