Search results for: military outpost
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 581

Search results for: military outpost

161 The Role and Significance of Mobile Gerdarmarie Battalions in the Canakkale Battles

Authors: Muzaffer Topgül, Ersi̇n Yilmaz

Abstract:

One of the unknown aspects of Çanakkale Battles is that the importance and contributions of Mobile Gendarmarie Battalion have not been fully understood. It was because the battles of the troops which were deployed more in interior parts of Gallipoli Peninsula, and the contributions of battle on level tactical troops were not considered as much as the studies on strategical or operative level troops. When the operation field and battle plans are examined, instead of deploying along the coast to put the forces with a power at zero level landing on the coast out of action, the main battle components are seen to have deployed as strong reserves in the more inner areas. The negative effect of the field on the great trop operation reveals the need for time in order to use the intervention forces. ‘Time’ emerged as the main factor in victory as a result of giving intervention opportunity to the troops. While ordering his soldiers in Conkbayırı to die rather than fight, Liutenant Colonel Mustafa Kemal, the Commander of the 19th division, also emphasized the significance of time. In this respect, the contribution of Mobile Gendarmarie Battalion which saved time for the troops to intervene can be clearly seen. During the study, the memoirs and the works written by military institutions based on the record sources under the light of the notes taken during the trips to the region were used. By preventing the enemies from capturing the area, Mobile Gendarmerie Battalions had an important role in Battles of Kerevizdere, Kireçtepe and Alçıtepe which were of great importance among the battles. The success of these battalions was expressed with compliment by both Turkish and foreign commanders that participated in the war. During the battles the losses of armed forces commissioned to keep the security and order brought about the formation of the regions deficient in state authority.

Keywords: Canakkale battles, mustafa kemal, mobile gerdarmarie, Ottoman empire, time

Procedia PDF Downloads 445
160 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 261
159 Empirical Study of Correlation between the Cost Performance Index Stability and the Project Cost Forecast Accuracy in Construction Projects

Authors: Amin AminiKhafri, James M. Dawson-Edwards, Ryan M. Simpson, Simaan M. AbouRizk

Abstract:

Earned value management (EVM) has been introduced as an integrated method to combine schedule, budget, and work breakdown structure (WBS). EVM provides various indices to demonstrate project performance including the cost performance index (CPI). CPI is also used to forecast final project cost at completion based on the cost performance during the project execution. Knowing the final project cost during execution can initiate corrective actions, which can enhance project outputs. CPI, however, is not constant during the project, and calculating the final project cost using a variable index is an inaccurate and challenging task for practitioners. Since CPI is based on the cumulative progress values and because of the learning curve effect, CPI variation dampens and stabilizes as project progress. Although various definitions for the CPI stability have been proposed in literature, many scholars have agreed upon the definition that considers a project as stable if the CPI at 20% completion varies less than 0.1 from the final CPI. While 20% completion point is recognized as the stability point for military development projects, construction projects stability have not been studied. In the current study, an empirical study was first conducted using construction project data to determine the stability point for construction projects. Early findings have demonstrated that a majority of construction projects stabilize towards completion (i.e., after 70% completion point). To investigate the effect of CPI stability on cost forecast accuracy, the correlation between CPI stability and project cost at completion forecast accuracy was also investigated. It was determined that as projects progress closer towards completion, variation of the CPI decreases and final project cost forecast accuracy increases. Most projects were found to have 90% accuracy in the final cost forecast at 70% completion point, which is inlined with findings from the CPI stability findings. It can be concluded that early stabilization of the project CPI results in more accurate cost at completion forecasts.

Keywords: cost performance index, earned value management, empirical study, final project cost

Procedia PDF Downloads 156
158 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks

Authors: Hyunsun Lee, Yi Zhu

Abstract:

Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.

Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles

Procedia PDF Downloads 123
157 Accuracy of Peak Demand Estimates for Office Buildings Using Quick Energy Simulation Tool

Authors: Mahdiyeh Zafaranchi, Ethan S. Cantor, William T. Riddell, Jess W. Everett

Abstract:

The New Jersey Department of Military and Veteran’s Affairs (NJ DMAVA) operates over 50 facilities throughout the state of New Jersey, U.S. NJDMAVA is under a mandate to move toward decarbonization, which will eventually include eliminating the use of natural gas and other fossil fuels for heating. At the same time, the organization requires increased resiliency regarding electric grid disruption. These competing goals necessitate adopting the use of on-site renewables such as photovoltaic and geothermal power, as well as implementing power control strategies through microgrids. Planning for these changes requires a detailed understanding of current and future electricity use on yearly, monthly, and shorter time scales, as well as a breakdown of consumption by heating, ventilation, and air conditioning (HVAC) equipment. This paper discusses case studies of two buildings that were simulated using the QUick Energy Simulation Tool (eQUEST). Both buildings use electricity from the grid and photovoltaics. One building also uses natural gas. While electricity use data are available in hourly intervals and natural gas data are available in monthly intervals, the simulations were developed using monthly and yearly totals. This approach was chosen to reflect the information available for most NJ DMAVA facilities. Once completed, simulation results are compared to metrics recommended by several organizations to validate energy use simulations. In addition to yearly and monthly totals, the simulated peak demands are compared to actual monthly peak demand values. The simulations resulted in monthly peak demand values that were within 30% of the measured values. These benchmarks will help to assess future energy planning efforts for NJ DMAVA.

