Search results for: military veterans
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 599

Search results for: military veterans

329 Reinforcement Learning for Classification of Low-Resolution Satellite Images

Authors: Khadija Bouzaachane, El Mahdi El Guarmah

Abstract:

The classification of low-resolution satellite images has been a worthwhile and fertile field that attracts plenty of researchers due to its importance in monitoring geographical areas. It could be used for several purposes such as disaster management, military surveillance, agricultural monitoring. The main objective of this work is to classify efficiently and accurately low-resolution satellite images by using novel technics of deep learning and reinforcement learning. The images include roads, residential areas, industrial areas, rivers, sea lakes, and vegetation. To achieve that goal, we carried out experiments on the sentinel-2 images considering both high accuracy and efficiency classification. Our proposed model achieved a 91% accuracy on the testing dataset besides a good classification for land cover. Focus on the parameter precision; we have obtained 93% for the river, 92% for residential, 97% for residential, 96% for the forest, 87% for annual crop, 84% for herbaceous vegetation, 85% for pasture, 78% highway and 100% for Sea Lake.

Keywords: classification, deep learning, reinforcement learning, satellite imagery

Procedia PDF Downloads 214
328 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 505
327 Minimization of Propagation Delay in Multi Unmanned Aerial Vehicle Network

Authors: Purva Joshi, Rohit Thanki, Omar Hanif

Abstract:

Unmanned aerial vehicles (UAVs) are becoming increasingly important in various industrial applications and sectors. Nowadays, a multi UAV network is used for specific types of communication (e.g., military) and monitoring purposes. Therefore, it is critical to reducing propagation delay during communication between UAVs, which is essential in a multi UAV network. This paper presents how the propagation delay between the base station (BS) and the UAVs is reduced using a searching algorithm. Furthermore, the iterative-based K-nearest neighbor (k-NN) algorithm and Travelling Salesmen Problem (TSP) algorthm were utilized to optimize the distance between BS and individual UAV to overcome the problem of propagation delay in multi UAV networks. The simulation results show that this proposed method reduced complexity, improved reliability, and reduced propagation delay in multi UAV networks.

Keywords: multi UAV network, optimal distance, propagation delay, K - nearest neighbor, traveling salesmen problem

Procedia PDF Downloads 205
326 Bedouin Dispersion in Israel: Between Sustainable Development and Social Non-Recognition

Authors: Tamir Michal

Abstract:

The subject of Bedouin dispersion has accompanied the State of Israel from the day of its establishment. From a legal point of view, this subject has offered a launchpad for creative judicial decisions. Thus, for example, the first court decision in Israel to recognize affirmative action (Avitan), dealt with a petition submitted by a Jew appealing the refusal of the State to recognize the Petitioner’s entitlement to the long-term lease of a plot designated for Bedouins. The Supreme Court dismissed the petition, holding that there existed a public interest in assisting Bedouin to establish permanent urban settlements, an interest which justifies giving them preference by selling them plots at subsidized prices. In another case (The Forum for Coexistence in the Negev) the Supreme Court extended equitable relief for the purpose of constructing a bridge, even though the construction infringed the Law, in order to allow the children of dispersed Bedouin to reach school. Against this background, the recent verdict, delivered during the Protective Edge military campaign, which dismissed a petition aimed at forcing the State to spread out Protective Structures in Bedouin villages in the Negev against the risk of being hit from missiles launched from Gaza (Abu Afash) is disappointing. Even if, in arguendo, no selective discrimination was involved in the State’s decision not to provide such protection, the decision, and its affirmation by the Court, is problematic when examined through the prism of the Theory of Recognition. The article analyses the issue by tools of theory of Recognition, according to which people develop their identities through mutual relations of recognition in different fields. In the social context, the path to recognition is cognitive respect, which is provided by means of legal rights. By seeing other participants in Society as bearers of rights and obligations, the individual develops an understanding of his legal condition as reflected in the attitude to others. Consequently, even if the Court’s decision may be justified on strict legal grounds, the fact that Jewish settlements were protected during the military operation, whereas Bedouin villages were not, is a setback in the struggle to make the Bedouin citizens with equal rights in Israeli society. As the Court held, ‘Beyond their protective function, the Migunit [Protective Structures] may make a moral and psychological contribution that should not be undervalued’. This contribution is one that the Bedouin did not receive in the Abu Afash verdict. The basic thesis is that the Court’s verdict analyzed above clearly demonstrates that the reliance on classical liberal instruments (e.g., equality) cannot secure full appreciation of all aspects of Bedouin life, and hence it can in fact prejudice them. Therefore, elements of the recognition theory should be added, in order to find the channel for cognitive dignity, thereby advancing the Bedouins’ ability to perceive themselves as equal human beings in the Israeli society.

