Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Scheduled Caste (SC) women, one of the most oppressed and neglected groups in India, have the highest prevalence of intimate partner violence (IPV), yet no study has analyzed correlates of IPV within this group, or analyzed them using... more
    • by 
    •   6  
      Violence Against WomenIndiaPhysical Domestic Violence Against WomenIPV
    • by 
    •   14  
      Computer ScienceRFIDWireless Sensor NetworksInternet of Things
    • by 
    • IPV
    • by 
    •   13  
      ServicesResource AllocationNext Generation Internet ResearchNetwork Address Translation
"Gender Violence & the Visual. An explorative study on the representation of intimate partner violence. Birgit Wolf (2010) ABSTRACT: Concerning violence against women, today we can account on its acknowledgment as societal... more
    • by 
    •   7  
      RepresentationVisual ResearchVictimisationGender Violence
Applying of security mechanisms to middle and high layers of OSI/ISO network model
    • by 
    •   20  
      DoS AttackAuthenticationDNSProtocol
    • by 
    •   8  
      RFIDInternet of ThingsSensorsActuators
    • by 
    •   2  
      Network ProtocolsIPV
... in number of tests per second We conducted three basic performance comparison tests over ... 4.3 TCP Connection Time Table 1 shows that various connection times in each experiment ... We also intend to investigate the performance of... more
    • by 
    •   7  
      Computer ScienceWireless CommunicationsComputer NetworksPerformance Evaluation
Abstract—With the expansion of Internet, the current protocol address space (IPv4) is faced with a shortage and the new generation Internet (IPv6) is raised in order to solve this problem. Also with increasing interest of users in... more
    • by 
    •   5  
      BeDiffServMPLSQuality of Service (QoS)
    • by 
    •   5  
      Network PerformanceJitterIPVInternet
    • by 
    •   10  
      Mobile SystemsMobility ManagementComputer NetworkReal Time
    • by 
    •   18  
      Distributed ComputingRoutingMobile IPQuality of Service
    • by 
    • IPV
    • by 
    •   10  
      RoutingNetworkElectronic PackagingImplementation
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security... more
    • by 
    •   4  
      Machine LearningAnomaly DetectionIPVDDOS Attack
    • by  and +1
    • IPV
    • by 
    •   4  
      AuthenticationConfidentialityIPSecIPV
    • by 
    •   3  
      TechnologyComputer NetworksIPV
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies... more
    • by 
    •   20  
      Information SystemsComputer SciencePrivacyNetwork Security
    • by 
    •   14  
      Wireless Sensor NetworksMashupsWireless networksMicrocontrollers
This thesis is the result of the bachelor’s thesis project “Evaluating an IPv4 and IPv6 network”.The IPv6 protocol was created with the main purpose of solving the problem of the depletion of IPadd ...
    • by 
    •   2  
      Computer ScienceIPV
    • by 
    •   2  
      IPVNetwork Simulator
    • by 
    •   2  
      Quality of ServiceIPV
    • by 
    •   16  
      Computer ScienceSocial NetworksDistributed SystemProbability Distribution & Applications
    • by 
    •   3  
      Network SecurityIPVQuality Service
    • by 
    •   2  
      Network ProtocolsIPV
    • by 
    •   15  
      NetworksMarsProgram DevelopmentNetwork Design
    • by 
    •   2  
      IPVInternet
    • by  and +1
    •   14  
      Distributed ComputingConvergencePower Line CommunicationSmart Grid
    • by 
    •   8  
      Information PolicyDNSMeasurementDomain Name System
    • by 
    • IPV
L’emergenza epidemiologica causata da covid-19 e le conseguenti misure intraprese dal governo italiano per contrastare il virus hanno avuto un impatto non indifferente sui centri antiviolenza e le case rifugio. Le operatrici si sono... more
    • by 
    •   3  
      IPVGBVCOVID-19 PANDEMIC
    • by 
    •   5  
      Process ControlMultithreadingKernelIPV
    • by 
    •   14  
      Communication systemsWireless Sensor NetworksCryptographyAuthentication
    • by 
    •   8  
      EngineeringNetwork SecurityIPSecIPV
    • by 
    •   8  
      EngineeringNetwork SecurityIPSecIPV
    • by 
    •   15  
      Computer ScienceComputer NetworksInternet Routing ProtocolWireless networks
    • by 
    •   8  
      Computer ScienceRoutingTunnellingIPSec
    • by 
    •   14  
      Computer NetworksInternet Routing ProtocolWireless networksRouting protocols
    • by 
    •   14  
      Distributed ComputingConvergencePower Line CommunicationSmart Grid
Abstract.  The Internet presents a unique environment in which to study adoption. This is because of its composition of autonomous entities that are otherwise strongly interrelated. Our model of Internet standards adoption (ISA) combines... more
    • by 
    •   5  
      Information SystemsAdoptionBusiness and ManagementIPV
    • by 
    •   27  
      EngineeringTechnologyService QualityWireless Systems
    • by 
    •   12  
      EngineeringUbiquitous ComputingConvergenceStandardization
    • by 
    •   7  
      Computer ScienceDistributed ComputingPrivacyComputer Software
Advanced Telecommunications runs during the second semester of Junior Sophister academic year. In each week, there are three lectures. Attendance at all lectures is compulsory. There are also two projects that need to be completed during... more
    • by 
    •   4  
      MPLSIPVGigabit EthernetToken Ring
The Network performance optimization, configuration depends on proper design of complete network. The network layer is concerned with getting packets from source all the way to destination. The packets may cross many networks to reach the... more
    • by 
    •   6  
      Computer ScienceSVM classifierComputer ApplicationsIntrusion Detection System
    • by 
    • IPV
    • by 
    • IPV