Keywords: building energy modeling, eQUEST, peak demand, smart meters

Procedia PDF Downloads 68
156 From Sympathizers to Perpetrators: Examining the Involvement of Rural Women in Bangladesh in Violent Extremism

Authors: Shantanu Majumder

Abstract:

This paper attempts to explain the factors contribute in attracting and engaging rural women in Bangladesh toward political Islam that in many cases manifests itself in the form of violent extremism (VE). Bangladesh, the fourth largest Muslim majority country in the world, has been confronting the problem of VE in the name of Islam since a long. The political Islamists, explaining the events like military operations in Afghanistan and Iraq, anti-Muslim politics in neighboring India and Myanmar, Islamophobia in the West, and several other issues in their own way, have become to a vast extent successful in creating a high level of emotion, anger and a feeling of being oppressed worldwide among the ordinary Muslims masses. Half-hearted role of public intellectuals and political expediency of liberal political forces in explaining these events in a secular democratic way also facilitate the extremists to earn political dividend. VE was perceived as an all-male activism of the political Islamists’ in the past in Bangladesh. However, evidence in the recent times shows that there are sympathizers, recruiters, and perpetrators as well among the womenfolk in favor of VE-based political Islam. The first section in this paper sheds light on the way the political Islamists build rapport with and win over the heart of target women in countryside under the camouflage of preaching authentic Islam. This section also describes the role of family in involvement of women in VE. The second section discusses wide-ranging use of websites, facebook, laptop, mobile phones and several other means in the way to motivate and radicalize women. How the involvement with political Islamists brings changes in thinking process, lifestyle and family life of motivated women has been focused in the third section. The final section deals briefly with the way out relying on the argument that law and order forces alone cannot tackle this problem.

Keywords: Bangladesh, political Islam, violent extremism, women

Procedia PDF Downloads 195
155 Modelling the Dynamics and Optimal Control Strategies of Terrorism within the Southern Borno State Nigeria

Authors: Lubem Matthew Kwaghkor

Abstract:

Terrorism, which remains one of the largest threats faced by various nations and communities around the world, including Nigeria, is the calculated use of violence to create a general climate of fear in a population to attain particular goals that might be political, religious, or economical. Several terrorist groups are currently active in Nigeria, leading to attacks on both civil and military targets. Among these groups, Boko Haram is the deadliest terrorist group operating majorly in Borno State. The southern part of Borno State in North-Eastern Nigeria has been plagued by terrorism, insurgency, and conflict for several years. Understanding the dynamics of terrorism is crucial for developing effective strategies to mitigate its impact on communities and to facilitate peace-building efforts. This research aims to develop a mathematical model that captures the dynamics of terrorism within the southern part of Borno State, Nigeria, capturing both government and local community intervention strategies as control measures in combating terrorism. A compartmental model of five nonlinear differential equations is formulated. The model analyses show that a feasible solution set of the model exists and is bounded. Stability analyses show that both the terrorism free equilibrium and the terrorism endermic equilibrium are asymptotically stable, making the model to have biological meaning. Optimal control theory will be employed to identify the most effective strategy to prevent or minimize acts of terrorism. The research outcomes are expected to contribute towards enhancing security and stability in Southern Borno State while providing valuable insights for policymakers, security agencies, and researchers. This is an ongoing research.

Keywords: modelling, terrorism, optimal control, susceptible, non-susceptible, community intervention

Procedia PDF Downloads 22
154 The Effect of Carbon Nanotubes in Copolyamide Nonwovens on the Properties of CFRP Laminates

Authors: Kamil Dydek, Anna Boczkowska, Paulina Latko-Duralek, Rafal Kozera, Michal Salacinski

Abstract:

In recent years there has been increasing interest in many industries, such as the aviation, automotive, and military industries, in Carbon Fibre Reinforced Polymers (CFRP). This is because of the excellent properties of CFRP, which are characterized by very high strength and stiffness in relation to their mass, low density (almost twice as low as aluminum and more than five times as low as steel), and corrosion resistance. However, they do not have sufficient electrical conductivity, which is required in some applications. Therefore, work is underway to improve their electrical conductivity, for example, by incorporating carbon nanotubes (CNTs) into the CFRP structure. CNTs possess excellent properties, such as high electrical conductivity, high aspect ratio, high Young’s modulus, and high tensile strength. An idea developed by our team is a modification of CFRP by the use of thermoplastic nonwovens containing CNTs. Nanocomposite fibers were made from three different masterbatches differing in the content of multi-wall carbon nanotubes, and then nonwovens that differed in areal weight were produced using a thermo-press. The out of autoclave method was used to fabricate the laminates from commercial carbon-epoxy prepreg dedicated to aviation applications - one without the nonwovens (reference) and five containing nonwovens placed between each prepreg layer. The volume of electrical conductivity of the manufactured laminates was measured in three directions. In order to investigate the adhesion between carbon fibers and nonwovens, the microstructure of the produced laminates was observed. The mechanical properties of the CFRP composites were measured in a short-beam shear test. In addition, the influence of thermoplastic nonwovens on the thermos-mechanical properties of laminates was analyzed by Dynamic Mechanical Analysis. The studies were carried out within grant no. DOB-1-3/1/PS/2014 financed by the National Centre for Research and Development in Poland.

Keywords: CFRP, thermoplastic nonwovens, carbon nanotubes, electrical conductivity

Procedia PDF Downloads 134
153 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm

Authors: Frodouard Minani

Abstract:

Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.

Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks

Procedia PDF Downloads 144
152 The Role of Businesses in Peacebuilding in Nigeria: A Stakeholder Approach

Authors: Jamila Mohammed Makarfi, Yontem Sonmez

Abstract:

Developing countries like Nigeria have recently been affected by conflicts characterized by violence, high levels of risk and insecurity, resulting in loss of lives, livelihoods, displacement of communities, degradation of health, educational and social infrastructure as well as economic underdevelopment. The Nigerian government’s response to most of these conflicts has mainly been reactionary in the form of military deployments, as against precautionary to prevent or address the root causes of the conflicts. Several studies have shown that at various points of a conflict, conflict regions can benefit from the resources and expertise available outside the government, mainly from the private sector through mechanisms such as corporate social responsibility (CSR) by businesses. The main aim of this study is to examine the role of businesses in peacebuilding in Northern Nigeria through CSR in the last decade. The expected contributions from this will answer research questions, such as the key business motivations to engage in peacebuilding, as well as the degree of influence exerted from various stakeholder groups on the business decision to engage. The methodology of the study adopts a multiple case study of over 120 businesses of various sizes, ranging from small, medium and large-scale. A mixed method enabled the collection of quantitative and qualitative primary data to augment the secondary data. The results indicated that the most important business motivations to engage in peacebuilding were the negative effects of the conflict on economic stability, as well as stakeholder-driven motives. On the other hand, out of the 12 identified stakeholders, micro-, small- and medium-scale enterprises (MSMEs) considered the chief executive officer’s interest to be the most important factor, while large companies rated the government and community pressure as the highest. Overall, the foreign stakeholders scored low on the influence chart for all business types.

Keywords: conflict, corporate social responsibility, peacebuilding, stakeholder

Procedia PDF Downloads 219
151 Role of Pulsed-Dye Laser in the Treatment of Inflammatory Acne Vulgaris

Authors: Shirajul Islam Khan, Muhammad Ashraful Alam Bhuiyan, Syeda Tania Begum

Abstract:

Introduction: Acne vulgaris is one of the most common dermatologic conditions and affects the vast majority of people at some point during their lifetime, so effective treatment is of major importance. The failure of usual treatment modalities, teratogenic effects with some severe side effects, and resistance to P.Acne by Retinoides have been focusing on new therapeutic options for the treatment of acne. More recently, pulsed dye laser therapy has been reported to reduce acne lesion counts. The negligible morbidity of these treatment modalities and some other benefits of subsequent acne scar management lead this therapy more attractive. Objective: The objective of this study is to assess the efficacy and safety of pulsed dye laser therapy in the treatment of inflammatory acne vulgaris. Materials and Methods: A prospective clinical trial was done in the Department of Dermatology and Venereology, Combined Military Hospital (CMH), Dhaka, to find out the role of pulse dye laser in the treatment of inflammatory acne vulgaris. The study was carried out with 60 patients with mild to moderate acne vulgaris, and those were treated with pulsed dye laser therapy at baseline and after 4, 8, and 12 weeks. Results: Among 60 patients with inflammatory acne, 42(70%) were in the age group of less than 20 years, and 36(60%) were female. Regarding the number of inflammatory lesions, the baseline mean number (± SD) was 12.77 ± 4.01; after 4 weeks of treatment of inflammatory acne by pulsed dye laser was 7.80 ± 4.11; after 8 weeks of treatment, 6.10 ± 4.03 and after 12 weeks of treatment was 4.17 ± 4.02. After 4 weeks of treatment by pulse dye laser, the level of improvement was excellent at 3.3%, good at 10%, fair at 60%, and poor at 26.7%; after 8 weeks of treatment, excellent was 13.3%, good was 46.7%, the fair was 30% and poor 10% and after 12 weeks of treatment, excellent was 56.7%, good 13.3%, fair 23.3% and poor 6.7%. Regarding safety level, out of 60 patients of inflammatory acne vulgaris treated by pulsed dye laser, about 52(86.7%) patients did not observe any side effects. Conclusions: On the basis of the study results, it can be concluded that pulsed-dye laser is highly effective and well tolerated by patients in the treatment of inflammatory acne.

Keywords: pulsed-dye laser, inflammatory acne, acne vulgaris, retinoids

Procedia PDF Downloads 92
150 Exploring the Aesthetics of Sexual Violence in Therese Park’s ‘A Gift of the Emperor’: A Brief Study on Korean Comfort Women

Authors: Khushboo Verma

Abstract:

The use of rape as a weapon of war has been in existence for as early as the middle ages. Women, during the conflict, have been treated as the spoils of war, a reward for the conquering soldiers granted to them by their superiors which is, arguably, most often overlooked as part of the collateral damage that is unavoidable in conflict zones. Korean-born Therese Park’s first novel, A Gift of the Emperor (1997), describes one such atrocious incidence wherein she highlights the active role the Japanese military played in procuring and condoning trafficking of women, who were euphemistically referred to as ‘comfort women’, for prostitution during World War II. This paper thus aims to look at the remembering and reckonings of these women, which fueled a range of creative gestures in the artistic representations and knowledge production by Korean American artists and writers. The essay divides into three parts wherein first it tries to highlight the relationship of the state and the self in relation to the ‘comfort women’ as to who bears the onus of the exploitation of these women, or the responsibility for the redressal with the present-day notions of human rights as studied through Ueno Chizuko’s ‘The Politics of Memory: Nation, Individual and Self’ (1999). There are several narratological elements of the text that are of interest here which shall be viewed and analysed throughout the paper as well. The second part of the paper talks about the aesthetics of rape and sexual violence as represented or (mis)represented by Park in her novel as she attempts to give voice to the victim and retain her and her suffering as the central focus of the narrative. Finally, the third part of the novel explores as well as places the novel in the context of debates over the highly contested issue of ‘comfort women’ and the actual ‘comfort women’ survivors’ testimonies. For this purpose, the present study focuses on Dori Laub’s ‘Truth and Testimony: The Process and the Struggle’ (1991).

