Academic literature on the topic 'Voix sur IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Voix sur IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Voix sur IP"
Marziali, Elsa. "David C. Burdick and Sunkyo Kwon (Eds.). Gerontechnology: Research and Practice in Technology and Aging. New York: Springer, 2004." Canadian Journal on Aging / La Revue canadienne du vieillissement 25, no. 2 (2006): 237–38. http://dx.doi.org/10.1353/cja.2006.0039.
Full textNazir, S., S. A. Kamil, A. Riyaz, M. S. Mir, M. M. Darzi, A. Yasine, and K. S. Goudar. "Pathology and colonization of internal organs after experimental infection of broiler chickens with Salmonella Gallinarum through oral or intraperitoneal routes." Revue d’élevage et de médecine vétérinaire des pays tropicaux 67, no. 2 (March 12, 2015): 53. http://dx.doi.org/10.19182/remvt.10184.
Full textCarton, L., F. Auger, N. Durieux, M. Petrault, J. Labreuche, D. Allorge, O. Cottencin, N. Simon, R. Bordet, and B. Rolland. "Effet longitudinal d’une administration aiguë d’éthanol sur le GABA et le glutamate : une étude en spectroscopie par résonance magnétique in vivo chez le rat." European Psychiatry 30, S2 (November 2015): S116. http://dx.doi.org/10.1016/j.eurpsy.2015.09.222.
Full textSalcedo Parra, Octavio José, Danilo López, and Ángela Patricia Ríos. "Desempeño de la calidad del servicio (QoS) sobre IPv6." Revista Tecnura 15, no. 28 (June 19, 2012): 32. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2011.1.a03.
Full textWidhiatmoko, Widhiatmoko, Hesti Susilawati, and Rahmat K. Noviandono. "Analisis Performansi VOIP (Voice Over Internet Protocol) Pada Jaringan Wimax (Worldwide Interoperability For Microwave Access) Di Wilayah DKI Jakarta." JURNAL INFOTEL - Informatika Telekomunikasi Elektronika 3, no. 1 (May 10, 2011): 58. http://dx.doi.org/10.20895/infotel.v3i1.88.
Full textGentayu, Purwo Panggalih, and Mudrik Alaydrus. "Analisa Layanan Keamanan, Performansi Pensinyalan dan Kualitas Panggilan Interkoneksi SIP International Direct Dialing Menggunakan Softswitch Class 4 dan Session Border Controller." Jurnal Telekomunikasi dan Komputer 3, no. 2 (February 27, 2017): 201. http://dx.doi.org/10.22441/incomtech.v3i2.1120.
Full textDissertations / Theses on the topic "Voix sur IP"
Abdelnur, Humberto Jorge Festor Olivier. "Gestion de vulnérabilités voix sur IP." S. l. : Nancy 1, 2009. http://www.scd.uhp-nancy.fr/docnum/SCD_T_2009_0005_ABDELNUR.pdf.
Full textAbdelnur, Humberto Jorge. "Gestion de vulnérabilités voix sur IP." Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10005/document.
Full textVoIP networks are in a major deployment phase and are becoming widely accepted due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality. Assuring its security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in the software implementation will continue rank high on the list of vulnerabilities. This thesis provides three contributions towards improving software security. The first is a VoIP specific security assessment framework integrated with discovery actions, data management and security attacks allowing to perform VoIP specific assessment tests. The second contribution consists in an automated approach able to discriminate message signatures and build flexible and efficient passive fingerprinting systems able to identify the source entity of messages in the network. The third contribution addresses the issue of detecting vulnerabilities using a stateful fuzzer. It provides an automated attack approach capable to track the state context of a target device and we share essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space
Gordon, David. "La sécurité de la voix sur IP." Mémoire, Université de Sherbrooke, 2008. http://savoirs.usherbrooke.ca/handle/11143/4859.
Full textKoenig, Lionel. "Masquage de pertes de paquets en voix sur IP." Thesis, Toulouse, INPT, 2011. http://www.theses.fr/2011INPT0010/document.