Keywords: bedouin dispersion, cognitive respect, recognition theory, sustainable development

Procedia PDF Downloads 353
325 Geovisualisation for Defense Based on a Deep Learning Monocular Depth Reconstruction Approach

Authors: Daniel R. dos Santos, Mateus S. Maldonado, Estevão J. R. Batista

Abstract:

The military commanders increasingly dependent on spatial awareness, as knowing where enemy are, understanding how war battle scenarios change over time, and visualizing these trends in ways that offer insights for decision-making. Thanks to advancements in geospatial technologies and artificial intelligence algorithms, the commanders are now able to modernize military operations on a universal scale. Thus, geovisualisation has become an essential asset in the defense sector. It has become indispensable for better decisionmaking in dynamic/temporal scenarios, operation planning and management for the war field, situational awareness, effective planning, monitoring, and others. For example, a 3D visualization of war field data contributes to intelligence analysis, evaluation of postmission outcomes, and creation of predictive models to enhance decision-making and strategic planning capabilities. However, old-school visualization methods are slow, expensive, and unscalable. Despite modern technologies in generating 3D point clouds, such as LIDAR and stereo sensors, monocular depth values based on deep learning can offer a faster and more detailed view of the environment, transforming single images into visual information for valuable insights. We propose a dedicated monocular depth reconstruction approach via deep learning techniques for 3D geovisualisation of satellite images. It introduces scalability in terrain reconstruction and data visualization. First, a dataset with more than 7,000 satellite images and associated digital elevation model (DEM) is created. It is based on high resolution optical and radar imageries collected from Planet and Copernicus, on which we fuse highresolution topographic data obtained using technologies such as LiDAR and the associated geographic coordinates. Second, we developed an imagery-DEM fusion strategy that combine feature maps from two encoder-decoder networks. One network is trained with radar and optical bands, while the other is trained with DEM features to compute dense 3D depth. Finally, we constructed a benchmark with sparse depth annotations to facilitate future research. To demonstrate the proposed method's versatility, we evaluated its performance on no annotated satellite images and implemented an enclosed environment useful for Geovisualisation applications. The algorithms were developed in Python 3.0, employing open-source computing libraries, i.e., Open3D, TensorFlow, and Pythorch3D. The proposed method provides fast and accurate decision-making with GIS for localization of troops, position of the enemy, terrain and climate conditions. This analysis enhances situational consciousness, enabling commanders to fine-tune the strategies and distribute the resources proficiently.

Keywords: depth, deep learning, geovisualisation, satellite images

Procedia PDF Downloads 13
324 Understanding Human Rights Violations in the Fight against Boko Haram: A Historical Perspective

Authors: Anthony Mpiani

Abstract:

Recent media and NGO reports suggest that human rights violations have been a salient characteristic of the government Joint Task Force (JTF) in the war on Boko Haram. However, there has been relatively scant scholarly engagement with the forms of abuses committed by the JTF against civilians and why such human rights violations occur. The focus of this paper is to analyse the various human rights violations committed by JTF in the war against Boko Haram. Employing a historical approach, it argues that the JTF's human rights violations is shaped by the philosophy of colonial policing in Nigeria. Consequently, the failure of successive post-colonial governments to ideologically transform policing is accountable for the human rights abuses being witnessed in Nigeria today. A philosophical transformation in Nigeria's security forces especially the police and military is a prerequisite for ending human rights abuses in the fight against Boko Haram.