Keywords: Korean comfort women, survivors’ testimonies, sexual slavery, aesthetics of sexual violence, horrible memories

Procedia PDF Downloads 159
149 Adhesive Bonded Joints Characterization and Crack Propagation in Composite Materials under Cyclic Impact Fatigue and Constant Amplitude Fatigue Loadings

Authors: Andres Bautista, Alicia Porras, Juan P. Casas, Maribel Silva

Abstract:

The Colombian aeronautical industry has stimulated research in the mechanical behavior of materials under different loading conditions aircrafts are generally exposed during its operation. The Calima T-90 is the first military aircraft built in the country, used for primary flight training of Colombian Air Force Pilots, therefore, it may be exposed to adverse operating situations such as hard landings which cause impact loads on the aircraft that might produce the impact fatigue phenomenon. The Calima T-90 structure is mainly manufactured by composites materials generating assemblies and subassemblies of different components of it. The main method of bonding these components is by using adhesive joints. Each type of adhesive bond must be studied on its own since its performance depends on the conditions of the manufacturing process and operating characteristics. This study aims to characterize the typical adhesive joints of the aircraft under usual loads. To this purpose, the evaluation of the effect of adhesive thickness on the mechanical performance of the joint under quasi-static loading conditions, constant amplitude fatigue and cyclic impact fatigue using single lap-joint specimens will be performed. Additionally, using a double cantilever beam specimen, the influence of the thickness of the adhesive on the crack growth rate for mode I delamination failure, as a function of the critical energy release rate will be determined. Finally, an analysis of the fracture surface of the test specimens considering the mechanical interaction between the substrate (composite) and the adhesive, provide insights into the magnitude of the damage, the type of failure mechanism that occurs and its correlation with the way crack propagates under the proposed loading conditions.

Keywords: adhesive, composites, crack propagation, fatigue

Procedia PDF Downloads 204
148 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 503
147 The Embodiment of Violence and Liminal Space in Illegality: Rohingya Refugees

Authors: E. Xavier, B. Nandita

Abstract:

Rohingyas are an ethnic and religious minority that resides in the Rakhine State of Myanmar. Post the military coup in 1962, Rohingyas have not been recognized as one of the ethnic tribes of Burma under the legislation. They have lost citizenship, education, health care rights, and instantly became illegal immigrants. While the historicization of this conflict is crucial, this paper wants to humanize the Rohingya population’s embodiment of violence on three different levels – individual, social, and political. In addition, the study focuses on their liminal existence in refugee camps in Bangladesh and in other parts of the world, such as Malaysia and the United States of America. A multi-medium study, it includes first-hand interviews with the Rohingya community in Wisconsin and Chicago, second-hand interviews from documentaries and past ethnographies from scholars to draw meaningful conclusions about their experience as a community. In the end, it focuses on the group of Rohingyas who have managed to resettle in another country and their transitioning experience. Rohingyas embody violence on their individual, social, and political bodies in different ways. Along with rape, murder, and physical harm, the community also encounters sexually transmitted infections, post-traumatic stress disorder symptoms, and poor mental health. On a social level, they encounter heightened gender discrimination, work industry shifting, and immense, shared emotional pain. As for their political body, the news media and journalism industry uses their bodies for purposes that benefit both parties and flirts with a tone of sensationalism in their reporting. In addition, the Rohingya community fluctuates with the concept of nationality, patriotism, citizenship, and refugee when they think about the future. This study provides a framework that future aid or health programs can use to determine the type of community need and its significance in the Rohingya community.

Keywords: embodiment, liminal, refugee, Rohingya

Procedia PDF Downloads 132
146 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan

Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain

Abstract:

Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.

Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism

Procedia PDF Downloads 110
145 Evaluation of Adequacy of Caspofungin Prescription in a Tunisian Hospital Cohort

Authors: Mariem Meddeb Sidhom, Souhayel Hedfi, Rjaibia Houda, Mehdi Dridi, Mohamed Ali Yousfi, Sâadia Gargouri

Abstract:

Considering the important increase in costs of caspofungin treatments and ahead the evolution of its indication, pharmacy department was prompted to realize a review of the adequacy of prescriptions in the medical intensive care units (ICU). A retrospective observational study was conducted in Tunis military hospital concerning ICU prescriptions of caspofungin from 2008 until 2013. A pharmacist had returned to the patient’s medical records to collect data and to the microbiology department for parasitological results. The adequacy of prescriptions was evaluated by a pharmacist and an infectiologist parasitologist, referring to predefined scale of criteria resuming the indications of the marketing authorization (MA) and grade AI-AII of the guidelines of the Infectious Diseases Society of America (IDSA). Sixty two ICU patients have been treated with caspofungin during the period of study; however, 8 files were lost. Thus, 54 patients were included in the study having received 55 prescriptions of caspofungin. Males were a majority with 64.8% of the population. Mean age was 51 years. Caspofungin was indicated in accordance with the IDSA recommendations in 43.6% of the cases. The most case of non respect to the guidelines was the indication of caspofungin as empirical treatment in non neutropenic patients. Caspofungin was utilized as a first line treatment in 9 cases where it was possible to give fluconazole first, as germs were fluconazole- sensitive. Caspofungin was indicated in 2 patients with good renal function and in which nor amphotericin B, liposomal ampho B neither itraconazole had been previously used, as indicates the MA. The posology of caspofungin was respected in all prescriptions with a loading dose of 70 mg in the first day and a maintenance dose of 50 mg daily. Seven patients had received a daily dose of 70 mg, the recommended dose for people weighing more than 80 Kg. Caspofungin prescriptions are far to be adequately done. There is a clear need of optimization in indicating this molecule and that must be done in collaboration between the pharmacy department, the ICUs and parasitology department.

