Search results for: asymmetrical warfare
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 153

Search results for: asymmetrical warfare

123 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness

Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan

Abstract:

Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.

Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis

Procedia PDF Downloads 122
122 Implementing Bioremediation Technologies to Degrade Chemical Warfare Agents and Explosives from War Affected Regions in Sri Lanka

Authors: Elackiya Sithamparanathan

Abstract:

Chemical agents used during the Sri Lankan civil war continue to threaten human and environmental health as affected areas are re-settled. Bioremediation is a cost-effective and eco-friendly approach to degrading chemical agents, and has greater public acceptance than chemical degradation. Baseline data on contaminant distribution, environmental parameters, and indigenous microbes are required before bioremediation can commence. The culture and isolate of suitable microbes and enzymes should be followed by laboratory trials, before field application and long-term monitoring of contaminant concentration, soil parameters, microbial ecology, and public health to monitor environmental and public health. As local people are not aware of the persistence of warfare chemicals and do not understand the potential impacts on human health, community awareness programs are required. Active community participation, and collaboration with international and local agencies, would contribute to the success of bioremediation and the effective removal of chemical agents in war affected areas of Sri Lanka.

Keywords: bioremediation, environmental protection, human health, war affected regions in Sri Lanka

Procedia PDF Downloads 352
121 Reactive Fabrics for Chemical Warfare Agent Decomposition Using Particle Crystallization

Authors: Myungkyu Park, Minkun Kim, Sunghoon Kim, Samgon Ryu

Abstract:

Recently, research for reactive fabrics which have the characteristics of CWA (Chemical Warfare Agent) decomposition is being performed actively. The performance level of decomposition for CWA decomposition in various environmental condition is one of the critical factors in applicability as protective materials for NBC (Nuclear, Biological, and Chemical) protective clothing. In this study, results of performance test for CWA decomposition by reactive fabric made of electrospinning web and reactive particle are presented. Currently, the MOF (metal organic framework) type of UiO-66-NH₂ is frequently being studied as material for decomposing CWA especially blister agent HD [Bis(2-chloroethyl) sulfide]. When we test decomposition rate with electrospinning web made of PVB (Polyvinyl Butiral) polymer and UiO-66-NH₂ particle, we can get very high protective performance than the case other particles are applied. Furthermore, if the repellant surface fabric is added on reactive material as the component of protective fabric, the performance of layer by layered reactive fabric could be approached to the level of current NBC protective fabric for HD decomposition rate. Reactive fabric we used in this study is manufactured by electrospinning process of polymer which contains the reactive particle of UiO-66-NH₂, and we performed crystalizing process once again on that polymer fiber web in solvent systems as a second step for manufacturing reactive fabric. Three kinds of polymer materials are used in this process, but PVB was most suitable as an electrospinning fiber polymer considering the shape of product. The density of particle on fiber web and HD decomposition rate is enhanced by secondary crystallization compared with the results which are not processed. The amount of HD penetration by 24hr AVLAG (Aerosol Vapor Liquid Assessment Group) swatch test through the reactive fabrics with secondary crystallization and without crystallization is 24 and 146μg/cm² respectively. Even though all of the reactive fiber webs for this test are combined with repellant surface layer at outer side of swatch, the effects of secondary crystallization of particle for the reactive fiber web are remarkable.

Keywords: CWA, Chemical Warfare Agent, gas decomposition, particle growth, protective clothing, reactive fabric, swatch test

Procedia PDF Downloads 263
120 Chemical Warfare Agent Simulant by Photocatalytic Filtering Reactor: Effect of Operating Parameters

Authors: Youcef Serhane, Abdelkrim Bouzaza, Dominique Wolbert, Aymen Amin Assadi

Abstract:

Throughout history, the use of chemical weapons is not exclusive to combats between army corps; some of these weapons are also found in very targeted intelligence operations (political assassinations), organized crime, and terrorist organizations. To improve the speed of action, important technological devices have been developed in recent years, in particular in the field of protection and decontamination techniques to better protect and neutralize a chemical threat. In order to assess certain protective, decontaminating technologies or to improve medical countermeasures, tests must be conducted. In view of the great toxicity of toxic chemical agents from (real) wars, simulants can be used, chosen according to the desired application. Here, we present an investigation about using a photocatalytic filtering reactor (PFR) for highly contaminated environments containing diethyl sulfide (DES). This target pollutant is used as a simulant of CWA, namely of Yperite (Mustard Gas). The influence of the inlet concentration (until high concentrations of DES (1200 ppmv, i.e., 5 g/m³ of air) has been studied. Also, the conversion rate was monitored under different relative humidity and different flow rates (respiratory flow - standards: ISO / DIS 8996 and NF EN 14387 + A1). In order to understand the efficacity of pollutant neutralization by PFR, a kinetic model based on the Langmuir–Hinshelwood (L–H) approach and taking into account the mass transfer step was developed. This allows us to determine the adsorption and kinetic degradation constants with no influence of mass transfer. The obtained results confirm that this small configuration of reactor presents an extremely promising way for the use of photocatalysis for treatment to deal with highly contaminated environments containing real chemical warfare agents. Also, they can give birth to an individual protection device (an autonomous cartridge for a gas mask).

Keywords: photocatalysis, photocatalytic filtering reactor, diethylsulfide, chemical warfare agents

Procedia PDF Downloads 80
119 Military Use of Artificial Intelligence under International Humanitarian Law: Insights from Canada

Authors: Mahshid TalebianKiakalayeh

Abstract:

As AI technologies can be used by both civilians and soldiers, it is vital to consider the consequences emanating from AI military as well as civilian use. Indeed, many of the same technologies can have a dual-use. This paper will explore the military uses of AI and assess its compliance with international legal norms. AI developments not only have changed the capacity of the military to conduct complex operations but have also increased legal concerns. The existence of a potential legal vacuum in legal principles on the military use of AI indicates the necessity of more study on compliance with International Humanitarian Law (IHL), the branch of international law which governs the conduct of hostilities. While capabilities of new means of military AI continue to advance at incredible rates, this body of law is seeking to limit the methods of warfare protecting civilian persons who are not participating in an armed conflict. Implementing AI in the military realm would result in potential issues, including ethical and legal challenges. For instance, when intelligence can perform any warfare task without any human involvement, a range of humanitarian debates will be raised as to whether this technology might distinguish between military and civilian targets or not. This is mainly because AI in fully military systems would not seem to carry legal and ethical judgment, which can interfere with IHL principles. The paper will take, as a case study, Canada’s compliance with IHL in the area of AI and the related legal issues that are likely to arise as this country continues to develop military uses of AI.

Keywords: artificial intelligence, military use, international humanitarian law, the Canadian perspective

Procedia PDF Downloads 149
118 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare

Authors: Piret Pernik

Abstract:

Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.

Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts

Procedia PDF Downloads 77
117 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution

Authors: V. S. S. Kumar, V. Ramya

Abstract:

In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.

Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept

Procedia PDF Downloads 427
116 Electoral Mathematics and Asymmetrical Treatment to Political Parties: The Mexican Case

Authors: Verónica Arredondo, Miguel Martínez-Panero, Teresa Peña, Victoriano Ramírez

Abstract:

The Mexican Chamber of Deputies is composed of 500 representatives: 300 of them elected by relative majority and another 200 ones elected through proportional representation in five electoral clusters (constituencies) with 40 representatives each. In this mixed-member electoral system, the seats distribution of proportional representation is not independent of the election by relative majority, as it attempts to correct representation imbalances produced in single-member districts. This two-fold structure has been maintained in the successive electoral reforms carried out along the last three decades (eight from 1986 to 2014). In all of them, the election process of 200 seats becomes complex: Formulas in the Law are difficult to understand and to be interpreted. This paper analyzes the Mexican electoral system after the electoral reform of 2014, which was applied for the first time in 2015. The research focuses on contradictions and issues of applicability, in particular situations where seats allocation is affected by ambiguity in the law and where asymmetrical treatment of political parties arises. Due to these facts, a proposal of electoral reform will be presented. It is intended to be simpler, clearer, and more enduring than the current system. Furthermore, this model is more suitable for producing electoral outcomes free of contradictions and paradoxes. This approach would allow a fair treatment of political parties and as a result an improved opportunity to exercise democracy.

