CINXE.COM

Search results for: VoIP Valen

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: VoIP Valen</title> <meta name="description" content="Search results for: VoIP Valen"> <meta name="keywords" content="VoIP Valen"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="VoIP Valen" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="VoIP Valen"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 15</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: VoIP Valen</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Low-Cost VoIP University Solution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Henrique%20Rodrigues%20de%20Oliveira">Carlos Henrique Rodrigues de Oliveira</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Carlos%20Costa%20Fonseca"> Luis Carlos Costa Fonseca</a>, <a href="https://publications.waset.org/abstracts/search?q=Caio%20de%20Castro%20Torres"> Caio de Castro Torres</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Gusm%C3%A3o%20Pereira"> Daniel Gusmão Pereira</a>, <a href="https://publications.waset.org/abstracts/search?q=Luiz%20Ricardo%20Souza%20Ripardo"> Luiz Ricardo Souza Ripardo</a>, <a href="https://publications.waset.org/abstracts/search?q=Magno%20Castro%20Moraes"> Magno Castro Moraes</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Paula%20Ferreira%20Costa"> Ana Paula Ferreira Costa</a>, <a href="https://publications.waset.org/abstracts/search?q=Luiz%20Carlos%20Chaves%20Lima%20Junior"> Luiz Carlos Chaves Lima Junior</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelianny%20Almeida%20da%20Cunha"> Aurelianny Almeida da Cunha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> VoIP University is a communication solution based on the IP protocol. This solution was proposed to modernize and save on communication, which required the development of Android, iOS, and Windows applications and a web service server. This solution allows integration with management system databases to create and manage a list of user extensions. VoIP UEMA was the first deployed project of VoIP University. MOS subjective voice quality test was done, and the results indicated good quality. A financial analysis revealed that annual spending on telephone bills decreased by more than 97 %. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VoIP%20eTec" title="VoIP eTec">VoIP eTec</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIP%20UEMA" title=" VoIP UEMA"> VoIP UEMA</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIP%20University" title=" VoIP University"> VoIP University</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIP%20Valen" title=" VoIP Valen"> VoIP Valen</a> </p> <a href="https://publications.waset.org/abstracts/182442/low-cost-voip-university-solution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182442.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Performance Analysis of VoIP Coders for Different Modulations Under Pervasive Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jasbinder%20Singh">Jasbinder Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Harjit%20Pal%20Singh"> Harjit Pal Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20A.%20Khan"> S. A. Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The work, in this paper, presents the comparison of encoded speech signals by different VoIP narrow-band and wide-band codecs for different modulation schemes. The simulation results indicate that codec has an impact on the speech quality and also effected by modulation schemes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VoIP" title="VoIP">VoIP</a>, <a href="https://publications.waset.org/abstracts/search?q=coders" title=" coders"> coders</a>, <a href="https://publications.waset.org/abstracts/search?q=modulations" title=" modulations"> modulations</a>, <a href="https://publications.waset.org/abstracts/search?q=BER" title=" BER"> BER</a>, <a href="https://publications.waset.org/abstracts/search?q=MOS" title=" MOS"> MOS</a> </p> <a href="https://publications.waset.org/abstracts/8221/performance-analysis-of-voip-coders-for-different-modulations-under-pervasive-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Analysis of Interleaving Scheme for Narrowband VoIP System under Pervasive Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monica%20Sharma">Monica Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Harjit%20Pal%20Singh"> Harjit Pal Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Jasbinder%20Singh"> Jasbinder Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Manju%20Bala"> Manju Bala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Voice over Internet Protocol (VoIP) system, the speech signal is degraded when passed through the network layers. The speech signal is processed through the best effort policy based IP network, which leads to the network degradations including delay, packet loss and jitter. The packet loss is the major issue of the degradation in the VoIP signal quality; even a single lost packet may generate audible