Search results for: military outpost
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 581

Search results for: military outpost

251 Modelling of Structures by Advanced Finites Elements Based on the Strain Approach

Authors: Sifeddine Abderrahmani, Sonia Bouafia

Abstract:

The finite element method is the most practical tool for the analysis of structures, whatever the geometrical shape and behavior. It is extensively used in many high-tech industries, such as civil or military engineering, for the modeling of bridges, motor bodies, fuselages, and airplane wings. Additionally, experience demonstrates that engineers like modeling their structures using the most basic finite elements. Numerous models of finite elements may be utilized in the numerical analysis depending on the interpolation field that is selected, and it is generally known that convergence to the proper value will occur considerably more quickly with a good displacement pattern than with a poor pattern, saving computation time. The method for creating finite elements using the strain approach (S.B.A.) is presented in this presentation. When the results are compared with those provided by equivalent displacement-based elements, having the same total number of degrees of freedom, an excellent convergence can be obtained through some application and validation tests using recently developed membrane elements, plate bending elements, and flat shell elements. The effectiveness and performance of the strain-based finite elements in modeling structures are proven by the findings for deflections and stresses.

Keywords: finite elements, plate bending, strain approach, displacement formulation, shell element

Procedia PDF Downloads 99
250 The Role of State Practices and Custom in Outer Space Law

Authors: Biswanath Gupta, Raju Kd

Abstract:

Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.

Keywords: customary international law, state practice, space law, treaty

Procedia PDF Downloads 343
249 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.

Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability

Procedia PDF Downloads 352
248 The Use of Actoprotectors by Professional Athletes

Authors: Kalin Ivanov, Stanislava Ivanova

Abstract:

Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.

Keywords: actoprotector, sport, doping, bemitil

Procedia PDF Downloads 322
247 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 341
246 Development and Validation of the 'Short Form BASIC Scale' Psychotic Tendencies Subscale

Authors: Chia-Chun Wu, Ying-Yao Cheng

Abstract:

The purpose of this study was developing the 'short-form BASIC scale' psychotic tendencies subscale so as to provide a more efficient, economical and effective way to assess the mental health of recruits. 1749 students from Naval Recruit Training Center participated in this study. The multidimensional constructs of psychotic tendencies subscale include four dimensions: schizophrenic tendencies, manic tendencies, depression tendencies, and suicidal ideation. We cut down the 36-item psychotic tendencies subscale to 25 items by using multidimension Rasch techniques. They were applied to assess model-data fit and to provide the validity evidence of the short form BASIC scale of psychotic tendencies subscale. The person separation reliabilities of the measures from four dimensions were .70, .67, .74 and .57, respectively. In addition, there is a notable correlation between the length version and short version of schizophrenic tendencies (scaled .89), manic tendencies (.96), depression tendencies (.97) and suicidal ideation (.97). The results have indicated that the development of the study of short-form scale sufficient to replace the original scale. Therefore, it is suggested that short-form basic scale is used to assess the mental health with participants being more willing to answer questions to ensure the validation of assessments.

Keywords: BASIC scale, military, Rasch analysis, short-form scale

Procedia PDF Downloads 361
245 Historical Analysis of Nigeria Politics, 1960–2010

Authors: Abdulsalami Muyideen Deji

Abstract:

Nigeria as nation got independence in 1960 from British government which allowed indigenous people to form self-government and rule themselves base on the acceptable laws and orders provided by indigenes. All citizens saw it as a welcome development that gave them opportunity to develop at their own pace. Certainly, this occurred at the first instance up to the first republic of 1963. But things became worse for the country when the first military coup of January 15, 1966 sowed apple of discord between the three major tribes in Nigeria Hausa, Yoruba and Igbo as a result of miscarriage of well-conceived plan of master-minder of that coup Major Chukwuma Kaduna Nzeogwu. Although, the argument had emanated from different quarters that if Nigeria was given opportunity to develop at the pace it was going at that time probably the Nigeria would have been among developed nation today, but that ill-fated coup was a clog in the wheel of nation’s progress. The base of this argument is that Nigeria achievements after independence still depend on the work of leaders who secure independence and also directed the affairs of nation within that short period of time up till today. Since then Nigeria has been grasping with different system of government, yet, the nation is still far from the solution. This paper will analyze Nigeria politics from independence, offer suggestion on the way forward. The source is strictly base on secondary source from textbook, newspapers, internet and journals.

