Identifying the Main Paths of Knowledge Diffusion in the Voice over Internet Protocol

被引:5
|
作者
Chen, Liang-Chu [1 ]
Shih, I-Chiang [1 ]
Liu, John S. [2 ]
机构
[1] Natl Def Univ, Management Coll, Dept Informat Management, Taoyuan, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Grad Inst Technol Management, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 01期
关键词
VoIP; Voice over Internet Protocol; Citation analysis; Key-route main path; Clustering-betweenness; QUALITY PREDICTION; FLOODING ATTACKS; CITATION NETWORK; TELEPHONY; IP; ARCHITECTURE; SERVICES; IMPLEMENTATION; PREVENTION; DESIGN;
D O I
10.3966/160792642020012101009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of the Internet, new applications and services are continuously being proposed for the telecommunication systems. Voice over Internet Protocol (VoIP) is one of the most prominent models for enabling convenient, high-rate, and on-demand voice conversation services through any IP-based network. The increased use of VoIP as an accepted communication form has resulted in a growing volume of academic research dedicated to their assessment. This study integrates the key-route main path analysis approach and edge-betweenness clustering technique to analyze the knowledge diffusion structures in VoIP domain. The former reveals a roadmap of VoIP including the overall development trajectory and the linkage among different research groups. The latter technique uncovers five major research groups in the VoIP-related literature: wireless network, quality of service, security, traffic and capacity, and VoIP services and architecture. The findings derived from this study highlight the significant development trajectories and contributors of VoIP-related studies.
引用
收藏
页码:85 / 98
页数:14
相关论文
共 50 条
  • [1] VoIP (Voice over Internet protocol)
    Davies, D
    [J]. CANADIAN MINING JOURNAL, 2005, 126 (06) : 9 - 9
  • [2] Securing Voice over Internet Protocol
    Ghafarian, Ahmad
    Draughorne, Randolph
    Hargraves, Shelley
    Grainger, Steven
    High, Stacy
    Jackson, Crystal
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 200 - 204
  • [3] VoIP (Voice over Internet Protocol)
    Davies, D
    [J]. PULP & PAPER-CANADA, 2005, 106 (05) : 15 - 15
  • [4] Voice over Internet protocol (VoIP)
    Goode, B
    [J]. PROCEEDINGS OF THE IEEE, 2002, 90 (09) : 1495 - 1517
  • [5] Voice over Internet Protocol - telephoning via Internet
    Banach, Artur
    [J]. E-MENTOR, 2005, (03): : 61 - 64
  • [6] Voice Over Internet Protocol: Vulnerabilities and Assessments
    Khan, Hafiz Muhammad Ashja
    Inayat, Usman
    Zia, Muhammad Fahad
    Ali, Fahad
    Jabeen, Taila
    Ali, Syed Moshin
    [J]. 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 695 - 700
  • [7] Voice over Internet protocol on mobile devices
    Mao, Guo Fang
    Talevski, Alex
    Chang, Elizabeth
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 163 - +
  • [8] Identifying the main paths of information diffusion in online social networks
    Zhu, Hengmin
    Yin, Xicheng
    Ma, Jing
    Hu, Wei
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 452 : 320 - 328
  • [9] Improved Voice Over Internet Protocol for Wireless Devices
    Roslin, Raihan Jannati Binti
    Khalifa, Othman O.
    Bhuiyan, Sharif Shah Newaj
    [J]. PROCEEDINGS OF THE 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2018, : 498 - 503
  • [10] Knowledge diffusion paths of blockchain domain: the main path analysis
    Yu, Dejian
    Sheng, Libo
    [J]. SCIENTOMETRICS, 2020, 125 (01) : 471 - 497