Search results for: military outpost
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 581

Search results for: military outpost

221 The Map of Cassini: An Accurate View of Current Border Between Spain and France

Authors: Barbara Polo Martin

Abstract:

During the 18th century, the border between Spain and France underwent various changes, primarily due to territorial agreements, wars, and treaties between the two nations and other European powers. For studying these changes, the Cassini maps remain valuable historical documents, offering a glimpse into the landscape and geography of 18th-century France and its neighboring regions, including the border between Spain and France. However, it's essential to recognize that these maps may not reflect modern political boundaries or territorial changes that have occurred since their creation. The project was initiated by King Louis XV in 1744 and continued by his successor, Louis XVI. The primary objective was to produce accurate maps of France, which would serve various purposes, including military, administrative, and scientific. The Cassini maps were groundbreaking for their time, as they were among the earliest attempts to create topographic maps on a national scale. They covered the entirety of France and were based on meticulous surveying and cartographic techniques. The maps featured precise geographic details, including elevation contours, rivers, roads, forests, and settlements. This study aims to analyze this rich and unknown cartography of France, study the rich place names it offers, as well as the accuracy of delimitations created over time between both empires in a historical way but also through a Geographical Information System. This study will offer a deeper knowledge about the cartography that supposes the beginning of topography in Europe.

Keywords: cartography, engineering, borders, Spain, France, Cassini

Procedia PDF Downloads 60
220 Indonesia’s Defense Diplomacy Strength Towards China’s Aggressive Maritime Policy

Authors: Pangihutan Panjaitan, Helda Risman, Devindra Oktaviano

Abstract:

This research is departed from the security issues generated from China’s unilateral claims in the South China Sea conflict. The diplomacy challenges come from Indonesia’s relations with China as well as with ASEAN-member countries involved in the conflict. It is estimated that the conflict in the South China Sea region will become an endless conflict. Comprehensively, Indonesia is implementing a gradual shift in diplomatic approach in creating positive and constructive ties among Indonesia, China, and ASEAN. In line with the rapid-changing world order, the conventional military approach becomes less significant in today’s modern inter-state interactions. This research is conducted in a qualitative literature review to explain how Indonesia’s recent soft diplomacy approach applied in the South China Sea conflict. This type of diplomacy theoretically assumed as one of the most preferred ways to establish mutual trust and confidence among conflicting parties. Maritime issues found its significance in contemporary foreign policy since the world’s most dynamic region has moved to the archipelagic Asia-Pacific. As mentioned by rationalists, every country, including Indonesia, has surely formulated its own prominent national interest, such as the defense aspect. Finally, this research will provide a deep analysis on Indonesia’s centrality in ASEAN as an effective way to ensure Indonesia’s strategic policy in the region well accommodated.

Keywords: soft diplomacy, south China sea, national defense, China

Procedia PDF Downloads 160
219 Space Debris Mitigation: Solutions from the Dark Skies of the Remote Australian Outback Using a Proposed Network of Mobile Astronomical Observatories

Authors: Muhammad Akbar Hussain, Muhammad Mehdi Hussain, Waqar Haider

Abstract:

There are tens of thousands of undetected and uncatalogued pieces of space debris in the Low Earth Orbit (LEO). They are not only difficult to be detected and tracked, their sheer number puts active satellites and humans in orbit around Earth into danger. With the entry of more governments and private companies into harnessing the Earth’s orbit for communication, research and military purposes, there is an ever-increasing need for not only the detection and cataloguing of these pieces of space debris, it is time to take measures to take them out and clean up the space around Earth. Current optical and radar-based Space Situational Awareness initiatives are useful mostly in detecting and cataloguing larger pieces of debris mainly for avoidance measures. Smaller than 10 cm pieces are in a relatively dark zone, yet these are deadly and capable of destroying satellites and human missions. A network of mobile observatories, connected to each other in real time and working in unison as a single instrument, may be able to detect small pieces of debris and achieve effective triangulation to help create a comprehensive database of their trajectories and parameters to the highest level of precision. This data may enable ground-based laser systems to help deorbit individual debris. Such a network of observatories can join current efforts in detection and removal of space debris in Earth’s orbit.

