Hasil untuk "cs.NI"

Menampilkan 20 dari ~503478 hasil · dari arXiv, DOAJ, CrossRef

JSON API
CrossRef Open Access 2025
FACING FRAGILITY: THE RESISTANCE OF WOMEN HUMAN RIGHTS DEFENDERS IN GENDER-BASED VIOLENCE ADVOCACY IN BALI

Ni Putu Dessy Parmitha Sari, I Nyoman Weda Kusuma, I Wayan Suardiana

Women human rights defenders (WHRDs) often find themselves in vulnerable situations, particularly due to their physicality, sexuality, and gender identity. In patriarchal settings like Bali, where gender inequality remains deeply rooted in cultural norms, such vulnerabilities are further exacerbated. These dynamics significantly affect the broader practice of human rights advocacy and illustrate the inherent risks involved—especially for women defenders working on cases of gender-based violence (GBV).This article explores how resistance emerges among WHRDs in the city of Denpasar, Bali, particularly in the context of advocating for GBV survivors. This resistance is often shaped by the repeated exposure to physical, mental, and sexual vulnerability during the advocacy process. The study also examines how intersecting discourses and patriarchal structures contribute to the formation of this resistance, as well as the resilience that follows. Using qualitative methods, including in-depth interviews and participant observation, this research identifies key forms of resistance practiced by WHRDs handling GBV cases. It finds that such resistance often leads to resilient actions that may positively influence the direction of GBV case handling in the region. Keywords: human right defenders, advocacy, women, fragility, Bali

arXiv Open Access 2024
Is Wireless Bad for Consensus in Blockchain?

Seungmo Kim

This paper examines how wireless communication affects the performance of various blockchain consensus mechanisms, focusing on their scalability and decentralization. It introduces an analytical framework for quantifying these effects, backed by extensive simulations, underscoring its broad applicability to various consensus mechanisms despite wireless communication's unreliability.

en cs.NI, eess.SP
arXiv Open Access 2022
Towards Achieving Immersive Holographic-Type Communication

Filip De Turck

This paper focuses on video streaming over telecommunication networks, taking the important evolution towards network softwarizaton into account. The importance and the opportunities provided by volumetric media delivery will be outlined by means of examples. The most appropriate management platform design for volumetric media delivery and the various challenges and possible approaches will be highlighted next. Finally an overview of research challenges and opportunities will be presented to generate further collaborative research in this area of research.

en cs.NI
arXiv Open Access 2020
Profinet vs Profibus

Pouya Aminaie, Poorya Aminaie

We present a step by step definition of Profinet and Profibus. We introduced different types of each of the two communication protocols. Then, the topology and performance of each one has been described individually. Finally, the properties of them have been compared to show that which one has a better performance in the industry.

en cs.NI
arXiv Open Access 2020
MiabNET: Message-in-a-bottle Protocol for MANET

Dongning Ma

In this short paper, we propose MiabNET, a reactive protocol for Mobile Ad-hoc Networks (MANET). This protocol leverages the concept of "message-in-a-bottle" to spread the routing information though the entire network. The idea of the protocol is briefly described as below: if a node would like to find a route to a destination node not in the routing table, it will initialize a bottle and send this bottle to \textbf{a random one} of its neighbors. If this neighbor does not have the route to the destination, it will send the bottle to one of its random neighbors as well, until the bottle reaches the destination node.

en cs.NI
arXiv Open Access 2020
Latency and Throughput Optimization in Modern Networks: A Comprehensive Survey

Amir Mirzaeinnia, Mehdi Mirzaeinia, Abdelmounaam Rezgui

Modern applications are highly sensitive to communication delays and throughput. This paper surveys major attempts on reducing latency and increasing the throughput. These methods are surveyed on different networks and surroundings such as wired networks, wireless networks, application layer transport control, Remote Direct Memory Access, and machine learning based transport control.

en cs.NI, cs.LG
arXiv Open Access 2019
Power Consumption and Energy-Efficiency for In-Band Full-Duplex Wireless Systems

Murad Murad, Ahmed M. Eltawil

This paper presents an analytical model of power consumption for In-Band Full-Duplex (IBFD) Wireless Local-Area Networks (WLANs). Energy-efficiency is compared for both Half-Duplex (HD) and IBFD networks. The presented analytical model closely matches the results generated by simulation. For a given traffic scenario, IBFD systems exhibit higher power consumption, however at improved energy efficiency when compared to equivalent HD WLANs.

