Search results for: military coup
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 581

Search results for: military coup

251 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 90
250 A Unified Approach for Naval Telecommunication Architectures

Authors: Y. Lacroix, J.-F. Malbranque

Abstract:

We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.

Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion

Procedia PDF Downloads 291
249 Relay Node Placement for Connectivity Restoration in Wireless Sensor Networks Using Genetic Algorithms

Authors: Hanieh Tarbiat Khosrowshahi, Mojtaba Shakeri

Abstract:

Wireless Sensor Networks (WSNs) consist of a set of sensor nodes with limited capability. WSNs may suffer from multiple node failures when they are exposed to harsh environments such as military zones or disaster locations and lose connectivity by getting partitioned into disjoint segments. Relay nodes (RNs) are alternatively introduced to restore connectivity. They cost more than sensors as they benefit from mobility, more power and more transmission range, enforcing a minimum number of them to be used. This paper addresses the problem of RN placement in a multiple disjoint network by developing a genetic algorithm (GA). The problem is reintroduced as the Steiner tree problem (which is known to be an NP-hard problem) by the aim of finding the minimum number of Steiner points where RNs are to be placed for restoring connectivity. An upper bound to the number of RNs is first computed to set up the length of initial chromosomes. The GA algorithm then iteratively reduces the number of RNs and determines their location at the same time. Experimental results indicate that the proposed GA is capable of establishing network connectivity using a reasonable number of RNs compared to the best existing work.

Keywords: connectivity restoration, genetic algorithms, multiple-node failure, relay nodes, wireless sensor networks

Procedia PDF Downloads 241
248 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 455
247 Reducing Weight and Fuel Consumption of Civil Aircraft by EML

Authors: Luca Bertola, Tom Cox, Pat Wheeler, Seamus Garvey, Herve Morvan

Abstract:

Electromagnetic launch systems have been proposed for military applications to accelerate jet planes on aircraft carriers. This paper proposes the implementation of similar technology to aid civil aircraft take-off, which can provide significant economic, environmental and technical benefits. Assisted launch has the potential of reducing ground noise and emissions near airports and improving overall aircraft efficiency through reducing engine thrust requirements. This paper presents a take-off performance analysis for an Airbus A320-200 taking off with and without the assistance of the electromagnetic catapult. Assisted take-off allows for a significant reduction in take-off field length, giving more capacity with existing airport footprints and reducing the necessary footprint of new airports, which will both reduce costs and increase the number of suitable sites. The electromagnetic catapult may allow the installation of smaller engines with lower rated thrust. The consequent fuel consumption and operational cost reduction are estimated. The potential of reducing the aircraft operational costs and the runway length required making electromagnetic launch system an attractive solution to the air traffic growth in busy airports.

Keywords: electromagnetic launch, fuel consumption, take-off analysis, weight reduction

Procedia PDF Downloads 332
246 The Development of Portable Application Software for Cardiovascular Fitness Norms of NDUM Cadet Students

Authors: Mohar Kassim, Hardy Azmir, Rahmat Sholihin Mokhtar

Abstract:

The purpose of this study is to build portable application software to determine the level of cardiovascular fitness for cadet students of the National Defence University of Malaysia (NDUM). Fitness in the context of this study refers to physical fitness, specifically the cardiovascular endurance level test battery in the form of a 2.4 km run test for UPNM cadet students. This run test will be conducted to measure, test, and evaluate the performance of UPNM cadet students. All the run test results can be recorded electronically inside the portable software and will later be able to show the level of cardiovascular fitness of every cadet student according to age and gender. This software can also calculate the body mass index (BMI). Normative survey method will be used in this study through the analysis of the 2.4 km run test results. The run test scores will be classified in interval and ratio scales. Based on the findings of this study, portable application software will produced. The software will be able to directly assist the Military Training Academy (ALK), Malaysian Armed Forces (ATM), and other relevant agencies in determining the level of cardiovascular fitness among their staff. The test can be done electronically and on portable mode. The next step to be taken is to have this application patented.