Keywords: colonialism, policing, joint task force, counterinsurgency, Boko Haram, human rights violations

Procedia PDF Downloads 164
323 A Non-linear Damage Model For The Annulus Of the Intervertebral Disc Under Cyclic Loading, Including Recovery

Authors: Shruti Motiwale, Xianlin Zhou, Reuben H. Kraft

Abstract:

Military and sports personnel are often required to wear heavy helmets for extended periods of time. This leads to excessive cyclic loads on the neck and an increased chance of injury. Computational models offer one approach to understand and predict the time progression of disc degeneration under severe cyclic loading. In this paper, we have applied an analytic non-linear damage evolution model to estimate damage evolution in an intervertebral disc due to cyclic loads over decade-long time periods. We have also proposed a novel strategy for inclusion of recovery in the damage model. Our results show that damage only grows 20% in the initial 75% of the life, growing exponentially in the remaining 25% life. The analysis also shows that it is crucial to include recovery in a damage model.

Keywords: cervical spine, computational biomechanics, damage evolution, intervertebral disc, continuum damage mechanics

Procedia PDF Downloads 569
322 Implementation of 5S Lean Methodology in Reviewing Competencies in a Higher Education Institution

Authors: Jasim Saleh Said AlDairi

Abstract:

The potential of applying Lean Management in Higher Education Institutions has increased significantly in last few years, leading to tremendous savings. Reviewing and updating competencies’ curriculum matrix is one of the critical and complicated processes that consume time and effort, and this has triggered searching for a scientific and sustainable approach to manage the such review. This paper presents a novel approach of implementing Lean (5S) methodology in reviewing technical competencies required for the graduates of the Military Technological College (MTC) in the Sultanate of Oman. The 5S framework has been imbedded into an action plan using the PDCA cycle. As a result, the method applied has helped in sorting out the actual required competencies, the team has identified the required (new, amended, and deleted) competencies in all of the targeted Engineering Departments, in addition, the major wastes within the overall process were identified, and the future review process was standardized and documented.

Keywords: PDCA, 5S, lean, MTC, competencies, curriculum matrix, higher education

Procedia PDF Downloads 94
321 Analysis of Initial Entry-Level Technology Course Impacts on STEM Major Selection

Authors: Ethan Shafer, Timothy Graziano

Abstract:

This research seeks to answer whether first-year courses at institutions of higher learning can impact STEM major selection. Unlike many universities, an entry-level technology course (often referred to as CS0) is required for all United States Military Academy (USMA) students–regardless of major–in their first year of attendance. Students at the academy choose their major at the end of their first year of studies. Through student responses to a multi-semester survey, this paper identifies a number of factors that potentially influence STEM major selection. Student demographic data, pre-existing exposure and access to technology, perceptions of STEM subjects, and initial desire for a STEM major are captured before and after taking a CS0 course. An analysis of factors that contribute to student perception of STEM and major selection are presented. This work provides recommendations and suggestions for institutions currently providing or looking to provide CS0-like courses to their students.

Keywords: education, STEM, pedagogy, digital literacy

Procedia PDF Downloads 123
320 Late Roman-Byzantine Glass Bracelet Finds at Amorium and Comparison with Other Cultures

Authors: Atilla Tekin

Abstract:

Amorium was one of the biggest cities of Byzantine Empire, located under and around the modern village of Hisarköy, Emirdağ, Afyonkarahisar Province, Turkey. It was situated on the routes of trades and Byzantine military road from Constantinople to Cilicia. In addition, it was on the routes of trades and a center of bishopric. After Arab invasion, Amorium gradually lost importance. The research consists of 1372 pieces of glass bracelet finds from mostly at 1998- 2009 excavations. Most of them were found as glass bracelets fragments. The fragments are of various size, forms, colors, and decorations. During the research, they were measured and grouped according to their crossings, at first. After being photographed, they were sketched by Adobe Illustrator and decoupaged by Photoshop. All forms, colors, and decorations were specified and compared to each other. Thus, they have been tried to be dated and uncovered the place of manufacture. The importance of the research is presenting the perception of image and admiration and comparing with other cultures.