Full textPacket loss due to misrouted or delayed packets in voice over IP leads to huge voice quality degradation. Packet loss concealment algorithms try to enhance the perceptive quality of the speech. The huge variety of vocoders leads us to propose a generic framework working directly on the speech signal available after decoding. The proposed system relies on one single "hidden Markov model" to model time evolution of acoustic features. An original indicator of continuous voicing is added to conventional parameters (Linear Predictive Cepstral Coefficients) in order to handle voiced/unvoiced sound. Finding the best path with missing observations leads to one major contribution: a modified version of the Viterbi algorithm tailored for estimating missing observations. All contributions are assessed using both perceptual criteria and objective metrics
Nassar, Mohamed. "Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP." Phd thesis, Université Henri Poincaré - Nancy I, 2009. http://tel.archives-ouvertes.fr/tel-00376831.
Full textNotre travail combine deux domaines: celui de la sécurité des réseaux et celui de l'intelligence artificielle. Nous renforcons les mécanismes de sécurité existants en apportant des contributions sur trois axes : Une approche basée sur des mécanismes d'apprentissage pour le monitorage de trafic de signalisation VoIP, un pot de miel spécifique, et un modèle de corrélation des évenements pour la détection d'intrusion. Pour l'évaluation de nos solutions, nous avons développés des agents VoIP distribués et gérés par une entité centrale. Nous avons développé un outil d'analyse des traces réseaux de la signalisation que nous avons utilisé pour expérimenter avec des traces de monde réel. Enfin, nous avons implanté un prototype de détection d'intrusion basé sur des règles de corrélation des événements.
Bassil, Carole. "SVSP (Secure Voice over IP Simple Protocol) une solution pour la sécurisation de la voix sur IP." Phd thesis, Télécom ParisTech, 2005. http://pastel.archives-ouvertes.fr/pastel-00001577.
Full textBassil, Carole. "SVSP, Secure voice over IP simple protocole, une solution pour la sécurisation de la voix sur IP /." Paris : École nationale supérieure des télécommunications, 2006. http://catalogue.bnf.fr/ark:/12148/cb40208342h.
Full textBassil, Carole. "SVSP (Secure Voice over IP Simple Protocole) : une solution pour la sécurisation de la voix sur IP." Paris, ENST, 2005. http://www.theses.fr/2005ENST0045.
Full textSince the invention of the first telephone by Alexander Graham Bell in 1869, network telephony technology did not stop evolving: from circuit switching to packet switching, from fixed network to wireless network. Several new architectures were created which combines the transport of voice, data and image in the same data network. The nature of these open networks has an impact on the voice in terms of security. This yields to the imminent need to secure voice communications while insuring a good quality of service to the voice as well in fixed, wireless and IP networks. Different security solutions are proposed for the data. But partial even incomplete solutions are proposed for the voice. First, we define the needs for securing the telephony and the security services required. Thus, we analyze the security offered by the different telephone networks, namely the security in the traditional telephone network (PSTN and ISDN), in the mobile networks (GSM and UMTS), and in the IP network based on the H. 323 and SIP architectures. This will allow us to compare the security solutions offered by these telephony architectures and to be able to present their advantages and limitations and the security requirements that they cannot satisfy. This analysis drives us to an eloquent result that is the absence of a complete end to end security solution that complies with the security requirements of telephony. Secondly, we propose security architecture for a unified telephony architecture. This security architecture proposes a service layer that is inserted between N and N + 1 layers of the OSI reference model. This choice provides a transparency and an independence of the underlying network but requires reviewing the interfaces and therefore the needs to define an API between the security application and the underlying network that insures transparency. This architecture provides the security services and defines necessary security policies to secure voice communications. Following the security architecture, we defined a security protocol that we named SVSP for Simple Voice Security Protocol. SVSP satisfies the security services defined by this architecture that provides a secure end-to-end phone call. Studies were carried out to integrate it in different telephony infrastructures, namely with the traditional telephone network, GSM the mobile network and with the H. 323 standard for voice over IP communications. A prototype of SVSP was implemented followed by integrating it with SIP the IETF voip standard
Meddahi, Ahmed. "Voix sur IP : Modèles et architectures pour l'évaluation et l'optimisation des performances." Evry, Institut national des télécommunications, 2005. http://www.theses.fr/2005TELE0003.