distortion in the decoded speech signal. In addition to these network degradations, the quality of the speech signal is also affected by the environmental noises and coder distortions. The signal quality of the VoIP system is improved through the interleaving technique. The performance of the system is evaluated for various types of noises at different network conditions. The performance of the enhanced VoIP signal is evaluated using perceptual evaluation of speech quality (PESQ) measurement for narrow band signal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VoIP" title="VoIP">VoIP</a>, <a href="https://publications.waset.org/abstracts/search?q=interleaving" title=" interleaving"> interleaving</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20loss" title=" packet loss"> packet loss</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20size" title=" packet size"> packet size</a>, <a href="https://publications.waset.org/abstracts/search?q=background%20noise" title=" background noise "> background noise </a> </p> <a href="https://publications.waset.org/abstracts/14305/analysis-of-interleaving-scheme-for-narrowband-voip-system-under-pervasive-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14305.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">479</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> CVOIP-FRU: Comprehensive VoIP Forensics Report Utility</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alejandro%20Villegas">Alejandro Villegas</a>, <a href="https://publications.waset.org/abstracts/search?q=Cihan%20Varol"> Cihan Varol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=betamax" title="betamax">betamax</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=report%20utility" title=" report utility"> report utility</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIP" title=" VoIP"> VoIP</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIPBuster" title=" VoIPBuster"> VoIPBuster</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIPWise" title=" VoIPWise"> VoIPWise</a> </p> <a href="https://publications.waset.org/abstracts/2689/cvoip-fru-comprehensive-voip-forensics-report-utility" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2689.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Towards a Security Model against Denial of Service Attacks for SIP Traffic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arellano%20Karina">Arellano Karina</a>, <a href="https://publications.waset.org/abstracts/search?q=Diego%20Avila-Pes%C3%A1ntez"> Diego Avila-Pesántez</a>, <a href="https://publications.waset.org/abstracts/search?q=Leticia%20Vaca-C%C3%A1rdenas"> Leticia Vaca-Cárdenas</a>, <a href="https://publications.waset.org/abstracts/search?q=Alberto%20Arellano"> Alberto Arellano</a>, <a href="https://publications.waset.org/abstracts/search?q=Carmen%20Mantilla"> Carmen Mantilla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Denial-of-Service%20SIP%20attacks" title="Denial-of-Service SIP attacks">Denial-of-Service SIP attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=MS-DoS-SIP" title=" MS-DoS-SIP"> MS-DoS-SIP</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20model" title=" security model"> security model</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIP-SIP%20vulnerabilities" title=" VoIP-SIP vulnerabilities"> VoIP-SIP vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/85955/towards-a-security-model-against-denial-of-service-attacks-for-sip-traffic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Voice over IP Quality of Service Evaluation for Mobile Ad Hoc Network in an Indoor Environment for Different Voice Codecs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lina%20Abou%20Haibeh">Lina Abou Haibeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Nadir%20Hakem"> Nadir Hakem</a>, <a href="https://publications.waset.org/abstracts/search?q=Ousama%20Abu%20Safia"> Ousama Abu Safia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the performance and quality of Voice over IP (VoIP) calls carried over a Mobile Ad Hoc Network (MANET) which has a number of SIP nodes registered on a SIP Proxy are analyzed. The testing campaigns are carried out in an indoor corridor structure having a well-defined channel’s characteristics and model for the different voice codecs, G.711, G.727 and G.723.1. These voice codecs are commonly used in VoIP technology. The calls’ quality are evaluated using four Quality of Service (QoS) metrics, namely, mean opinion score (MOS), jitter, delay, and packet loss. The relationship between the wireless channel’s parameters and the optimum codec is well-established. According to the experimental results, the voice codec G.711 has the best performance for the proposed MANET topology <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20channel%20modelling" title="wireless channel modelling">wireless channel modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=Voip" title=" Voip"> Voip</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=session%20initiation%20protocol%20%28SIP%29" title=" session initiation protocol (SIP)"> session initiation protocol (SIP)</a>, <a href="https://publications.waset.org/abstracts/search?q=QoS" title=" QoS"> QoS</a> </p> <a href="https://publications.waset.org/abstracts/74102/voice-over-ip-quality-of-service-evaluation-for-mobile-ad-hoc-network-in-an-indoor-environment-for-different-voice-codecs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74102.