Keywords: politics, government, independence, development

Procedia PDF Downloads 320
244 Metaphors Investigation between President Xi Jinping of China and Trump of Us on the Corpus-Based Approach

Authors: Jie Zheng, Ruifeng Luo

Abstract:

The United States is the world’s most developed economy with the strongest military power. China is the fastest growing country with growing comprehensive strength and its economic strength is second only to the US. However, the conflict between them is getting serious in recent years. President’s address is the representative of a nation’s ideology. The paper has built up a small sized corpus of President Xi Jinping and Trump’s speech in Davos to investigate their respective use and types of metaphors and calculate the respective percentage of each type of metaphor. The result shows President Xi Jinping employs more metaphors than Trump. The metaphors of Xi includes “building” metaphor, “plant” metaphor, “journey” metaphor, “ship” metaphor, “traffic” metaphor, “nation is a person” metaphor, “show” metaphor, etc while Trump’s comprises “war” metaphor, “building” metaphor, “journey” metaphor, “traffic” metaphor, “tax” metaphor, “book” metaphor, etc. After investigating metaphor use differences, the paper makes an analysis of the underlying ideology between the two nations. China is willing to strengthen ties with all the countries all over the world and has built a platform of development for them and itself to go to the destination of social well being while the US pays much concern to itself, emphasizing its first leading position and is also willing to help its alliances to development. The paper’s comparison of the ideology difference between the two countries will help them get a better understanding and reduce the conflict to some extent.

Keywords: metaphor; corpus; ideology; conflict

Procedia PDF Downloads 147
243 “The Forgotten People:” Analyzing the Invisible, Intersectional Discrimination Against Metis Women

Authors: Yifan Jia

Abstract:

The Metis is a group of indigenous peoples in Canada. Having experienced centuries of injustices, beginning with colonialism dating back to the 16th century, culminating with military defeats in the 1800s and the establishment of residential schools, and continuing with structural injustices in the 21st century, Metis people have long been, and continue to be marginalized and made invisible in the Canadian society. In particular, Metis women born between 1997 and 2012 face intersectional discrimination based on not only race, but also a multitude of identity factors, including gender, age, geographical location, health, sexual orientation, and lateral violence from First Nations peoples. This paper uncovers the multilayered oppression against young Metis women through a literature review and uses several theories to analyze the invisibility of this discrimination in society, including color-blind racism, collective shame, lack of understanding of intersectionality, and Mauvaise foi (bad faith). To address the invisible, intersectional discrimination against young Metis women, several suggestions and possibilities could be considered. These include amending the education system, fostering group affiliation, bringing structural changes to federal policies and funding systems, and cooperating with other indigenous nations such as First Nations and Inuit.

Keywords: discrimination, Metis Women, indigenous rights, intersectionality

Procedia PDF Downloads 70
242 Women in the Soviet Press during the Great Patriotic War (1941-1945)

Authors: Nani Manvelishvili

Abstract:

Soviet propaganda tried to shape common public opinion through Soviet Press. The activation of propaganda gained special importance to increase the fighting ability of the military and people behind the front During the Great Patriotic war (1941-1945). The state propaganda used unnecessary intervention in Press and created characters who were supposed to be role models for society. The new female role models were identified, which were supported by the authorities. The representation of the mother, warrior woman, working woman, victim, feminine woman, etc., in the works aimed to raise the fighting ability of the Soviet citizen and incite patriotism. This paper analyzes the soviet Press (The newspaper “Komunisti”) that was written and published during the Great Patriotic war in Soviet Georgia. The study aims to find propagandistic content in Press that used Soviet ideology during the Great Patriotic war. We analyzed the Soviet Newspaper "Komunisti," published during wartime. Soviet Press had the most significant impact on the formation of public opinion. The Soviet government actively used this resource to increase combat capability. While at the beginning of the war, women were supposed to replace men, propaganda by the end of the war moved to reassert conservative gender politics. Women returned to their traditional roles.