Keywords: space debris, low earth orbit, mobile observatories, triangulation, seamless operability

Procedia PDF Downloads 166
218 India, Pakistan and the US in the Afghan Imbroglio: The Way Forward

Authors: Saroj Kumar Rath

Abstract:

When insurgency erupted in Kashmir in 1989, it was quickly backed by Pakistan. Kashmir witnessed terrorism for more than a decade till 2004 when Indian forces decimated militancy. After the US pressure in 1992, terrorist training camps of Pakistan shifted to Afghanistan and al Qaeda and the Taliban had taken over training of Kashmiri militants in Afghanistan after 1997 as part of their global jihad. The Indo-Pak rivalry over Kashmir dispute had taken a new turn in the aftermath of 9/11 developments. Islamabad viewed its Afghan policy through the prism of denying India any advantage in Kabul. Pakistan was successful in refuting Indian presence in Kabul for a decade through the Taliban. After the 9/11 attacks the Inter Services Intelligence (ISI) saw Northern Alliance, supported by the Americans and all of Pakistan’s regional rivals – India, Iran, and Russia – as claiming victory in Kabul. For Pakistan’s military regime, this was a strategic disaster and prompted the ISI to give refuge to the escaping Taliban, while denying full support to Hamid Karzai. The new development in Afghanistan prompted India to establish a foothold it had lost nearly a decade earlier. India established diplomatic contacts with Afghanistan; supported the Karzai government and funded aid programs. Pakistan alleged that Indian agents are training Baloch and Sindhi dissidents in Pakistan through Afghanistan. Kabul had suddenly become the new Kashmir – the new battleground for India-Pakistan rivalry.

Keywords: Afghan imbroglio, Kashmir conflict, Indo-Pak rivalry, US policy in South Asia

Procedia PDF Downloads 433
217 Optimization of a Hand-Fan Shaped Microstrip Patch Antenna by Means of Orthogonal Design Method of Design of Experiments for L-Band and S-Band Applications

Authors: Jaswinder Kaur, Nitika, Navneet Kaur, Rajesh Khanna

Abstract:

A hand-fan shaped microstrip patch antenna (MPA) for L-band and S-band applications is designed, and its characteristics have been reconnoitered. The proposed microstrip patch antenna with double U-slot defected ground structure (DGS) is fabricated on an FR4 substrate which is a very readily available and inexpensive material. The suggested antenna is optimized using Orthogonal Design Method (ODM) of Design of Experiments (DOE) to cover the frequency range from 0.91-2.82 GHz for L-band and S-band applications. The L-band covers the frequency range of 1-2 GHz, which is allocated to telemetry, aeronautical, and military systems for passive satellite sensors, weather radars, radio astronomy, and mobile communication. The S-band covers the frequency range of 2-3 GHz, which is used by weather radars, surface ship radars and communication satellites and is also reserved for various wireless applications such as Worldwide Interoperability for Microwave Access (Wi-MAX), super high frequency radio frequency identification (SHF RFID), industrial, scientific and medical bands (ISM), Bluetooth, wireless broadband (Wi-Bro) and wireless local area network (WLAN). The proposed method of optimization is very time efficient and accurate as compared to the conventional evolutionary algorithms due to its statistical strategy. Moreover, the antenna is tested, followed by the comparison of simulated and measured results.

Keywords: design of experiments, hand fan shaped MPA, L-Band, orthogonal design method, S-Band

Procedia PDF Downloads 134
216 Relationship between Personality Traits and Postural Stability among Czech Military Combat Troops

Authors: K. Rusnakova, D. Gerych, M. Stehlik

Abstract:

Postural stability is a complex process involving actions of biomechanical, motor, sensory and central nervous system components. Numerous joint systems, muscles involved, the complexity of sporting movements and situations require perfect coordination of the body's movement patterns. To adapt to a constantly changing situation in such a dynamic environment as physical performance, optimal input of information from visual, vestibular and somatosensory sensors are needed. Combat soldiers are required to perform physically and mentally demanding tasks in adverse conditions, and poor postural stability has been identified as a risk factor for lower extremity musculoskeletal injury. The aim of this study is to investigate whether some personality traits are related to the performance of static postural stability among soldiers of combat troops. NEO personality inventory (NEO-PI-R) was used to identify personality traits and the Nintendo Wii Balance Board was used to assess static postural stability of soldiers. Postural stability performance was assessed by changes in center of pressure (CoP) and center of gravity (CoG). A posturographic test was performed for 60 s with eyes opened during quiet upright standing. The results showed that facets of neuroticism and conscientiousness personality traits were significantly correlated with measured parameters of CoP and CoG. This study can help for better understanding the relationship between personality traits and static postural stability. The results can be used to optimize the training process at the individual level.

Keywords: neuroticism, conscientiousness, postural stability, combat troops

Procedia PDF Downloads 142
215 The Belt and Road Initiative in a Spiderweb of Conflicting Great Power Interests: A Geopolitical Analysis

Authors: Csaba Barnabas Horvath

Abstract:

The Belt and Road initiative of China is one that can change the face of Eurasia as we know it. Instead of four major, densely populated subcontinents defined by Mackinder (East Asia, Europe, the Indian Subcontinent, and the Middle East) isolated from each other by vast, sparsely populated and underdeveloped regions, it can at last start to function as a geographic whole, with a sophisticated infrastructure linking its different parts to each other. This initiative, however, happens not in a geopolitical vacuum, but in a space of conflicting great power interests. In Central Asia, the influence of China and Russia are in a setting of competition, where despite the cooperation between the two powers to a great degree, issues causing mutual mistrust emerge repeatedly. In Afghanistan, besides western military presence, even India’s efforts can be added to the picture. In Southeast Asia, a key region regarding the maritime Silk Road, India’s Act East policy meets with China’s Belt and Road, not always in consensus, not to mention US and Japanese interests in the region. The presentation aims to take an overview on how conflicting great power interests are likely to influence the outcome of the Belt and Road initiative. The findings show, that overall success of the Belt and Road Initiative may not be as smooth, as hoped by China, but at the same time, in a limited number of strategically important countries (such as Pakistan, Laos, and Cambodia), this setting is actually a factor favoring China, providing at least a selected number of reliable corridors, where the initiative is actually likely to be successful.

Keywords: belt and road initiative, geostrategic corridors, geopolitics, great power rivalry

Procedia PDF Downloads 219
214 Comparative Analysis of Characterologic Features of Cadets with High Psychomotor Skills Who Study in Polish Air Force Academy

Authors: Justyna Skrzyńska, Zdzisław Kobos, Zbigniew Wochyński

Abstract:

The assessment of characterologic type is an essential element which decides about the proper task performance in the Air Forces. The aim of the research was to specify the percentage distribution of characterologic features by cadets studying particular courses in Polish Air Force Academy with the use of questionnaire. 34 first-year cadets chosen by lot and disunited into aircrafts pilots (N-10), helicopter pilots (N-13) and navigators(N-11) participated in the research. All of the questioned have had their psychomotor education examined in Military Aviation Medicine Institute in Warsaw, Poland. Moreover all of them are characterised by very good fitness. In the research, an anonymous poll(based on Myers-Briggs Type Indicator) appraising cadets’ characterologic type has been used. Cadets were provided with the same accommodation and nutrition. The findings have shown that percentage distribution was diversified, however it could be distinctly observed that most of future helicopter pilots (69%) are introverts whereas the majority of aircrafts pilots (70%) and navigators (100%) are extraverts. Moreover, it was also observed that 70% of cadets studying aircrafts pilotage run regular lifestyle and have judging skill according to Myers-Briggs Type Indicator. In future navigators group, 73% of students do not have this characteristic. The research has shown that cadets studying pilotage are more likely to demonstrate the characteristics which are essential for a performance of the important tasks in pilots environment than the cadets studying navigation.

Keywords: pilot, Myers-Briggs Type indicator, questionnaire research, cadets, psychomotor education

Procedia PDF Downloads 484
213 Foreign Women Affecting the Social Life of the Ottoman Empire at the Beginning of the Twentieth Century: The Case of Lady Alice Lowther (1873-1939)

Authors: Meliha Nur Cercinli

Abstract:

In the last period of the Ottoman Empire, foreign officers played important role in the political area. Behind their political activities, their wives had a considerable influence on Ottoman social life. Despite the difficult conditions, these women involved in educating girls, encouraging Ottoman women to take part in the production area. For this purpose, they opened many schools and workplaces in various regions of the capital-Istanbul. One of these women was Lady Alice Lowther, who was known as the wife of British ambassador Gerard Agustus Lowther. She arranged various organizations in order to create necessary resources to help families of martyrs. Also, she chaired the Committee for Aid to Ottoman Military Families (Asker Ailelerine Yardım Komitesi), made an effort to establish the Society for Protection Animals in Istanbul (Istanbul Himaye-i Hayvanat Cemiyeti) with the supports of The Royal Society For Prevention Cruelty For Animals. Apart from these, she was also a good observer and writer as a traveller. She wrote and published her memories with the name of Down The Old Road (1921), When It Was June (1923) Land Of Gold Mohur (1932), Moments In Portugal Or Land Of The Laurel (1939). This paper aims to analyze Lady Alice Lowther’s activities in Istanbul based on Ottoman Archive documents. In addition, her books will also be examined as they will present a different perspective regarding her experiences.

Keywords: Lady Lowther, Ottoman Empire, women history, social life

Procedia PDF Downloads 158
212 Effect of Fortification of Expressed Human Breast Milk with Olive Oil and Skimmed Milk in Improving Weight Gain in Very Low Birth Weight Neonates and Shortening Their Length of Hospital Stay

Authors: Sumrina Kousar

Abstract:

Objective: The aim of this study was to observe the effect of fortification of expressed human breast milk with olive oil and skimmed milk in improving weight gain in very low birth weight neonates and shortening their length of hospital stay. Study Design and place: A randomized controlled trial was carried out at the Combined Military Hospital Lahore from March 2018 to March 2019. Methods: Neonates admitted with very low birth weight and gestational age of < 34 weeks were included in the study. Sixty babies were enrolled using non-probability consecutive sampling; a random number table was used to allocate them into a fortification group and a control group. The control group received expressed milk alone, while olive oil 1 ml twice daily and skimmed milk 1 gram in every third feed were added to expressed milk in the fortification group. Data was analyzed on SPSS 20. Proportions were compared by applying the chi-square test. An independent sample t-test was applied for comparing means. A p-value of ≤ 0.05 was considered significant. Results: The study comprised of 60 neonates, with 30 in each of the groups. Weight gain was 24.83±5.63 in the fortification group and 11.72±3.95 in the control group (p =< 0.001). Mean hospital stay was 20.5716.511 in the fortification group and 27.678.89 in the control group (p =< 0.043). Conclusion: Olive oil and skimmed milk fortification of breast milk was effective for weight gain and reducing the length of hospital stay in very low birth weight neonates.

Keywords: fortification, olive oil, skimmed milk, weight gain

Procedia PDF Downloads 168
211 Aerodynamic Modelling of Unmanned Aerial System through Computational Fluid Dynamics: Application to the UAS-S45 Balaam

Authors: Maxime A. J. Kuitche, Ruxandra M. Botez, Arthur Guillemin

Abstract:

As the Unmanned Aerial Systems have found diverse utilities in both military and civil aviation, the necessity to obtain an accurate aerodynamic model has shown an enormous growth of interest. Recent modeling techniques are procedures using optimization algorithms and statistics that require many flight tests and are therefore extremely demanding in terms of costs. This paper presents a procedure to estimate the aerodynamic behavior of an unmanned aerial system from a numerical approach using computational fluid dynamic analysis. The study was performed using an unstructured mesh obtained from a grid convergence analysis at a Mach number of 0.14, and at an angle of attack of 0°. The flow around the aircraft was described using a standard k-ω turbulence model. Thus, the Reynold Averaged Navier-Stokes (RANS) equations were solved using ANSYS FLUENT software. The method was applied on the UAS-S45 designed and manufactured by Hydra Technologies in Mexico. The lift, the drag, and the pitching moment coefficients were obtained at different angles of attack for several flight conditions defined in terms of altitudes and Mach numbers. The results obtained from the Computational Fluid Dynamics analysis were compared with the results obtained by using the DATCOM semi-empirical procedure. This comparison has indicated that our approach is highly accurate and that the aerodynamic model obtained could be useful to estimate the flight dynamics of the UAS-S45.

Keywords: aerodynamic modelling, CFD Analysis, ANSYS FLUENT, UAS-S45

Procedia PDF Downloads 374
210 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 353
209 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 659
208 Growing Evaluation Process in Chamaedorea Linearis with Humus from Biosolids of the Wastewater Treatment Plant, Nueva Granada Military University Cajica

Authors: J. Gonzalez, P. Jimenez, C. Isaza

Abstract:

Palms have different characteristics that make them vulnerable; that is the case of the Chamaedorea linearis, with the presence of solitary stems of small diameter and medium leaves, culturally harvested, and in religious festivities used. Additionally, they present a weak apical meristem as the only emergency point, slow development and growth, and an affectation due to the high rate of deforestation in Colombia. Propagation of this species can improve the pressure on wild populations and help their survival in the environment. In this study was used in 177 plants biosolids humus from the Wastewater Treatment Plant (WWTP), located at the UMNG Campus Cajica (Cundinamarca, Colombia). The experiment used a control and two treatments with 10% and 20% of humus. During the process, the variables evaluated were number of leaves, percentage of chlorophyll, stem length, and estimated leaf area. The data set were taking during 14 weeks before the reproductive maturity, evidencing that the most representative development of the palms was in the treatment of 20%, plants in this treatment presented major number of leaves, larger stems, a high quantity of chlorophyll, and was a first treatment that present pinnate leaves them represent an important point in maturity process. The research gives an opportunity to improve times of growth in another species of palms and plants (Product result from INV ING 2986 UMNG).

Keywords: biosolids, humus, growth, palms, wastewater treatment plant, WWTP

Procedia PDF Downloads 124
207 Necro-Power, Paramilitarism, and Sovereignty: An Interpretation of Colombian Paramilitarism as Symptom of the Formation Process of the (Neo)Liberal Democratic State

Authors: Julian David Rios Acuna

Abstract:

This paper seeks to argue that the phenomenon of ‘paramilitarism’ in Colombia exhibits the role of violence as constitutive of the political process of state formation in the country. In order to do this, it takes as its point of departure a landmark moment in the long history of private armies known as the ‘paramilitary’ in Colombia. In 2001, paramilitary commanders, politicians, and members of the military and other branches of state power singed what is known as the ‘Pact of Ralito.’ In this pact, the paramilitary appropriated constitutional and legal language. The paper argues that this appropriation shows that the paramilitary and the state express the same claim to sovereign power and therefore have the same foundation. More precisely, paramilitary power shows itself to base its power on the same foundation as the legal order, namely, extreme forms of violence where death is generative of power. In this sense, the paper shows how, by sharing its foundation, Colombian paramilitarism exhibits that state power in Colombia can be characterized as necro-power as Achille Mbembe understands it. The paper argues that paramilitarism shows state power as necro-power by constituting itself as a symptom understood, following Zizek, as that which both shows and overthrows its own foundation. In this way, paramilitarism shows the foundation of the state, thereby reconfiguring this very state. This reconfiguration, explicitly based on necro-power, the paper concludes, transforms the state into a form more appropriate to the political demands of neo-liberalism. By exhibiting its foundation in necro-power through paramilitarism, the Colombian State turns from a liberal into a (neo)liberal democracy.

Keywords: necro-power, necropolitics, paramilitarism in Colombia, state formation, state power, sovereign power

Procedia PDF Downloads 134
206 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 134
205 Applying Serious Game Design Frameworks to Existing Games for Integration of Custom Learning Objectives

Authors: Jonathan D. Moore, Mark G. Reith, David S. Long

Abstract:

Serious games (SGs) have been shown to be an effective teaching tool in many contexts. Because of the success of SGs, several design frameworks have been created to expedite the process of making original serious games to teach specific learning objectives (LOs). Even with these frameworks, the time required to create a custom SG from conception to implementation can range from months to years. Furthermore, it is even more difficult to design a game framework that allows an instructor to create customized game variants supporting multiple LOs within the same field. This paper proposes a refactoring methodology to apply the theoretical principles from well-established design frameworks to a pre-existing serious game. The expected result is a generalized game that can be quickly customized to teach LOs not originally targeted by the game. This methodology begins by describing the general components in a game, then uses a combination of two SG design frameworks to extract the teaching elements present in the game. The identified teaching elements are then used as the theoretical basis to determine the range of LOs that can be taught by the game. This paper evaluates the proposed methodology by presenting a case study of refactoring the serious game Battlespace Next (BSN) to teach joint military capabilities. The range of LOs that can be taught by the generalized BSN are identified, and examples of creating custom LOs are given. Survey results from users of the generalized game are also provided. Lastly, the expected impact of this work is discussed and a road map for future work and evaluation is presented.

Keywords: serious games, learning objectives, game design, learning theory, game framework

Procedia PDF Downloads 115
204 Investigation of Stellram Indexable Milling Cutter XDLT09-D41 Tool Wear for Machining of Ti6Al4V

Authors: Saad Nawaz, Yu Gang, Miao Haibin

Abstract:

Titanium alloys are attractive materials for aerospace industry due to their exceptional strength to weight ratio that is maintained at elevated temperatures and their good corrosion resistance. Major applications of titanium alloys were military aerospace industry, but since last decade the trend has now shifted towards commercial industry. On the other hand, titanium alloys are notorious for being poor thermal conductor that leads to them being difficult materials for machining. In this experimental study, Stellram Indexable milling cutter XDLT09-D41 is used for rough down milling of Ti6Al4V for small depth of cut under different combinations of parameters and application of high-pressure coolant. The machining performance was evaluated in terms of tool wear, tool life, and thermal crack. The tool wear was mostly observed at the tool tip and at bottom part of tool thermal deformations were observed which propagated with respect to time. Flank wear due to scratching of the cutting chips and diffusion wear because of high thermal stresses were observed specially at the bottom of the cutting tool. It was found that maximum tool life was obtained at the speed of 40m/min, feed rate of 358mm/min and depth of cut of 0.8mm. In the end, it was concluded that machining of Ti6Al4V is a thermally dominant process which leads to high thermal stresses in machining zone that results in increasing tool wear rate and deformation propagation.

Keywords: tool wear, cutting speed, flank wear , tool life

Procedia PDF Downloads 316
203 Helicopter Exhaust Gases Cooler in Terms of Computational Fluid Dynamics (CFD) Analysis

Authors: Mateusz Paszko, Ksenia Siadkowska

Abstract:

Due to the low-altitude and relatively low-speed flight, helicopters are easy targets for actual combat assets e.g. infrared-guided missiles. Current techniques aim to increase the combat effectiveness of the military helicopters. Protection of the helicopter in flight from early detection, tracking and finally destruction can be realized in many ways. One of them is cooling hot exhaust gasses, emitting from the engines to the atmosphere in special heat exchangers. Nowadays, this process is realized in ejective coolers, where strong heat and momentum exchange between hot exhaust gases and cold air ejected from atmosphere takes place. Flow effects of air, exhaust gases; mixture of those two and the heat transfer between cold air and hot exhaust gases are given by differential equations of: Mass transportation–flow continuity, ejection of cold air through expanding exhaust gasses, conservation of momentum, energy and physical relationship equations. Calculation of those processes in ejective cooler by means of classic mathematical analysis is extremely hard or even impossible. Because of this, it is necessary to apply the numeric approach with modern, numeric computer programs. The paper discussed the general usability of the Computational Fluid Dynamics (CFD) in a process of projecting the ejective exhaust gases cooler cooperating with helicopter turbine engine. In this work, the CFD calculations have been performed for ejective-based cooler cooperating with the PA W3 helicopter’s engines.