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jinghui%20Peng">Jinghui Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Shanyu%20Tang"> Shanyu Tang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jia%20Li"> Jia Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steganalysis" title="steganalysis">steganalysis</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=Fast%20Fourier%20Transform" title=" Fast Fourier Transform"> Fast Fourier Transform</a>, <a href="https://publications.waset.org/abstracts/search?q=streaming%20media" title=" streaming media"> streaming media</a> </p> <a href="https://publications.waset.org/abstracts/108985/fast-fourier-transform-based-steganalysis-of-covert-communications-over-streaming-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108985.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neda%20Seyyedi">Neda Seyyedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Reza%20Berangi"> Reza Berangi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VOIP%20networks" title="VOIP networks">VOIP networks</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding%20attacks" title=" flooding attacks"> flooding attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy" title=" entropy"> entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20networks" title=" computer networks"> computer networks</a> </p> <a href="https://publications.waset.org/abstracts/28214/sip-flooding-attacks-detection-and-prevention-using-shannon-renyi-and-tsallis-entropy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Mesotrione and Tembotrione Applied Alone or in Tank-Mix with Atrazine on Weed Control in Elephant Grass</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexandre%20M.%20Brighenti">Alexandre M. Brighenti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The experiment was carried out in Valen&ccedil;a, Rio de Janeiro State, Brazil, to evaluate the selectivity and weed control of carotenoid biosynthesis inhibiting herbicides applied alone or in combination with atrazine in elephant grass crop. The treatments were as follows: mesotrione (0.072 and 0.144 kg ha<sup>-1</sup> + 0.5% v/v mineral oil - Assist&reg;), tembotrione (0.075 and 0.100 kg ha<sup>-1</sup> + 0.5% v/v mineral oil - Aureo&reg;), atrazine + mesotrione (1.25 + 0.072 kg ha<sup>-1</sup> + 0.5% v/v mineral oil - Assist&reg;), atrazine + tembotrione (1.25 + 0.100 kg ha<sup>-1</sup> + 0.5% v/v mineral oil - Aureo&reg;), atrazine + mesotrione (1.25 + 0.072 kg ha<sup>-1</sup>), atrazine + tembotrione (1.25 + 0.100 kg ha<sup>-1</sup>) and two controls (hoed and unhoed check). Two application rates of mesotrione with the addition of mineral oil or the tank mixture of atrazine plus mesotrione, with or without the addition of mineral oil, did not provide injuries capable to reduce elephant grass forage yield. Tembotrione was phytotoxic to elephant grass when applied with mineral oil. Atrazine and tembotrione in a tank-mix, with or without mineral oil, were also phytotoxic to elephant grass. All treatments provided satisfactory weed control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forage" title="forage">forage</a>, <a href="https://publications.waset.org/abstracts/search?q=Napier%20grass" title=" Napier grass"> Napier grass</a>, <a href="https://publications.waset.org/abstracts/search?q=pasture" title=" pasture"> pasture</a>, <a href="https://publications.waset.org/abstracts/search?q=Pennisetum%20purpureum" title=" Pennisetum purpureum"> Pennisetum purpureum</a>, <a href="https://publications.waset.org/abstracts/search?q=weeds" title=" weeds"> weeds</a> </p> <a href="https://publications.waset.org/abstracts/79651/mesotrione-and-tembotrione-applied-alone-or-in-tank-mix-with-atrazine-on-weed-control-in-elephant-grass" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79651.