Search results for: combat maritime terrorism in the KSA
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 873

Search results for: combat maritime terrorism in the KSA

543 Deployment of Armed Soldiers in European Cities as a Source of Insecurity among Czech Population

Authors: Blanka Havlickova

Abstract:

In the last ten years, there are growing numbers of troops with machine guns serving on streets of European cities. We can see them around government buildings, major transport hubs, synagogues, galleries and main tourist landmarks. As the main purpose of armed soldier’s presence in European cities authorities declare the prevention of terrorist attacks and psychological support for tourists and domestic population. The main objective of the following study is to find out whether the deployment of armed soldiers in European cities has a calming and reassuring effect on Czech citizens (if the presence at armed soldiers make the Czech population feel more secure) or rather becomes a stress factor (the presence of soldiers standing guard in full military fatigues recalls serious criminality and terrorist attacks which are reflected in the fears and insecurity of Czech population). The initial hypothesis of this study is connected with the priming theory, the idea that when we are exposed to an image (armed soldier), it makes us unconsciously focus on a topic connected with this image (terrorism). This paper is based on a quantitative public survey, which was carried out in the form of electronic questioning among the citizens of the Czech Republic. Respondents answered 14 questions about two European cities – London and Paris. Besides general questions investigating the respondents' awareness of these cities, some of the questions focused on the fear that the respondents had when picturing themselves leaving next Monday for the given city (London or Paris). The questions asking about respondent´s travel fears and concerns were accompanied by different photos. When answering the question about fear some respondents have been presented with a photo of Westminster Palace and the Eiffel with ordinary citizens while other respondents have been presented with a picture of the Westminster Palace, the and Eiffel's tower not only with ordinary citizens, but also with one soldier holding a machine gun. The main goal of this paper is to analyse and compare data about concerns for these two groups of respondents (presented with different pictures) and find out if and how an armed soldier with a machine gun in front of the Westminster Palace or the Eiffel Tower affects the public's concerns about visiting the site. In other words, the aim of this paper is to confirm or rebut the hypothesis that the look at a soldier with a machine gun in front of the Eiffel Tower or the Westminster Palace automatically triggers the association with a terrorist attack leading to an increase in fear and insecurity among Czech population.

Keywords: terrorism, security measures, priming, risk perception

Procedia PDF Downloads 249
542 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 729
541 Talking to Ex-Islamic State Fighters inside Iraqi Prisons: An Arab Woman’s Perspective on Radicalization and Deradicalization

Authors: Suha Hassen

Abstract:

This research aims to untangle the complexity of conducting face-to-face interviews with 80 ex-Islamic State fighters, encompassing three groups: local Iraqis, Arabs from the Middle East, and international fighters from around the globe. Each interview lasted approximately two hours and was conducted in both Arabic and English, focusing on the motivations behind joining the Islamic State and the pathways and mechanisms facilitating their involvement. The phenomenon of individuals joining violent Islamist extremist and jihadist organizations is multifaceted, drawing substantial attention within terrorism and security studies. Organizations such as the Islamic State, Hezbollah, Hamas, and Al-Qaeda pose formidable threats to international peace and stability, employing various terrorist tactics for radicalization and recruitment. However, significant gaps remain in current studies, including a lack of firsthand accounts, an inadequate understanding of original narratives (religious and linguistic) due to abstraction and misinterpretation of motivations, and a lack of Arab women's perspectives from the region. This study addresses these gaps by exploring the cultural, religious, and historical complexities that shape the narratives of ex-ISIS fighters. The paper will showcase three distinct cases: one French prisoner, one Moroccan fighter, and a local Iraqi, illustrating the diverse motivations and experiences that contribute to joining and leaving extremist groups. The findings provide valuable insights into the nuanced dynamics of radicalization, emphasizing the need for gender-sensitive approaches in counter-terrorism strategies and deradicalization programs. Importantly, this research has practical implications for counter-narrative policies and early-stage prevention of radicalization. By understanding the narratives used by ex-fighters, policymakers can develop targeted counter-narratives that disrupt recruitment efforts. Additionally, insights into the mechanisms of radicalization can inform early intervention programs, helping to identify and support at-risk individuals before they become entrenched in extremist ideologies. Ultimately, this research enhances our understanding of the individual experiences of ex-ISIS fighters and calls for a reevaluation of the narratives surrounding women’s roles in extremism and recovery.