Keywords: Amorium, glass bracelets, image, Byzantine empire, jewelry

Procedia PDF Downloads 197
319 Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime

Authors: Vrince Vimal, Madhav J. Nigam

Abstract:

Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime.

Keywords: Wireless Sensor network (WSN), Random Deployment, Clustering, Isolated Nodes, Networks Lifetime

Procedia PDF Downloads 337
318 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile

Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho

Abstract:

An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.

Keywords: air to air missile, missile approach warning, lethal range, survivability

Procedia PDF Downloads 568
317 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 47
316 Dietary Factors Contributing to Osteoporosis among Postmenopausal Women in Riyadh Armed Forces Hospital

Authors: Rabab Makki

Abstract:

Bone mineral density and bone metabolism are affected by various factors such as genetic, endocrine, mechanical and nutritional. Our understanding of nutritional influences on bone health is limited because most studies have focused on calcium. This study investigated the dietary factors which are likely t contribute to Osteoporosis in Saudi post-menopausal women, and correlated it with BMD. This is a case controlled study involved 36 postmenopausal Saudi females selected from the Orthopedics and osteoporosis outpatient clinics, and 25 postmenopausal Saudi females as controls from the primary clinic of Military Hospital in Riyadh. The women were diagnosed as osteoporotic based on the BMD measurement at any site (left femur neck, right femur neck, left total hip or right total hip or spine). Both the controls and the Osteoporotics were over 50 years of age and BMI between 31-34 kg/m2 had 2nd degree obesity, and were not free from other problems such as diabetes, hypertension, etc. Subjects (osteoporotics and controls) were interviewed to called data on demographic characterstics, medical history, dietary intake anthropometry (height and weight) bone mineral density. Blood samples were collected from subjects (Osteoporotics and controls). Analysis of serum calcium, vitamin D, phosphate were done at the main laboratory at Military Hospital Riyadh, by the laboratory technician while BMD was determined at the department of Nuclear Medicine by an expert technician and results were interpreted by radiologist.Data on frequency of consumption of animal food (meat, eggs, poultry and fish) and diary foods (milk, yogurt, cheese) of osteoporotic was less than control. In spite of the low intake there was no association with BMD.In general, the vegetables and fruits were consumed less by the osteoporotics than control. The only fruit which had shown a significant positive correlation is banana with right and left hip BMD total probably due to high potassium and minerals content which likely to prevent bone resorption. Mataziz vegetables combination of wheat showed a significant positive correlation with the same site (total right and left hip). Both osteoporotics abd controls were consuming table sugar. (But the sweet intake showed a significant negative correlation with left neck femur BMD, suggesting sucrose increase urinary calcium loss. Both osteoporotic and controls were consuming Arabic coffee. A negative significant correlation between intake of Arabic coffee and BMD of right neck femur of osteoporosis patient was observed. It could be suggested that increased intake of fruits and vegetables, might promote bone density while high intake of coffee and sugars might affect bone density, no significant correlation was observed between BMD at any site and diary product. We can say the major risk factors are inadequate nutrition. Further studies are needed among Saudi population to confirm these results.

Keywords: osteoporosi, Saudia Arabia, Riyadh Armed Forces, postmenopausal women

Procedia PDF Downloads 408
315 Globalisation and Diplomacy: How Can Small States Improve the Practice of Diplomacy to Secure Their Foreign Policy Objectives?

