Search results for: military
278 Exploring Non-Governmental Organizations’ Performance Management: Bahrain Athletics Association as a Case Study
Authors: Nooralhuda Aljlas
Abstract:
In the ever-growing field of non-governmental organizations, the enhancement of performance management and measurement systems has been increasingly acknowledged by political, economic, social, legal, technological and environmental factors. Within Bahrain Athletics Association, such enhancement results from the key factors leading performance management including collaboration, feedback, human resource management, leadership and participative management. The exploratory, qualitative research conducted reviewed performance management theory. As reviewed, the key factors leading performance management were identified. Drawing on a non-governmental organization case study, the key factors leading Bahrain Athletics Association’s performance management were explored. By exploring the key factors leading Bahrain Athletics Association’s performance management, the research study proposed a theoretical framework of the key factors leading performance management in non-governmental organizations in general. The research study recommended further investigation of the role of the two key factors of command and control and leadership, combining military and civilian approaches to enhancing non-governmental organizations’ performance management.Keywords: Bahrain athletics association, exploratory, key factor, performance management
Procedia PDF Downloads 365277 Risk Assessment for Aerial Package Delivery
Authors: Haluk Eren, Ümit Çelik
Abstract:
Recent developments in unmanned aerial vehicles (UAVs) have begun to attract intense interest. UAVs started to use for many different applications from military to civilian use. Some online retailer and logistics companies are testing the UAV delivery. UAVs have great potentials to reduce cost and time of deliveries and responding to emergencies in a short time. Despite these great positive sides, just a few works have been done for routing of UAVs for package deliveries. As known, transportation of goods from one place to another may have many hazards on delivery route due to falling hazards that can be exemplified as ground objects or air obstacles. This situation refers to wide-range insurance concept. For this reason, deliveries that are made with drones get into the scope of shipping insurance. On the other hand, air traffic was taken into account in the absence of unmanned aerial vehicle. But now, it has been a reality for aerial fields. In this study, the main goal is to conduct risk analysis of package delivery services using drone, based on delivery routes.Keywords: aerial package delivery, insurance estimation, territory risk map, unmanned aerial vehicle, route risk estimation, drone risk assessment, drone package delivery
Procedia PDF Downloads 343276 The Role and Position of Chinese Modern Martial Art in the School Physical Education (1912-1945)
Authors: Hsien-Wei Kuo
Abstract:
The thoughts of the military citizens, pragmatism, naturalism and nationalism related to physical education were developed during the warring period of the Republic of China. Moreover, the development of martial art formed by nationalism and political party was to utilize to save the nation, the people and the world. The martial art was also promoted in the system of school physical education gradually at the same time. The aim of this study is to explore the role, duty and position of the martial art education with the political color and advocacy in the system of school physical education. This study focuses on the practice, course hours, selective materials and competitive rules of physical education in the school system in modern China. Therefore, the methods of the historical research and content analysis were used to collect the historical materials and documents for going into them. The results will give a detailed account of the developed model of institutionalization, unification and regularization of martial art, and its growing, golden and stagnant periods in the school physical education system under the impact of western sport and physical education. It may sum up the meaning relationships among the politics, education practice and sport for all.Keywords: martial art education, national martial arts institution, sick man of East Asia, the may 4th movement
Procedia PDF Downloads 382275 Family Dynamics on Attitude Towards Peace: The Mediating Role of Emotional Regulation Strategies
Authors: Nicole Kaye A. Callanta, Shalimar B. Baruang, Anne Edelienne P. Tadena, Imelu G. Mordeno, Odessa May D. Escalona
Abstract:
Untold numbers of children and adolescents around the world are exposed increasingly to the war on a daily basis. These experiences shape how they will view themselves, others, and the world. A wealth of studies have shown the role of family dynamics in the development of children’s attitudes, particularly their social behaviors. This specific study, however, contends that family dynamics influence peace and conflict resolution attitude and further asserts that it is brought about by the degree of emotional regulation strategies they use. Utilising purposive sampling, adolescent participant-respondents were from different schools in Southern Philipines, specifically of the cities of Marawi and Iligan, where exposure to warring clans, internal struggle between the Philippine Military and insurgencies, and the recent Marawi Seige caused by Al-Qaeda and ISIS-spawned terrorism. Results showed emotional regulation strategies mediate the relationship between family dynamics, particularly on family cohesion, and attitude towards peace. Thus implying the association between family cohesion and attitude towards peace strengthens with the use of emotional regulation strategies.Keywords: attitude towards peace, emotional regulation strategies, family cohesion, family dynamics