Keywords: Arab women in extremism, counter-narrative policy, ex-ISIS fighters in Iraq, radicalization

Procedia PDF Downloads 15
540 Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe

Authors: Khaled M. Khan, Armstrong Nhlabatsi

Abstract:

This article attempts to analyse behavioural traits of lone-wolves who struck and killed innocents in six different attacks in Europe in last nine months. The main objective of this study is to develop a profiling template in order to capture commonality of characteristics of these attackers. This study tries to understand the homogeneity of lone-wolves in terms of their social background and state of mind. The commonality among them can possibly be used to build a profiling template that could help detecting vulnerable persons who are prone to be self-radicalised or radicalised by someone else. The result of this study provides us an understanding of their commonality in terms of their state of mind and social characteristics.

Keywords: behavioral pattern, terrorism, profiling, commonality

Procedia PDF Downloads 400
539 ISIS Resurgence in the Era of COVID-19

Authors: Stacey Pollard, Henry Baraket, Girish Ganesan, Natalie Kim

Abstract:

One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery.

Keywords: Terrorism, COVID-19, Islamic State, Instability, Iraq, Syria, Global, Resurgence

Procedia PDF Downloads 69
538 A Model of the Adoption of Maritime Autonomous Surface Ship

Authors: Chin-Shan Lu, Yi-Pei Liu

Abstract:

This study examines the factors influencing the adoption of MASS in Taiwan's shipping industry. Digital technology and unmanned vehicle advancements have enhanced efficiency and reduced environmental impact in the shipping industry. The IMO has set regulations to promote low-carbon emissions and autonomous ship technology. Using the TOE framework and DOI theory, a research model was constructed, and data from 132 Taiwanese shipping companies were collected via a questionnaire survey. A structural equation modeling (SEM) was conducted to examine the relationships between variables. Results show that technological and environmental factors significantly influence operators' attitudes toward MASS, while organizational factors impact their willingness to adopt. Enhancing technological support, internal resource allocation, top management support, and cost management are crucial for promoting adoption. This study identifies key factors and provides recommendations for adopting autonomous ships in Taiwan's shipping industry.

Keywords: MASS, technology-organization-environment, diffusion of innovations theory, shipping industry

Procedia PDF Downloads 20
537 A Novel Integration of Berth Allocation, Quay Cranes and Trucks Scheduling Problems in Container Terminals

Authors: M. Moharami Gargari, S. Javdani Zamani, A. Mohammadnejad, S. Abuali

Abstract:

As maritime container transport is developing fast, the need arises for efficient operations at container terminals. One of the most important determinants of container handling efficiency is the productivity of quay cranes and internal transportation vehicles, which are responsible transporting of containers for unloading and loading operations for container vessels. For this reason, this paper presents an integrated mathematical model formulation for discrete berths with quay cranes and internal transportations vehicles. The problems have received increasing attention in the literature and the present paper deals with the integration of these interrelated problems. A new mixed integer linear formulation is developed for the Berth Allocation Problem (BAP), Quay Crane Assignment and Scheduling Problem (QCASP) and Internal Transportation Scheduling (ITS), which accounts for cranes and trucks positioning conditions.

Keywords: discrete berths, container terminal, truck scheduling, dynamic vessel arrival

Procedia PDF Downloads 396
536 Traditional Ecological Knowledge System as Climate Change Adaptation Strategies for Mountain Community of Tangkhul Tribe in Northeast India

Authors: Tuisem Shimrah

Abstract:

One general agreement on climate change is that its causes may be local but the effects are global. Indigenous people are subscribed to “low-carbon” traditional ways of life and as such they have contributed little to causes of climate change. On the contrary they are the most adversely affected by climate change due to their dependence on surrounding rich biological wealth as a source of their livelihood, health care, entertainment and cultural activities This paper deals with the results of the investigation of various adaptation strategies adopted to combat climate change by traditional community. The result shows effective ways of application of traditional knowledge and wisdom applied by Tangkhul traditional community at local and community level in remote areas in Northeast India. Four adaptation measures are being presented in this paper.