Keywords: caspofungin, prescription, intensive care units, marketing authorization, Tunisian hospital cohort

Procedia PDF Downloads 338
144 Motivation in Online Instruction

Authors: David Whitehouse

Abstract:

Some of the strengths of online teaching include flexibility, creativity, and comprehensiveness. A challenge can be motivation. How can an instructor repeating the same lessons over and over, day in and day out, year after year, maintain motivation? Enthusiasm? Does motivating the student and creating enthusiasm in class build the same things inside the instructor? The answers lie in the adoption of what I label EUQ—The Empathy and Understanding Quotient. In the online environment, students who are adults have many demands on their time: civilian careers, families (spouse, children, older parents), and sometimes even military service. Empathetic responses on the part of the instructor will lead to open and honest communication on the part of the student, which will lead to understanding on the part of the instructor and a rise in motivation in both parties. Understanding the demands can inform an instructor’s relationship with the student throughout the temporal parameters of classwork. In practicing EUQ, instructors can build motivation in their students and find internal motivation in an enhanced classroom dynamic. The presentation will look at what motivates a student to accomplish more than the minimum required and how that can lead to excellent results for an instructor’s own motivation. Through direct experience of having students give high marks on post-class surveys and via direct messaging, the presentation will focus on how applying EUQ in granting extra time, searching for intent while grading, communicating with students via Quick Notes, responses in Forums, comments in Assignments, and comments in grading areas - - - how applying these things infuses enthusiasm and energy in the instructor which drive creativity in teaching. Three primary ways of communicating with students will be given as examples. The positive response and negative response each for a Forum, an Assignment, and a Message will be explored. If there is time, participants will be invited to craft their own EUQ responses in a role playing exercise involving two common classroom scenarios—late work and plagiarism.

Keywords: education, instruction, motivation, online, teaching

Procedia PDF Downloads 171
143 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 294
142 Geometric Nonlinear Dynamic Analysis of Cylindrical Composite Sandwich Shells Subjected to Underwater Blast Load

Authors: Mustafa Taskin, Ozgur Demir, M. Mert Serveren

Abstract:

The precise study of the impact of underwater explosions on structures is of great importance in the design and engineering calculations of floating structures, especially those used for military purposes, as well as power generation facilities such as offshore platforms that can become a target in case of war. Considering that ship and submarine structures are mostly curved surfaces, it is extremely important and interesting to examine the destructive effects of underwater explosions on curvilinear surfaces. In this study, geometric nonlinear dynamic analysis of cylindrical composite sandwich shells subjected to instantaneous pressure load is performed. The instantaneous pressure load is defined as an underwater explosion and the effects of the liquid medium are taken into account. There are equations in the literature for pressure due to underwater explosions, but these equations have been obtained for flat plates. For this reason, the instantaneous pressure load equations are arranged to be suitable for curvilinear structures before proceeding with the analyses. Fluid-solid interaction is defined by using Taylor's Plate Theory. The lower and upper layers of the cylindrical composite sandwich shell are modeled as composite laminate and the middle layer consists of soft core. The geometric nonlinear dynamic equations of the shell are obtained by Hamilton's principle, taken into account the von Kàrmàn theory of large displacements. Then, time dependent geometric nonlinear equations of motion are solved with the help of generalized differential quadrature method (GDQM) and dynamic behavior of cylindrical composite sandwich shells exposed to underwater explosion is investigated. An algorithm that can work parametrically for the solution has been developed within the scope of the study.

Keywords: cylindrical composite sandwich shells, generalized differential quadrature method, geometric nonlinear dynamic analysis, underwater explosion

Procedia PDF Downloads 192
141 U Slot Loaded Wearable Textile Antenna

Authors: Varsha Kheradiya, Ganga Prasad Pandey

Abstract:

The use of wearable antennas is rising because wireless devices become small. The wearable antenna is part of clothes used in communication applications, including energy harvesting, medical application, navigation, and tracking. In current years, Antennas embroidered on clothes, conducting antennas based on fabric, polymer embedded antennas, and inkjet-printed antennas are all attractive ways. Also shows the analysis required for wearable antennas, such as wearable antennae interacting with the human body. The primary requirements for the antenna are small size, low profile minimizing radiation absorption by the human body, high efficiency, structural integrity to survive worst situations, and good gain. Therefore, research in energy harvesting, biomedicine, and military application design is increasingly favoring flexible wearable antennas. Textile materials that are effectively used for designing and developing wearable antennas for body area networks. The wireless body area network is primarily concerned with creating effective antenna systems. The antenna should reduce their size, be lightweight, and be adaptable when integrated into clothes. When antennas integrate into clothes, it provides a convenient alternative to those fabricated using rigid substrates. This paper presents a study of U slot loaded wearable textile antenna. U slot patch antenna design is illustrated for wideband from 1GHz to 6 GHz using textile material jeans as substrate and pure copper polyester taffeta fabric as conducting material. This antenna design exhibits dual band results for WLAN at 2.4 GHz and 3.6 GHz frequencies. Also, study U slot position horizontal and vertical shifting. Shifting the horizontal positive X-axis position of the U slot produces the third band at 5.8 GHz.

