2021
DOI: 10.4018/ijitn.2021070106
|View full text |Cite
|
Sign up to set email alerts
|

Conceptual Modeling of an IP Phone Communication System

Abstract: In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…This model and its variations are the most commonly adopted models in various fields of science, technology, and medicine (Fedaghi et al, 2009). Although the Shannon-Weaver communication model cannot explain the complex cognitive processes that occur in human communication (Fedaghi et al, 2009), this model is commonly used in communication concept modeling between practitioners and patients because of its simplicity and its scientific foundation (Bowman & Targowski, 1987;Dysart-Gale, 2009). The elements in this model include the information source, encoder, noise, decoder, and receiver (Fedaghi et al, 2009;Kuznar & Yager, 2020).…”
Section: Resultsmentioning
confidence: 99%
“…This model and its variations are the most commonly adopted models in various fields of science, technology, and medicine (Fedaghi et al, 2009). Although the Shannon-Weaver communication model cannot explain the complex cognitive processes that occur in human communication (Fedaghi et al, 2009), this model is commonly used in communication concept modeling between practitioners and patients because of its simplicity and its scientific foundation (Bowman & Targowski, 1987;Dysart-Gale, 2009). The elements in this model include the information source, encoder, noise, decoder, and receiver (Fedaghi et al, 2009;Kuznar & Yager, 2020).…”
Section: Resultsmentioning
confidence: 99%
“…TM also includes triggering (denoted by a dashed arrow), or the initiation of a new flow (e.g., electricity triggers a flow of air). TM modeling is used in many applications (e.g., see Al-Fedaghi [22][23][24][25]).…”
Section: Thinging Machinesmentioning
confidence: 99%
“…Upon arrival at the pickup location, the transfer request is processed again (16) to extract the docking device's identifier (17) and send it to the local location (18). At the same time, the docking device's local-location identifier (19) flows (20) to the UAV, which compares the two identifiers (21,22). If the identifiers' UAV (23) and local location (24) match, confirmations are exchanged (25).…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Currently, no formal proof exists that the five TM stages are sufficient to describe all behavior processes. The TM model has been applied to many real systems, such as in phone communication [29], physical security [17], vehicle tracking [19], intelligent monitoring [32], asset management [20], information leakage [22], engineering plants [23], inventory management processes [24], procurement processes [26], public key infrastructure network architecture [26], bank check processing [35], waste water treatment [39], computer attacks [26], provenance [42], services in banking industry architecture network [31], and digital circuits [37]. Additionally, we will expend extensive effort to partially substantiate the claim of the genericity of the TM stages in different fields.…”
Section: Tm Substantiationmentioning
confidence: 99%