arXiv Open Access 2018
Click Spam Prevention Model for On-Line Advertisement

Nicola Zingirian, Michele Benini

This paper shows a vulnerability of the pay-per-click accounting of Google Ads and proposes a statistical tradeoff-based approach to manage this vulnerability. The result of this paper is a model to calculate the overhead cost per click necessary to protect the subscribers and a simple algorithm to implement this protection. Simulations validate the correctness of the model and the economical applicability.

en cs.NI
CrossRef Open Access 2018
КЛАСТЕРНАЯ САМООРГАНИЗАЦИЯ ИНТЕРМЕТАЛЛИЧЕСКИХ СИСТЕМ: МЕТАЛЛОКЛАСТЕРЫ Cs И Cs И МЕТАЛЛООКСИДНЫЙ КЛАСТЕР CsO ДЛЯ САМОСБОРКИ КРИСТАЛЛИЧЕСКОЙ СТРУКТУРЫ (Cs)(Cs)(CsO), "Физика и химия стекла"

В. Я. Шевченко, В.А. Блатов, Г.Д. Илюшин

Проведен геометрический и топологический анализ металлооксида с минимальным известным содержанием кислорода CsO, образующегося из кислородсодержащего расплава металлического Cs. Для определения кластеров-прекурсоров кристаллических структур использованы специальные алгоритмы разложения структурных графов на кластерные субструктуры (пакет программ ToposPro). Определены участвующие в самосборке кристаллических структур кластеры-прекурсоры: трехоктаэдрические кластеры CsO, октаэдрические кластеры Cs, тетраэдрические кластеры Cs. Реконструированы симметрийный и топологический коды процессов самосборки кристаллических структур из кластеров-прекурсоров в виде: первичная цепь микрослой микрокаркас.

arXiv Open Access 2017
Scatter Radio Receivers for Extended Range Environmental Sensing WSNs

Panos N. Alevizos, Aggelos Bletsas

Backscatter communication, relying on the reflection principle, constitutes a promising-enabling technology for lowcost, large-scale, ubiquitous sensor networking. This work makes an overview of the state-of-the-art coherent and noncoherent scatter radio receivers that account for the peculiar signal model consisting of several microwave and communication parameters.

en cs.NI
arXiv Open Access 2016
Wireless Application Protocol Architecture Overview

Seyed Hossein Ahmadpanah, Abdullah Jafari Chashmi, Vahid Jahan

WAP protocol is a set of communication protocols application environment and wireless devices. WAP model more than a WAP gateway. Suitable for wireless communication environment.

en cs.NI
arXiv Open Access 2015
CSMA-SIC: Carrier Sensing with Successive Interference Cancellation

Mohsen Mollanoori

Successive interference cancellation (SIC) is a physical layer technique that enables the decoders to decode multiple simultaneously transmitted signals. The complicated model of SIC requires careful design of the MAC protocol and accurate adjustment of transmission parameters. We propose a new MAC protocol, known as CSMA-SIC, that employs the multi-packet reception capability of SIC. The proposed protocol adjusts the transmission probabilities to achieve throughput optimality.

en cs.NI, cs.IT
arXiv Open Access 2013
Analyzing wireless communication network vulnerability with homological invariants

Michael Robinson

This article explains how sheaves and homology theory can be applied to simplicial complex models of wireless communication networks to study their vulnerability to jamming. It develops two classes of invariants (one local and one global) for studying which nodes and links present more of a liability to the network's performance when under attack.

en cs.NI, math.AT
arXiv Open Access 2013
Scenarios of Destruction for Large Network and Increasing Reliability

P. A. Golovinski

Damage scenarios for large networks are considered. The cascade scenario is described by means of powers of adjacency matrix. More difficult probabilistic variants of the large network damage are modeling by Markov chains. For reliability augmentation of networks we add a set of random intermediate agents with big dimensionality. It provides high reliability of all system even with low reliability of single components. Probabilistic estimation of reliability for reinforced network is made.

en cs.NI
arXiv Open Access 2011
A Case for a Global Information Network

Maximilian Ott, Yan Shvartzshnaider

This paper argues for the adoption of a information centric system model instead of the current service-oriented one. We present an architecture for a global information storage and dissemination network which provides for efficient interaction and coordination among autonomous actors through a shared information space. We believe that the resulting, loosely coupled systems, while probabilistic in nature, will lead to robust outcomes at large scales.

en cs.NI

Halaman 8 dari 25174