Keywords: electoral mathematics, electoral reform, Mexican electoral system, political asymmetry, proportional representation

Procedia PDF Downloads 231
115 Asymmetrical Informative Estimation for Macroeconomic Model: Special Case in the Tourism Sector of Thailand

Authors: Chukiat Chaiboonsri, Satawat Wannapan

Abstract:

This paper used an asymmetric informative concept to apply in the macroeconomic model estimation of the tourism sector in Thailand. The variables used to statistically analyze are Thailand international and domestic tourism revenues, the expenditures of foreign and domestic tourists, service investments by private sectors, service investments by the government of Thailand, Thailand service imports and exports, and net service income transfers. All of data is a time-series index which was observed between 2002 and 2015. Empirically, the tourism multiplier and accelerator were estimated by two statistical approaches. The first was the result of the Generalized Method of Moments model (GMM) based on the assumption which the tourism market in Thailand had perfect information (Symmetrical data). The second was the result of the Maximum Entropy Bootstrapping approach (MEboot) based on the process that attempted to deal with imperfect information and reduced uncertainty in data observations (Asymmetrical data). In addition, the tourism leakages were investigated by a simple model based on the injections and leakages concept. The empirical findings represented the parameters computed from the MEboot approach which is different from the GMM method. However, both of the MEboot estimation and GMM model suggests that Thailand’s tourism sectors are in a period capable of stimulating the economy.

Keywords: TThailand tourism, Maximum Entropy Bootstrapping approach, macroeconomic model, asymmetric information

Procedia PDF Downloads 273
114 Effects of Variation of Centers in the Torsional Analysis of Asymmetrical Buildings by Performing Non Linear Static Analysis

Authors: Md Masihuddin Siddiqui, Abdul Haakim Mohammed

Abstract:

Earthquakes are the most unpredictable and devastating of all natural disasters. The behaviour of a building during an earthquake depends on several factors such as stiffness, adequate lateral strength, ductility, and configurations. The experience from the performance of buildings during past earthquakes has shown that the buildings with regular geometry, uniformly distributed mass and stiffness in plan as well as in elevation suffer much less damage compared to irregular configurations. The three centers namely- centre of mass, centre of strength, centre of stiffness are the torsional parameters which contribute to the strength of the building in case of an earthquake. Inertial forces and resistive forces in a structural system act through the center of mass and center of rigidity respectively which together oppose the forces that are produced during seismic excitation. So these centers of a structural system should be positioned where the structural system is the strongest so that the effects produced due to the earthquake may have a minimal effect on the structure. In this paper, the effects of variation of strength eccentricity and stiffness eccentricity in reducing the torsional responses of the asymmetrical buildings by using pushover analysis are studied. The maximum reduction of base torsion was observed in the case of minimum strength eccentricity, and the least reduction was observed in the case of minimum stiffness eccentricity.

Keywords: strength eccentricity, stiffness eccentricity, asymmetric structure, base torsion, push over analysis

Procedia PDF Downloads 273
113 Copper (II) Complex of New Tetradentate Asymmetrical Schiff Base Ligand: Synthesis, Characterization, and Catecholase-Mimetic Activity

Authors: Cahit Demetgul, Sahin Bayraktar, Neslihan Beyazit

Abstract:

Metalloenzymes are enzyme proteins containing metal ions, which are directly bound to the protein or to enzyme-bound nonprotein components. One of the major metalloenzymes that play a key role in oxidation reactions is catechol oxidase, which shows catecholase activity i.e. oxidation of a broad range of catechols to quinones through the four-electron reduction of molecular oxygen to water. Studies on the model compounds mimicking the catecholase activity are very useful and promising for the development of new, more efficient bioinspired catalysts, for in vitro oxidation reactions. In this study, a new tetradentate asymmetrical Schiff-base and its Cu(II) complex were synthesized by condensation of 4-nitro-1,2-phenylenediamine with 6-formyl-7-hydroxy-5-methoxy-2-methylbenzopyran-4-one and by using an appropriate Cu(II) salt, respectively. The prepared compounds were characterized by elemental analysis, FT-IR, NMR, UV-Vis and magnetic susceptibility. The catecholase-mimicking activity of the new Schiff Base Cu(II) complex was performed for the oxidation of 3,5-di-tert-butylcatechol (3,5-DTBC) in methanol at 25 °C, where the electronic spectra were recorded at different time intervals. The yield of the quinone (3,5-DTBQ) was determined from the measured absorbance at 400 nm of the resulting solution. The compatibility of catalytic reaction with Michaelis-Menten kinetics was also investigated. In conclusion, we have found that our new Schiff Base Cu(II) complex presents a significant capacity to catalyze the oxidation reaction of the catechol to o-quinone.