Authors: H. M. Ross-McAlpine

Abstract:

Much of what is written on diplomacy, globalization and the global economy addresses the changing nature of relationships between major powers. While the most dramatic and influential changes have resulted from these developing relationships the world is not, on deeper inspection, governed neatly by major powers. Due to advances in technology, the shifting balance of power and a changing geopolitical order, small states have the ability to exercise a greater influence than ever before. Increasingly interdependent and ever complex, our world is too delicate to be handled by a mighty few. The pressure of global change requires small states to adapt their diplomatic practices and diversify their strategic alliances and relationships. The nature and practice of diplomacy must be re-evaluated in light of the pressures resulting from globalization. This research examines: how small states can best secure their foreign policy objectives? Small state theory is used as a foundation for exploring the case study of New Zealand. The research draws on secondary sources to evaluate the existing theory in relation to modern practices of diplomacy. As New Zealand lacks the required economic and military power to play an active, influential role in international affairs what strategies are used to exert influence? Furthermore, New Zealand lies in a remote corner of the Pacific and is geographically isolated from its nearest neighbors how does this affect security and trade priorities? The findings note a significant shift since the 1970’s in New Zealand’s diplomatic relations. This shift is arguably a direct result of globalization, regionalism and a growing independence from the traditional bi-lateral relationships. The need to source predictable trade, investment and technology are an essential driving force for New Zealand’s diplomatic relations. A lack of hard power aligns New Zealand’s prosperity with a secure, rules-based international system that increases the likelihood of a stable and secure global order. New Zealand’s diplomacy and prosperity has been intrinsically reliant on its reputation. A vital component of New Zealand’s diplomacy is preserving a reputation for integrity and global responsibility. It is the use of this soft power that facilitates the influence that New Zealand enjoys on the world stage. To weave a comprehensive network of successful diplomatic relationships, New Zealand must maintain a reputation of international credibility. Globalization has substantially influenced the practice of diplomacy for New Zealand. The current world order places economic and military might in the hands of a few, subsequently requiring smaller states to use other means for securing their interests. There are clear strategies evident in New Zealand’s diplomacy practice that draw attention to how other smaller states might best secure their foreign policy objectives. While these findings are limited, as with all case study research, there is value in applying the findings to other small states struggling to secure their interests in the wake of rapid globalization.

Keywords: diplomacy, foreign policy, globalisation, small state

Procedia PDF Downloads 398
314 A Content Analysis of Us Media Framing of Conflict: Effects on Global Journalism and Its Social Consequences

Authors: Lee Artz

Abstract:

This presentation outlines US media frames of recent interventions in Iraq, Afghanistan, and Syria and their impact on global media and public discourse. A content analysis of sources, descriptors, and contexts of leading US media (AP, New York Times, Fox News) finds that news coverage highlights terrorism, justifies military action, and downplays the human costs. These media frames that normalize intervention also omit coverage of the environmental consequences of war, with scant or no reporting on pollution, destruction and contamination of agricultural infrastructures and the difficulty of any environmentally sustainable recovery. A content analysis of leading European and Middle East media (Daily Mail, Le Monde, Deutsch Welle, Al Jazeera) indicates that they have adopted the same reporting practices, frames, and techniques resulting in a hybrid, yet homogeneous, increasingly global news environment that does a disservice to the public interest and democracy.

Keywords: conflict, environment, media framing, public interest

Procedia PDF Downloads 202
313 Analysis of Bending Abilities of Soft Pneumatic Actuator

Authors: Jeevan Balaji, Shreyas Chigurupati

Abstract:

Pneumatic gripper use compressed air to operate its actuators (fingers). Unlike the conventional metallic gripper, a soft pneumatic actuator (SPA) can be used for relocating fragile objects. An added advantage for this gripper is that the pressure exerted on the object can be varied by changing the dimensions of the air chambers and also by the number of chambers. SPAs have many benefits over conventional robots in the military, medical fields because of their compliance nature and are easily produced using the 3D printing process. In the paper, SPA is proposed to perform pick and place tasks. A design was developed for the actuators, which is convenient for gripping any fragile objects. Thermoplastic polyurethane (TPU) is used for 3D printing the actuators. The actuator model behaves differently as the parameters such as its chamber height, number of chambers change. A detailed FEM model of the actuator is drafted for different pressure inputs using ABAQUS CAE software, and a safe loading pressure range is found.