Keywords: development, software, application, portable, fitness norms, cardiovascular endurance

Procedia PDF Downloads 549
245 Modelling of Structures by Advanced Finites Elements Based on the Strain Approach

Authors: Sifeddine Abderrahmani, Sonia Bouafia

Abstract:

The finite element method is the most practical tool for the analysis of structures, whatever the geometrical shape and behavior. It is extensively used in many high-tech industries, such as civil or military engineering, for the modeling of bridges, motor bodies, fuselages, and airplane wings. Additionally, experience demonstrates that engineers like modeling their structures using the most basic finite elements. Numerous models of finite elements may be utilized in the numerical analysis depending on the interpolation field that is selected, and it is generally known that convergence to the proper value will occur considerably more quickly with a good displacement pattern than with a poor pattern, saving computation time. The method for creating finite elements using the strain approach (S.B.A.) is presented in this presentation. When the results are compared with those provided by equivalent displacement-based elements, having the same total number of degrees of freedom, an excellent convergence can be obtained through some application and validation tests using recently developed membrane elements, plate bending elements, and flat shell elements. The effectiveness and performance of the strain-based finite elements in modeling structures are proven by the findings for deflections and stresses.

Keywords: finite elements, plate bending, strain approach, displacement formulation, shell element

Procedia PDF Downloads 99
244 The Role of State Practices and Custom in Outer Space Law

Authors: Biswanath Gupta, Raju Kd

Abstract:

Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.

Keywords: customary international law, state practice, space law, treaty

Procedia PDF Downloads 343
243 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.

Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability

Procedia PDF Downloads 352
242 The Use of Actoprotectors by Professional Athletes

Authors: Kalin Ivanov, Stanislava Ivanova

Abstract:

Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.

Keywords: actoprotector, sport, doping, bemitil

Procedia PDF Downloads 322
241 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 341
240 Development and Validation of the 'Short Form BASIC Scale' Psychotic Tendencies Subscale

Authors: Chia-Chun Wu, Ying-Yao Cheng

Abstract:

The purpose of this study was developing the 'short-form BASIC scale' psychotic tendencies subscale so as to provide a more efficient, economical and effective way to assess the mental health of recruits. 1749 students from Naval Recruit Training Center participated in this study. The multidimensional constructs of psychotic tendencies subscale include four dimensions: schizophrenic tendencies, manic tendencies, depression tendencies, and suicidal ideation. We cut down the 36-item psychotic tendencies subscale to 25 items by using multidimension Rasch techniques. They were applied to assess model-data fit and to provide the validity evidence of the short form BASIC scale of psychotic tendencies subscale. The person separation reliabilities of the measures from four dimensions were .70, .67, .74 and .57, respectively. In addition, there is a notable correlation between the length version and short version of schizophrenic tendencies (scaled .89), manic tendencies (.96), depression tendencies (.97) and suicidal ideation (.97). The results have indicated that the development of the study of short-form scale sufficient to replace the original scale. Therefore, it is suggested that short-form basic scale is used to assess the mental health with participants being more willing to answer questions to ensure the validation of assessments.

Keywords: BASIC scale, military, Rasch analysis, short-form scale

Procedia PDF Downloads 361
239 Metaphors Investigation between President Xi Jinping of China and Trump of Us on the Corpus-Based Approach

Authors: Jie Zheng, Ruifeng Luo

Abstract:

The United States is the world’s most developed economy with the strongest military power. China is the fastest growing country with growing comprehensive strength and its economic strength is second only to the US. However, the conflict between them is getting serious in recent years. President’s address is the representative of a nation’s ideology. The paper has built up a small sized corpus of President Xi Jinping and Trump’s speech in Davos to investigate their respective use and types of metaphors and calculate the respective percentage of each type of metaphor. The result shows President Xi Jinping employs more metaphors than Trump. The metaphors of Xi includes “building” metaphor, “plant” metaphor, “journey” metaphor, “ship” metaphor, “traffic” metaphor, “nation is a person” metaphor, “show” metaphor, etc while Trump’s comprises “war” metaphor, “building” metaphor, “journey” metaphor, “traffic” metaphor, “tax” metaphor, “book” metaphor, etc. After investigating metaphor use differences, the paper makes an analysis of the underlying ideology between the two nations. China is willing to strengthen ties with all the countries all over the world and has built a platform of development for them and itself to go to the destination of social well being while the US pays much concern to itself, emphasizing its first leading position and is also willing to help its alliances to development. The paper’s comparison of the ideology difference between the two countries will help them get a better understanding and reduce the conflict to some extent.

Keywords: metaphor; corpus; ideology; conflict

Procedia PDF Downloads 147
238 “The Forgotten People:” Analyzing the Invisible, Intersectional Discrimination Against Metis Women

Authors: Yifan Jia

Abstract:

The Metis is a group of indigenous peoples in Canada. Having experienced centuries of injustices, beginning with colonialism dating back to the 16th century, culminating with military defeats in the 1800s and the establishment of residential schools, and continuing with structural injustices in the 21st century, Metis people have long been, and continue to be marginalized and made invisible in the Canadian society. In particular, Metis women born between 1997 and 2012 face intersectional discrimination based on not only race, but also a multitude of identity factors, including gender, age, geographical location, health, sexual orientation, and lateral violence from First Nations peoples. This paper uncovers the multilayered oppression against young Metis women through a literature review and uses several theories to analyze the invisibility of this discrimination in society, including color-blind racism, collective shame, lack of understanding of intersectionality, and Mauvaise foi (bad faith). To address the invisible, intersectional discrimination against young Metis women, several suggestions and possibilities could be considered. These include amending the education system, fostering group affiliation, bringing structural changes to federal policies and funding systems, and cooperating with other indigenous nations such as First Nations and Inuit.

Keywords: discrimination, Metis Women, indigenous rights, intersectionality

Procedia PDF Downloads 70
237 Women in the Soviet Press during the Great Patriotic War (1941-1945)

Authors: Nani Manvelishvili

Abstract:

Soviet propaganda tried to shape common public opinion through Soviet Press. The activation of propaganda gained special importance to increase the fighting ability of the military and people behind the front During the Great Patriotic war (1941-1945). The state propaganda used unnecessary intervention in Press and created characters who were supposed to be role models for society. The new female role models were identified, which were supported by the authorities. The representation of the mother, warrior woman, working woman, victim, feminine woman, etc., in the works aimed to raise the fighting ability of the Soviet citizen and incite patriotism. This paper analyzes the soviet Press (The newspaper “Komunisti”) that was written and published during the Great Patriotic war in Soviet Georgia. The study aims to find propagandistic content in Press that used Soviet ideology during the Great Patriotic war. We analyzed the Soviet Newspaper "Komunisti," published during wartime. Soviet Press had the most significant impact on the formation of public opinion. The Soviet government actively used this resource to increase combat capability. While at the beginning of the war, women were supposed to replace men, propaganda by the end of the war moved to reassert conservative gender politics. Women returned to their traditional roles.

Keywords: Great Patriotic War, Soviet Georgia, women in war, women's history, Soviet press

Procedia PDF Downloads 98
236 Impact of COVID-19 Pandemic in the European Air Transport Command during 2020-2021

Authors: Martin Gascón Hove, Ralph Vermeltfoort, Alessandro Fiorini, Erwan Dulaurent, Henning von Perbandt

Abstract:

Introduction: The outbreak of the COVID-19 pandemic has completely changed the global health situation, with more than 400 million cases published and over 5 million deaths. European Air Transport Command (EATC) is integrated by seven nations, and among its capabilities is that of aeromedical evacuation (AM). Material and methods: Impact of novel coronavirus was analysed based on the number and characteristics of patients and executed missions within EATC and, particularly by Spain, during the biennium 2020-2021. Results: One thousand sixty patients were transported in 186 missions. Neither death nor disease contagion was reported during AM performances. Military cases transferred were 986, mostly routine priority (91,4%), and 74 were civilians, who were transported in 17 missions, and 81,1% of which were categorized as urgent. Niger led the list of original countries, with 191 evacuated patients. 76,1% of requests came from Italy and Germany. Airbus A310 was the most used aircraft (32,2%). Germany transported 222 patients of another nationality, while Spain executed eight missions and repatriated 68 cases, 58 of which were from Mali. Conclusions: COVID-19 has led to a surged number of evacuated patients inside EATC, which has proven to be a safe and effective means of transportation, even in critical cases. Spain has gained prominence since its annexation in 2015.

Keywords: COVID-19, SARS-CoV-2, pandemic, aviation, Spain

Procedia PDF Downloads 153
235 Production of Energetic Nanomaterials by Spray Flash Evaporation

Authors: Martin Klaumünzer, Jakob Hübner, Denis Spitzer

Abstract:

Within this paper, latest results on processing of energetic nanomaterials by means of the Spray Flash Evaporation technique are presented. This technology constitutes a highly effective and continuous way to prepare fascinating materials on the nano- and micro-scale. Within the process, a solution is set under high pressure and sprayed into an evacuated atomization chamber. Subsequent ultrafast evaporation of the solvent leads to an aerosol stream, which is separated by cyclones or filters. No drying gas is required, so the present technique should not be confused with spray dying. Resulting nanothermites, insensitive explosives or propellants and compositions are foreseen to replace toxic (according to REACH) and very sensitive matter in military and civil applications. Diverse examples are given in detail: nano-RDX (n-Cyclotrimethylentrinitramin) and nano-aluminum based systems, mixtures (n-RDX/n-TNT - trinitrotoluene) or even cocrystalline matter like n-CL-20/HMX (Hexanitrohexaazaisowurtzitane/ Cyclotetra-methylentetranitramin). These nanomaterials show reduced sensitivity by trend without losing effectiveness and performance. An analytical study for material characterization was performed by using Atomic Force Microscopy, X-Ray Diffraction, and combined techniques as well as spectroscopic methods. As a matter of course, sensitivity tests regarding electrostatic discharge, impact, and friction are provided.

Keywords: continuous synthesis, energetic material, nanoscale, nanoexplosive, nanothermite

Procedia PDF Downloads 264
234 Pathomorphological Markers of the Explosive Wave Action on Human Brain

Authors: Sergey Kozlov, Juliya Kozlova

Abstract:

Introduction: The increased attention of researchers to an explosive trauma around the world is associated with a constant renewal of military weapons and a significant increase in terrorist activities using explosive devices. Explosive wave is a well known damaging factor of explosion. The most sensitive to the action of explosive wave in the human body are the head brain, lungs, intestines, urine bladder. The severity of damage to these organs depends on the distance from the explosion epicenter to the object, the power of the explosion, presence of barriers, parameters of the body position, and the presence of protective clothing. One of the places where a shock wave acts, in human tissues and organs, is the vascular endothelial barrier, which suffers the greatest damage in the head brain and lungs. The objective of the study was to determine the pathomorphological changes of the head brain followed the action of explosive wave. Materials and methods of research: To achieve the purpose of the study, there have been studied 6 male corpses delivered to the morgue of Municipal Institution "Dnipropetrovsk regional forensic bureau" during 2014-2016 years. The cause of death of those killed was a military explosive injury. After a visual external assessment of the head brain, for histological study there was conducted the 1 x 1 x 1 cm/piece sampling from different parts of the head brain, i.e. the frontal, parietal, temporal, occipital sites, and also from the cerebellum, pons, medulla oblongata, thalamus, walls of the lateral ventricles, the bottom of the 4th ventricle. Pieces of the head brain were immersed in 10% formalin solution for 24 hours. After fixing, the paraffin blocks were made from the material using the standard method. Then, using a microtome, there were made sections of 4-6 micron thickness from paraffin blocks which then were stained with hematoxylin and eosin. Microscopic analysis was performed using a light microscope with x4, x10, x40 lenses. Results of the study: According to the results of our study, injuries of the head brain were divided into macroscopic and microscopic. Macroscopic injuries were marked according to the results of visual assessment of haemorrhages under the membranes and into the substance, their nature, and localisation, areas of softening. In the microscopic study, our attention was drawn to both vascular changes and those of neurons and glial cells. Microscopic qualitative analysis of histological sections of different parts of the head brain revealed a number of structural changes both at the cellular and tissue levels. Typical changes in most of the studied areas of the head brain included damages of the vascular system. The most characteristic microscopic sign was the separation of vascular walls from neuroglia with the formation of perivascular space. Along with this sign, wall fragmentation of these vessels, haemolysis of erythrocytes, formation of haemorrhages in the newly formed perivascular spaces were found. In addition to damages of the cerebrovascular system, destruction of the neurons, presence of oedema of the brain tissue were observed in the histological sections of the brain. On some sections, the head brain had a heterogeneous step-like or wave-like nature. Conclusions: The pathomorphological microscopic changes in the brain, identified in the study on the died of explosive traumas, can be used for diagnostic purposes in conjunction with other characteristic signs of explosive trauma in forensic and pathological studies. The complex of microscopic signs in the head brain, i.e. separation of blood vessel walls from neuroglia with the perivascular space formation, fragmentation of walls of these blood vessels, erythrocyte haemolysis, formation of haemorrhages in the newly formed perivascular spaces is the direct indication of explosive wave action.

Keywords: blast wave, neurotrauma, human, brain

Procedia PDF Downloads 192
233 Case Scenario Simulation concerning Eventual Ship Sourced Oil Spill, Expansion and Response Process in Istanbul Strait

Authors: Cihat Aşan

Abstract:

Istanbul Strait is a crucial and narrow waterway, not only having a role in linking two continents but also has a crossover mission for the petroleum, which is the biggest energy resource, between its supply and demand sources. Besides its substantial features, sensitivities like around 18 million populations in surroundings, military facilities, ports, oil lay down areas etc. also brings the high risk to use of Istanbul Strait. Based on the statistics of Turkish Ministry of Transportation, Maritime and Communication, although the number of vessel passage in Istanbul Strait is declining, tonnage of hazardous and flammable cargo like oil and chemical transportation is increasing and subsequently the risk of oil pollution, loss of life and property is also rising. Based on the mentioned above; it is crucial to be prepared for the initial and subsequent response to eventual ship sourced oil spill which may cause to block the Strait for an unbearable duration. In this study; preconditioned Istanbul Strait sensitive areas studies has been taken into account and possible oil spill scenario is loaded to PISCES 2 (Potential Incident Simulation Control and Evaluation System) decision support system for the determined specific sea area. Consequences of the simulation like oil expanding process, required number and types of assets to response, had in hand and evaluated.

Keywords: Istanbul strait, oil spill, PISCES simulator, initial response

Procedia PDF Downloads 343
232 Experimental Study on the Effect of Storage Conditions on Thermal Hazard of Nitrocellulose

Authors: Hua Chai, Qiangling Duan, Huiqi Cao, Mi Li, Jinhua Sun

Abstract:

Nitrocellulose (NC), a kind of energetic material, has been widely used in the industrial and military fields. However, this material can also cause serious social disasters due to storage conditions. Thermal hazard of nitrocellulose (NC) was experimentally investigated using the CALVET heat flux calorimeter C80, and three kinds of storage conditions were considered in the experiments: (1) drying time, (2) moisture content, (3) cycles. The results showed that the heat flow curves of NC moved to the low-temperature direction firstly and then slightly moved back by increasing the drying hours. Moisture that was responsible for the appearance of small exothermic peaks was proven to be the unfavorable safety factor yet it could increase the onset temperature of the main peak to some extent. And cycles could both lower the onset temperature and the maximum heat flow but enlarged the peak temperature. Besides, relevant kinetic parameters such as the heat of reaction (ΔH) and the activation energy (Ea) were obtained and compared. It was found that all the three conditions could reduce the values of Ea and most of them produced larger reaction heat. In addition, the critical explosion temperature (Tb) of the NC samples were derived. It was clear that not only the drying time but also the cycles would increase the thermal hazard of the NC. Yet, the right amount of water helped to reduce the thermal hazard.