Keywords: microstrip patch antenna, textile material, U slot wearable antenna, wireless body area network

Procedia PDF Downloads 90
140 The Crisis of Displacement and Resettlement of Bakassi People of the Nigeria-Cameroon Borderlands

Authors: Geoffrey Nwaka

Abstract:

After many years of a border dispute between Nigeria and Cameroon over the ownership of the Bakassi Peninsula, the International Court of Justice ruled in 2002 that, based on the 1913 colonial boundary agreement between Britain and Germany, the oil-rich Peninsula, inhabited for generations by Nigerians, and hitherto administered as one of Nigeria’s 774 Local Government Areas, belongs to Cameroon, and not to Nigeria. Under pressure from the international community, Nigeria and Cameroon signed the Greentree Accord in 2006 to comply peacefully with the ICJ ruling and to protect the fundamental rights and freedoms of the Bakassi people, whether they opted to remain in the Peninsula under the authority of Cameroon or relocate to Nigeria. Sadly, the Nigerian government and the international community underestimated the scale of displacement that would follow the withdrawal of the Nigerian administration and military forces from the area and did not prepare adequately for the massive influx of tens of thousands of Bakassi people hurriedly dislodged by the reported hostility of the Cameroon authorities and their security services. The paper discusses the historical context and contemporary significance of the crisis, the chaotic resettlement schemes and appalling humanitarian relief camps in ‘New Bakassi’, and the prolonged hardship and disillusionment of the disaffected refugees/returnees. The lesson for African and Asian governments and peoples is to avoid needless conflicts over the 'imported' colonial boundaries, to remove unnecessary border restrictions, and take fully into account the development needs and well-being of borderland communities that sometimes rightly feel that distant central governments negotiate their political and international interests at the expense of the borderlands; and finally, to begin to see the boundaries more as links and bridges for the cooperation and integration of African and Asian states and peoples, rather than as barriers and static lines of demarcation on the map.

Keywords: Africa, forced displacement, resettlement, border conflict, Bakassi

Procedia PDF Downloads 17
139 Multi-Sensor Image Fusion for Visible and Infrared Thermal Images

Authors: Amit Kumar Happy

Abstract:

This paper is motivated by the importance of multi-sensor image fusion with a specific focus on infrared (IR) and visual image (VI) fusion for various applications, including military reconnaissance. Image fusion can be defined as the process of combining two or more source images into a single composite image with extended information content that improves visual perception or feature extraction. These images can be from different modalities like visible camera & IR thermal imager. While visible images are captured by reflected radiations in the visible spectrum, the thermal images are formed from thermal radiation (infrared) that may be reflected or self-emitted. A digital color camera captures the visible source image, and a thermal infrared camera acquires the thermal source image. In this paper, some image fusion algorithms based upon multi-scale transform (MST) and region-based selection rule with consistency verification have been proposed and presented. This research includes the implementation of the proposed image fusion algorithm in MATLAB along with a comparative analysis to decide the optimum number of levels for MST and the coefficient fusion rule. The results are presented, and several commonly used evaluation metrics are used to assess the suggested method's validity. Experiments show that the proposed approach is capable of producing good fusion results. While deploying our image fusion algorithm approaches, we observe several challenges from the popular image fusion methods. While high computational cost and complex processing steps of image fusion algorithms provide accurate fused results, they also make it hard to become deployed in systems and applications that require a real-time operation, high flexibility, and low computation ability. So, the methods presented in this paper offer good results with minimum time complexity.

Keywords: image fusion, IR thermal imager, multi-sensor, multi-scale transform

Procedia PDF Downloads 115
138 A Comparison of Sulfur Mustard Cytotoxic Effects on the Two Human Lung Origin Cell Lines

Authors: P. Jost, L. Muckova, M. Matula, J. Pejchal, D. Jun, R. Stetina

Abstract:

Sulfur mustard (bis(2-chlorethyl) sulfide) is highly toxic, chemical warfare agent that has been used in the past in several armed conflicts. Except for the skin, respiratory tract is one of the important routes of exposure. The elucidation and understanding of the mechanism of toxicity of SM have been effort intensive research. The multiple targets character of SM caused cellular damage resulted in activation of many different mechanisms which contribute to cellular response and participate in the final cytopathology effect. In our present work, we compared time-dependent changes in sulfur mustard exposed adult human lung fibroblasts NHLF and lung epithelial alveolar cell line A-549. Cell viability (MTT assay, Calcein-AM assay, and xCELLigence - real-time cell analysis), apoptosis (flow cytometry), mitochondrial membrane potential (Δψm, flow cytometry), reactive oxygen species induction (DC and cell cycle distribution (flow cytometry) were studied. We observed significantly decreased mitochondrial membrane potential and subsequent induction of apoptosis correlating with decreased cellular viability in the sulfur mustard exposed cells. In low concentrations, sulfur mustard-induced S-phase cell cycle arrest, on the other hand, high concentrations, cell cycle phase distribution of sulfur mustard exposed cells resembled cell cycle phase distribution of control group, which implies nonspecific cell cycle inhibition. Epithelial cells A-549 was found as more sensible to sulfur mustard toxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.