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Comparative Study of Scheduling Algorithms for LTE Networks </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samia%20Dardouri">Samia Dardouri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ridha%20Bouallegue"> Ridha Bouallegue</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scheduling is the process of dynamically allocating physical resources to User Equipment (UE) based on scheduling algorithms implemented at the LTE base station. Various algorithms have been proposed by network researchers as the implementation of scheduling algorithm which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of PF, MLWDF and EXP/PF scheduling algorithms. The evaluation is considered for a single cell with interference scenario for different flows such as Best effort, Video and VoIP in a pedestrian and vehicular environment using the LTE-Sim network simulator. The comparative study is conducted in terms of system throughput, fairness index, delay, packet loss ratio (PLR) and total cell spectral efficiency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LTE" title="LTE">LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=multimedia%20flows" title=" multimedia flows"> multimedia flows</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduling%20algorithms" title=" scheduling algorithms"> scheduling algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title=" mobile computing"> mobile computing</a> </p> <a href="https://publications.waset.org/abstracts/8094/comparative-study-of-scheduling-algorithms-for-lte-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8094.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> A Novel RLS Based Adaptive Filtering Method for Speech Enhancement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pogula%20Rakesh">Pogula Rakesh</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Kishore%20Kumar"> T. Kishore Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Speech enhancement is a long standing problem with numerous applications like teleconferencing, VoIP, hearing aids, and speech recognition. The motivation behind this research work is to obtain a clean speech signal of higher quality by applying the optimal noise cancellation technique. Real-time adaptive filtering algorithms seem to be the best candidate among all categories of the speech enhancement methods. In this paper, we propose a speech enhancement method based on Recursive Least Squares (RLS) adaptive filter of speech signals. Experiments were performed on noisy data which was prepared by adding AWGN, Babble and Pink noise to clean speech samples at -5dB, 0dB, 5dB, and 10dB SNR levels. We then compare the noise cancellation performance of proposed RLS algorithm with existing NLMS algorithm in terms of Mean Squared Error (MSE), Signal to Noise ratio (SNR), and SNR loss. Based on the performance evaluation, the proposed RLS algorithm was found to be a better optimal noise cancellation technique for speech signals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20filter" title="adaptive filter">adaptive filter</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20noise%20canceller" title=" adaptive noise canceller"> adaptive noise canceller</a>, <a href="https://publications.waset.org/abstracts/search?q=mean%20squared%20error" title=" mean squared error"> mean squared error</a>, <a href="https://publications.waset.org/abstracts/search?q=noise%20reduction" title=" noise reduction"> noise reduction</a>, <a href="https://publications.waset.org/abstracts/search?q=NLMS" title=" NLMS"> NLMS</a>, <a href="https://publications.waset.org/abstracts/search?q=RLS" title=" RLS"> RLS</a>, <a href="https://publications.waset.org/abstracts/search?q=SNR" title=" SNR"> SNR</a>, <a href="https://publications.waset.org/abstracts/search?q=SNR%20loss" title=" SNR loss"> SNR loss</a> </p> <a href="https://publications.waset.org/abstracts/16212/a-novel-rls-based-adaptive-filtering-method-for-speech-enhancement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">481</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> LTE Performance Analysis in the City of Bogota Northern Zone for Two Different Mobile Broadband Operators over Qualipoc</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V%C3%ADctor%20D.%20Rodr%C3%ADguez">Víctor D. Rodríguez</a>, <a href="https://publications.waset.org/abstracts/search?q=Edith%20P.%20Estupi%C3%B1%C3%A1n"> Edith P. Estupiñán</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20C.%20Mart%C3%ADnez"> Juan C. Martínez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evolution in mobile broadband technologies has allowed to increase the download rates in users considering the current services. The evaluation of technical parameters at the link level is of vital importance to validate the quality and veracity of the connection, thus avoiding large losses of data, time and productivity. Some of these failures may occur between the eNodeB (Evolved Node B) and the user equipment (UE), so the link between the end device and the base station can be observed. LTE (Long Term Evolution) is considered one of the IP-oriented mobile broadband technologies that work stably for data and VoIP (Voice Over IP) for those devices that have that feature. This research presents a technical analysis of the connection and channeling processes between UE and eNodeB with the TAC (Tracking Area Code) variables, and analysis of performance variables (Throughput, Signal to Interference and Noise Ratio (SINR)). Three measurement scenarios were proposed in the city of Bogot&aacute; using QualiPoc, where two operators were evaluated (Operator 1 and Operator 2). Once the data were obtained, an analysis