Keywords: C80, nitrocellulose, storage conditions, the critical explosion temperature, thermal hazard

Procedia PDF Downloads 164
231 The Impacts of Civil War on Import and Export in Ethiopia: A Case Study of the Tigray Region Conflict

Authors: Simegn Alemayehu Ayele

Abstract:

Abstract: On November 4, 2020, the Ethiopian government launched a military operation against the Tigray People's Liberation Front (TPLF) in Ethiopia's Tigray Province, sparking the beginning of the Tigray War. This study focuses on the most recent Tigray War as it explores the effects of the civil war on Ethiopia's import and export activity. This study examines the consequences of violence on Ethiopia's trade relations, including its trading partners, export volume, and import requirements, using a combination of qualitative and quantitative data. The research outcome showed that Ethiopia's trade activities have suffered significantly as a result of the Tigray conflict, with both imports and exports declining. Particularly, the violence has hampered logistics and transportation networks, which has reduced the number of products exported and imported. Furthermore, the conflict has weakened Ethiopia's trading relationships and reduced demand for Ethiopian commodities. The survey also reveals that some of Ethiopia's major trade routes have been closed as a result of the conflict, severely restricting trade activities. These findings underline the necessity for political stability and conflict resolution procedures to support the nation's import and export activity by indicating that civil war has substantial repercussions for Ethiopia's economic development and trade activities.

Keywords: import demands, logistic networks, trade partiners, trade relatinships

Procedia PDF Downloads 85
230 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 113
229 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 371
228 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 144
227 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 153
226 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks

Authors: Michael Josef Schwerer

Abstract:

Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.

Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy

Procedia PDF Downloads 51
225 Pain Control by Ketamine in Combat Situation; Consideration and Outcomes

Authors: Mohammad Javad Behzadnia, Hamidreza Javadzadeh

Abstract:

Background: Pain management is essential to surmounting multi-injured people in an overcrowded emergency setting. Its role would be more apparent when the physician encounters a mass casualty in a war zone or even a military prehospital. Having sedative and analgesic properties, rapid onset and offset effects, and maintaining the cardiovascular and respiratory contain are the main reason for selecting Ketamine as a good choice in the war zone. Methods: In a prospective interventional study in a war zone, we have selected and followed two groups of casualties for pain management. All were men with an average age of 26.6±8 y/o and 27.5 ±7 y/o in A and B groups, respectively. Group A received only Ketamine and Group B received Ketamine and diazepam. Results: This study showed that all of the injured patients who received Ketamine had experienced some agitation, and they may finally need benzodiazepines for sedation, but in group B that received benzodiazepine before or simultaneous with Ketamine, the agitation was significantly reduced. (P Value ≤0.05) Conclusion: Various factors may affect pain score and perception; patients' culture, mental health, previous drug usage, and addiction could alter the pain score in similar situations. It seems that the significant agitation is due to catecholamine release in stressful Moments of the battlefield. Accordingly, this situation could be exacerbated due to ketamine properties. Nonetheless, as a good choice in the war zone, Ketamine is now recommended to combine with benzodiazepines for procedural sedation and analgesia (PSA).