Keywords: aviation, CFD analysis, ejective-cooler, helicopter techniques

Procedia PDF Downloads 332
202 The Role of Identity Politics in the 2023 General Election in Nigeria: An Overview

Authors: Adekunle Saheed Ajisebiyawo

Abstract:

This paper examines the influence of identity politics on the development of electoral democracy in Nigeria. The paper was anchored on a theory of African democracy adopted the qualitative methodology and deployed data from secondary sources to evaluate the 2023 presidential election, and found that ethnicity, religion, and regional sentiments played a major role in the election. The practical implications of this paper are that while Nigeria’s democracy is tending towards consolidation, if the unexpected does not happen, e.g., military takeover, religious and ethnic identities can mar the country’s development as competent candidates that have good policies will be voted out based on religious and ethnic sentiments. Thus, there is a need to de-emphasize religion and ethnicity in the Nigerian polity. Candidates and parties that campaign based on racial or religious narratives should be barred from contesting elective positions. The paper concluded that identity politics is inimical to Nigeria’s democratization process as well as efforts aimed at uniting and integrating the country; it, therefore, recommended that to establish a sound electoral democracy and a strong united country, the menace of ethnic, religious, and regional cleavages should be addressed. To achieve this, efforts should be intensified towards providing a set of principles for nation-building which should be included in the constitution. In addition, the paper urges the media to support the formation of an inclusive government, cutting across tribes and religions in the country to reduce the negative impact of ethnicity and religion in the country.

Keywords: cleavages, democracy, ethnicity, election, identity politics, religion

Procedia PDF Downloads 59
201 The Role of Development in Settling Migration Crisis: The Preventive Approach of the European Union in Relations with Sub-Saharan African States

Authors: Artsiom Zinchanka

Abstract:

The world faces now one of the largest migration crisis and the European Union meets challenges in accepting the flow of migrants that could not be handled finally at this step. This crisis is complicated with many factors, such as military conflict in the Middle East; absence of the appropriate conditions in the refugees’ camps; but also with the complicity of the migration flow consisting of the Sub-Saharan migrants. This type of migrants leave their homelands for many reasons including poverty, not appropriate level of social and economic conditions, absence of infrastructure and access to the education and medical care. In practice, when the restrictive approach directed to limit the flow of illicit migration and to send illicit migrants back to their homelands is not always working, the approach directed to the root causes of the migration crisis can be more effective in settling the crisis. The Cotonou Agreement and the following treaties concluded between the European Union, and Sub-Saharan states show that the European Union considers the development of human rights and appropriate social and economic conditions in the Sub-Saharan states as one of the most important factors addressing the migration crisis. The preventive approach as the efforts of the European Union to develop appropriate social and economic conditions in Sub-Saharan states is considered in this article, as well as its evolution and current condition. This article also considers pros and cons of this approach and the obstacles that this approach faces. The research methods include review of literature and documents, analytical and descriptive methods.

Keywords: migration crisis, preventive approach, Sub-Saharan States, the European Union

Procedia PDF Downloads 134
200 Review of Microstructure, Mechanical and Corrosion Behavior of Aluminum Matrix Composite Reinforced with Agro/Industrial Waste Fabricated by Stir Casting Process

Authors: Mehari Kahsay, Krishna Murthy Kyathegowda, Temesgen Berhanu

Abstract:

Aluminum matrix composites have gained focus on research and industrial use, especially those not requiring extreme loading or thermal conditions, for the last few decades. Their relatively low cost, simple processing and attractive properties are the reasons for the widespread use of aluminum matrix composites in the manufacturing of automobiles, aircraft, military, and sports goods. In this article, the microstructure, mechanical, and corrosion behaviors of the aluminum metal matrix were reviewed, focusing on the stir casting fabrication process and usage of agro/industrial waste reinforcement particles. The results portrayed that mechanical properties like tensile strength, ultimate tensile strength, hardness, percentage of elongation, impact, and fracture toughness are highly dependent on the amount, kind, and size of reinforcing particles. Additionally, uniform distribution, wettability of reinforcement particles, and the porosity level of the resulting composite also affect the mechanical and corrosion behaviors of aluminum matrix composites. The two-step stir-casting process resulted in better wetting characteristics, a lower porosity level, and a uniform distribution of particles with proper handling of process parameters. On the other hand, the inconsistent and contradicting results on corrosion behavior regarding monolithic and hybrid aluminum matrix composites need further study.