Procedia PDF Downloads 174274 China's Middle East Policy and the Competition with the United States
Authors: Shabnam Dadparvar, Laijin Shen
Abstract:
This paper focuses on China’s policy in the Middle East and the rivalry with the U.S. The question is that what are the main factors on China’s Middle East policy and its competition with the U.S? The hypothesis regards to three effective factors: 'China’s energy dependency' on the Middle East, 'economy' and support for 'stability' in the Middle East. What is important in China’s competition with the U.S regarding to its Middle East policy is the substantial difference in ways of treating the countries of the region; China is committed to Westphalia model based on non-interference in internal affairs of the countries and respect the sovereignty of the governments. However, after 9/11, the U.S is seeking a balance between stability and change through intervention in the international affairs and in some cases is looking for a regime change. From the other hand, China, due to its dependency on the region’s energy welcomes America’s military presence in the region for providing stability. The authors by using a descriptive analytical method try to explain the situation of rivalry between China and the United States in Middle East. China is an 'emerging power' with high economic growth and in demand of more energy supply. The problem is that a rising power in the region is often a source of concern for hegemony.Keywords: China's foreign policy, energy, hegemony, the Middle East
Procedia PDF Downloads 352273 Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life
Authors: Lai Junzhe, Wang Lihao, Burra Venkata Durga Kumar
Abstract:
In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems.Keywords: distributed system, artificial intelligence, blockchain, IoT, visual information processing, smart home
Procedia PDF Downloads 113272 The Effects of Cross-Border Use of Drones in Nigerian National Security
Authors: H. P. Kerry
Abstract:
Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.Keywords: armed drones, drones, cross-border, national security
Procedia PDF Downloads 158271 Structural Parameter Identification of Old Steel Truss Bridges
Authors: A. Bogdanovic, M. Vitanova, J. Bojadjieva, Z. Rakicevic, V. Sesov, K. Edip, N. Naumovski, F. Manojlovski, A.Popovska, A. Shoklarovski, T. Kitanovski, D. Ivanovski, I. Markovski, D. Filipovski
Abstract:
The conditions of existing structures change in the course of time and can hardly be characterized particularly if a bridge has long been in function and there is no design documentation related to it. To define the real conditions of a structure, detailed static and dynamic analysis of the structure has to be carried out and its modal parameters have to be defined accurately. Modal analysis enables a quite accurate identification of the natural frequencies and mode shapes. Presented in this paper are the results from the performed detailed analyses of a steel truss bridge that has been in use for more than 7 decades by the military services of R.N. Macedonia and for which there is no documentation at all. Static and dynamic investigations and ambient vibration measurements were performed. The acquired data were used to identify the mode shapes that were used for comparison with the numerical model. Dynamic tests were performed to define the bridge behaviour and the damping index. Finally, based on all the conducted detailed analyses and investigations, conclusions on the conditions of the bridge structure were drawn.Keywords: ambient vibrations, dynamic identification, in-situ measurement, steel truss bridge
Procedia PDF Downloads 93270 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security
Authors: Irfan U. Din
Abstract:
The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)
Procedia PDF Downloads 290269 Assembly Training: An Augmented Reality Approach Using Design Science Research
Authors: Stefan Werrlich, Phuc-Anh Nguyen, Kai Nitsche, Gunther Notni
Abstract:
Augmented Reality (AR) is a strong growing research topic. This innovative technology is interesting for several training domains like education, medicine, military, sports and industrial use cases like assembly and maintenance tasks. AR can help to improve the efficiency, quality and transfer of training tasks. Due to these reasons, AR becomes more interesting for big companies and researchers because the industrial domain is still an unexplored field. This paper presents the research proposal of a PhD thesis which is done in cooperation with the BMW Group, aiming to explore head-mounted display (HMD) based training in industrial environments. We give a short introduction, describing the motivation, the underlying problems as well as the five formulated research questions we want to clarify along this thesis. We give a brief overview of the current assembly training in industrial environments and present some AR-based training approaches, including their research deficits. We use the Design Science Research (DSR) framework for this thesis and describe how we want to realize the seven guidelines, mandatory from the DSR. Furthermore, we describe each methodology which we use within that framework and present our approach in a comprehensive figure, representing the entire thesis.Keywords: assembly, augmented reality, research proposal, training