Keywords: Great Patriotic War, Soviet Georgia, women in war, women's history, Soviet press

Procedia PDF Downloads 98
241 Impact of COVID-19 Pandemic in the European Air Transport Command during 2020-2021

Authors: Martin Gascón Hove, Ralph Vermeltfoort, Alessandro Fiorini, Erwan Dulaurent, Henning von Perbandt

Abstract:

Introduction: The outbreak of the COVID-19 pandemic has completely changed the global health situation, with more than 400 million cases published and over 5 million deaths. European Air Transport Command (EATC) is integrated by seven nations, and among its capabilities is that of aeromedical evacuation (AM). Material and methods: Impact of novel coronavirus was analysed based on the number and characteristics of patients and executed missions within EATC and, particularly by Spain, during the biennium 2020-2021. Results: One thousand sixty patients were transported in 186 missions. Neither death nor disease contagion was reported during AM performances. Military cases transferred were 986, mostly routine priority (91,4%), and 74 were civilians, who were transported in 17 missions, and 81,1% of which were categorized as urgent. Niger led the list of original countries, with 191 evacuated patients. 76,1% of requests came from Italy and Germany. Airbus A310 was the most used aircraft (32,2%). Germany transported 222 patients of another nationality, while Spain executed eight missions and repatriated 68 cases, 58 of which were from Mali. Conclusions: COVID-19 has led to a surged number of evacuated patients inside EATC, which has proven to be a safe and effective means of transportation, even in critical cases. Spain has gained prominence since its annexation in 2015.

Keywords: COVID-19, SARS-CoV-2, pandemic, aviation, Spain

Procedia PDF Downloads 154
240 Production of Energetic Nanomaterials by Spray Flash Evaporation

Authors: Martin Klaumünzer, Jakob Hübner, Denis Spitzer

Abstract:

Within this paper, latest results on processing of energetic nanomaterials by means of the Spray Flash Evaporation technique are presented. This technology constitutes a highly effective and continuous way to prepare fascinating materials on the nano- and micro-scale. Within the process, a solution is set under high pressure and sprayed into an evacuated atomization chamber. Subsequent ultrafast evaporation of the solvent leads to an aerosol stream, which is separated by cyclones or filters. No drying gas is required, so the present technique should not be confused with spray dying. Resulting nanothermites, insensitive explosives or propellants and compositions are foreseen to replace toxic (according to REACH) and very sensitive matter in military and civil applications. Diverse examples are given in detail: nano-RDX (n-Cyclotrimethylentrinitramin) and nano-aluminum based systems, mixtures (n-RDX/n-TNT - trinitrotoluene) or even cocrystalline matter like n-CL-20/HMX (Hexanitrohexaazaisowurtzitane/ Cyclotetra-methylentetranitramin). These nanomaterials show reduced sensitivity by trend without losing effectiveness and performance. An analytical study for material characterization was performed by using Atomic Force Microscopy, X-Ray Diffraction, and combined techniques as well as spectroscopic methods. As a matter of course, sensitivity tests regarding electrostatic discharge, impact, and friction are provided.

Keywords: continuous synthesis, energetic material, nanoscale, nanoexplosive, nanothermite

Procedia PDF Downloads 264
239 Pathomorphological Markers of the Explosive Wave Action on Human Brain

Authors: Sergey Kozlov, Juliya Kozlova

Abstract:

Introduction: The increased attention of researchers to an explosive trauma around the world is associated with a constant renewal of military weapons and a significant increase in terrorist activities using explosive devices. Explosive wave is a well known damaging factor of explosion. The most sensitive to the action of explosive wave in the human body are the head brain, lungs, intestines, urine bladder. The severity of damage to these organs depends on the distance from the explosion epicenter to the object, the power of the explosion, presence of barriers, parameters of the body position, and the presence of protective clothing. One of the places where a shock wave acts, in human tissues and organs, is the vascular endothelial barrier, which suffers the greatest damage in the head brain and lungs. The objective of the study was to determine the pathomorphological changes of the head brain followed the action of explosive wave. Materials and methods of research: To achieve the purpose of the study, there have been studied 6 male corpses delivered to the morgue of Municipal Institution "Dnipropetrovsk regional forensic bureau" during 2014-2016 years. The cause of death of those killed was a military explosive injury. After a visual external assessment of the head brain, for histological study there was conducted the 1 x 1 x 1 cm/piece sampling from different parts of the head brain, i.e. the frontal, parietal, temporal, occipital sites, and also from the cerebellum, pons, medulla oblongata, thalamus, walls of the lateral ventricles, the bottom of the 4th ventricle. Pieces of the head brain were immersed in 10% formalin solution for 24 hours. After fixing, the paraffin blocks were made from the material using the standard method. Then, using a microtome, there were made sections of 4-6 micron thickness from paraffin blocks which then were stained with hematoxylin and eosin. Microscopic analysis was performed using a light microscope with x4, x10, x40 lenses. Results of the study: According to the results of our study, injuries of the head brain were divided into macroscopic and microscopic. Macroscopic injuries were marked according to the results of visual assessment of haemorrhages under the membranes and into the substance, their nature, and localisation, areas of softening. In the microscopic study, our attention was drawn to both vascular changes and those of neurons and glial cells. Microscopic qualitative analysis of histological sections of different parts of the head brain revealed a number of structural changes both at the cellular and tissue levels. Typical changes in most of the studied areas of the head brain included damages of the vascular system. The most characteristic microscopic sign was the separation of vascular walls from neuroglia with the formation of perivascular space. Along with this sign, wall fragmentation of these vessels, haemolysis of erythrocytes, formation of haemorrhages in the newly formed perivascular spaces were found. In addition to damages of the cerebrovascular system, destruction of the neurons, presence of oedema of the brain tissue were observed in the histological sections of the brain. On some sections, the head brain had a heterogeneous step-like or wave-like nature. Conclusions: The pathomorphological microscopic changes in the brain, identified in the study on the died of explosive traumas, can be used for diagnostic purposes in conjunction with other characteristic signs of explosive trauma in forensic and pathological studies. The complex of microscopic signs in the head brain, i.e. separation of blood vessel walls from neuroglia with the perivascular space formation, fragmentation of walls of these blood vessels, erythrocyte haemolysis, formation of haemorrhages in the newly formed perivascular spaces is the direct indication of explosive wave action.

Keywords: blast wave, neurotrauma, human, brain

Procedia PDF Downloads 192
238 Case Scenario Simulation concerning Eventual Ship Sourced Oil Spill, Expansion and Response Process in Istanbul Strait

Authors: Cihat Aşan

Abstract:

Istanbul Strait is a crucial and narrow waterway, not only having a role in linking two continents but also has a crossover mission for the petroleum, which is the biggest energy resource, between its supply and demand sources. Besides its substantial features, sensitivities like around 18 million populations in surroundings, military facilities, ports, oil lay down areas etc. also brings the high risk to use of Istanbul Strait. Based on the statistics of Turkish Ministry of Transportation, Maritime and Communication, although the number of vessel passage in Istanbul Strait is declining, tonnage of hazardous and flammable cargo like oil and chemical transportation is increasing and subsequently the risk of oil pollution, loss of life and property is also rising. Based on the mentioned above; it is crucial to be prepared for the initial and subsequent response to eventual ship sourced oil spill which may cause to block the Strait for an unbearable duration. In this study; preconditioned Istanbul Strait sensitive areas studies has been taken into account and possible oil spill scenario is loaded to PISCES 2 (Potential Incident Simulation Control and Evaluation System) decision support system for the determined specific sea area. Consequences of the simulation like oil expanding process, required number and types of assets to response, had in hand and evaluated.

Keywords: Istanbul strait, oil spill, PISCES simulator, initial response

Procedia PDF Downloads 343
237 Experimental Study on the Effect of Storage Conditions on Thermal Hazard of Nitrocellulose

Authors: Hua Chai, Qiangling Duan, Huiqi Cao, Mi Li, Jinhua Sun

Abstract:

Nitrocellulose (NC), a kind of energetic material, has been widely used in the industrial and military fields. However, this material can also cause serious social disasters due to storage conditions. Thermal hazard of nitrocellulose (NC) was experimentally investigated using the CALVET heat flux calorimeter C80, and three kinds of storage conditions were considered in the experiments: (1) drying time, (2) moisture content, (3) cycles. The results showed that the heat flow curves of NC moved to the low-temperature direction firstly and then slightly moved back by increasing the drying hours. Moisture that was responsible for the appearance of small exothermic peaks was proven to be the unfavorable safety factor yet it could increase the onset temperature of the main peak to some extent. And cycles could both lower the onset temperature and the maximum heat flow but enlarged the peak temperature. Besides, relevant kinetic parameters such as the heat of reaction (ΔH) and the activation energy (Ea) were obtained and compared. It was found that all the three conditions could reduce the values of Ea and most of them produced larger reaction heat. In addition, the critical explosion temperature (Tb) of the NC samples were derived. It was clear that not only the drying time but also the cycles would increase the thermal hazard of the NC. Yet, the right amount of water helped to reduce the thermal hazard.