Keywords: microstructure, mechanical behavior, corrosion, aluminum matrix composite

Procedia PDF Downloads 73
199 Engineering Strategies Towards Improvement in Energy Storage Performance of Ceramic Capacitors for Pulsed Power Applications

Authors: Abdul Manan

Abstract:

The necessity for efficient and cost-effective energy storage devices to intelligently store the inconsistent energy output from modern renewable energy sources is peaked today. The scientific community is struggling to identify the appropriate material system for energy storage applications. Countless contributions by researchers worldwide have now helped us identify the possible snags and limitations associated with each material/method. Energy storage has attracted great attention for its use in portable electronic devices military field. Different devices, such as dielectric capacitors, supercapacitors, and batteries, are used for energy storage. Of these, dielectric capacitors have high energy output, a long life cycle, fast charging and discharging capabilities, work at high temperatures, and excellent fatigue resistance. The energy storage characteristics have been studied to be highly affected by various factors, such as grain size, optimized compositions, grain orientation, energy band gap, processing techniques, defect engineering, core-shell formation, interface engineering, electronegativity difference, the addition of additives, density, secondary phases, the difference of Pmax-Pr, sample thickness, area of the electrode, testing frequency, and AC/DC conditions. The data regarding these parameters/factors are scattered in the literature, and the aim of this study is to gather the data into a single paper that will be beneficial for new researchers in the field of interest. Furthermore, control over and optimizing these parameters will lead to enhancing the energy storage properties.

Keywords: strategies, ceramics, energy storage, capacitors

Procedia PDF Downloads 77
198 Aircraft Components, Manufacturing and Design: Opportunities, Bottlenecks, and Challenges

Authors: Ionel Botef

Abstract:

Aerospace products operate in very aggressive environments characterized by high temperature, high pressure, large stresses on individual components, the presence of oxidizing and corroding atmosphere, as well as internally created or externally ingested particulate materials that induce erosion and impact damage. Consequently, during operation, the materials of individual components degrade. In addition, the impact of maintenance costs for both civil and military aircraft was estimated at least two to three times greater than initial purchase values, and this trend is expected to increase. As a result, for viable product realisation and maintenance, a spectrum of issues regarding novel processing technologies, innovation of new materials, performance, costs, and environmental impact must constantly be addressed. One of these technologies, namely the cold-gas dynamic-spray process has enabled a broad range of coatings and applications, including many that have not been previously possible or commercially practical, hence its potential for new aerospace applications. Therefore, the purpose of this paper is to summarise the state of the art of this technology alongside its theoretical and experimental studies, and explore how the cold-gas dynamic-spray process could be integrated within a framework that finally could lead to more efficient aircraft maintenance. Based on the paper's qualitative findings supported by authorities, evidence, and logic essentially it is argued that the cold-gas dynamic-spray manufacturing process should not be viewed in isolation, but should be viewed as a component of a broad framework that finally leads to more efficient aerospace operations.

Keywords: aerospace, aging aircraft, cold spray, materials

Procedia PDF Downloads 121
197 Self‑reported Auditory Problems Are Associated with Adverse Mental Health Outcomes and Alcohol Misuse in the UK Armed Forces

Authors: Fred N. H. Parker, Nicola T. Fear, S. A. M. Stevelink, L. Rafferty

Abstract:

Purpose Auditory problems, such as hearing loss and tinnitus, have been associated with mental health problems and alcohol misuse in the UK general population and in the US Armed Forces; however, few studies have examined these associations within the UK Armed Forces. The present study examined the association between auditory problems and probable common mental disorders, post-traumatic stress disorder and alcohol misuse. Methods 5474 serving and ex-service personnel from the UK Armed Forces were examined, selected from those who responded to phase two (data collection 2007–09) and phase three (2014–16) of a military cohort study. Multivariable logistic regression was used to examine the association between auditory problems at phase two and mental health problems at phase three. Results 9.7% of participants reported ever experiencing hearing problems alone, 7.9% reported tinnitus within the last month alone, and 7.8% reported hearing problems with tinnitus. After adjustment, hearing problems with tinnitus at phase two was associated with increased odds of probable common mental disorders (AOR = 1.50, 95% CI 1.09–2.08), post-traumatic stress disorder (AOR = 2.30, 95% CI 1.41–3.76), and alcohol misuse (AOR = 1.94, 95% CI 1.28–2.96) at phase three. Tinnitus alone was associated with probable post-traumatic stress disorder (AOR = 1.80, 95% CI 1.03–3.15); however, hearing problems alone were not associated with any outcomes of interest. Conclusions The association between auditory problems and mental health problems emphasizes the importance of the prevention of auditory problems in the Armed Forces: through enhanced audiometric screening, improved hearing protection equipment, and greater levels of utilization of such equipment.

