Essays about: "voip software"
Showing result 1 - 5 of 29 essays containing the words voip software.
-
1. Remotely Operated VoIP Radio for Drones
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Nowadays, search and rescue organizations are considering using drones to aid in rescue missions. To ensure the drones work properly, we need to design a reliable and stable systems. One of these systems is the communication system, which creates a link between the drone and the operator. READ MORE
-
2. Utilizing Multi-core for optimized Data Exchange via VoIP
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In contemporary IT industry, Multi-tasking solutions are highly regarded as optimal solutions, because hardware is equipped with multi-core CPUs. With multicore technology, CPUs run with lower frequencies while giving same or better performance as a whole system of processing. READ MORE
-
3. A reverse proxy for VoIP : Or how to improve security in a ToIP network
University essay from KTH/KommunikationsnätAbstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE
-
4. Utilizing Multi-Core for Optimized Data Exchange Via VoIP
University essay from KTH/Medicinsk bildteknikAbstract : In contemporary IT industry, Multi-tasking solutions are highly regarded as optimal solutions, because hardware is equipped with multi-core CPUs. With Multi-Core technology, CPUs run with lower frequencies while giving same or better performance as a whole system of processing. READ MORE
-
5. Secure key management in a trusted domain on mobile devices
University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : As mobile devices manage more and more sensitive information they have become a more targeted platform to exploit. To maintain system integrity while providing a highly responsive product, platform developers have developed hardware as well as software solutions to improve security. READ MORE