Full textThere is a large consensus on the adoption of packetized media transmission in the near future. We can see that video broadcast has greatly benefited from these techniques (DVD, satellite and cable) and that audio is following. Voice is in our opinion the last medium to " resist " and this is due to the legacy circuit switched networks that have to be first replaced by packet switched ones. As voice is still occupying a large market share in telecommunications business, there is a serious concern from the operators' side as to offer at least the current " circuit switched " quality for future voice over IP communications. Also, " Despite huge efforts, the Internet (not IP) is incapable of carrying real-time or delaysensitive traffic ". So, before expecting a widespread deployment of Internet telephony, critical issues must be solved. The detailed analysis of the existing protocols and architectures models for voice over IP services, shows that performances optimization is necessary. For this, we propose several original contributions and prove that these propositions clearly improve global performances of the existing protocols and architectures for voice over IP, while assuring compatibility. These propositions are : -" Smart Profile ", a model and architecture for SIP performance optimization, particularly well adapted when network conditions are not satisfactory. Effectively, situations where bandwidth saving or availability is a constraint, the impact on the establishment delays can be significant. This is essentially due, to the textual format of SIP protocol but also, to the messages flow required for accessing to " complex " services. This model, minimizes establishment delays for a low level of complexity. " Smart Profile ", is an approach based on methods between " caching " and " compression " techniques. -" Packet-E-Model ", a model for the subjective and dynamic quality evaluation for voice over IP. This new model, extends and adapts the classical " E " model from the ITU-T G. 107 recommendation, to the particular context of IP networks, characterized by a high variability and complexity. It computes and provides a " MOS " type score, reflecting the subjective quality of the voice communication. " Packet-E-Model ", takes into account parameters such as delay or packet losses, " observed " on the IP path, for " MOS " calculation on a packet per packet basis. -" MOSQoS ", an architecture model for dynamically, controlling and adjusting Quality of Service (QoS), depending on the measurement and variability of voice quality. Classical QoS models are not much adapted to the particular characteristics of " VoIP ", for example in a mobility context, where voice quality perception can change dynamically during a session. So, this model, enables dynamic allocation of network resources, based on the " MOS " score variability which, represents the subjective quality (human perception) of the VoIP session. Feasibility and performance studies, resulting from simulation but also from implementation on different test-beds are very satisfactory and show that optimization is globally achieved. Results analysis shows the robustness of our contributions. Also, the models we proposed can be easily integrated in existing " VoIP " architectures
Mayorga, Ortiz Pedro. "Reconnaissance vocale dans un contexte de voix sur IP : diagnostic et propositions." Grenoble INPG, 2005. http://www.theses.fr/2005INPG0014.
Full textThe purpose of This work of thesis is to diagnose the new challenges for the speech recognition in the recent context of the voice over IP, and to propose some solutions making it possible to improve the performances of the automatic recognition systems. The first contribution of our work consequently consisted in diagnosing most precisely possible the problems due to the compression and the packet losses for two different recognition tasks: the automatic speech recognition and automatic speaker recognition. From the diagnosis result, we noted a more important degradation due to the compression on the speaker verification task. With regard to the automatic speech recognition, the most important degradation was caused by the packet losses. The second contribution of this thesis thus corresponds to the proposal for recovering techniques in order to improve the robustness of systems under significant packet losses conditions. The recovery techniques were applied on the basis of transmitter and receiver. The experimental results show that the techniques of interleaving based on the transmitter combined with the interpolation based on the receiver, prove to be the most efficient. In addition, our experiments also confirm the advantages of a "distributed architecture" where acoustic vectors traveling on the network from the client to the recognition server (concept of "distributed speech recognition" proposed by the international organization ETSI), compared to an architecture more traditional type "server pure" where the signal (or its compressed version) travels from the client terminal on the network to the recognition server
Books on the topic "Voix sur IP"
Schieb, Jörg. Voice over IP: Telefonieren übers Internet. Kilchberg: SmartBooks, 2006.
Find full textManuel, Caballero José, ed. Triple play: Building the convergent network for IP, VOIP, and IPTV. Chichester, West Sussex, England: Wiley, 2008.
Find full textConference papers on the topic "Voix sur IP"
Soares, Rafael Amaral, Gabriel Carvalho Ferreira, Priscila America Solis, and Marcos Fagundes Caetano. "EROS-5: Gerador de Tráfego Sintético para Redes 5G." In XXXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc_estendido.2020.12400.
Full text