Keywords: catecholase activity, Michaelis-Menten kinetics, Schiff base, transition metals

Procedia PDF Downloads 287
112 A Communication Signal Recognition Algorithm Based on Holder Coefficient Characteristics

Authors: Hui Zhang, Ye Tian, Fang Ye, Ziming Guo

Abstract:

Communication signal modulation recognition technology is one of the key technologies in the field of modern information warfare. At present, communication signal automatic modulation recognition methods are mainly divided into two major categories. One is the maximum likelihood hypothesis testing method based on decision theory, the other is a statistical pattern recognition method based on feature extraction. Now, the most commonly used is a statistical pattern recognition method, which includes feature extraction and classifier design. With the increasingly complex electromagnetic environment of communications, how to effectively extract the features of various signals at low signal-to-noise ratio (SNR) is a hot topic for scholars in various countries. To solve this problem, this paper proposes a feature extraction algorithm for the communication signal based on the improved Holder cloud feature. And the extreme learning machine (ELM) is used which aims at the problem of the real-time in the modern warfare to classify the extracted features. The algorithm extracts the digital features of the improved cloud model without deterministic information in a low SNR environment, and uses the improved cloud model to obtain more stable Holder cloud features and the performance of the algorithm is improved. This algorithm addresses the problem that a simple feature extraction algorithm based on Holder coefficient feature is difficult to recognize at low SNR, and it also has a better recognition accuracy. The results of simulations show that the approach in this paper still has a good classification result at low SNR, even when the SNR is -15dB, the recognition accuracy still reaches 76%.

Keywords: communication signal, feature extraction, Holder coefficient, improved cloud model

Procedia PDF Downloads 122
111 Data Science in Military Decision-Making: A Semi-Systematic Literature Review

Authors: H. W. Meerveld, R. H. A. Lindelauf

Abstract:

In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.

Keywords: data science, decision-making, information superiority, literature review, military

Procedia PDF Downloads 137
110 The Sea Striker: The Relevance of Small Assets Using an Integrated Conception with Operational Performance Computations

Authors: Gaëtan Calvar, Christophe Bouvier, Alexis Blasselle

Abstract:

This paper presents the Sea Striker, a compact hydrofoil designed with the goal to address some of the issues raised by the recent evolutions of naval missions, threats and operation theatres in modern warfare. Able to perform a wide range of operations, the Sea Striker is a 40-meter stealth surface combatant equipped with a gas turbine and aft and forward foils to reach high speeds. The Sea Striker's stealthiness is enabled by the combination of composite structure, exterior design, and the advanced integration of sensors. The ship is fitted with a powerful and adaptable combat system, ensuring a versatile and efficient response to modern threats. Lightly Manned with a core crew of 10, this hydrofoil is highly automated and can be remoted pilote for special force operation or transit. Such a kind of ship is not new: it has been used in the past by different navies, for example, by the US Navy with the USS Pegasus. Nevertheless, the recent evolutions in science and technologies on the one hand, and the emergence of new missions, threats and operation theatres, on the other hand, put forward its concept as an answer to nowadays operational challenges. Indeed, even if multiples opinions and analyses can be given regarding the modern warfare and naval surface operations, general observations and tendencies can be drawn such as the major increase in the sensors and weapons types and ranges and, more generally, capacities; the emergence of new versatile and evolving threats and enemies, such as asymmetric groups, swarm drones or hypersonic missile; or the growing number of operation theatres located in more coastal and shallow waters. These researches were performed with a complete study of the ship after several operational performance computations in order to justify the relevance of using ships like the Sea Striker in naval surface operations. For the selected scenarios, the conception process enabled to measure the performance, namely a “Measure of Efficiency” in the NATO framework for 2 different kinds of models: A centralized, classic model, using large and powerful ships; and A distributed model relying on several Sea Strikers. After this stage, a was performed. Lethal, agile, stealth, compact and fitted with a complete set of sensors, the Sea Striker is a new major player in modern warfare and constitutes a very attractive response between the naval unit and the combat helicopter, enabling to reach high operational performances at a reduced cost.

Keywords: surface combatant, compact, hydrofoil, stealth, velocity, lethal

Procedia PDF Downloads 93
109 The Evolution of Strike and Intelligence Functions in Special Operations Forces

Authors: John Hardy

Abstract:

The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.

Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces

Procedia PDF Downloads 238
108 Exploring the Impact of Cultural Values on the Performance of Women Bureaucrats in Pakistan

Authors: Fariya Tahreen

Abstract:

Women are an important part of the society comprising more than 50% population of the world. Participation of women in public services is increasing in the present era while cultural values embedded with gender differences still influencing the performance of working women. Many researches have been carried out on cultural impact on working women like managers, doctors, and lawyers and other public servants. But very rare efforts were made to study the impact of cultural values on the performance of women bureaucrats. The present study aimed to find out the relationship of cultural values (i.e., collective identity, gender segregation, and gender asymmetrical relations) with the performance of women bureaucrats. Sample of the present study comprised of 130 women bureaucrats from the Office Management Group, Inland Revenue, District Management Group, and Pakistan Police Services which is selected by convenient sampling technique. The locale of the study was Islamabad, Rawalpindi and Lahore city. The current research study was conducted by using a quantitative approach in research method and data were collected through survey method. The measures used in the study included: personal information, three main cultural values, and performance of women bureaucrats. Uni-variate and bi-variate analyses were implied by using correlation and multiple linear regression test. The current study shows a negative significant relationship between cultural values and performance of women bureaucrats (R²= 0.790, p-value 0.000). It shows that cultural values (collective identity, gender segregation and gender asymmetrical relations) significantly influence the performance of women bureaucrats. Due to the influence and pressure of these cultural values, women bureaucrats give less time to the office and avail more leaves. They also avoid contacting with male colleagues, public dealings, field visits and playing leadership role. Further, they attend fewer meetings of policy formulation due to given less importance for it. In a nutshell, the study concluded that cultural values significantly influence the performance of women bureaucrats in Pakistan.

Keywords: cultural values, performance, Pakistan, women bureaucrats

Procedia PDF Downloads 104
107 Chilean Business Orientalism: The Role of Non-State Actors in the Frame of Asymmetric Bilateral Relations

Authors: Pablo Ampuero, Claudia Labarca

Abstract:

The current research paper assesses how the narrative of Chilean businesspeople about China shapes a new Orientalism Analyses on the role of non-state actors in foreign policy that have hitherto theorized about Orientalism as a narrative of hegemonic power. Hence, it has been instrumental to the efforts of imperialist powers to justify their mission civilisatrice. However, such conceptualization can seldom explain new complexities of international interactions at the height of globalization. Hence, we assessed the case of Chile, a small Latin American country, and its relationship with China, its largest trading partner. Through a discourse analysis of interviews with Chilean businesspeople engaged in the Chinese market, we could determine that Chile is building an Orientalist image of China. This new business Orientalism reinforces a relation of alterity based on commercial opportunities, traditional values, and natural dispositions. Hence, the perception of the Chinese Other amongst Chilean business people frames a new set of representations as part of the essentially commercial nature of current bilateral relations. It differs from previous frames, such as the racial bias frame of the early 20th century, or the anti-communist frame in reaction to Mao’s leadership. As in every narrative of alterity, there is not only a construction of the Other but also a definition of the Self. Consequently, this analysis constitutes a relevant case of the role of non-state actors in asymmetrical bilateral relations, where the non-state actors of the minor power build and act upon an Orientalist frame, which is not representative of its national status in the relation. This study emerges as a contribution on the relation amongst non-state actors in asymmetrical relations, where the smaller power’s business class acts on a negative prejudice of its interactions with its counterpart. The research builds upon the constructivist approach to international relations, linking the idea of Nation Branding with Orientalism in the case of Chile-China relations.

Keywords: new business Orientalism, small power, framing, Chile-China relations

Procedia PDF Downloads 308
106 The Numerical and Experimental Analysis of Compressed Composite Plate in Asymmetrical Arrangement of Layers

Authors: Katarzyna Falkowicz

Abstract:

The work focused on the original concept of a thin-walled plate element with a cut-out, for use as a spring or load-bearing element. The subject of the study were rectangular plates with a cut-out with variable geometrical parameters and with a variable angle of fiber arrangement, made of a carbon-epoxy composite with high strength properties in an asymmetrical arrangement, subjected to uniform compression. The influence of geometrical parameters of the cut-out and the angle of fiber arrangement on the value of critical load of the structure and buckling form was investigated. Uniform thin plates are relatively cheap to manufacture, however due to their low bending stiffness; they can carry relatively small loads. The lowest form of loss of plate stability, which is the bending form, leads to its rapid destruction due to high deflection increases, with a slight increase in compressive load - low rigidity of the structure. However, the stiffness characteristics of the structure change significantly when the work of plate is forcing according to the higher flexural-torsional form of buckling. The plate is able to carry a much higher compressive load while maintaining much stiffer work characteristics in the post-critical range. The calculations carried out earlier show that plates with forced higher form of buckling are characterized by stable, progressive paths of post-critical equilibrium, enabling their use as elastic elements. The characteristics of such elements can be designed in a wide range by changing the geometrical parameters of the cut-out, i.e. height and width as well as by changing the angle of fiber arrangement The commercial ABAQUS program using the finite element method was used to develop the discrete model and perform numerical calculations. The obtained results are of significant practical importance in the design of structures with elastic elements, allowing to achieve the required maintenance characteristics of the device.