Procedia PDF Downloads 246268 Analysis of the Performance of State Institutions From 2008-2013 in Pakistan
Authors: Mahrukh Shehzadi
Abstract:
Pakistan is a democratic republic but has spent much time under military rulers; after a few years of independence, Pakistan faced three martial laws in 1958, 1969, and 1977, and the latest in 1999 by General Musharraf. The purpose of this thesis is to analyze the politics, policies and overall performance of Pakistan People’s Party Government from 2008-2013. PPP won a significant victory in the elections of 2008. The co-chairman, Mr. Asif Ali Zardari, announced the end of the fourth dictatorship. It was for the first time in Pakistan’s history that an elected government completed its term (2008-2013). While the completion of its term is an achievement, the performance of the democratically-elected government – federal, provincial and local does not inspire much confidence. Poor governance, persistent confrontational relations between the executive and the judiciary, charges of corruption, and the incompetence of the political leadership to build consensus to combat terrorism continue to cast criticisms on the democratic process and the civilian regime’s capability to sustain democracy. In the present study, the researcher will try to describe and explain the public thinking pattern regarding the policies opted for by the PPP-led government and their impact on the people’s minds of Pakistan.Keywords: democracy, performance, policies, state, manifesto
Procedia PDF Downloads 62267 Russia's War Memory: How Tolstoy Uses Homeric Epic to Reconstruct History
Authors: Svetlana Yefimenko
Abstract:
Situated within the fields of Russian literature, Russian history, and classics, this paper investigates the early writing of Leo Tolstoy in terms of his reception and appropriation of Homeric epic for the purposes of reconstructing early 19th-century Russian history. The epic mode, specifically its Homeric variation, was deployed in Tolstoy’s writing on his military experience in the Crimean War to legitimize a version of historical events which positioned Russian soldiers as the inheritors of ancient Greek heroism. With reference to Tolstoy’s oft-neglected Sevastopol’ Sketches, and the short stories The Raid, The Wood-Felling, and Two Hussars, this paper examines how such narratives pass from communicative memory into collective memory both in the Homeric epics and in Tolstoy’s reworking of them, particularly on the literary effects produced when the distance between communicative and collective memory collapses. Within a song culture, epic song functions as memory, and this paper shows how, by modeling his early work on epic, Tolstoy produced texts which act as memory itself, thereby becoming the authoritative version of Russia’s past in the Crimea, often contradicting historical facts.Keywords: classical reception, collective memory, Russian history, Russian literature
Procedia PDF Downloads 133266 Power, Values, Rules and Leader Decision Making: A Discourse Perspective
Authors: Cathryn Robinson, Bernard McKenna, David Rooney
Abstract:
This paper argues that the application of values-based leadership increasingly challenges leaders in rules-based organisations, particularly in bureaucratic organisations such as the military, public service, police, and emergency services. Leaders are grappling to reconcile how to enact values-based leadership and decision-making when they are bound by rules, policies, and procedures. This interpretive study used a multi-faceted vignette (critical incident) as the basis of an interview with air force officers at three levels: executive, senior, and junior. In this way, practice is forced to intersect with discourse. The findings revealed a shared set of discourse themes (legal; rules; safety and risk; operational practice/theatre discourses), but also clear dialectical tensions. These tensions were evident in executive officers and senior leaders emphasizing rules and information themes, whereas junior officers emphasized decision making, collateral, and situation. These findings reveal discourse and practice incommensurability that could have grave implications in the conduct of war.Keywords: critical incident, discourse analysis, rules-based, values-based
Procedia PDF Downloads 184265 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming
Authors: Meesun Sun, Yongmin Kim
Abstract:
Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost
Procedia PDF Downloads 139264 Lunar Exploration based on Ground-Based Radar: Current Research Progress and Future Prospects
Authors: Jiangwan Xu, Chunyu Ding
Abstract:
Lunar exploration is of significant importance in the development and utilization of in-situ lunar resources, water ice exploration, space and astronomical science, as well as in political and military strategy. In recent years, ground-based radar (GBR) has gained increasing attention in the field of lunar exploration due to its flexibility, low cost, and penetrating capabilities. This paper reviews the scientific research on lunar exploration using GBR, outlining the basic principles of GBR and the progress made in lunar exploration studies. It introduces the fundamental principles of lunar imaging using GBR, and systematically reviews studies on lunar surface layer detection, inversion of lunar regolith dielectric properties, and polar water ice detection using GBR. In particular, the paper summarizes the current development status of Chinese GBR and forecasts future development trends in China. This review will enhance the understanding of lunar exploration results using GBR radar, systematically demonstrate the main applications and scientific achievements of GBR in lunar exploration, and provide a reference for future GBR radar lunar exploration missions.Keywords: ground-based radar, lunar exploration, radar imaging, lunar surface/subsurface detection
Procedia PDF Downloads 33263 Guided Information Campaigns for Counter-Terrorism: Behavioral Approach to Interventions Regarding Polarized Societal Network
Authors: Joshua Midha
Abstract:
The basis for information campaigns and behavioral interventions has long reigned as a tactic. From the Soviet-era propaganda machines to the opinion hijacks in Iran, these measures are now commonplace and are used for dissemination and disassembly. However, the use of these tools for strategic diffusion, specifically in a counter-terrorism setting, has only been explored on the surface. This paper aims to introduce a larger conceptual portion of guided information campaigns into preexisting terror cells and situations. It provides an alternative, low-risk intervention platform for future military strategy. This paper highlights a theoretical framework to lay out the foundationary details and explanations for behavioral interventions and moves into using a case study to highlight the possibility of implementation. It details strategies, resources, circumstances, and risk factors for intervention. It also sets an expanding foundation for offensive PsyOps and argues for tactical diffusion of information to battle extremist sentiment. The two larger frameworks touch on the internal spread of information within terror cells and external political sway, thus charting a larger holistic purpose of strategic operations.Keywords: terrorism, behavioral intervention, propaganda, SNA, extremism
Procedia PDF Downloads 95262 Surface Plasmon Resonance Imaging-Based Epigenetic Assay for Blood DNA Post-Traumatic Stress Disorder Biomarkers
Authors: Judy M. Obliosca, Olivia Vest, Sandra Poulos, Kelsi Smith, Tammy Ferguson, Abigail Powers Lott, Alicia K. Smith, Yang Xu, Christopher K. Tison
Abstract:
Post-Traumatic Stress Disorder (PTSD) is a mental health problem that people may develop after experiencing traumatic events such as combat, natural disasters, and major emotional challenges. Tragically, the number of military personnel with PTSD correlates directly with the number of veterans who attempt suicide, with the highest rate in the Army. Research has shown epigenetic risks in those who are prone to several psychiatric dysfunctions, particularly PTSD. Once initiated in response to trauma, epigenetic alterations in particular, the DNA methylation in the form of 5-methylcytosine (5mC) alters chromatin structure and represses gene expression. Current methods to detect DNA methylation, such as bisulfite-based genomic sequencing techniques, are laborious and have massive analysis workflow while still having high error rates. A faster and simpler detection method of high sensitivity and precision would be useful in a clinical setting to confirm potential PTSD etiologies, prevent other psychiatric disorders, and improve military health. A nano-enhanced Surface Plasmon Resonance imaging (SPRi)-based assay that simultaneously detects site-specific 5mC base (termed as PTSD base) in methylated genes related to PTSD is being developed. The arrays on a sensing chip were first constructed for parallel detection of PTSD bases using synthetic and genomic DNA (gDNA) samples. For the gDNA sample extracted from the whole blood of a PTSD patient, the sample was first digested using specific restriction enzymes, and fragments were denatured to obtain single-stranded methylated target genes (ssDNA). The resulting mixture of ssDNA was then injected into the assay platform, where targets were captured by specific DNA aptamer probes previously immobilized on the surface of a sensing chip. The PTSD bases in targets were detected by anti-5-methylcytosine antibody (anti-5mC), and the resulting signals were then enhanced by the universal nanoenhancer. Preliminary results showed successful detection of a PTSD base in a gDNA sample. Brighter spot images and higher delta values (control-subtracted reflectivity signal) relative to those of the control were observed. We also implemented the in-house surface activation system for detection and developed SPRi disposable chips. Multiplexed PTSD base detection of target methylated genes in blood DNA from PTSD patients of severity conditions (asymptomatic and severe) was conducted. This diagnostic capability being developed is a platform technology, and upon successful implementation for PTSD, it could be reconfigured for the study of a wide variety of neurological disorders such as traumatic brain injury, Alzheimer’s disease, schizophrenia, and Huntington's disease and can be extended to the analyses of other sample matrices such as urine and saliva.Keywords: epigenetic assay, DNA methylation, PTSD, whole blood, multiplexing
Procedia PDF Downloads 127261 Villar Settlement Farm School for the Aetas: Assimilation through American Colonial Education in Zambales, Philippines
Authors: Julian E. Abuso, Alberto T. Paala Jr.