Keywords: adaptation, climate change, Northeast India, Tangkhul, traditional community

Procedia PDF Downloads 274
535 Diffusion of “Not One Woman Less”: Argentina and Beyond

Authors: Adriana Piatti-Crocker

Abstract:

Drawing on archival documentation, digital platforms, academic journals, and reports, this research will explore the diffusion of a protest movement in Latin America. Starting in Argentina in 2015, this paper will explain how the hashtag #NiUnaMenos (“Not One Woman Less”), created to combat violence against women and girls, led to the spread of a regionwide movement. A year after its introduction, hundreds of thousands of activists mobilized on the streets of major cities in Latin America. Movements arose to protest against specific circumstances and contexts under the hashtag #NiUnaMenos, but the main goal of all of these protests was to fight against misogynist violence. Moreover, unlike previous social movements, the use of social media, such as Facebook, Instagram, Whatsapp, and Twitter, changed the depth and scope of these protests and led to an unprecedented speed in helping transmit their messages, strategies, identities, and goals.

Keywords: social protests, #NiUnaMenos ( Not one woman less), diffusion of social protests, protests and mysoginist violence

Procedia PDF Downloads 90
534 MMSE-Based Beamforming for Chip Interleaved CDMA in Aeronautical Mobile Radio Channel

Authors: Sherif K. El Dyasti, Esam A. Hagras, Adel E. El-Hennawy

Abstract:

This paper addresses the performance of antenna array beam-forming on Chip-Interleaved Code Division Multiple Access (CI_CDMA) system based on Minimum Mean Square Error (MMSE) detector in aeronautical mobile radio channel. Multipath fading, Doppler shifts caused by the speed of the aircraft, and Multiple Access Interference (MAI) are the most important reasons that affect and reduce the performance of aeronautical system. In this paper, we suggested the CI-CDMA with antenna array to combat this fading and improve the bit error rate (BER) performance. We further evaluate the performance of the proposed system in the four standard scenarios in aeronautical mobile radio channel.

Keywords: aeronautical channel, CI-CDMA, beamforming, communication, information

Procedia PDF Downloads 413
533 Evaluation of the Most Effective Insecticides against the Spodoptera Frugiperda, on the Maize Production

Authors: Ahmed Ali Hassan

Abstract:

In 2016, the Fall Armyworm (FAW) was first discovered in Africa. FAW is abundantly present in Somalia and seriously harms the maize crop. This investigation examined the impact on maize productivity of three different pesticides used to combat the autumn armyworm, Spodoptera frugiperda (Noctuidae: Lepidoptera). During the 2020–2021 growing season, three insecticides (Malathion 57 EC, Ampligo150 ZC, and Carbryle 85 WP) were evaluated at field demonstration plots. Our result showed that, significant mortality of S. frugiperda was observed on the treatment plot treated with Amplico. Ampligo caused over 90% larval mortality after application. Malathion had moderate activity, causing 53.733% mortality after application, while Carbaryl was less effective, causing 36.367% mortality after application. Consequently, the current finding shows that the three selected insecticides reduced the damage and infestation level of S. frugiperda in the maize field conditions and the most effective treatment were Amplico.

Keywords: pesticides, maize fall army worm, insecticides, mortality, S. frugiperda

Procedia PDF Downloads 64
532 The Implementation of Self-Determination Theory on the Opportunities and Challenges for Blended E-Learning in Motivating Egyptian Logistics Learners

Authors: Aisha Noour, Nick Hubbard

Abstract:

Learner motivation is considered an important premise for the Blended e-Learning (BL) method. BL is an effective learning method in multiple domains, which opens several opportunities for its participants to engage in the learning environment. This research explores the learners’ perspective of BL according to the Self-Determination Theory (SDT). It identifies the opportunities and challenges for using the BL in Logistics Education (LE) in Egyptian Higher Education (HE). SDT is approached from different perspectives within the relationship between Intrinsic Motivation (IM), Extrinsic Motivation (EM) and Amotivation (AM). A self-administered face-to-face questionnaire was used to collect data from learners who were geographically widely spread around three colleges of International Transport and Logistics (CILTs) at the Arab Academy for Science, Technology and Maritime Transport (AAST&MT) in Egypt. Six hundred and sixteen undergraduates responded to a questionnaire survey. Respondents were drawn from three branches in Greater Cairo, Alexandria, and Port Said. The data analysis used was SPSS 22 and AMOS 18.

