Search results for: military conflict
670 Government Policy over the Remuneration System of The Board of Commissioners in Indonesian Stated-Owned Enterprises
Authors: Synthia Atas Sari
Abstract:
The purpose of this paper is to examine the impact of reward system which determine by government over the work of Board of Commissioners to implement good corporate governance in Indonesian state-owned enterprises. To do so, this study analyzes the adequacy of the remuneration, the job attractiveness, and the board commitment and dedication with the remuneration system. Qualitative method used to examine the significant features and challenges to the government policy over the remuneration determination for the board of commissioners to their roles. Data gathered through semi-structure in-depth interview to the twenty-one participants over nine Indonesian stated-owned enterprises and written documents. Findings of this study indicate that government policies over the remuneration system is not effective to increase the performance of board of commissioners in implementing good corporate governance in Indonesian stated-owned enterprises due to unattractiveness of the remuneration amount, demotivate active members, and conflict interest over members of the remuneration committee.Keywords: reward system, board of commissioners, stated-owned enterprises, government policy
Procedia PDF Downloads 336669 Pathomorphological Markers of the Explosive Wave Action on Human Brain
Authors: Sergey Kozlov, Juliya Kozlova
Abstract:
Introduction: The increased attention of researchers to an explosive trauma around the world is associated with a constant renewal of military weapons and a significant increase in terrorist activities using explosive devices. Explosive wave is a well known damaging factor of explosion. The most sensitive to the action of explosive wave in the human body are the head brain, lungs, intestines, urine bladder. The severity of damage to these organs depends on the distance from the explosion epicenter to the object, the power of the explosion, presence of barriers, parameters of the body position, and the presence of protective clothing. One of the places where a shock wave acts, in human tissues and organs, is the vascular endothelial barrier, which suffers the greatest damage in the head brain and lungs. The objective of the study was to determine the pathomorphological changes of the head brain followed the action of explosive wave. Materials and methods of research: To achieve the purpose of the study, there have been studied 6 male corpses delivered to the morgue of Municipal Institution "Dnipropetrovsk regional forensic bureau" during 2014-2016 years. The cause of death of those killed was a military explosive injury. After a visual external assessment of the head brain, for histological study there was conducted the 1 x 1 x 1 cm/piece sampling from different parts of the head brain, i.e. the frontal, parietal, temporal, occipital sites, and also from the cerebellum, pons, medulla oblongata, thalamus, walls of the lateral ventricles, the bottom of the 4th ventricle. Pieces of the head brain were immersed in 10% formalin solution for 24 hours. After fixing, the paraffin blocks were made from the material using the standard method. Then, using a microtome, there were made sections of 4-6 micron thickness from paraffin blocks which then were stained with hematoxylin and eosin. Microscopic analysis was performed using a light microscope with x4, x10, x40 lenses. Results of the study: According to the results of our study, injuries of the head brain were divided into macroscopic and microscopic. Macroscopic injuries were marked according to the results of visual assessment of haemorrhages under the membranes and into the substance, their nature, and localisation, areas of softening. In the microscopic study, our attention was drawn to both vascular changes and those of neurons and glial cells. Microscopic qualitative analysis of histological sections of different parts of the head brain revealed a number of structural changes both at the cellular and tissue levels. Typical changes in most of the studied areas of the head brain included damages of the vascular system. The most characteristic microscopic sign was the separation of vascular walls from neuroglia with the formation of perivascular space. Along with this sign, wall fragmentation of these vessels, haemolysis of erythrocytes, formation of haemorrhages in the newly formed perivascular spaces were found. In addition to damages of the cerebrovascular system, destruction of the neurons, presence of oedema of the brain tissue were observed in the histological sections of the brain. On some sections, the head brain had a heterogeneous step-like or wave-like nature. Conclusions: The pathomorphological microscopic changes in the brain, identified in the study on the died of explosive traumas, can be used for diagnostic purposes in conjunction with other characteristic signs of explosive trauma in forensic and pathological studies. The complex of microscopic signs in the head brain, i.e. separation of blood vessel walls from neuroglia with the perivascular space formation, fragmentation of walls of these blood vessels, erythrocyte haemolysis, formation of haemorrhages in the newly formed perivascular spaces is the direct indication of explosive wave action.Keywords: blast wave, neurotrauma, human, brain
Procedia PDF Downloads 192668 The Urban Project and the Urban Improvement to the Test of the Participation, Case: Project of Modernization of Constantine
Authors: Mouhoubi Nedjima, Sassi Boudemagh Souad
Abstract:
In the framework of the modernization of the city of Constantine, and in order to restore its status as a regional metropolis and introduce it into the network of cities international metropolises, a major urban project was launched: project of modernization and of metropolitanization of the city of Constantine (PMMC). Our research project focuses on the management of the project for the modernization of the city of Constantine (PMMC) focusing on the management of some aspects of the urban project whose participation, with the objective assessment of the managerial approach business. Among the cases revealing taken into account in our research work on the question of participation of actors and their organizations, the operation relating to "the urban improvement in the city of the Brothers FERRAD in the district of Zouaghi". This operation with the objective of improving the living conditions of citizens has faced several challenges and obstacles that have been in major part the factors of its failure. Through this study, we examine the management process and the mode of organization of the actors of the project as well as the level of participation of the citizen to finally propose managerial solutions to conflict situations observed.Keywords: the urban project, the urban improvement, participation, Constantine
Procedia PDF Downloads 400667 Alternative Dispute Resolution Procedures for International Conflicts about Industrial Design
Authors: Moreno Liso Lourdes
Abstract:
The industrial design protects the appearance of part or all of a product resulting from the features of, in particular, the lines, contours, colors, shape, texture or materials of the product itself or its ornamentation. The industrial property offers a different answer depending on the characteristics of the shape object of protection possible, including the trademark and industrial design. There are certain cases where the trademark right invalidate the exclusive right of the industrial design. This can occur in the following situations: 1st) collected as a sign design and trademarked; and 2nd) you want to trademark and protected as a form design (either registered or unregistered). You can either get a trade mark or design right in the same sign or form, provided it meets the legal definition of brand and design and meets the requirements imposed for the protection of each of them, even able to produce an overlap of protection. However, this double protection does not have many advantages. It is, therefore, necessary to choose the best form of legal protection according to the most adequate ratios. The diversity of rights that can use the creator of an industrial design to protect your job requires you to make a proper selection to prevent others, especially their competitors, taking advantage of the exclusivity that guarantees the law. It is necessary to choose between defending the interests of the parties through a judicial or extrajudicial procedure when the conflict arises. In this paper, we opted for the defense through mediation.Keywords: industrial design, ADR, Law, EUIPO
Procedia PDF Downloads 241666 Case Scenario Simulation concerning Eventual Ship Sourced Oil Spill, Expansion and Response Process in Istanbul Strait
Authors: Cihat Aşan
Abstract:
Istanbul Strait is a crucial and narrow waterway, not only having a role in linking two continents but also has a crossover mission for the petroleum, which is the biggest energy resource, between its supply and demand sources. Besides its substantial features, sensitivities like around 18 million populations in surroundings, military facilities, ports, oil lay down areas etc. also brings the high risk to use of Istanbul Strait. Based on the statistics of Turkish Ministry of Transportation, Maritime and Communication, although the number of vessel passage in Istanbul Strait is declining, tonnage of hazardous and flammable cargo like oil and chemical transportation is increasing and subsequently the risk of oil pollution, loss of life and property is also rising. Based on the mentioned above; it is crucial to be prepared for the initial and subsequent response to eventual ship sourced oil spill which may cause to block the Strait for an unbearable duration. In this study; preconditioned Istanbul Strait sensitive areas studies has been taken into account and possible oil spill scenario is loaded to PISCES 2 (Potential Incident Simulation Control and Evaluation System) decision support system for the determined specific sea area. Consequences of the simulation like oil expanding process, required number and types of assets to response, had in hand and evaluated.Keywords: Istanbul strait, oil spill, PISCES simulator, initial response
Procedia PDF Downloads 343665 Experimental Study on the Effect of Storage Conditions on Thermal Hazard of Nitrocellulose
Authors: Hua Chai, Qiangling Duan, Huiqi Cao, Mi Li, Jinhua Sun
Abstract:
Nitrocellulose (NC), a kind of energetic material, has been widely used in the industrial and military fields. However, this material can also cause serious social disasters due to storage conditions. Thermal hazard of nitrocellulose (NC) was experimentally investigated using the CALVET heat flux calorimeter C80, and three kinds of storage conditions were considered in the experiments: (1) drying time, (2) moisture content, (3) cycles. The results showed that the heat flow curves of NC moved to the low-temperature direction firstly and then slightly moved back by increasing the drying hours. Moisture that was responsible for the appearance of small exothermic peaks was proven to be the unfavorable safety factor yet it could increase the onset temperature of the main peak to some extent. And cycles could both lower the onset temperature and the maximum heat flow but enlarged the peak temperature. Besides, relevant kinetic parameters such as the heat of reaction (ΔH) and the activation energy (Ea) were obtained and compared. It was found that all the three conditions could reduce the values of Ea and most of them produced larger reaction heat. In addition, the critical explosion temperature (Tb) of the NC samples were derived. It was clear that not only the drying time but also the cycles would increase the thermal hazard of the NC. Yet, the right amount of water helped to reduce the thermal hazard.Keywords: C80, nitrocellulose, storage conditions, the critical explosion temperature, thermal hazard
Procedia PDF Downloads 164664 The Applicability of International Humanitarian Law to Non-State Actors
Authors: Yin Cheung Lam
Abstract:
In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.Keywords: discursive analysis, human rights, non-state actors, war on terror
Procedia PDF Downloads 606663 Groundwater Based Irrigation for Paddy Farming in Gangetic Plains of India: Consequences and Mitigations
Authors: Dhananjoy Dutta