Keywords: buckling mode, numerical method, unsymmetrical laminates, thin-walled elastic elements

Procedia PDF Downloads 86
105 Land Tenure and Erosion as Determinants of Guerrilla Violence in Assam, India: An Ethnographic and Remote Sensing Approach

Authors: Kevin T. Inks

Abstract:

India’s Brahmaputra River Valley has, since independence, experienced consistent low-intensity guerrilla warfare between ethnic and religious groups. These groups are often organized around perceived ethnic territoriality, and target civilians, communities, and especially migrants belonging to other ethnic and religious groups. Intense flooding and erosion have led to widespread displacement, and disaster relief funds are largely tied to legal land tenure. Displaced residents of informal settlements receive little or no resettlement aid, and their subsequent migration strategies and risk from guerrilla violence are poorly understood. Semi-structured interviews and comprehensive surveys focused on perceptions of risk, efficacy of disaster relief, and migration and adaptation strategies were conducted with households identified as being ‘at-risk’ of catastrophic flooding and erosion in Majuli District, Assam. Interviews with policymakers and government workers were conducted to assess disaster relief efforts in informal settlements, and remote sensing methods were used to identify informal settlement and hydrogeomorphic change. The results show that various ethnic and religious groups have differential strategies and preferences for resettlement. However, these varying strategies are likely to lead to differential levels of risk from guerrilla violence. Members of certain ethnic groups residing in informal settlements, in the absence of resettlement assistance, are more likely to seek out unofficial settlement on land far from the protection of the state and experience greater risk of becoming victims of political violence. As climate change and deforestation are likely to increase the severity of the displacement crisis in the Brahmaputra River Valley, more comprehensive disaster relief and surveying efforts are vital for limiting migration and informal settlement in potential sites of guerrilla warfare.

Keywords: climate, displacement, flooding, India, violence

Procedia PDF Downloads 82
104 Characteristics of Photoluminescence in Resonant Quasiperiodic Double-period Quantum Wells

Authors: C. H. Chang, R. Z. Qiu, C. W. Tsao, Y. H. Cheng, C. H. Chen, W. J. Hsueh

Abstract:

Characteristics of photoluminescence (PL) in a resonant quasi-periodic double-period quantum wells (DPQW) are demonstrated. The maximum PL intensity in the DPQW is remarkably greater than that in a traditional periodic QW (PQW) under the Bragg or anti-Bragg conditions. The optimal PL spectrum in the DPQW has an asymmetrical form instead of the symmetrical form in the PQW. Moreover, there are two large values of PL intensity in the DPQW, which also differs from the PQW.

Keywords: Photoluminescence, quantum wells, quasiperiodic structure

Procedia PDF Downloads 693
103 Prediction of Turbulent Separated Flow in a Wind Tunel

Authors: Karima Boukhadia

Abstract:

In the present study, the subsonic flow in an asymmetrical diffuser was simulated numerically using code CFX 11.0 and its generator of grid ICEM CFD. Two models of turbulence were tested: K- ε and K- ω SST. The results obtained showed that the K- ε model singularly over-estimates the speed value close to the wall and that the K- ω SST model is qualitatively in good agreement with the experimental results of Buice and Eaton 1997. They also showed that the separation and reattachment of the fluid on the tilted wall strongly depends on its angle of inclination and that the length of the zone of separation increases with the angle of inclination of the lower wall of the diffuser.

Keywords: asymmetric diffuser, separation, reattachment, tilt angle, separation zone

Procedia PDF Downloads 552
102 Low Power, Highly Linear, Wideband LNA in Wireless SOC

Authors: Amir Mahdavi

Abstract:

In this paper a highly linear CMOS low noise amplifier (LNA) for ultra-wideband (UWB) applications is proposed. The proposed LNA uses a linearization technique to improve second and third-order intercept points (IIP3). The linearity is cured by repealing the common-mode section of all intermodulation components from the cascade topology current with optimization of biasing current use symmetrical and asymmetrical circuits for biasing. Simulation results show that maximum gain and noise figure are 6.9dB and 3.03-4.1dB over a 3.1–10.6 GHz, respectively. Power consumption of the LNA core and IIP3 are 2.64 mW and +4.9dBm respectively. The wideband input impedance matching of LNA is obtained by employing a degenerating inductor (|S11|<-9.1 dB). The circuit proposed UWB LNA is implemented using 0.18 μm based CMOS technology.