Keywords: intrinsic motivation, extrinsic motivation, amotivation, blended e-learning, Self Determination Theory

Procedia PDF Downloads 414
531 Literature Review: Microalgae as Functional Foods with Solvent Free Extraction

Authors: Angela Justina Kumalaputri

Abstract:

Indonesia, as a maritime country, has abundant marine living resources yet has not been optimally utilized. So far, we only focusing on fisheries. In the other hand, Indonesia, as the country with the fourth longest coastline, is a very good cultivation place for microalgae. Microalgae can be diversified to many important products, such as food, fuel, pharmaceutical products, functional food, and cosmetics.This research is focusing on the literature study about types of microalgae as sources for functional foods (such as antioxidants), including the contents and the separation methods. The research methods which we use are: (1) Literature study about various microalgaes (2) Literature study about extractions using supercritical fluid of CO₂, which are free from toxic organic solvents, environmentally friendly, and safe for food products. Supercritical fluid extraction using CO₂ (low critical points: temperature at 31.1 oC and pressure at 72.9 bars) could be done at a low temperature which are suitable for temperature labile compounds, low energy, and faster extraction time compared with conventional method of extraction.

Keywords: antioxidants, supercritical fluid extraction, solvent-free extraction, microalgae

Procedia PDF Downloads 71
530 The Active Subject and the Victim of Trafficking in Human Beings: Material and Procedural Criminal Law Approaches

Authors: Andrei Nastas, Sergiu Cernomopret

Abstract:

This research addresses trafficking in human beings, in terms of the active subject and the victim of this crime, through the prism of national and international regulations in material and procedural criminal matters. For the correlative approach of both mentioned aspects, the active subject and the victim of trafficking in human beings, the research addresses both its constituent elements and the way to prevent and combat this phenomenon through criminal proceedings. As follows, trafficking in human beings, from a material criminal point of view, involves two subjects of this crime (active subject - offender and passive subject - victim), while their procedural status differs depending on the case (victim or injured party). The result of the research highlights some clarifications, which find a theoretical-practical basis in the legal provisions, the specialized doctrine, and the judicial practice.

Keywords: victim, active subject, abuse, injured party, crime

Procedia PDF Downloads 128
529 Human Resource Management Challenges in Nigeria Under a Globalised Economy

Authors: Odeh Linus

Abstract:

The pace of globalization is increasing continuously in terms of markets for goods and services, investment opportunities across borders amongst others. Enterprises face competition from all fronts. Human resource management is not left out in this transformation crusade as it has obligation to move along with the changing demands of the globalization process. One of the objectives of this paper is to show that effective managers should constantly be aware of the changes taking place in domestic (home country) environment, as well as around the globe (international and foreign environments) on HR issues and developments. By so doing, they can scan their environment on an ongoing basis, and when they detect opportunities and/or threats, they can transform their organization to seize the opportunities and/or combat or neutralize the threats as the case may be. In this presentation, problems, issues and trends in HRM practice in Nigeria in the current period were reviewed. The factors affecting HRM and its practice in a global context and what should be the direction of the profession and its practice in Nigeria constitute the main focus of this paper.

Keywords: human resource, globalization, management, developing countries

Procedia PDF Downloads 307
528 An Efficient Acquisition Algorithm for Long Pseudo-Random Sequence

Authors: Wan-Hsin Hsieh, Chieh-Fu Chang, Ming-Seng Kao

Abstract:

In this paper, a novel method termed the Phase Coherence Acquisition (PCA) is proposed for pseudo-random (PN) sequence acquisition. By employing complex phasors, the PCA requires only complex additions in the order of N, the length of the sequence, whereas the conventional method utilizing fast Fourier transform (FFT) requires complex multiplications and additions both in the order of Nlog2N . In order to combat noise, the input and local sequences are partitioned and mapped into complex phasors in PCA. The phase differences between pairs of input and local phasors are utilized for acquisition, and thus complex multiplications are avoided. For more noise-robustness capability, the multi-layer PCA is developed to extract the code phase step by step. The significant reduction of computational loads makes the PCA an attractive method, especially when the sequence length of is extremely large which becomes intractable for the FFT-based acquisition.