Keywords: apoptosis, cell cycle, cytotoxicity, sulfur mustard

Procedia PDF Downloads 192
137 Automation of Savitsky's Method for Power Calculation of High Speed Vessel and Generating Empirical Formula

Authors: M. Towhidur Rahman, Nasim Zaman Piyas, M. Sadiqul Baree, Shahnewaz Ahmed

Abstract:

The design of high-speed craft has recently become one of the most active areas of naval architecture. Speed increase makes these vehicles more efficient and useful for military, economic or leisure purpose. The planing hull is designed specifically to achieve relatively high speed on the surface of the water. Speed on the water surface is closely related to the size of the vessel and the installed power. The Savitsky method was first presented in 1964 for application to non-monohedric hulls and for application to stepped hulls. This method is well known as a reliable comparative to CFD analysis of hull resistance. A computer program based on Savitsky’s method has been developed using MATLAB. The power of high-speed vessels has been computed in this research. At first, the program reads some principal parameters such as displacement, LCG, Speed, Deadrise angle, inclination of thrust line with respect to keel line etc. and calculates the resistance of the hull using empirical planning equations of Savitsky. However, some functions used in the empirical equations are available only in the graphical form, which is not suitable for the automatic computation. We use digital plotting system to extract data from nomogram. As a result, value of wetted length-beam ratio and trim angle can be determined directly from the input of initial variables, which makes the power calculation automated without manually plotting of secondary variables such as p/b and other coefficients and the regression equations of those functions are derived by using data from different charts. Finally, the trim angle, mean wetted length-beam ratio, frictional coefficient, resistance, and power are computed and compared with the results of Savitsky and good agreement has been observed.

Keywords: nomogram, planing hull, principal parameters, regression

Procedia PDF Downloads 404
136 Evaluation of Outpatient Management of Proctological Surgery under Saddle Block

Authors: Bouhouf Atef, Beloulou Mohamed Lamine

Abstract:

Introduction: Outpatient surgery is continually developing compared to conventional inpatient surgery; its rate is constantly increasing every year due to global socio-economic pressure. Most hospitals continue to perform proctologic surgery in conventional hospitalization. Purpose: As part of a monocentric prospective descriptive study, we examined the feasibility of proctologic surgery under saddle block on an outpatient basis with the same safety conditions as in traditional hospitalization. Material and methods: This is a monocentric prospective descriptive study spread over a period of 24 months, from December 2018 to December 2020 including 150 patients meeting the medico-surgical and socio-environmental criteria of eligibility for outpatient surgery, operated for proctological pathologies under saddle block in outpatient mode, in the surgery department of the regional military hospital of Constantine Algeria. The data were collected and analyzed by the biomedical statistics software Epi-info and Microsoft Excel, then compared with other related studies. Results: This study involved over a period of two years, 150 male patients with an average age of 32 years (20-64). Most patients (95,33%) were ASA I class, and 4,67% ASA II class. All patients received saddle blocks. The average length of stay of patients was six hours. The quality indicators in outpatient surgery in our study were: zero (0)% of deprogrammings, three (3)% of conversions to full hospitalization, 0,7% of readmissions, an average waiting time before access to the operating room of 83 minutes without delay of discharge, a satisfaction rate of 90,8% and a reduction in the cost compared to conventional inpatient surgery in proportions ranging from – 32,6% and – 48,75%. Conclusions: The outpatient management of proctological surgery under saddle block is very beneficial in terms of safety, efficiency, simplicity, and economy. Our results are in line with those of the literature and our work deserves to be continued to include many patients.

Keywords: outpatient surgery, proctological surgery, saddle block, satisfaction, cost

Procedia PDF Downloads 20
135 Comparison of Direction of Arrival Estimation Method for Drone Based on Phased Microphone Array

Authors: Jiwon Lee, Yeong-Ju Go, Jong-Soo Choi

Abstract:

Drones were first developed for military use and were used in World War 1. But recently drones have been used in a variety of fields. Several companies actively utilize drone technology to strengthen their services, and in agriculture, drones are used for crop monitoring and sowing. Other people use drones for hobby activities such as photography. However, as the range of use of drones expands rapidly, problems caused by drones such as improperly flying, privacy and terrorism are also increasing. As the need for monitoring and tracking of drones increases, researches are progressing accordingly. The drone detection system estimates the position of the drone using the physical phenomena that occur when the drones fly. The drone detection system measures being developed utilize many approaches, such as radar, infrared camera, and acoustic detection systems. Among the various drone detection system, the acoustic detection system is advantageous in that the microphone array system is small, inexpensive, and easy to operate than other systems. In this paper, the acoustic signal is acquired by using minimum microphone when drone is flying, and direction of drone is estimated. When estimating the Direction of Arrival(DOA), there is a method of calculating the DOA based on the Time Difference of Arrival(TDOA) and a method of calculating the DOA based on the beamforming. The TDOA technique requires less number of microphones than the beamforming technique, but is weak in noisy environments and can only estimate the DOA of a single source. The beamforming technique requires more microphones than the TDOA technique. However, it is strong against the noisy environment and it is possible to simultaneously estimate the DOA of several drones. When estimating the DOA using acoustic signals emitted from the drone, it is impossible to measure the position of the drone, and only the direction can be estimated. To overcome this problem, in this work we show how to estimate the position of drones by arranging multiple microphone arrays. The microphone array used in the experiments was four tetrahedral microphones. We simulated the performance of each DOA algorithm and demonstrated the simulation results through experiments.