Keywords: soft robotics, pneumatic actuator, design and modelling, bending analysis

Procedia PDF Downloads 167
312 Idea of International Criminal Justice in the Function of Prosecution International Crimes

Authors: Vanda Božić, Željko Nikač

Abstract:

The wars and armed conflicts have often resulted in violations of international humanitarian law, and often commit the most serious international crimes such as war crimes, crimes against humanity, aggression and genocide. However, only in the XX century the rule was articulated idea of establishing a body of international criminal justice in order to prosecute these crimes and their perpetrators. The first steps in this field have been made by establishing the International military tribunals for war crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. In the end, The International Criminal Court was established in Rome in 1998 with the aim of justice and in order to give satisfaction the victims of crimes and their families. The aim of the paper was to provide a historical and comparative analysis of the institutions of international criminal justice based on which these institutions de lege lata fulfilled the goals of individual criminal responsibility and justice. Furthermore, the authors suggest de lege ferenda that the Permanent International Criminal Tribunal, in addition to the prospective case, also takes over the current ICTY and ICTR cases.

Keywords: international crimes, international criminal justice, prosecution of crimes, ad hoc tribunal, the international criminal court

Procedia PDF Downloads 280
311 Corporate Social Responsibility and Dividend Policy

Authors: Mohammed Benlemlih

Abstract:

Using a sample of 22,839 US firm-year observations over the 1991-2012 period, we find that high CSR firms pay more dividends than low CSR firms. The analysis of individual components of CSR provides strong support for this main finding: five of the six individual dimensions are also associated with high dividend payout. When analyzing the stability of dividend payout, our results show that socially irresponsible firms adjust dividends more rapidly than socially responsible firms do: dividend payout is more stable in high CSR firms. Additional results suggest that firms involved in two controversial activities -the military and alcohol - are associated with low dividend payouts. These findings are robust to alternative assumptions and model specifications, alternative measures of dividend, additional control, and several approaches to address endogeneity. Overall, our results are consistent with the expectation that high CSR firms may use dividend policy to manage the agency problems related to overinvestment in CSR.

Keywords: corporate social responsibility, dividend policy, Lintner model, agency theory, signaling theory, dividend stability

Procedia PDF Downloads 267
310 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 335
309 Single Ended Primary Inductance Converter with Internal Model Controller

Authors: Fatih Suleyman Taskincan, Ahmet Karaarslan

Abstract:

In this article, the study and analysis of Single Ended Primary Inductance Converter (SEPIC) are presented for battery charging applications that will be used in military applications. The usage of this kind of converters come from its advantage of non-reverse polarity at outputs. As capacitors charge and discharge through inductance, peak current does not occur on capacitors. Therefore, the efficiency will be high compared to buck-boost converters. In this study, the converter (SEPIC) is designed to be operated with Internal Model Controller (IMC). The traditional controllers like Proportional Integral Controller are not preferred as its linearity behavior. Hence IMC is designed for this converter. This controller is a model-based control and provides more robustness and better set point monitoring. Moreover, it can be used for an unstable process where the conventional controller cannot handle the dynamic operation. Matlab/Simulink environment is used to simulate the converter and its controller, then, the results are shown and discussed.

Keywords: DC/DC converter, single ended primary inductance converter, SEPIC, internal model controller, IMC, switched mode power supply

Procedia PDF Downloads 630
308 Improving Coverage in Wireless Sensor Networks Using Particle Swarm Optimization Algorithm

Authors: Ehsan Abdolzadeh, Sanaz Nouri, Siamak Khalaj

Abstract:

Today WSNs have many applications in different fields like the environment, military operations, discoveries, monitoring operations, and so on. Coverage size and energy consumption are the important challenges that these networks need to face. This paper tries to solve the problem of coverage with a requirement of k-coverage and minimum energy consumption. In order to minimize energy consumption, visual sensor networks have been used that observe and process just those targets that are located in their view direction. As a result, sensor rotations have decreased, and subsequently, energy consumption has been minimized. To solve the problem of coverage particle swarm optimization, coverage optimization has been able to ensure coverage requirement together with minimizing sensor rotations while meeting the problem requirement of k≤14. So energy consumption has decreased, and this could extend the sensors’ lifetime subsequently.