Keywords: FFT, PCA, PN sequence, convolution theory

Procedia PDF Downloads 473
527 Between Order and Chaos: Politics and the Challenge of Peace in Mozambique

Authors: Edmilson Nhambe, Belisario Machaieie

Abstract:

Since the signing of the General Peace Agreement-GPA in 1992, Mozambique has seen successive setbacks in the search for effective peace, civil war, social conflicts, terrorism, and armed conflicts mix the reality of Mozambican democracy. The article seeks to understand the dynamics of conflict and peace in Mozambique. Specifically, it seeks to analyze the structural factors that lead to (violent) conflict situations and the factors that favor or promote peace. For this purpose, desk research was chosen to analyze studies of peace and conflict. This article develops the argument that the non-violation of the peace agreement, in particular the GPA in Rome, as it had a structuring effect on the Mozambican political system, no longer guarantees in itself the irreversibility of the pacification process. In fact, the country is currently stagnating in the category of a fragile peace process with the risk of slipping into a situation of war or open armed conflict.

Keywords: peace, conflict, GPA, instability

Procedia PDF Downloads 194
526 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 56
525 Developing Logistics Indices for Turkey as an an Indicator of Economic Activity

Authors: Gizem İntepe, Eti Mizrahi

Abstract:

Investment and financing decisions are influenced by various economic features. Detailed analysis should be conducted in order to make decisions not only by companies but also by governments. Such analysis can be conducted either at the company level or on a sectoral basis to reduce risks and to maximize profits. Sectoral disaggregation caused by seasonality effects, subventions, data advantages or disadvantages may appear in sectors behaving parallel to BIST (Borsa Istanbul stock exchange) Index. Proposed logistic indices could serve market needs as a decision parameter in sectoral basis and also helps forecasting activities in import export volume changes. Also it is an indicator of logistic activity, which is also a sign of economic mobility at the national level. Publicly available data from “Ministry of Transport, Maritime Affairs and Communications” and “Turkish Statistical Institute” is utilized to obtain five logistics indices namely as; exLogistic, imLogistic, fLogistic, dLogistic and cLogistic index. Then, efficiency and reliability of these indices are tested.

Keywords: economic activity, export trade data, import trade data, logistics indices

Procedia PDF Downloads 332
524 Challenge of Net-Zero Carbon Construction and Measurement of Energy Consumption and Carbon Emission Reduction to Climate Change, Economy and Job Growths in Hong Kong and Australia

Authors: Kwok Tak Kit

Abstract:

Under the Paris Agreement 2015, the countries committed to address and combat the climate change and its negative impacts and agree to the target of reducing the global greenhouse gas (GHG) emission substantially by limiting the global temperature to 20C above the pre-industrial level in this century. A internationally Submit named “ 26th United Nations Climate Conference” (COP26) was held in Glasgow in 2021 with all committed countries agreed to the finalize the outstanding element in Paris Agreement and Glasgow Climate Pact to keep 1.50C. In this paper, we will focus on the basic approach of waste strategy, recycling policy, circular economy strategy, net-zero strategy and sustainability strategy and the importance of the elements which affect the carbon emission, waste generation and energy conservation will be further reviewed with recommendation for future study.

Keywords: net-zero carbon, climate change, carbon emission, energy consumption

Procedia PDF Downloads 178
523 Red Dawn in the Desert: A World-Systems Analysis of the Maritime Silk Road Initiative

Authors: Toufic Sarieddine

Abstract:

The current debate on the hegemonic impact of China’s Belt and Road Initiative (BRI) is of two opposing strands: Resilient and absolute US hegemony on the one hand and various models of multipolar hegemony such as bifurcation on the other. Bifurcation theories illustrate an unprecedented division of hegemonic functions between China and the US, whereby Beijing becomes the world’s economic hegemon, leaving Washington the world’s military hegemon and security guarantor. While consensus points to China being the main driver of unipolarity’s rupturing, the debate among bifurcationists is on the location of the first rupture. In this regard, the Middle East and North Africa (MENA) region has seen increasing Chinese foreign direct investment in recent years while that to other regions has declined, ranking it second in 2018 as part of the financing for the Maritime Silk Road Initiative (MSRI). China has also become the top trade partner of 11 states in the MENA region, as well as its top source of machine imports, surpassing the US and achieving an overall trade surplus almost double that of Washington’s. These are among other features outlined in world-systems analysis (WSA) literature which correspond with the emergence of a new hegemon. WSA is further utilized to gauge other facets of China’s increasing involvement in MENA and assess whether bifurcation is unfolding therein. These features of hegemony include the adoption of China’s modi operandi, economic dominance in production, trade, and finance, military capacity, cultural hegemony in ideology, education, and language, and the promotion of a general interest around which to rally potential peripheries (MENA states in this case). China’s modi operandi has seen some adoption with regards to support against the United Nations Convention on the Law of the Sea, oil bonds denominated in the yuan, and financial institutions such as the Shanghai Gold Exchange enjoying increasing Arab patronage. However, recent elections in Qatar, as well as liberal reforms in Saudi Arabia, demonstrate Washington’s stronger normative influence. Meanwhile, Washington’s economic dominance is challenged by China’s sizable machine exports, increasing overall imports, and widening trade surplus, but retains some clout via dominant arms and transport exports, as well as free-trade deals across the region. Militarily, Washington bests Beijing’s arms exports, has a dominant and well-established presence in the region, and successfully blocked Beijing’s attempt to penetrate through the UAE. Culturally, Beijing enjoys higher favorability in Arab public opinion, and its broadcast networks have found some resonance with Arab audiences. In education, the West remains MENA students’ preferred destination. Further, while Mandarin has become increasingly available in schools across MENA, its usage and availability still lag far behind English. Finally, Beijing’s general interest in infrastructure provision and prioritizing economic development over social justice and democracy provides an avenue for increased incorporation between Beijing and the MENA region. The overall analysis shows solid progress towards bifurcation in MENA.

Keywords: belt and road initiative, hegemony, Middle East and North Africa, world-systems analysis

Procedia PDF Downloads 105
522 Climatic Roots of Piracy in Red Sea

Authors: Nasser Karami

Abstract:

Piracy in the North West of Indian Ocean and the Red Sea has become a global crisis in recent years. Pirates of this area are often very poor people from the Horn of Africa and the western coast of the Red Sea. Climatic and geographical evidence suggests that poverty and destruction of social structures in the region have directly relation to prolonged-drought. Indeed, after the seventies (more than 40 years ago) due to the long-term drought in the region, all political, economic and social structures had declined. Spread of terrorism, violent extremism and of course piracy, are main effects of climate change and drought of this regression. It is disturbing to say the climatic documents say that because of global climate change, severe drought will continue in this region. This mean that the dangers worse than piracy threatens the future of this area. Forty-year data that has assessed in this study indicate that there is direct relationship between spread of drought and piracy in the Red Sea.

Keywords: climate, poverty, climate change, drought, piracy in red sea

Procedia PDF Downloads 494
521 Docking Studie of Biologically Active Molecules: Exploring Medical Applications

Authors: Sihame Amakrane, Zineb Ouahdi, Mohammed Salah, Said Belaaouad

Abstract:

\This research explores the efficacy of novel pyrimidine derivatives on bacterial strains such as Escherichia coli, Staphylococcus aureus, and Myccobacterium tuberculosis, utilizing bending energy calculations. Of the 25 compounds examined, 13 displayed potent activity against all the bacterial strains under study, exhibiting bending energy measurements between -7.4 and -10.7 kcal/mol. The -7.4 kcal/mol value corresponds to the bending energy of the SA12 and SA13 compounds with the 2xct protein (Staphylococcus aureus), whereas the -10.7 kcal/molis linked with the bending energy of SA6 and SA11 compounds with the 6GAV protein (Myccobacterium tuberculosis). Further research will involve a QSAR (Quantitative Structure-Activity Relationship) study aimed at constructing a reliable model to combat the aforementioned bacterial strains and a molecular dynamics study to evaluate the stability of ligand-protein complexes.

Keywords: docking, QSAR, bending energy, e. coli

Procedia PDF Downloads 77
520 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios

Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão

Abstract:

Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.

Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario

Procedia PDF Downloads 189
519 The Ebola Virus Disease and Its Outbreak in Nigeria

Authors: Osagiede Efosa Kelvin

Abstract:

The Ebola virus disease (EVD); also Ebola hemorrhagic fever, is a disease of humans and other primates caused by Ebola viruses. Signs and symptoms typically start between two days and three weeks after contracting the virus as a fever, sore throat, muscle pain, and headaches. Then, vomiting, diarrhoea and rash usually follow, along with decreased function of the liver and kidneys. At this time, some people begin to bleed both internally and externally. The first death in Nigeria was reported on 25 July 2014: a Liberian-American with Ebola flew from Liberia to Nigeria and died in Lagos soon after arrival. As part of the effort to contain the disease, possible contacts were monitored –353 in Lagos and 451 in Port Harcourt On 22 September, the World Health Organisation reported a total of 20 cases, including eight deaths. The WHO's representative in Nigeria officially declared Nigeria Ebola-free on 20 October after no new active cases were reported in the follow-up contact. This paper looks at the Ebola Virus in general and the measures taken by Nigeria to combat its spread.

Keywords: Ebola virus, hemorrhagic fever, Nigeria, outbreak

Procedia PDF Downloads 497
518 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 329
517 Cooperative Spectrum Sensing Using Hybrid IWO/PSO Algorithm in Cognitive Radio Networks

Authors: Deepa Das, Susmita Das

Abstract:

Cognitive Radio (CR) is an emerging technology to combat the spectrum scarcity issues. This is achieved by consistently sensing the spectrum, and detecting the under-utilized frequency bands without causing undue interference to the primary user (PU). In soft decision fusion (SDF) based cooperative spectrum sensing, various evolutionary algorithms have been discussed, which optimize the weight coefficient vector for maximizing the detection performance. In this paper, we propose the hybrid invasive weed optimization and particle swarm optimization (IWO/PSO) algorithm as a fast and global optimization method, which improves the detection probability with a lesser sensing time. Then, the efficiency of this algorithm is compared with the standard invasive weed optimization (IWO), particle swarm optimization (PSO), genetic algorithm (GA) and other conventional SDF based methods on the basis of convergence and detection probability.

Keywords: cognitive radio, spectrum sensing, soft decision fusion, GA, PSO, IWO, hybrid IWO/PSO

Procedia PDF Downloads 463
516 The Effects of Irregular Immigration Originating from Syria on Turkey's Security Issues

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

After the September 11 attacks, fight against terrorism has risen to higher levels in security concepts of the countries. The following reactions of some nation states have led to the formation of unstable areas in different parts of the World. Especially, in Iraq and Syria, the influences of radical groups have risen with the weakening of the central governments. Turkey (with the geographical proximity to the current crisis) has become a stop on the movement of people who were displaced because of terrorism. In the process, the policies of the Syrian regime resulted in a civil war which is still going on since 2011, and remain as an unresolved crisis. With the extension of the problem, changes occurred in foreign policies of the World Powers; moreover, the ongoing effects of the riots, conflicts of interests of foreign powers, conflicts in the region because of the activities of radical groups increased instability within the country. This case continues to affect the security of Turkey, particularly illegal immigration. It has exceeded the number of two million Syrians who took refuge in Turkey due to the civil war, while continuing uncertainty about the legal status of asylum seekers, besides the security problems of asylum-seekers themselves, there are problems in education, health and communication (language) as well. In this study, we will evaluate the term of immigration through the eyes of national and international law, place the disorganized and illegal immigration in security sphere, and define the elements/components of irregular migration within the changing security concept. Ultimately, this article will assess the effects of the Syrian refuges to Turkey’s short-term, mid-term, and long-term security in the light of the national and international data flows and solutions will be presented to the ongoing problem. While explaining the security problems the data and the donnees obtained from the nation and international corporations will be examined thorough the human security dimensions such as living conditions of the immigrants, the ratio of the genders, especially birth rate occasions, the education circumstances of the immigrant children, the effects of the illegal passing on the public order. In addition, the demographic change caused by the immigrants will be analyzed, the changing economical conditions where the immigrants mostly accumulate, and their participation in public life will be worked on and the economical obstacles sourcing due to irregular immigration will be clarified. By the entire datum gathered from the educational, cultural, social, economic, demographical extents, the regional factors affecting the migration and the role of irregular migration in Turkey’s future security will be revealed by implication to current knowledge sources.