Keywords: acoustic sensing, direction of arrival, drone detection, microphone array

Procedia PDF Downloads 160
134 A Web Service Based Sensor Data Management System

Authors: Rose A. Yemson, Ping Jiang, Oyedeji L. Inumoh

Abstract:

The deployment of wireless sensor network has rapidly increased, however with the increased capacity and diversity of sensors, and applications ranging from biological, environmental, military etc. generates tremendous volume of data’s where more attention is placed on the distributed sensing and little on how to manage, analyze, retrieve and understand the data generated. This makes it more quite difficult to process live sensor data, run concurrent control and update because sensor data are either heavyweight, complex, and slow. This work will focus on developing a web service platform for automatic detection of sensors, acquisition of sensor data, storage of sensor data into a database, processing of sensor data using reconfigurable software components. This work will also create a web service based sensor data management system to monitor physical movement of an individual wearing wireless network sensor technology (SunSPOT). The sensor will detect movement of that individual by sensing the acceleration in the direction of X, Y and Z axes accordingly and then send the sensed reading to a database that will be interfaced with an internet platform. The collected sensed data will determine the posture of the person such as standing, sitting and lying down. The system is designed using the Unified Modeling Language (UML) and implemented using Java, JavaScript, html and MySQL. This system allows real time monitoring an individual closely and obtain their physical activity details without been physically presence for in-situ measurement which enables you to work remotely instead of the time consuming check of an individual. These details can help in evaluating an individual’s physical activity and generate feedback on medication. It can also help in keeping track of any mandatory physical activities required to be done by the individuals. These evaluations and feedback can help in maintaining a better health status of the individual and providing improved health care.

Keywords: HTML, java, javascript, MySQL, sunspot, UML, web-based, wireless network sensor

Procedia PDF Downloads 212
133 China-Pakistan Nexus and Its Implication for India

Authors: Riddhi Chopra

Abstract:

While China’s friendship with a number of countries has waxed and waned over the decades, Sino-Pak relationship is said to have withstood the vicissitudes of larger international politics as well as changes in regional and domestic currents. Pakistan, one of the first countries to recognize the People’s Republic of China, thus providing China with a corridor into the energy rich Muslim states which was reciprocated with a continual stream of no-strings-attached military hardware and defense-related assistance from Beijing. The joint enmity towards India also provided the initial thrust to a burgeoning Sino-Pak friendship. This paper intends to provide a profound analysis of the strategic relation between China-Pakistan and examine India as a determining factor. The Pakistan-China strategic relationship has been conventionally viewed by India as a zero sum game, wherein any gains accrued by Pakistan or China through their partnership is seen as a direct detriment to the evolution of India-Pakistan or India-China relation. The paper evaluates various factors which were crucial for the synthesis of such a strong relation and presents a comprehensive study of the various policies and programs that have been undertaken by the two countries to tie India to South Asia and reduce its sphere of influence. The geographic dynamics is said to breed a natural coalition, dominating the strategic ambitions of both Beijing and Islamabad hence directing their relationship. In addition to the obvious geopolitical factors, there are several dense collaborations between the two nations knitting a relatively close partnership. Moreover, an attempt has been made to assess the irritants in China-Pak relations and the initiatives taken by the two to further strengthen it. Current trends in diplomatic, economic and defense cooperation – along with the staunch affinity rooted in history and consistent geo-strategic interests – points to a strong and strengthening relationship, significant in directing India’s foreign and security policies. This paper seeks to analyze the changing power dynamics of the China-Pak nexus with external actors such as US and India with an ulterior motive of their own and predict the change in power dynamics between the four countries.

Keywords: China, Pakistan, India, strategy

Procedia PDF Downloads 268
132 Ergonomics and Its Applicability in the Design Process in Egypt Challenges and Prospects

Authors: Mohamed Moheyeldin Mahmoud

Abstract:

Egypt suffers from a severe shortage of data and charts concerning the physical dimensions, measurements, qualities and consumer behavior. The shortage of needed information and appropriate methods has forced the Egyptian designer to use any other foreign standard when designing a product for the Egyptian consumer which has led to many problems. The urgently needed database concerning the physical specifications, measurements of the Egyptian consumers, as well as the need to support the Ergonomics given courses in many colleges and institutes with the latest technologies, is stated as the research problem. Descriptive analytical method relying on the compiling, comparing and analyzing of information and facts in order to get acceptable perceptions, ideas and considerations is the used methodology by the researcher. The research concludes that: 1. Good interaction relationship between users and products shows the success of that product. 2. An integration linkage between the most prominent fields of science specially Ergonomics, Interaction Design and Ethnography should be encouraged to provide an ultimately updated database concerning the nature, specifications and environment of the Egyptian consumer, in order to achieve a higher benefit for both user and product. 3. Chinese economic policy based on the study of market requirements long before any market activities should be emulated. 4. Using Ethnography supports the design activities creating new products or updating existent ones through measuring the compatibility of products with their environment and user expectations, While contracting a joint cooperation between military colleges, sports education institutes from one side, and design institutes from the other side to provide an ultimately updated (annually updated) database concerning some specifications about students of both sexes applying in those institutes (height, weight, etc.) to provide the Industrial designer with the needed information when creating a new product or updating an existing one concerning that category is recommended by the researcher.

Keywords: adapt, ergonomics, ethnography, interaction design

Procedia PDF Downloads 227