scholarly journals Gateway between XMPP & SIP for Extensible Messaging and Voice over IP

Author(s):  
Prof. Meet Patel

Services and applications for real-time communications are developed during the last decade in two different contexts with almost opposite approaches. On the one hand, tele-communications companies have developed technologies supported the session initiation protocol (SIP), within the first place to re-implement the normal telephony service on the web, infrastructure, thus replacing the expensive circuit-switched network, but also enabling new communication channels like presence sharing and instant messaging. On the opposite hand, communities of open source developers have driven the evolution of open communication tools like e-mail and discussion systems towards the extensible messaging and presence protocol (XMPP). While the 2 worlds have virtually ignored one another for years, basically replicating the identical set of features, recent events within the industry have revealed a stimulating convergence between such technologies that within the near future is probably going to form them integrate. The project “Implementation of gateway between XMPP and SIP” is an effort to review various open source internet multimedia protocols like XMPP, SIP, RTP, MSRP et al. and their implementation into the $64000 environment and studying its actual working. The proposed system provides the features of audio call, and video call together with the features of conferencing, instant messaging, and presence.

2021 ◽  
Vol 29 (1) ◽  
Author(s):  
Thomas Bock ◽  
Claus Hunsen ◽  
Mitchell Joblin ◽  
Sven Apel

AbstractMailing lists are a major communication channel for supporting developer coordination in open-source software projects. In a recent study, researchers explored temporal relationships (e.g., synchronization) between developer activities on source code and on the mailing list, relying on simple heuristics of developer collaboration (e.g., co-editing files) and developer communication (e.g., sending e-mails to the mailing list). We propose two methods for studying synchronization between collaboration and communication activities from a higher-level perspective, which captures the complex activities and views of developers more precisely than the rather technical perspective of previous work. On the one hand, we explore developer collaboration at the level of features (not files), which are higher-level concepts of the domain and not mere technical artifacts. On the other hand, we lift the view of developer communication from a message-based model, which treats each e-mail individually, to a conversation-based model, which is semantically richer due to grouping e-mails that represent conceptually related discussions. By means of an empirical study, we investigate whether the different abstraction levels affect the observed relationship between commit activity and e-mail communication using state-of-the-art time-series analysis. For this purpose, we analyze a combined history of 40 years of data for three highly active and widely deployed open-source projects: QEMU, BusyBox, and OpenSSL. Overall, we found evidence that a higher-level view on the coordination of developers leads to identifying a stronger statistical dependence between the technical activities of developers than a less abstract and rather technical view.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


1983 ◽  
Vol 4 ◽  
pp. 297-297
Author(s):  
G. Brugnot

We consider the paper by Brugnot and Pochat (1981), which describes a one-dimensional model applied to a snow avalanche. The main advance made here is the introduction of the second dimension in the runout zone. Indeed, in the channelled course, we still use the one-dimensional model, but, when the avalanche spreads before stopping, we apply a (x, y) grid on the ground and six equations have to be solved: (1) for the avalanche body, one equation for continuity and two equations for momentum conservation, and (2) at the front, one equation for continuity and two equations for momentum conservation. We suppose the front to be a mobile jump, with longitudinal velocity varying more rapidly than transverse velocity.We solve these equations by a finite difference method. This involves many topological problems, due to the actual position of the front, which is defined by its intersection with the reference grid (SI, YJ). In the near future our two directions of research will be testing the code on actual avalanches and improving it by trying to make it cheaper without impairing its accuracy.


Author(s):  
Alexander Boll ◽  
Florian Brokhausen ◽  
Tiago Amorim ◽  
Timo Kehrer ◽  
Andreas Vogelsang

AbstractSimulink is an example of a successful application of the paradigm of model-based development into industrial practice. Numerous companies create and maintain Simulink projects for modeling software-intensive embedded systems, aiming at early validation and automated code generation. However, Simulink projects are not as easily available as code-based ones, which profit from large publicly accessible open-source repositories, thus curbing empirical research. In this paper, we investigate a set of 1734 freely available Simulink models from 194 projects and analyze their suitability for empirical research. We analyze the projects considering (1) their development context, (2) their complexity in terms of size and organization within projects, and (3) their evolution over time. Our results show that there are both limitations and potentials for empirical research. On the one hand, some application domains dominate the development context, and there is a large number of models that can be considered toy examples of limited practical relevance. These often stem from an academic context, consist of only a few Simulink blocks, and are no longer (or have never been) under active development or maintenance. On the other hand, we found that a subset of the analyzed models is of considerable size and complexity. There are models comprising several thousands of blocks, some of them highly modularized by hierarchically organized Simulink subsystems. Likewise, some of the models expose an active maintenance span of several years, which indicates that they are used as primary development artifacts throughout a project’s lifecycle. According to a discussion of our results with a domain expert, many models can be considered mature enough for quality analysis purposes, and they expose characteristics that can be considered representative for industry-scale models. Thus, we are confident that a subset of the models is suitable for empirical research. More generally, using a publicly available model corpus or a dedicated subset enables researchers to replicate findings, publish subsequent studies, and use them for validation purposes. We publish our dataset for the sake of replicating our results and fostering future empirical research.


2018 ◽  
Vol 6 (1) ◽  
pp. 91-114
Author(s):  
Stefan Hartmann

Abstract This paper investigates the alternation between two competing German future constructions, the werden + Infinitive construction and the futurate present, from a usage-based perspective. Two lines of evidence are combined: On the one hand, a pilot corpus study indicates that werden + Infinitive is more likely to be used for referring to distant-future events than to near-future events. However, syntactic factors seem to be at least as decisive as semantic ones for speakers’ choice between the two constructions. On the other hand, an experimental study taps into language users’ interpretation of sentences framed in one of the two constructions. It can be shown that the grammatical framing does not significantly affect participants’ estimates of the temporal distance of the events to which the stimuli sentences refer. This suggests that the meaning differences between the two constructions be more nuanced, e.g. pertaining to discourse-pragmatic functions.


2020 ◽  
Vol 39 (3) ◽  
pp. 125-138
Author(s):  
Alina Zajadacz ◽  
Aleksandra Minkwitz

AbstractThe purpose of the article is to present the concept of using social media (SM) as data sources and communication tools, useful at the various stages of planning, implementing and monitoring the effects of tourism development on a local level. The first part discusses the stages of planning, then presents the characteristics of SM, along with a discussion of the issues presented in the literature to this date. The next part presents data sources and methods of research on SM and functions that they can perform in tourism. The concept presented, on the one hand, reviews the perspectives of practical use of SM as a communication tool and source of data and, on the other hand, the challenges related to the need to further deepen research on tourism planning methods that are adequate to the continuously changing environment.


Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2020 ◽  
Vol 55 (1) ◽  
pp. 82-94
Author(s):  
Joanna Antczak

Operation in the cyberspace of every business unit is unavoidable. Most commercial transactions, marketing activities, e-mail contact with employees or contractors are carried out using virtual space. The purpose of the article is to identify and analyze selected costs for cybersecurity of an enterprise. Costs related to cybersecurity constitute a new category in the management of an enterprise. Considering the costs at the enterprise level, two areas should be discussed: on the one hand, those incurred to prevent cyber threats and on the other one, the costs of offsetting the negative effects of cyber-attacks. For the sake of stable operation and at the same time development in the future, the management should strengthen activities in the field of information security, which is related to costs that will minimize the risk of cyber-attacks.


Sign in / Sign up

Export Citation Format

Share Document