Keywords: displaced people, human security, irregular migration, refugees

Procedia PDF Downloads 305
515 Enhanced Iceberg Information Dissemination for Public and Autonomous Maritime Use

Authors: Ronald Mraz, Gary C. Kessler, Ethan Gold, John G. Cline

Abstract:

The International Ice Patrol (IIP) continually monitors iceberg activity in the North Atlantic by direct observation using ships, aircraft, and satellite imagery. Daily reports detailing navigational boundaries of icebergs have significantly reduced the risk of iceberg contact. What is currently lacking is formatting this data for automatic transmission and display of iceberg navigational boundaries in commercial navigation equipment. This paper describes the methodology and implementation of a system to format iceberg limit information for dissemination through existing radio network communications. This information will then automatically display on commercial navigation equipment. Additionally, this information is reformatted for Google Earth rendering of iceberg track line limits. Having iceberg limit information automatically available in standard navigation equipment will help support full autonomous operation of sailing vessels.

Keywords: iceberg, iceberg risk, iceberg track lines, AIS messaging, international ice patrol, North American ice service, google earth, autonomous surface vessels

Procedia PDF Downloads 134
514 Computer Based Identification of Possible Molecular Targets for Induction of Drug Resistance Reversion in Multidrug Resistant Mycobacterium Tuberculosis

Authors: Oleg Reva, Ilya Korotetskiy, Marina Lankina, Murat Kulmanov, Aleksandr Ilin

Abstract:

Molecular docking approaches are widely used for design of new antibiotics and modeling of antibacterial activities of numerous ligands which bind specifically to active centers of indispensable enzymes and/or key signaling proteins of pathogens. Widespread drug resistance among pathogenic microorganisms calls for development of new antibiotics specifically targeting important metabolic and information pathways. A generally recognized problem is that almost all molecular targets have been identified already and it is getting more and more difficult to design innovative antibacterial compounds to combat the drug resistance. A promising way to overcome the drug resistance problem is an induction of reversion of drug resistance by supplementary medicines to improve the efficacy of the conventional antibiotics. In contrast to well established computer-based drug design, modeling of drug resistance reversion still is in its infancy. In this work, we proposed an approach to identification of compensatory genetic variants reducing the fitness cost associated with the acquisition of drug resistance by pathogenic bacteria. The approach was based on an analysis of the population genetic of Mycobacterium tuberculosis and on results of experimental modeling of the drug resistance reversion induced by a new anti-tuberculosis drug FS-1. The latter drug is an iodine-containing nanomolecular complex that passed clinical trials and was admitted as a new medicine against MDR-TB in Kazakhstan. Isolates of M. tuberculosis obtained on different stages of the clinical trials and also from laboratory animals infected with MDR-TB strain were characterized by antibiotic resistance, and their genomes were sequenced by the paired-end Illumina HiSeq 2000 technology. A steady increase in sensitivity to conventional anti-tuberculosis antibiotics in series of isolated treated with FS-1 was registered despite the fact that the canonical drug resistance mutations identified in the genomes of these isolates remained intact. It was hypothesized that the drug resistance phenotype in M. tuberculosis requires an adjustment of activities of many genes to compensate the fitness cost of the drug resistance mutations. FS-1 cased an aggravation of the fitness cost and removal of the drug-resistant variants of M. tuberculosis from the population. This process caused a significant increase in genetic heterogeneity of the Mtb population that was not observed in the positive and negative controls (infected laboratory animals left untreated and treated solely with the antibiotics). A large-scale search for linkage disequilibrium associations between the drug resistance mutations and genetic variants in other genomic loci allowed identification of target proteins, which could be influenced by supplementary drugs to increase the fitness cost of the drug resistance and deprive the drug-resistant bacterial variants of their competitiveness in the population. The approach will be used to improve the efficacy of FS-1 and also for computer-based design of new drugs to combat drug-resistant infections.

Keywords: complete genome sequencing, computational modeling, drug resistance reversion, Mycobacterium tuberculosis

Procedia PDF Downloads 259