• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • International Journal Advanced Network Monitoring Controls
  • Borderlands



Westphalian sovereignty as a zombie category in Australia

Introduction Modern accounts of sovereignty are customarily connected to the 1648 Peace of Westphalia, which it is often argued helped to establish the ideal of political authority being tied to static geographical containers governed by sovereign rulers. Academic scholarship has however demonstrated that a static ‘Westphalian’ conception of sovereignty fails to account for the performative and fluid modes by which state-based political power is exercised and resisted (e.g. Agnew 2018; Conversi

Louis Everuss

Borderlands , ISSUE 1, 115–146


IPV9 is the Foundation of the Future Digital World

. One is the issue of cyber sovereignty, it’s necessary to find out whose web we’re on. Obviously, it’s the American Internet. That is why President Xi has said he wants to uphold cyber sovereignty. But how we assert our sovereignty over the Internet is still a challenge. The second problem is that Premier Li Keqiang said that he hoped the operators would speed up, reduce the cost, and reduce the bandwidth cost for the majority of small and medium-sized enterprises to access the Internet, but how to

Peide Lou, Fei Xu

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 1–6


Transversal borderings: Territory and mobility for human rights activists in the Thai-Burma borderlands

where human rights activists operated by partially using sovereignty, or its lack of, as a protective barrier from the Burmese state, and as a means to conduct unregulated activities. While I will largely argue for cross-border geographies that partially obscure nation-state borders, this should not discount the relevance of national territorial sovereignty and the tangibility of the border. Many human rights activists from Burma have deliberately placed themselves outside the control of the nation

Rachel Sharples

Borderlands , ISSUE 2, 37–63


Research and Design of Next Generation Internet (IPV9) Datagram

, big data and cloud storage, IPv6 has some shortcomings in its address structure design, security and network sovereignty. The Chinese researchers developed a new generation Internet (IPV9) datagram by researching the existed IPv4 and IPv6, and it is based on the method of assigning addresses to computers connected to the Internet by full decimal character code. It is a subsequent version with RFC1606, RFC1607, a new generation of network data structure, it is not the updating of IPv4 and IPv6, it

Zhongsheng Wang, Jianping Xie, Zhao Lin, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls , ISSUE 1, 10–28

No Record Found..
Page Actions