Abstract:
The creation of settlement farm schools at the outset of American colonization of the Philippines was not a matter of accident; rather, their establishment was a major component of a grand plan on public education based on the benevolent assimilation policy of the United States. This argument is illustrated by the case of Villar Settlement Farm School, a school for the Aetas as a non-Christian tribal community in 1907. The study aims to: (1) identify and describe the antecedents for the establishment of Settlement Farm School, (2) explicate the cultural conflicts encountered by Aetas in school, (3) appraise the consequences of education as acculturation among Aeta population. The study made use of the following: historical data based on primary and secondary sources and life histories from primary informants. The Settlement Farm School for the Aetas was borne out of the American’s change in policy from military to civilian authority, recognition of education as a tool for benevolent assimilation. The narratives of informants manifested resistance to certain aspects of the educational process.Keywords: settlement farm school Aetas, tribe, colonial education, Aeta, non-Christian tribal community
Procedia PDF Downloads 321260 Art and Society: Greek Migrant Artists in Paris during 1970s
Authors: Sapfo A. Mortaki
Abstract:
From the early 1960s and until the middle of the next decade, the lack of favorable conditions for the development of art along with the imposition of the 1967 military dictatorship resulted in a great flow of Greek artists abroad. The fall of the dictatorship and the change of the political scene after 1974 constitute crucial milestones in the cultural life of the country. In the field of visual arts significant changes are attempted in the state's effort to formulate a national cultural policy. This article examines the presence of Greek migrant artists (painters and sculptors) in Paris during the 1970s. Since the mid-1970s, and particularly in the early 1980s, Modern Greek Diaspora undergoes a new transition phase, when the concept of immigration changes. The aim of this study is to record and give prominence to the presence of the Greek artists -through archival research in the daily and periodical press- as well as present the impact of their artistic activity on French intellectual life and on the country’s society during this period. Furthermore, the presence and work of these artists are discussed in an environment of cultural coexistence which, to a certain extent, can be regarded as the result of the social phenomenon of their migration in the era of postmodernity. Finally, their contribution to the development of the cultural life of Greece, inside and outside its borders, is also being examined.Keywords: art and society, cultural policy, Greek artists, postmodernity
Procedia PDF Downloads 234259 India’s Deterrence Program: Defense or Development
Authors: Aneri Mehta, Krunal Mehta
Abstract:
A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.Keywords: foreign policy, nuclear deterrence, nuclear policy, development
Procedia PDF Downloads 522258 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks
Authors: Andrew D. Henshaw, James M. Austin
Abstract:
Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money
Procedia PDF Downloads 92257 A Unified Approach for Naval Telecommunication Architectures
Authors: Y. Lacroix, J.-F. Malbranque
Abstract:
We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion
Procedia PDF Downloads 292256 Relay Node Placement for Connectivity Restoration in Wireless Sensor Networks Using Genetic Algorithms
Authors: Hanieh Tarbiat Khosrowshahi, Mojtaba Shakeri
Abstract:
Wireless Sensor Networks (WSNs) consist of a set of sensor nodes with limited capability. WSNs may suffer from multiple node failures when they are exposed to harsh environments such as military zones or disaster locations and lose connectivity by getting partitioned into disjoint segments. Relay nodes (RNs) are alternatively introduced to restore connectivity. They cost more than sensors as they benefit from mobility, more power and more transmission range, enforcing a minimum number of them to be used. This paper addresses the problem of RN placement in a multiple disjoint network by developing a genetic algorithm (GA). The problem is reintroduced as the Steiner tree problem (which is known to be an NP-hard problem) by the aim of finding the minimum number of Steiner points where RNs are to be placed for restoring connectivity. An upper bound to the number of RNs is first computed to set up the length of initial chromosomes. The GA algorithm then iteratively reduces the number of RNs and determines their location at the same time. Experimental results indicate that the proposed GA is capable of establishing network connectivity using a reasonable number of RNs compared to the best existing work.Keywords: connectivity restoration, genetic algorithms, multiple-node failure, relay nodes, wireless sensor networks
Procedia PDF Downloads 243255 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 456254 Reducing Weight and Fuel Consumption of Civil Aircraft by EML
Authors: Luca Bertola, Tom Cox, Pat Wheeler, Seamus Garvey, Herve Morvan
Abstract:
Electromagnetic launch systems have been proposed for military applications to accelerate jet planes on aircraft carriers. This paper proposes the implementation of similar technology to aid civil aircraft take-off, which can provide significant economic, environmental and technical benefits. Assisted launch has the potential of reducing ground noise and emissions near airports and improving overall aircraft efficiency through reducing engine thrust requirements. This paper presents a take-off performance analysis for an Airbus A320-200 taking off with and without the assistance of the electromagnetic catapult. Assisted take-off allows for a significant reduction in take-off field length, giving more capacity with existing airport footprints and reducing the necessary footprint of new airports, which will both reduce costs and increase the number of suitable sites. The electromagnetic catapult may allow the installation of smaller engines with lower rated thrust. The consequent fuel consumption and operational cost reduction are estimated. The potential of reducing the aircraft operational costs and the runway length required making electromagnetic launch system an attractive solution to the air traffic growth in busy airports.Keywords: electromagnetic launch, fuel consumption, take-off analysis, weight reduction
Procedia PDF Downloads 334253 The Development of Portable Application Software for Cardiovascular Fitness Norms of NDUM Cadet Students
Authors: Mohar Kassim, Hardy Azmir, Rahmat Sholihin Mokhtar
Abstract:
The purpose of this study is to build portable application software to determine the level of cardiovascular fitness for cadet students of the National Defence University of Malaysia (NDUM). Fitness in the context of this study refers to physical fitness, specifically the cardiovascular endurance level test battery in the form of a 2.4 km run test for UPNM cadet students. This run test will be conducted to measure, test, and evaluate the performance of UPNM cadet students. All the run test results can be recorded electronically inside the portable software and will later be able to show the level of cardiovascular fitness of every cadet student according to age and gender. This software can also calculate the body mass index (BMI). Normative survey method will be used in this study through the analysis of the 2.4 km run test results. The run test scores will be classified in interval and ratio scales. Based on the findings of this study, portable application software will produced. The software will be able to directly assist the Military Training Academy (ALK), Malaysian Armed Forces (ATM), and other relevant agencies in determining the level of cardiovascular fitness among their staff. The test can be done electronically and on portable mode. The next step to be taken is to have this application patented.Keywords: development, software, application, portable, fitness norms, cardiovascular endurance
Procedia PDF Downloads 550252 Modelling of Structures by Advanced Finites Elements Based on the Strain Approach
Authors: Sifeddine Abderrahmani, Sonia Bouafia
Abstract:
The finite element method is the most practical tool for the analysis of structures, whatever the geometrical shape and behavior. It is extensively used in many high-tech industries, such as civil or military engineering, for the modeling of bridges, motor bodies, fuselages, and airplane wings. Additionally, experience demonstrates that engineers like modeling their structures using the most basic finite elements. Numerous models of finite elements may be utilized in the numerical analysis depending on the interpolation field that is selected, and it is generally known that convergence to the proper value will occur considerably more quickly with a good displacement pattern than with a poor pattern, saving computation time. The method for creating finite elements using the strain approach (S.B.A.) is presented in this presentation. When the results are compared with those provided by equivalent displacement-based elements, having the same total number of degrees of freedom, an excellent convergence can be obtained through some application and validation tests using recently developed membrane elements, plate bending elements, and flat shell elements. The effectiveness and performance of the strain-based finite elements in modeling structures are proven by the findings for deflections and stresses.Keywords: finite elements, plate bending, strain approach, displacement formulation, shell element
Procedia PDF Downloads 100251 The Role of State Practices and Custom in Outer Space Law
Authors: Biswanath Gupta, Raju Kd
Abstract:
Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.Keywords: customary international law, state practice, space law, treaty
Procedia PDF Downloads 343250 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability
Authors: Rungrot Trongsakul
Abstract:
This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability
Procedia PDF Downloads 353249 The Use of Actoprotectors by Professional Athletes
Authors: Kalin Ivanov, Stanislava Ivanova
Abstract:
Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.Keywords: actoprotector, sport, doping, bemitil
Procedia PDF Downloads 322