Ni Putu Dessy Parmitha Sari, I Nyoman Weda Kusuma, I Wayan Suardiana
Women human rights defenders (WHRDs) often find themselves in vulnerable situations, particularly due to their physicality, sexuality, and gender identity. In patriarchal settings like Bali, where gender inequality remains deeply rooted in cultural norms, such vulnerabilities are further exacerbated. These dynamics significantly affect the broader practice of human rights advocacy and illustrate the inherent risks involved—especially for women defenders working on cases of gender-based violence (GBV).This article explores how resistance emerges among WHRDs in the city of Denpasar, Bali, particularly in the context of advocating for GBV survivors. This resistance is often shaped by the repeated exposure to physical, mental, and sexual vulnerability during the advocacy process. The study also examines how intersecting discourses and patriarchal structures contribute to the formation of this resistance, as well as the resilience that follows. Using qualitative methods, including in-depth interviews and participant observation, this research identifies key forms of resistance practiced by WHRDs handling GBV cases. It finds that such resistance often leads to resilient actions that may positively influence the direction of GBV case handling in the region. Keywords: human right defenders, advocacy, women, fragility, Bali
This paper examines how wireless communication affects the performance of various blockchain consensus mechanisms, focusing on their scalability and decentralization. It introduces an analytical framework for quantifying these effects, backed by extensive simulations, underscoring its broad applicability to various consensus mechanisms despite wireless communication's unreliability.
This paper focuses on video streaming over telecommunication networks, taking the important evolution towards network softwarizaton into account. The importance and the opportunities provided by volumetric media delivery will be outlined by means of examples. The most appropriate management platform design for volumetric media delivery and the various challenges and possible approaches will be highlighted next. Finally an overview of research challenges and opportunities will be presented to generate further collaborative research in this area of research.
We present a step by step definition of Profinet and Profibus. We introduced different types of each of the two communication protocols. Then, the topology and performance of each one has been described individually. Finally, the properties of them have been compared to show that which one has a better performance in the industry.
In this short paper, we propose MiabNET, a reactive protocol for Mobile Ad-hoc Networks (MANET). This protocol leverages the concept of "message-in-a-bottle" to spread the routing information though the entire network. The idea of the protocol is briefly described as below: if a node would like to find a route to a destination node not in the routing table, it will initialize a bottle and send this bottle to \textbf{a random one} of its neighbors. If this neighbor does not have the route to the destination, it will send the bottle to one of its random neighbors as well, until the bottle reaches the destination node.
Amir Mirzaeinnia, Mehdi Mirzaeinia, Abdelmounaam Rezgui
Modern applications are highly sensitive to communication delays and throughput. This paper surveys major attempts on reducing latency and increasing the throughput. These methods are surveyed on different networks and surroundings such as wired networks, wireless networks, application layer transport control, Remote Direct Memory Access, and machine learning based transport control.
This paper presents an analytical model of power consumption for In-Band Full-Duplex (IBFD) Wireless Local-Area Networks (WLANs). Energy-efficiency is compared for both Half-Duplex (HD) and IBFD networks. The presented analytical model closely matches the results generated by simulation. For a given traffic scenario, IBFD systems exhibit higher power consumption, however at improved energy efficiency when compared to equivalent HD WLANs.
This paper shows a vulnerability of the pay-per-click accounting of Google Ads and proposes a statistical tradeoff-based approach to manage this vulnerability. The result of this paper is a model to calculate the overhead cost per click necessary to protect the subscribers and a simple algorithm to implement this protection. Simulations validate the correctness of the model and the economical applicability.
Проведен геометрический и топологический анализ металлооксида с минимальным известным содержанием кислорода CsO, образующегося из кислородсодержащего расплава металлического Cs. Для определения кластеров-прекурсоров кристаллических структур использованы специальные алгоритмы разложения структурных графов на кластерные субструктуры (пакет программ ToposPro). Определены участвующие в самосборке кристаллических структур кластеры-прекурсоры: трехоктаэдрические кластеры CsO, октаэдрические кластеры Cs, тетраэдрические кластеры Cs. Реконструированы симметрийный и топологический коды процессов самосборки кристаллических структур из кластеров-прекурсоров в виде: первичная цепь микрослой микрокаркас.
Backscatter communication, relying on the reflection principle, constitutes a promising-enabling technology for lowcost, large-scale, ubiquitous sensor networking. This work makes an overview of the state-of-the-art coherent and noncoherent scatter radio receivers that account for the peculiar signal model consisting of several microwave and communication parameters.
We propose a cost-optimal antenna vs. spectrum resource allocation strategy for mobile 5G MD-MIMO over Next-Generation PONs. Comparing wavelength overlay and shared wavelength approaches, split-PHY leads to solutions with higher mobile capacity than fronthaul.
Seyed Hossein Ahmadpanah, Abdullah Jafari Chashmi, Vahid Jahan
WAP protocol is a set of communication protocols application environment and wireless devices. WAP model more than a WAP gateway. Suitable for wireless communication environment.
Successive interference cancellation (SIC) is a physical layer technique that enables the decoders to decode multiple simultaneously transmitted signals. The complicated model of SIC requires careful design of the MAC protocol and accurate adjustment of transmission parameters. We propose a new MAC protocol, known as CSMA-SIC, that employs the multi-packet reception capability of SIC. The proposed protocol adjusts the transmission probabilities to achieve throughput optimality.
This article explains how sheaves and homology theory can be applied to simplicial complex models of wireless communication networks to study their vulnerability to jamming. It develops two classes of invariants (one local and one global) for studying which nodes and links present more of a liability to the network's performance when under attack.
Damage scenarios for large networks are considered. The cascade scenario is described by means of powers of adjacency matrix. More difficult probabilistic variants of the large network damage are modeling by Markov chains. For reliability augmentation of networks we add a set of random intermediate agents with big dimensionality. It provides high reliability of all system even with low reliability of single components. Probabilistic estimation of reliability for reinforced network is made.
Physical layer features of Ethernet from the first realization towards the 100 Gb Ethernet (100 GbE) development have been considered. Comparisons of these features are made according to the standardized data rates. Feasible physical layer options are then discussed for high data rates.
This paper argues for the adoption of a information centric system model instead of the current service-oriented one. We present an architecture for a global information storage and dissemination network which provides for efficient interaction and coordination among autonomous actors through a shared information space. We believe that the resulting, loosely coupled systems, while probabilistic in nature, will lead to robust outcomes at large scales.
In this paper a scheme for handoff and connectivity, based on wireless sensor nodetechniques is proposed. Scenes are created in Qualnet and simulated for a simple case. Results are discussed.