Keywords: highly linear LNA, low-power LNA, optimal bias techniques

Procedia PDF Downloads 260
101 CDM-Based Controller Design for High-Frequency Induction Heating System with LLC Tank

Authors: M. Helaimi, R. Taleb, D. Benyoucef, B. Belmadani

Abstract:

This paper presents the design of a polynomial controller with coefficient diagram method (CDM). This controller is used to control the output power of high frequency resonant inverter with LLC tank. One of the most important problems associated with the proposed inverter is achieving ZVS operating during the induction heating process. To overcome this problem, asymmetrical voltage cancellation (AVC) control technique is proposed. The phased look loop (PLL) is used to track the natural frequency of the system. The small signal model of the system with the proposed control is obtained using extending describing function method (EDM). The validity of the proposed control is verified by simulation results.

Keywords: induction heating, AVC control, CDM, PLL, resonant inverter

Procedia PDF Downloads 633
100 Architectural Thinking in a Time of Climate Emergency

Authors: Manoj Parmar

Abstract:

The article uses reflexivity as a research method to investigate and propose an architectural theory plan for climate change. It hypothecates that to discuss or formulate discourse on "Architectural Thinking in a Time of Climate Emergency," firstly, we need to understand the modes of integration that enable architectural thinking with climate change. The study intends to study the various integration modes that have evolved historically and situate them in time. Subsequently, it analyses the integration pattern, challenges the existing model, and finds a way towards climate change as central to architectural thinking. The study is fundamental on-premises that ecology and climate change scholarship has consistently out lashed the asymmetrical and nonlinear knowledge and needs approaches for architecture that are less burden to climate change to people and minimize its impact on ecology.

Keywords: climate change, architectural theory, reflexivity, modernity

Procedia PDF Downloads 254
99 Optimal Diversification and Bank Value Maximization

Authors: Chien-Chih Lin

Abstract:

This study argues that the optimal diversifications for the maximization of bank value are asymmetrical; they depend on the business cycle. During times of expansion, systematic risks are relatively low, and hence there is only a slight effect from raising them with a diversified portfolio. Consequently, the benefit of reducing individual risks dominates any loss from raising systematic risks, leading to a higher value for a bank by holding a diversified portfolio of assets. On the contrary, in times of recession, systematic risks are relatively high. It is more likely that the loss from raising systematic risks surpasses the benefit of reducing individual risks from portfolio diversification. Consequently, more diversification leads to lower bank values. Finally, some empirical evidence from the banks in Taiwan is provided.

Keywords: diversification, default probability, systemic risk, banking, business cycle

Procedia PDF Downloads 410
98 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 403
97 Analysis of the Strip Shape and Microstructure with Consideration of Roll Crossing and Shifting

Authors: Z. Y. Jiang, H. B. Tibar, A. Aljabri

Abstract:

Optimisation of the physical and mechanical properties of cold rolled thin strips is achieved by controlling the rolling parameters. In this paper, the factors affecting the asymmetrical cold rolling of thin low carbon steel strip have been studied at a speed ratio of 1.1 without lubricant applied. The effect of rolling parameters on the resulting microstructure was also investigated. It was found that under dry condition, work roll shifting and work roll cross angle can improve the strip profile, and the result is more significant with an increase of work roll cross angle rather than that of work roll shifting. However, there was no obvious change in microstructure. In addition, effects of rolling parameters on strip profile and microstructure have also been discussed.

Keywords: rolling speed ratio, microstructure, work roll cross angle, work roll shifting

Procedia PDF Downloads 396
96 Flap Structure Geometry in Breakthrough Structure: A Case Study from the Southern Tunisian Atlas Example, Orbata Anticline

Authors: Soulef Amamria, Mohamed Sadok Bensalem, Mohamed Ghanmi

Abstract:

The structural and sedimentological study of fault-related- folds in the Southern Tunisian Atlas is distinguished by a special geometry of the gravitational structures. This distinct geometry is observable in the example of a flap structure in Jebel Ben Zannouch with the formation of a stuck syncline. This geometry can be explained by the mechanism of major thrusting in Orbata anticline in the occidental extremity of Gafsa chains, with asymmetrical flank dips and hinge migration kinematics. These kinematics was originally controlled by the Breakthrough structure; the study of this special geometry of gravity flap structure depends on the sedimentation domain, shortening ratios, and erosion speed. This study constitutes one of the complete examples of kinematic model validation on a field scale.