Keywords: K coverage, particle union optimization algorithm, wireless sensor networks, visual sensor networks

Procedia PDF Downloads 118
307 Study on Wireless Transmission for Reconnaissance UAV with Wireless Sensor Network and Cylindrical Array of Microstrip Antennas

Authors: Chien-Chun Hung, Chun-Fong Wu

Abstract:

It is important for a commander to have real-time information to aware situations and to make decision in the battlefield. Results of modern technique developments have brought in this kind of information for military purposes. Unmanned aerial vehicle (UAV) is one of the means to gather intelligence owing to its widespread applications. It is still not clear whether or not the mini UAV with short-range wireless transmission system is used as a reconnaissance system in Taiwanese. In this paper, previous experience on the research of the sort of aerial vehicles has been applied with a data-relay system using the ZigBee modulus. The mini UAV developed is expected to be able to collect certain data in some appropriate theaters. The omni-directional antenna with high gain is also integrated into mini UAV to fit the size-reducing trend of airborne sensors. Two advantages are so far obvious. First, mini UAV can fly higher than usual to avoid being attacked from ground fires. Second, the data will be almost gathered during all maneuvering attitudes.

Keywords: mini UAV, reconnaissance, wireless transmission, ZigBee modulus

Procedia PDF Downloads 195
306 Design an Architectural Model for Deploying Wireless Sensor Network to Prevent Forest Fire

Authors: Saurabh Shukla, G. N. Pandey

Abstract:

The fires have become the most serious disasters to forest resources and the human environment. In recent years, due to climate change, human activities and other factors the frequency of forest fires has increased considerably. The monitoring and prevention of forest fires have now become a global concern for forest fire prevention organizations. Currently, the methods for forest fire prevention largely consist of patrols, observation from watch towers. Thus, software like deployment of the wireless sensor network to prevent forest fire is being developed to get a better estimate of the temperature and humidity prospects. Now days, wireless sensor networks are beginning to be deployed at an accelerated pace. It is not unrealistic to expect that in coming years the world will be covered with wireless sensor networks. This new technology has lots of unlimited potentials and can be used for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces.

Keywords: deployment, sensors, wireless sensor networks, forest fires

Procedia PDF Downloads 437
305 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 185
304 Unmanned Air Vehicles against Disasters: Wildfires, Avalanches, Floods

Authors: İsmail Şimşekoğlu, Serkan Yılmaz

Abstract:

There have been great improvements in technology that caused epoch-making changes in aviation. Thus, we can control air vehicles from ground without pilots in them: The UAVs. Due to UAV’s lack of need of pilots and their small size make them have crucial importance for us. UAVs have variety of usage area, especially in military. However, as soldiers we believe that we can use UAVs for better purposes. In this essay we indicate the usage of UAVs for the sake of saving nature from destruction of disasters by expressing what happened in the past and what can possibly happen in the future, especially in firefighting, preventing avalanches and decreasing the effects of floods. These three disasters cause hazardous consequences to the nature. Wildfires endanger so many lives by burning and destroying what comes in their paths. The numbers of avalanches are increased with the global warming. The changes of seasons triggered floods all over the world that threaten the city life. Besides all of these people may lose their lives in order to intrude these disasters. Drones will do the job without involving people lives. Thus it will diminish the risks so drones will be used for the sake of nature and people.

Keywords: unmanned air vehicles, nature, firefighting, avalanche, flood

Procedia PDF Downloads 445
303 Investigation of TEC Using YOUTHSAT RaBIT Payload Data for Low Latitude Regions

Authors: Perumalla Naveen Kumar

Abstract:

Global Positioning System (GPS) is used for civilian and military user positioning applications. The accuracy of GPS is degrading mainly because of ionospheric error. It is very important to analyze the effects of ionosphere on the performance of satellite systems especially in the low latitude regions. These variations depend on the Total Electron Content (TEC) in the ionosphere. To investigate the variations in the atmosphere, a mini satellite known as YOUTHSAT is launched by India. This is the outcome of the collaboration between India and USSR. One of the YOUTHSAT Indian payload is RaBIT (Radio Beacon for Ionospheric Tomography). In this paper, YOUTHSAT RaBIT payload data for the three typical days of 2011 are considered. The analysis is carried out for four Indian stations. The variations of Slant TEC, elevation angle and azimuth angles are analyzed with respect to local time. The obtained results are encouraging.

