14 research outputs found

    Veiled Politics: Muslim Women's Visibility and Their Use in European Countries' Political Life

    Get PDF
    One of the many disastrous consequences of the tragic events of 9/11 is the war waged by the neocolonialists in order to "liberate" Muslim women. This gender-based war stands on a series of pillars, such as the presumption that Western civilization offers women a great deal of privileges, while Muslim culture gives none. Therefore, it would be logical to suppose that, because of the many opportunities the West grants to Muslim women who reside there, the latter may have an active role in the local political process. However, Muslim women have scarce visibility in European political life, and their presence is sometimes merely instrumental to some party: in most cases, women are coopted because they are a good sample of "secular Muslims" ( i.e. , they do not wear the hijab , i.e. , the veil and a modest attire); in others, they are appointed because they are veiled and can therefore become a good vehicle in order to win the support both of the Muslim community and of its sympathizers. In this paper, I will analyze some crucial aspects of Muslim women's formal political participation in some European countries; in addition, I will focus on the Italian case with the help of a series of interviews with Muslim women who play an active role in local political councils. The study shows how in European politics, Muslim women can become a commodity even when they stand out as rising political individuals; but also how they fight to gain visibility and public recognition, in spite of the tense situation and of the rampant Islamophobia

    Protocol Wireless Medical Sensor Networks in IoT for the Efficiency of Healthcare

    No full text
    International audienceIn this article, a new medical communication scheme, protocol wireless medical sensor networks for the efficiency of healthcare (PWMSN4EoCH), shorten by (PEH), which uses hasty strategy and random network coding (RNC), is proposed. The new concept improves the performance of the healthcare network. It quickly analyzes the medical network description, focusing on some basic parameters for narrowband Internet of Things (NB-IoT) systems in wireless mesh networks (WMNs). This PEH effectively meets the requirements prescribed for wireless telemedicine applications in which medical sensors (MSs) share the downlink and uplink resources to its neighborhood, including wireless health hubs (WHHs) and wireless base stations (WBSs) for controlling the health of the human body. The PEH scheme substantially accelerates the implementation devices of telemedicine for patient satisfaction. In contrast, the state-ofthe-art technique (SoAT) scheme, which is currently used, misses the entirety of the proposed principle. The proposed scheme is compared with the SoAT in terms of message size (bytes), roundtrip time (RTT) (ms), overall network capacity (ONC) (bytes/s, and delivery delay (DD) in ms. Our investigation has proved that the RTT, ONC, and DD of the proposed PEH are much better than the SoAT schemes, achieving 64%, 66%, and 71%, respectively. The simulation studies clearly indicate that the PEH introduces more than 64% performance enhancement over the SoAT scheme

    An Accelerated End-to-End Probing Protocol for Narrowband IoT Medical Devices

    No full text
    International audienceIn this study, a narrowband internet of things (NB-IoT) medical device (MD) was presented. We consider a wireless communication system where the multi-hop sources shared the downlink and uplink resources to probe and control hospital patients' MDs.A multicast data packet was distributed over the multi-hop MD networks, and a random linear network coding approach was applied in the source instead of the intermediate nodes. We evaluated the MD probe cycle between a master station and remote terminal units, which were connected with several critical devices in a medical room. Furthermore, an accelerated end-to-end (E2E) probing protocol was established in the wireless mesh network to minimize the probing cycle of the health devices. In particular, a faster protocol was developed to address the probe and control subproblem.The proposed approach could assist in realizing the accelerated E2E probing for NB-IoT MDs, reducing the number of retransmissions, recovering lost packets, and providing a prompt overview of the medical network performance,based on several basic parameters such as modulation types, Quadrature amplitude modulation (QAM) and Frequency-shift keying (FSK), acknowledgment (ACK), average message sizes AMS, subcarrier spacing (SCS). Furthermore, in a comparative study of the contemporary probing cycle techniques, the proposed protocol notably outperformed several widely used protocols,with the reduction of the number of transmissions as well as the improvement of round trip time (RTT), and E2E probing cycle exceeding 89%,71%, and 60%, respectively. INDEX TERMS Accelerated end-to-end probing protocol, Narrowband internet of things, Wireless medical devices, Network coding, Wireless mesh networks