Keywords: fault-related-folds, southern Tunisian Atlas, flap structure, breakthrough

Procedia PDF Downloads 67
95 Should the U.S. Rely on Drone Strikes to Combat the Islamic State? Why Deploying a Drone Campaign against ISIS Will Do Nothing to Address the Causes of the Insurgency or Prevent Its Resurgence?

Authors: Danielle Jablanski

Abstract:

This article addresses the use of drone strikes under international law and the intersection between Islamic law and current terrorist trends worldwide. It breaks down the legality of drone strikes under international law and dissects certain aspects of their usage in modern warfare; i.e. concepts of directly participating in hostilities and the role of CIA operators. The article then looks at international paradigms of law enforcement versus the use of military force in relation to terrorism. Lastly, it describes traditional aspects of Islamic law and several interpretations of the law today as applied to widespread campaigns of terrorism, namely that of the recent group ISIS or ISIL operating between the battlegrounds of Iraq and Syria. The piece concludes with appraisals for moving forward on the basis of honing in on reasons for terrorism and negative opinions of solely military campaigns to dismantle or disrupt terror organizations and breeding grounds.

Keywords: international law, terrorism, ISIS, islamic law

Procedia PDF Downloads 448
94 Optical Vortex in Asymmetric Arcs of Rotating Intensity

Authors: Mona Mihailescu, Rebeca Tudor, Irina A. Paun, Cristian Kusko, Eugen I. Scarlat, Mihai Kusko

Abstract:

Specific intensity distributions in the laser beams are required in many fields: optical communications, material processing, microscopy, optical tweezers. In optical communications, the information embedded in specific beams and the superposition of multiple beams can be used to increase the capacity of the communication channels, employing spatial modulation as an additional degree of freedom, besides already available polarization and wavelength multiplexing. In this regard, optical vortices present interest due to their potential to carry independent data which can be multiplexed at the transmitter and demultiplexed at the receiver. Also, in the literature were studied their combinations: 1) axial or perpendicular superposition of multiple optical vortices or 2) with other laser beam types: Bessel, Airy. Optical vortices, characterized by stationary ring-shape intensity and rotating phase, are achieved using computer generated holograms (CGH) obtained by simulating the interference between a tilted plane wave and a wave passing through a helical phase object. Here, we propose a method to combine information through the reunion of two CGHs. One is obtained using the helical phase distribution, characterized by its topological charge, m. The other is obtained using conical phase distribution, characterized by its radial factor, r0. Each CGH is obtained using plane wave with different tilts: km and kr for CGH generated from helical phase object and from conical phase object, respectively. These reunions of two CGHs are calculated to be phase optical elements, addressed on the liquid crystal display of a spatial light modulator, to optically process the incident beam for investigations of the diffracted intensity pattern in far field. For parallel reunion of two CGHs and high values of the ratio between km and kr, the bright ring from the first diffraction order, specific for optical vortices, is changed in an asymmetric intensity pattern: a number of circle arcs. Both diffraction orders (+1 and -1) are asymmetrical relative to each other. In different planes along the optical axis, it is observed that this asymmetric intensity pattern rotates around its centre: in the +1 diffraction order the rotation is anticlockwise and in the -1 diffraction order, the rotation is clockwise. The relation between m and r0 controls the diameter of the circle arcs and the ratio between km and kr controls the number of arcs. For perpendicular reunion of the two CGHs and low values of the ratio between km and kr, the optical vortices are multiplied and focalized in different planes, depending on the radial parameter. The first diffraction order contains information about both phase objects. It is incident on the phase masks placed at the receiver, computed using the opposite values for topological charge or for the radial parameter and displayed successively. In all, the proposed method is exploited in terms of constructive parameters, for the possibility offered by the combination of different types of beams which can be used in robust optical communications.

Keywords: asymmetrical diffraction orders, computer generated holograms, conical phase distribution, optical vortices, spatial light modulator

Procedia PDF Downloads 289