of the variables was performed determining that the data obtained in transmission modes vary depending on the parameters BLER (Block Error Rate), performance and SNR (Signal-to-Noise Ratio). In the case of both operators, differences in transmission modes are detected and this is reflected in the quality of the signal. In addition, due to the fact that both operators work in different frequencies, it can be seen that Operator 1, despite having spectrum in Band 7 (2600 MHz), together with Operator 2, is reassigning to another frequency, a lower band, which is AWS (1700 MHz), but the difference in signal quality with respect to the establishment with data by the provider Operator 2 and the difference found in the transmission modes determined by the eNodeB in Operator 1 is remarkable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BLER" title="BLER">BLER</a>, <a href="https://publications.waset.org/abstracts/search?q=LTE" title=" LTE"> LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=qualipoc" title=" qualipoc"> qualipoc</a>, <a href="https://publications.waset.org/abstracts/search?q=SNR." title=" SNR. "> SNR. </a> </p> <a href="https://publications.waset.org/abstracts/126065/lte-performance-analysis-in-the-city-of-bogota-northern-zone-for-two-different-mobile-broadband-operators-over-qualipoc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Critical Evaluation and Analysis of Effects of Different Queuing Disciplines on Packets Delivery and Delay for Different Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omojokun%20Gabriel%20Aju">Omojokun Gabriel Aju</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communication network is a process of exchanging data between two or more devices via some forms of transmission medium using communication protocols. The data could be in form of text, images, audio, video or numbers which can be grouped into FTP, Email, HTTP, VOIP or Video applications. The effectiveness of such data exchange will be proved if they are accurately delivered within specified time. While some senders will not really mind when the data is actually received by the receiving device, inasmuch as it is acknowledged to have been received by the receiver. The time a data takes to get to a receiver could be very important to another sender, as any delay could cause serious problem or even in some cases rendered the data useless. The validity or invalidity of a data after delay will therefore definitely depend on the type of data (information). It is therefore imperative for the network device (such as router) to be able to differentiate among the packets which are time sensitive and those that are not, when they are passing through the same network. So, here is where the queuing disciplines comes to play, to handle network resources when such network is designed to service widely varying types of traffics and manage the available resources according to the configured policies. Therefore, as part of the resources allocation mechanisms, a router within the network must implement some queuing discipline that governs how packets (data) are buffered while waiting to be transmitted. The implementation of the queuing discipline will regulate how the packets are buffered while waiting to be transmitted. In achieving this, various queuing disciplines are being used to control the transmission of these packets, by determining which of the packets get the highest priority, less priority and which packets are dropped. The queuing discipline will therefore control the packets latency by determining how long a packet can wait to be transmitted or dropped. The common queuing disciplines are first-in-first-out queuing, Priority queuing and Weighted-fair queuing (FIFO, PQ and WFQ). This paper critically evaluates and analyse through the use of Optimized Network Evaluation Tool (OPNET) Modeller, Version 14.5 the effects of three queuing disciplines (FIFO, PQ and WFQ) on the performance of 5 different applications (FTP, HTTP, E-Mail, Voice and Video) within specified parameters using packets sent, packets received and transmission delay as performance metrics. The paper finally suggests some ways in which networks can be designed to provide better transmission performance while using these queuing disciplines. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=applications" title="applications">applications</a>, <a href="https://publications.waset.org/abstracts/search?q=first-in-first-out%20queuing%20%28FIFO%29" title=" first-in-first-out queuing (FIFO)"> first-in-first-out queuing (FIFO)</a>, <a href="https://publications.waset.org/abstracts/search?q=optimised%20network%20evaluation%20tool%20%28OPNET%29" title=" optimised network evaluation tool (OPNET)"> optimised network evaluation tool (OPNET)</a>, <a href="https://publications.waset.org/abstracts/search?q=packets" title=" packets"> packets</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20queuing%20%28PQ%29" title=" priority queuing (PQ)"> priority queuing (PQ)</a>, <a href="https://publications.waset.org/abstracts/search?q=queuing%20discipline" title=" queuing discipline"> queuing discipline</a>, <a href="https://publications.waset.org/abstracts/search?q=weighted-fair%20queuing%20%28WFQ%29" title=" weighted-fair queuing (WFQ)"> weighted-fair queuing (WFQ)</a> </p> <a href="https://publications.waset.org/abstracts/26471/critical-evaluation-and-analysis-of-effects-of-different-queuing-disciplines-on-packets-delivery-and-delay-for-different-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26471.