Keywords: Global Positioning System (GPS), Total Electron Content (TEC), YOUTHSAT, Radio Beacon for Ionospheric Tomography (RaBIT)

Procedia PDF Downloads 384
302 Modelling the Antecedents of Supply Chain Enablers in Online Groceries Using Interpretive Structural Modelling and MICMAC Analysis

Authors: Rose Antony, Vivekanand B. Khanapuri, Karuna Jain

Abstract:

Online groceries have transformed the way the supply chains are managed. These are facing numerous challenges in terms of product wastages, low margins, long breakeven to achieve and low market penetration to mention a few. The e-grocery chains need to overcome these challenges in order to survive the competition. The purpose of this paper is to carry out a structural analysis of the enablers in e-grocery chains by applying Interpretive Structural Modeling (ISM) and MICMAC analysis in the Indian context. The research design is descriptive-explanatory in nature. The enablers have been identified from the literature and through semi-structured interviews conducted among the managers having relevant experience in e-grocery supply chains. The experts have been contacted through professional/social networks by adopting a purposive snowball sampling technique. The interviews have been transcribed, and manual coding is carried using open and axial coding method. The key enablers are categorized into themes, and the contextual relationship between these and the performance measures is sought from the Industry veterans. Using ISM, the hierarchical model of the enablers is developed and MICMAC analysis identifies the driver and dependence powers. Based on the driver-dependence power the enablers are categorized into four clusters namely independent, autonomous, dependent and linkage. The analysis found that information technology (IT) and manpower training acts as key enablers towards reducing the lead time and enhancing the online service quality. Many of the enablers fall under the linkage cluster viz., frequent software updating, branding, the number of delivery boys, order processing, benchmarking, product freshness and customized applications for different stakeholders, depicting these as critical in online food/grocery supply chains. Considering the perishability nature of the product being handled, the impact of the enablers on the product quality is also identified. Hence, study aids as a tool to identify and prioritize the vital enablers in the e-grocery supply chain. The work is perhaps unique, which identifies the complex relationships among the supply chain enablers in fresh food for e-groceries and linking them to the performance measures. It contributes to the knowledge of supply chain management in general and e-retailing in particular. The approach focus on the fresh food supply chains in the Indian context and hence will be applicable in developing economies context, where supply chains are evolving.

Keywords: interpretive structural modelling (ISM), India, online grocery, retail operations, supply chain management

Procedia PDF Downloads 205
301 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect

Authors: Debasish Nandy

Abstract:

India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.

Keywords: bilateral, diplomacy, infiltration, terrorism

Procedia PDF Downloads 541
300 Multi-Sensor Target Tracking Using Ensemble Learning

Authors: Bhekisipho Twala, Mantepu Masetshaba, Ramapulana Nkoana

Abstract:

Multiple classifier systems combine several individual classifiers to deliver a final classification decision. However, an increasingly controversial question is whether such systems can outperform the single best classifier, and if so, what form of multiple classifiers system yields the most significant benefit. Also, multi-target tracking detection using multiple sensors is an important research field in mobile techniques and military applications. In this paper, several multiple classifiers systems are evaluated in terms of their ability to predict a system’s failure or success for multi-sensor target tracking tasks. The Bristol Eden project dataset is utilised for this task. Experimental and simulation results show that the human activity identification system can fulfill requirements of target tracking due to improved sensors classification performances with multiple classifier systems constructed using boosting achieving higher accuracy rates.

Keywords: single classifier, ensemble learning, multi-target tracking, multiple classifiers

Procedia PDF Downloads 271