Keywords: C80, nitrocellulose, storage conditions, the critical explosion temperature, thermal hazard

Procedia PDF Downloads 164
236 The Impacts of Civil War on Import and Export in Ethiopia: A Case Study of the Tigray Region Conflict

Authors: Simegn Alemayehu Ayele

Abstract:

Abstract: On November 4, 2020, the Ethiopian government launched a military operation against the Tigray People's Liberation Front (TPLF) in Ethiopia's Tigray Province, sparking the beginning of the Tigray War. This study focuses on the most recent Tigray War as it explores the effects of the civil war on Ethiopia's import and export activity. This study examines the consequences of violence on Ethiopia's trade relations, including its trading partners, export volume, and import requirements, using a combination of qualitative and quantitative data. The research outcome showed that Ethiopia's trade activities have suffered significantly as a result of the Tigray conflict, with both imports and exports declining. Particularly, the violence has hampered logistics and transportation networks, which has reduced the number of products exported and imported. Furthermore, the conflict has weakened Ethiopia's trading relationships and reduced demand for Ethiopian commodities. The survey also reveals that some of Ethiopia's major trade routes have been closed as a result of the conflict, severely restricting trade activities. These findings underline the necessity for political stability and conflict resolution procedures to support the nation's import and export activity by indicating that civil war has substantial repercussions for Ethiopia's economic development and trade activities.

Keywords: import demands, logistic networks, trade partiners, trade relatinships

Procedia PDF Downloads 85
235 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 113
234 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 373
233 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 144
232 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 153
231 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks

Authors: Michael Josef Schwerer

Abstract:

Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.

Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy

Procedia PDF Downloads 51
230 Pain Control by Ketamine in Combat Situation; Consideration and Outcomes

Authors: Mohammad Javad Behzadnia, Hamidreza Javadzadeh

Abstract:

Background: Pain management is essential to surmounting multi-injured people in an overcrowded emergency setting. Its role would be more apparent when the physician encounters a mass casualty in a war zone or even a military prehospital. Having sedative and analgesic properties, rapid onset and offset effects, and maintaining the cardiovascular and respiratory contain are the main reason for selecting Ketamine as a good choice in the war zone. Methods: In a prospective interventional study in a war zone, we have selected and followed two groups of casualties for pain management. All were men with an average age of 26.6±8 y/o and 27.5 ±7 y/o in A and B groups, respectively. Group A received only Ketamine and Group B received Ketamine and diazepam. Results: This study showed that all of the injured patients who received Ketamine had experienced some agitation, and they may finally need benzodiazepines for sedation, but in group B that received benzodiazepine before or simultaneous with Ketamine, the agitation was significantly reduced. (P Value ≤0.05) Conclusion: Various factors may affect pain score and perception; patients' culture, mental health, previous drug usage, and addiction could alter the pain score in similar situations. It seems that the significant agitation is due to catecholamine release in stressful Moments of the battlefield. Accordingly, this situation could be exacerbated due to ketamine properties. Nonetheless, as a good choice in the war zone, Ketamine is now recommended to combine with benzodiazepines for procedural sedation and analgesia (PSA).

Keywords: battlefield, ketamine, benzodiazepine, pain control

Procedia PDF Downloads 102
229 Using Q-Learning to Auto-Tune PID Controller Gains for Online Quadcopter Altitude Stabilization

Authors: Y. Alrubyli

Abstract:

Unmanned Arial Vehicles (UAVs), and more specifically, quadcopters need to be stable during their flights. Altitude stability is usually achieved by using a PID controller that is built into the flight controller software. Furthermore, the PID controller has gains that need to be tuned to reach optimal altitude stabilization during the quadcopter’s flight. For that, control system engineers need to tune those gains by using extensive modeling of the environment, which might change from one environment and condition to another. As quadcopters penetrate more sectors, from the military to the consumer sectors, they have been put into complex and challenging environments more than ever before. Hence, intelligent self-stabilizing quadcopters are needed to maneuver through those complex environments and situations. Here we show that by using online reinforcement learning with minimal background knowledge, the altitude stability of the quadcopter can be achieved using a model-free approach. We found that by using background knowledge instead of letting the online reinforcement learning algorithm wander for a while to tune the PID gains, altitude stabilization can be achieved faster. In addition, using this approach will accelerate development by avoiding extensive simulations before applying the PID gains to the real-world quadcopter. Our results demonstrate the possibility of using the trial and error approach of reinforcement learning combined with background knowledge to achieve faster quadcopter altitude stabilization in different environments and conditions.