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> High Efficiency Double-Band Printed Rectenna Model for Energy Harvesting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rakelane%20A.%20Mendes">Rakelane A. Mendes</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandro%20T.%20M.%20Goncalves"> Sandro T. M. Goncalves</a>, <a href="https://publications.waset.org/abstracts/search?q=Raphaella%20L.%20R.%20Silva"> Raphaella L. R. Silva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The concepts of energy harvesting and wireless energy transfer have been widely discussed in recent times. There are some ways to create autonomous systems for collecting ambient energy, such as solar, vibratory, thermal, electromagnetic, radiofrequency (RF), among others. In the case of the RF it is possible to collect up to 100 μW / cm². To collect and/or transfer energy in RF systems, a device called rectenna is used, which is defined by the junction of an antenna and a rectifier circuit. The rectenna presented in this work is resonant at the frequencies of 1.8 GHz and 2.45 GHz. Frequencies at 1.8 GHz band are e part of the GSM / LTE band. The GSM (Global System for Mobile Communication) is a frequency band of mobile telephony, it is also called second generation mobile networks (2G), it came to standardize mobile telephony in the world and was originally developed for voice traffic. LTE (Long Term Evolution) or fourth generation (4G) has emerged to meet the demand for wireless access to services such as Internet access, online games, VoIP and video conferencing. The 2.45 GHz frequency is part of the ISM (Instrumentation, Scientific and Medical) frequency band, this band is internationally reserved for industrial, scientific and medical development with no need for licensing, and its only restrictions are related to maximum power transfer and bandwidth, which must be kept within certain limits (in Brazil the bandwidth is 2.4 - 2.4835 GHz). The rectenna presented in this work was designed to present efficiency above 50% for an input power of -15 dBm. It is known that for wireless energy capture systems the signal power is very low and varies greatly, for this reason this ultra-low input power was chosen. The Rectenna was built using the low cost FR4 (Flame Resistant) substrate, the antenna selected is a microfita antenna, consisting of a Meandered dipole, and this one was optimized using the software CST Studio. This antenna has high efficiency, high gain and high directivity. Gain is the quality of an antenna in capturing more or less efficiently the signals transmitted by another antenna and/or station. Directivity is the quality that an antenna has to better capture energy in a certain direction. The rectifier circuit used has series topology and was optimized using Keysight's ADS software. The rectifier circuit is the most complex part of the rectenna, since it includes the diode, which is a non-linear component. The chosen diode is the Schottky diode SMS 7630, this presents low barrier voltage (between 135-240 mV) and a wider band compared to other types of diodes, and these attributes make it perfect for this type of application. In the rectifier circuit are also used inductor and capacitor, these are part of the input and output filters of the rectifier circuit. The inductor has the function of decreasing the dispersion effect on the efficiency of the rectifier circuit. The capacitor has the function of eliminating the AC component of the rectifier circuit and making the signal undulating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dipole%20antenna" title="dipole antenna">dipole antenna</a>, <a href="https://publications.waset.org/abstracts/search?q=double-band" title=" double-band"> double-band</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20efficiency" title=" high efficiency"> high efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=rectenna" title=" rectenna"> rectenna</a> </p> <a href="https://publications.waset.org/abstracts/107089/high-efficiency-double-band-printed-rectenna-model-for-energy-harvesting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107089.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Health and Climate Changes: &quot;Ippocrate&quot; a New Alert System to Monitor and Identify High Risk</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Calabrese">A. Calabrese</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20F.