Author of the publication

VoIP communication quality and flow volume preference - A SIP and Red5 example.

, , , , and . ICSAI, page 782-786. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improvement of diamond encoding using characteristic value positioning and modulus function., , and . J. Syst. Softw., 86 (5): 1377-1383 (2013)VoIP communication quality and flow volume preference - A SIP and Red5 example., , , , and . ICSAI, page 782-786. IEEE, (2016)Effectiveness of combing airdrop and mobile devices in word card teaching., , , , and . ICSAI, page 471-475. IEEE, (2016)A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC)., , , and . ISDA (3), page 426-430. IEEE Computer Society, (2008)Using the ACM Technique to Refine Protein Spots in 2DGE Images., , , , , and . AINA, page 289-292. IEEE Computer Society, (2005)A secure data hiding method based on preservation of saturated pixels., , , and . ICDIP, volume 8334 of SPIE Proceedings, page 83342Z. SPIE, (2012)Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving., , , , and . J. Supercomput., 66 (2): 907-917 (2013)A simple and efficient watermarking technique based on JPEG2000 codec., , and . ISMSE, page 80-87. IEEE Computer Society, (2003)A new detection method of halftone images based on crisscross checking technique., , and . ISMSE, page 94-101. IEEE Computer Society, (2003)Personalized live streaming channel recommendation based on most similar neighbors., , , and . Multim. Tools Appl., 80 (13): 19867-19883 (2021)