Keywords: reinforcement learning, Q-leanring, online learning, PID tuning, unmanned aerial vehicle, quadcopter

Procedia PDF Downloads 174
228 An Approach of Node Model TCnNet: Trellis Coded Nanonetworks on Graphene Composite Substrate

Authors: Diogo Ferreira Lima Filho, José Roberto Amazonas

Abstract:

Nanotechnology opens the door to new paradigms that introduces a variety of novel tools enabling a plethora of potential applications in the biomedical, industrial, environmental, and military fields. This work proposes an integrated node model by applying the same concepts of TCNet to networks of nanodevices where the nodes are cooperatively interconnected with a low-complexity Mealy Machine (MM) topology integrating in the same electronic system the modules necessary for independent operation in wireless sensor networks (WSNs), consisting of Rectennas (RF to DC power converters), Code Generators based on Finite State Machine (FSM) & Trellis Decoder and On-chip Transmit/Receive with autonomy in terms of energy sources applying the Energy Harvesting technique. This approach considers the use of a Graphene Composite Substrate (GCS) for the integrated electronic circuits meeting the following characteristics: mechanical flexibility, miniaturization, and optical transparency, besides being ecological. In addition, graphene consists of a layer of carbon atoms with the configuration of a honeycomb crystal lattice, which has attracted the attention of the scientific community due to its unique Electrical Characteristics.

Keywords: composite substrate, energy harvesting, finite state machine, graphene, nanotechnology, rectennas, wireless sensor networks

Procedia PDF Downloads 105
227 US Foreign Aids and Its Institutional and Non-Institutional Impacts in the Middle East, Africa, Southeast Asia, and Latin America (2000 - 2020)

Authors: Mahdi Fakheri, Mohammad Mohsen Mahdizadeh Naeini

Abstract:

This paper addresses an understudied aspect of U.S. foreign aids between the years 2000 and 2020. Despite a growing body of literature on the impacts of U.S. aids, the question about how the United States uses its foreign aids to change developing countries has remained unanswered. As foreign aid is a tool of the United States' foreign policy, answering this very question can reveal the future that the U.S. prefers for developing countries and that secures its national interest. This paper will explore USAID's official dataset, which includes the data of foreign aids to the Middle East, Africa, Latin America, and Southeast Asia from 2000 to 2020. Through an empirical analysis, this paper argues that the focus of U.S. foreign aid is evenly divided between institutional and non-institutional (i.e., slight enhancement of status quo) changes. The former is induced by training and education, funding the initiatives and projects, making capacity and increasing the efficiency of human, operational, and management sectors, and enhancing the living condition of the people. Moreover, it will be demonstrated that the political, military, cultural, economic, and judicial are some of the institutions that the U.S. has planned to change in the aforementioned period and regions.

Keywords: USAID, foreign aid, development, developing countries, Middle East, Africa, Southeast Asia, Latin America

Procedia PDF Downloads 189
226 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict

Authors: Zhao Xinlei

Abstract:

The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.

Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition

Procedia PDF Downloads 83
225 A 1.57ghz Mixer Design for GPS Receiver

Authors: Hamd Ahmed

Abstract:

During the Persian Gulf War in 1991s, The confederation forces were surprised when they were being shot at by friendly forces in Iraqi desert. As obvious was the fact that they were mislead due to the lack of proper guidance and technology resulting in unnecessary loss of life and bloodshed. This unforeseen incident along with many others led the US department of defense to open the doors of GPS. In the very beginning, this technology was for military use, but now it is being widely used and increasingly popular among the public due to its high accuracy and immeasurable significance. The GPS system simply consists of three segments, the space segment (the satellite), the control segment (ground control) and the user segment (receiver). This project work is about designing a 1.57GHZ mixer for triple conversion GPS receiver .The GPS Front-End receiver based on super heterodyne receiver which improves selectivity and image frequency. However the main principle of the super heterodyne receiver depends on the mixer. Many different types of mixers (single balanced mixer, Single Ended mixer, Double balanced mixer) can be used with GPS receiver, it depends on the required specifications. This research project will provide an overview of the GPS system and details about the basic architecture of the GPS receiver. The basic emphasis of this report in on investigating general concept of the mixer circuit some terms related to the mixer along with their definitions and present the types of mixer, then gives some advantages of using singly balanced mixer and its application. The focus of this report is on how to design mixer for GPS receiver and discussing the simulation results.