%20Uricchio"> V. F. Uricchio</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20di%20Noia"> D. di Noia</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Favale"> S. Favale</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Caiati"> C. Caiati</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20P.%20Maggi"> G. P. Maggi</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Donvito"> G. Donvito</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Diacono"> D. Diacono</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Tangaro"> S. Tangaro</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Italiano"> A. Italiano</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Riezzo"> E. Riezzo</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Zippitelli"> M. Zippitelli</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Toriello"> M. Toriello</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Celiberti"> E. Celiberti</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Festa"> D. Festa</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Colaianni"> A. Colaianni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Climate change has a severe impact on human health. There is a vast literature demonstrating temperature increase is causally related to cardiovascular problem and represents a high risk for human health, but there are not study that improve a solution. In this work, it is studied how the clime influenced the human parameter through the analysis of climatic conditions in an area of the Apulia Region: Capurso Municipality. At the same time, medical personnel involved identified a set of variables useful to define an index describing health condition. These scientific studies are the base of an innovative alert system, IPPOCRATE, whose aim is to asses climate risk and share information to population at risk to support prevention and mitigation actions. IPPOCRATE is an e-health system, it is designed to provide technological support to analysis of health risk related to climate and provide tools for prevention and management of critical events. It is the first integrated system of prevention of human risk caused by climate change. IPPOCRATE calculates risk weighting meteorological data with the vulnerability of monitored subjects and uses mobile and cloud technologies to acquire and share information on different data channels. It is composed of four components: Multichannel Hub. Multichannel Hub is the ICT infrastructure used to feed IPPOCRATE cloud with a different type of data coming from remote monitoring devices, or imported from meteorological databases. Such data are ingested, transformed and elaborated in order to be dispatched towards mobile app and VoIP phone systems. IPPOCRATE Multichannel Hub uses open communication protocols to create a set of APIs useful to interface IPPOCRATE with 3rd party applications. Internally, it uses non-relational paradigm to create flexible and highly scalable database. WeHeart and Smart Application The wearable device WeHeart is equipped with sensors designed to measure following biometric variables: heart rate, systolic blood pressure and diastolic blood pressure, blood oxygen saturation, body temperature and blood glucose for diabetic subjects. WeHeart is designed to be easy of use and non-invasive. For data acquisition, users need only to wear it and connect it to Smart Application by Bluetooth protocol. Easy Box was designed to take advantage from new technologies related to e-health care. EasyBox allows user to fully exploit all IPPOCRATE features. Its name, Easy Box, reveals its purpose of container for various devices that may be included depending on user needs. Territorial Registry is the IPPOCRATE web module reserved to medical personnel for monitoring, research and analysis activities. Territorial Registry allows to access to all information gathered by IPPOCRATE using GIS system in order to execute spatial analysis combining geographical data (climatological information and monitored data) with information regarding the clinical history of users and their personal details. Territorial Registry was designed for different type of users: control rooms managed by wide area health facilities, single health care center or single doctor. Territorial registry manages such hierarchy diversifying the access to system functionalities. IPPOCRATE is the first e-Health system focused on climate risk prevention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=climate%20change" title="climate change">climate change</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20risk" title=" health risk"> health risk</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20technological%20system" title=" new technological system"> new technological system</a> </p> <a href="https://publications.waset.org/abstracts/28782/health-and-climate-changes-ippocrate-a-new-alert-system-to-monitor-and-identify-high-risk" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">867</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10