Keywords: battlefield, ketamine, benzodiazepine, pain control

Procedia PDF Downloads 102
224 Using Q-Learning to Auto-Tune PID Controller Gains for Online Quadcopter Altitude Stabilization

Authors: Y. Alrubyli

Abstract:

Unmanned Arial Vehicles (UAVs), and more specifically, quadcopters need to be stable during their flights. Altitude stability is usually achieved by using a PID controller that is built into the flight controller software. Furthermore, the PID controller has gains that need to be tuned to reach optimal altitude stabilization during the quadcopter’s flight. For that, control system engineers need to tune those gains by using extensive modeling of the environment, which might change from one environment and condition to another. As quadcopters penetrate more sectors, from the military to the consumer sectors, they have been put into complex and challenging environments more than ever before. Hence, intelligent self-stabilizing quadcopters are needed to maneuver through those complex environments and situations. Here we show that by using online reinforcement learning with minimal background knowledge, the altitude stability of the quadcopter can be achieved using a model-free approach. We found that by using background knowledge instead of letting the online reinforcement learning algorithm wander for a while to tune the PID gains, altitude stabilization can be achieved faster. In addition, using this approach will accelerate development by avoiding extensive simulations before applying the PID gains to the real-world quadcopter. Our results demonstrate the possibility of using the trial and error approach of reinforcement learning combined with background knowledge to achieve faster quadcopter altitude stabilization in different environments and conditions.

Keywords: reinforcement learning, Q-leanring, online learning, PID tuning, unmanned aerial vehicle, quadcopter

Procedia PDF Downloads 174
223 An Approach of Node Model TCnNet: Trellis Coded Nanonetworks on Graphene Composite Substrate

Authors: Diogo Ferreira Lima Filho, José Roberto Amazonas

Abstract:

Nanotechnology opens the door to new paradigms that introduces a variety of novel tools enabling a plethora of potential applications in the biomedical, industrial, environmental, and military fields. This work proposes an integrated node model by applying the same concepts of TCNet to networks of nanodevices where the nodes are cooperatively interconnected with a low-complexity Mealy Machine (MM) topology integrating in the same electronic system the modules necessary for independent operation in wireless sensor networks (WSNs), consisting of Rectennas (RF to DC power converters), Code Generators based on Finite State Machine (FSM) & Trellis Decoder and On-chip Transmit/Receive with autonomy in terms of energy sources applying the Energy Harvesting technique. This approach considers the use of a Graphene Composite Substrate (GCS) for the integrated electronic circuits meeting the following characteristics: mechanical flexibility, miniaturization, and optical transparency, besides being ecological. In addition, graphene consists of a layer of carbon atoms with the configuration of a honeycomb crystal lattice, which has attracted the attention of the scientific community due to its unique Electrical Characteristics.

Keywords: composite substrate, energy harvesting, finite state machine, graphene, nanotechnology, rectennas, wireless sensor networks

Procedia PDF Downloads 105
222 US Foreign Aids and Its Institutional and Non-Institutional Impacts in the Middle East, Africa, Southeast Asia, and Latin America (2000 - 2020)

Authors: Mahdi Fakheri, Mohammad Mohsen Mahdizadeh Naeini

Abstract:

This paper addresses an understudied aspect of U.S. foreign aids between the years 2000 and 2020. Despite a growing body of literature on the impacts of U.S. aids, the question about how the United States uses its foreign aids to change developing countries has remained unanswered. As foreign aid is a tool of the United States' foreign policy, answering this very question can reveal the future that the U.S. prefers for developing countries and that secures its national interest. This paper will explore USAID's official dataset, which includes the data of foreign aids to the Middle East, Africa, Latin America, and Southeast Asia from 2000 to 2020. Through an empirical analysis, this paper argues that the focus of U.S. foreign aid is evenly divided between institutional and non-institutional (i.e., slight enhancement of status quo) changes. The former is induced by training and education, funding the initiatives and projects, making capacity and increasing the efficiency of human, operational, and management sectors, and enhancing the living condition of the people. Moreover, it will be demonstrated that the political, military, cultural, economic, and judicial are some of the institutions that the U.S. has planned to change in the aforementioned period and regions.

Keywords: USAID, foreign aid, development, developing countries, Middle East, Africa, Southeast Asia, Latin America

Procedia PDF Downloads 189