Keywords: GPS , RF filter, heterodyne, mixer

Procedia PDF Downloads 323
224 Federalism, Dual Sovereignty, and the Supreme Court of Nigeria

Authors: Edoba Bright Omoregie

Abstract:

Nigeria became a federation in 1954 six years before it gained independence away from British colonial rule. The country has remained a federation since then despite the challenging circumstances of military rule and civil strife which have tasked its federal credentials. Since 1961, when it first decided a federalism dispute, cases over vertical and horizontal powers have inundated the country’s Supreme Court. In its current practice of federalism after democratic rule was resumed in 1999, the country has witnessed a spell of intergovernmental disputes over a good number of federalism issues. Such conflicts have eventually found their way to the Supreme Court for resolution, not as a final appellate court (which it is in other non-federal matters) but as a court of first and final instance following the constitutional provision granting the court such power. However, in April 2014 one of such disputes was denied hearing by the court when it declined original jurisdiction to determine the matter. The suit was instituted by one state of the federation against the federal government and the other 35 states challenging the collection of value added tax (a consumption tax)on certain goods and services within the state. The paper appraises the rationale of the court’s decision and reason that its decision to decline jurisdiction is the result of an avoidable misunderstanding of the dual sovereignty instituted by the federal system of Nigeria as well as a misconception of the role which the court is constitutionally assigned to play in resolving intergovernmental schisms in the federal system.

Keywords: dual sovereignty, federalism, intergovernmental conflict, Supreme Court

Procedia PDF Downloads 555
223 Identity and Citizenship Crises of Rohingya from the Perspective of Diaspora Communities

Authors: Mufizur Rahman

Abstract:

This thesis argues that by the citizenship policies of the Myanmar government, the rights of Rohingya have been taken away and the identity of Rohingya has been marginalized. An emphasis is made on the history, ancestors, homeland, and ideal when an individual seeks recognition for ethnic identity. Ethnic groups hold on to their unique culture, cultural heritage, language, homeland, and historical past not only to act in solidarity but also to reinforce the consciousness of national identity. Rohingya ethnic group in Rakhine state (formerly Arakan state) is in seek for identity and citizenship rights in the country. Even though Rohingya people have been living in Arakan for centuries, they are being marginalized and have been deprived of their rights by the 1982 citizenship law, which was created by the authoritarian leader after the military coup in 1962. This study elaborated marginalized and persecuted life of Rohingyas for decades by the Government of Myanmar (GOM) in their homeland and after the enactment of the 1982 Citizenship Law and citizenship policies enforced by the government. Thereby, every right was deprived systematically from the Rohingya by the GOM. By this circumstance of the country, many Rohingyas have fled from the country and sought asylum in other countries. This study primarily used the qualitative research data of in-depth personal interviews by conducting 18 Rohingya participants from the diaspora community, including male and female participants. The study examined the narrative of the Rohingya identity and citizenship policies of their homeland from the personal experience of the diaspora community.

Keywords: Rohingya, identity, citizenship policies, Diaspora community, homeland, Myanmar

Procedia PDF Downloads 81
222 Luminescence and Local Environment: Identification of Thermal History

Authors: Veronique Jubera, Guillaume Salek, Manuel Gaudon, Alain Garcia, Alain Demourgues

Abstract:

Luminescence of transition metal and rare earth elements cover ultraviolet to far infrared wavelengths. Applications of phosphors are numerous. One can cite lighting, sensing, laser, energy, medical or military applications. But regarding each domain, specific criteria are required and they can be achieved with a strong control of the chemical composition. Emission of doped materials can be tailored with modifications of the local environment of the cations. For instance, the increase of the crystal field effect shifts the divalent manganese radiative transitions from the green to the red color. External factor as heat-treatment can induce changes of the doping element location or modify the unit cell crystalline symmetry. By controlling carefully the synthesis route, it is possible to initiate emission shift and to establish the thermal history of a compound. We propose to demonstrate through the luminescence of divalent manganese and trivalent rare earth doped oxide, that it is possible to follow the thermal history of a material. After optimization of the synthesis route, structural and optical properties are discussed. Finally, thermal calibration graphs are successfully established on these doped compounds. This makes these materials promising probe for thermal sensing.

Keywords: emission, thermal sensing, transition metal, rare eath element

Procedia PDF Downloads 385