Keywords: armed forces, hearing problems, tinnitus, mental health, alcohol misuse

Procedia PDF Downloads 166
196 Like a Bridge over Troubled Waters: The Value of Joint Learning Programs in Intergroup Identity-Based Conflict in Israel

Authors: Rachelly Ashwall, Ephraim Tabory

Abstract:

In an attempt to reduce the level of a major identity-based conflict in Israel between Ultra-orthodox and secular Jews, several initiatives in recent years have tried to bring members of the two societies together in facilitated joint discussion forums. Our study analyzes the impact of two types of such programs: joint mediation training classes and confrontation-based learning programs that are designed to facilitate discussions over controversial issues. These issues include claims about an unequal shouldering of national obligations such as military service, laws requiring public observance of the Sabbath, and discrimination against women, among others. The study examines the factors that enabled the two groups to reduce their social distance, and increase their understanding of each other, and develop a recognition and tolerance of the other group's particular social identity. The research conducted over a course of two years involved observations of the activities of the groups, interviews with the participants, and analysis of the social media used by the groups. The findings demonstrate the progression from a mutual initial lack of knowledge about habits, norms, and attitudes of the out-group to an increasing desire to know, understand and more readily accept the identity of a previously rejected outsider. Participants manifested more respect, concern for and even affection for those whose identity initially led them to reject them out of hand. We discuss the implications for seemingly intractable identity-based conflict in fragile societies.

Keywords: identity-based conflict, intergroup relations, joint mediation learning, out-group recognition, social identity

Procedia PDF Downloads 252
195 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 426
194 MXene-Based Self-Sensing of Damage in Fiber Composites

Authors: Latha Nataraj, Todd Henry, Micheal Wallock, Asha Hall, Christine Hatter, Babak Anasori, Yury Gogotsi

Abstract:

Multifunctional composites with enhanced strength and toughness for superior damage tolerance are essential for advanced aerospace and military applications. Detection of structural changes prior to visible damage may be achieved by incorporating fillers with tunable properties such as two-dimensional (2D) nanomaterials with high aspect ratios and more surface-active sites. While 2D graphene with large surface areas, good mechanical properties, and high electrical conductivity seems ideal as a filler, the single-atomic thickness can lead to bending and rolling during processing, requiring post-processing to bond to polymer matrices. Lately, an emerging family of 2D transition metal carbides and nitrides, MXenes, has attracted much attention since their discovery in 2011. Metallic electronic conductivity and good mechanical properties, even with increased polymer content, coupled with hydrophilicity make MXenes a good candidate as a filler material in polymer composites and exceptional as multifunctional damage indicators in composites. Here, we systematically study MXene-based (Ti₃C₂) coated on glass fibers for fiber reinforced polymer composite for self-sensing using microscopy and micromechanical testing. Further testing is in progress through the investigation of local variations in optical, acoustic, and thermal properties within the damage sites in response to strain caused by mechanical loading.

Keywords: damage sensing, fiber composites, MXene, self-sensing

Procedia PDF Downloads 120
193 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets

Authors: Kothuri Sriraman, Mattupalli Komal Teja

Abstract:

In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).

Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm

Procedia PDF Downloads 348
192 Integrated Microsystem for Multiplexed Genosensor Detection of Biowarfare Agents

Authors: Samuel B. Dulay, Sandra Julich, Herbert Tomaso, Ciara K. O'Sullivan

Abstract:

An early, rapid and definite detection for the presence of biowarfare agents, pathogens, viruses and toxins is required in different situations which include civil rescue and security units, homeland security, military operations, public transportation securities such as airports, metro and railway stations due to its harmful effect on the human population. In this work, an electrochemical genosensor array that allows simultaneous detection of different biowarfare agents within an integrated microsystem that provides an easy handling of the technology which combines a microfluidics setup with a multiplexing genosensor array has been developed and optimised for the following targets: Bacillus anthracis, Brucella abortis and melitensis, Bacteriophage lambda, Francisella tularensis, Burkholderia mallei and pseudomallei, Coxiella burnetii, Yersinia pestis, and Bacillus thuringiensis. The electrode array was modified via co-immobilisation of a 1:100 (mol/mol) mixture of a thiolated probe and an oligoethyleneglycol-terminated monopodal thiol. PCR products from these relevant biowarfare agents were detected reproducibly through a sandwich assay format with the target hybridised between a surface immobilised probe into the electrode and a horseradish peroxidase-labelled secondary reporter probe, which provided an enzyme based electrochemical signal. The potential of the designed microsystem for multiplexed genosensor detection and cross-reactivity studies over potential interfering DNA sequences has demonstrated high selectivity using the developed platform producing high-throughput.

Keywords: biowarfare agents, genosensors, multipled detection, microsystem

Procedia PDF Downloads 272