    Veiled Politics: Muslim Women’s Visibility and Their Use in European Countries’ Political Life

    No full text
    One of the many disastrous consequences of the tragic events of 9/11 is the war waged by the neocolonialists in order to "liberate" Muslim women. This gender-based war stands on a series of pillars, such as the presumption that Western civilization offers women a great deal of privileges, while Muslim culture gives none. Therefore, it would be logical to suppose that, because of the many opportunities the West grants to Muslim women who reside there, the latter may have an active role in the local political process. However, Muslim women have scarce visibility in European political life, and their presence is sometimes merely instrumental to some party: in most cases, women are coopted because they are a good sample of "secular Muslims" ( i.e. , they do not wear the hijab , i.e. , the veil and a modest attire); in others, they are appointed because they are veiled and can therefore become a good vehicle in order to win the support both of the Muslim community and of its sympathizers. In this paper, I will analyze some crucial aspects of Muslim women's formal political participation in some European countries; in addition, I will focus on the Italian case with the help of a series of interviews with Muslim women who play an active role in local political councils. The study shows how in European politics, Muslim women can become a commodity even when they stand out as rising political individuals; but also how they fight to gain visibility and public recognition, in spite of the tense situation and of the rampant Islamophobia

    The Total Network Capacity of Wireless Mesh Networks for IoT Applications

    No full text
    Computing and measuring the total capacity of a data network are a remarkably difficult problem. These metrics are directly linked to the available bandwidth to each wireless internet of things (IoT) device of the network.  In this paper, the authors study the performance metrics associated with capacity traffic in multi-hop wireless mesh networks (WMNs). It is dedicated to Internet access assuming a time division multiple access (TDMA). They focus simultaneously on three key operating metrics, the total network capacity (TNC), total application network capacity (TANC), and the Average message time (AMS). They also analyze how parameters such as forward error correction (FEC) and acknowledgments (ACK) affect the overall network capacity under different operating conditions. Theoretical network capacity for WMNs, in this paper, is explored to draw attention to the number of open research issue

    A Perfect Challenge to Select the Ideal Virus Vaccine Using a New Potent Hierarchical Algorithm in a Smart Laboratory

    No full text
    Improving the bit error rate (BER) in dense wireless medical sensor networks (WMSNs) using small areas is challenging. Ensuring the relay of big data in healthcare, such as human virus vaccine signs, is always a huge challenge. This paper proposes a new potent hierarchical algorithm (PHA) for controlling several vaccine types in real-time using a uniquely challenging laboratory before being recommended and authorized. This healthcare research paper offers a new medical application in the virus testing communication of several separate and independent patient groups (subnets), exploiting a smart laboratory. The health data aggregator (HDA) nodes of the patients are wirelessly connected to a relay network (RN) via the central node (CN). We develop an efficient communication scheme, improving BER values versus signal-to-noise ratio (SNR), proposing a PHA that requires three main creation stages. The first stage is responsible for collecting big medical data. In the second and third stages, we use coding approaches based on network coding (NC) and low-density parity-check code (LDPC). The proposed PHA reduces BER in deep fading environment receivers for different creating parameters. This paper introduces an innovative approach to tracking the evolution of virus vaccines by integrating IoMT, Big Data, and Artificial Intelligence (AI). This integration enables identifying and selecting the optimal and most effective vaccine

    Spectral coded phase bipolar OCDMA technological implementation thanks to low index modulation filters

    No full text
    International audienceOptical code division multiple access (OCDMA) systems are attracting an increasing interest in optical fiber communication. This is due to the various advantages that they provide; in particular for the simultaneous improvement capacity and flexible channel allocation as well as fastest data speeds and increased security. In this paper, the authors present an experimental demonstration of bipolar optical CDMA System with phase shift using E-beam technique on Hx Li1−x NbO3 transmission channel realized by proton exchange. The idea of the proposed system is to evaluate the result of eight cascaded Bragg filters in very narrow band. The coded sequence corresponds to that of Hadamard H8(7), represented by the bits ’1 1 −1 −1 −1 −1 1 1’, and phase shift have been identified on the coder spectral response whilst increasing the multiplexing capacity in terms of the total number of users and the data
    corecore