Abstract:
Field studies in lower Gangetic plains of India reveal that over-abstraction of groundwater for irrigation to paddy leads to a substantial depletion of groundwater over the decades, resulting in negative effects on lowering of the water table, drying up of surface water sources and aquifer pollution with leached-out arsenic. The aggravating arsenic toxicity in drinking water is manifested in health problems and ‘arsenicosis’ of people. A social conflict arises between farmers, who intend to grow paddy for livelihoods, and the groundwater authority, which enacts the ‘Regulation Laws’ by putting a check on the excessive installation of private tube-wells for irrigation. Hence, considering the challenges of resource sustainability, health issues, and food security, the study calls for a paradigm shift in policy from further groundwater development to sustainable water resources management and evaluates some strategies integrating supply and demand side management for mitigating the problems.Keywords: groundwater, irrigation, paddy farming, water table depletion, arsenic pollution, gangetic plains
Procedia PDF Downloads 30662 A Vision-Based Early Warning System to Prevent Elephant-Train Collisions
Authors: Shanaka Gunasekara, Maleen Jayasuriya, Nalin Harischandra, Lilantha Samaranayake, Gamini Dissanayake
Abstract:
One serious facet of the worsening Human-Elephant conflict (HEC) in nations such as Sri Lanka involves elephant-train collisions. Endangered Asian elephants are maimed or killed during such accidents, which also often result in orphaned or disabled elephants, contributing to the phenomenon of lone elephants. These lone elephants are found to be more likely to attack villages and showcase aggressive behaviour, which further exacerbates the overall HEC. Furthermore, Railway Services incur significant financial losses and disruptions to services annually due to such accidents. Most elephant-train collisions occur due to a lack of adequate reaction time. This is due to the significant stopping distance requirements of trains, as the full braking force needs to be avoided to minimise the risk of derailment. Thus, poor driver visibility at sharp turns, nighttime operation, and poor weather conditions are often contributing factors to this problem. Initial investigations also indicate that most collisions occur in localised “hotspots” where elephant pathways/corridors intersect with railway tracks that border grazing land and watering holes. Taking these factors into consideration, this work proposes the leveraging of recent developments in Convolutional Neural Network (CNN) technology to detect elephants using an RGB/infrared capable camera around known hotspots along the railway track. The CNN was trained using a curated dataset of elephants collected on field visits to elephant sanctuaries and wildlife parks in Sri Lanka. With this vision-based detection system at its core, a prototype unit of an early warning system was designed and tested. This weatherised and waterproofed unit consists of a Reolink security camera which provides a wide field of view and range, an Nvidia Jetson Xavier computing unit, a rechargeable battery, and a solar panel for self-sufficient functioning. The prototype unit was designed to be a low-cost, low-power and small footprint device that can be mounted on infrastructures such as poles or trees. If an elephant is detected, an early warning message is communicated to the train driver using the GSM network. A mobile app for this purpose was also designed to ensure that the warning is clearly communicated. A centralized control station manages and communicates all information through the train station network to ensure coordination among important stakeholders. Initial results indicate that detection accuracy is sufficient under varying lighting situations, provided comprehensive training datasets that represent a wide range of challenging conditions are available. The overall hardware prototype was shown to be robust and reliable. We envision a network of such units may help contribute to reducing the problem of elephant-train collisions and has the potential to act as an important surveillance mechanism in dealing with the broader issue of human-elephant conflicts.Keywords: computer vision, deep learning, human-elephant conflict, wildlife early warning technology
Procedia PDF Downloads 226661 The Role of the Defense and Future War in Ukraine
Authors: Matthew J. Flynn
Abstract:
In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.Keywords: cyber, domains, future war, Putin, Ukraine
Procedia PDF Downloads 113660 Faithfulness of Film Adaptations: An Evaluation
Authors: Mel Aljon A. Montesa, Cynthia A. Martinez
Abstract:
As the advent of the trend of lifting books into film flourishes, the study was conducted which concerns the evaluation of the level of faithfulness of film adaptations. This study assessed the level of faithfulness of the book based on the elements of fiction and determined whether the respondents were affected by it. Sixty (60) respondents were included in the study which composed of readers who have read the book before watching the film and viewers who watched the film first before reading the sourced text. The results revealed that most of the respondents evaluated the level of faithfulness of the four out of five elements of fiction including the plot, setting, conflict, and theme as moderately faithful while they found the characters somewhat faithful to the original characters. It was evident in the results that there are significant relationships among the plot and theme and its emotional effects to the respondents, thus, data also showed the significant relationships between the four out of five elements of fictions, excluding setting, and its social or behavioral effects to the respondents. A proposed rubric was made to evaluate film adaptations based on the film elements of fiction.Keywords: elements of fiction, film adaptations, level of faithfulness, psychological effects
Procedia PDF Downloads 301659 When Sexual Desire Fades: Women Talk about Changes in Desire within Long Term Heterosexual Relationships
Authors: Avigail Moor
Abstract:
A decline in women’s sexual desire over the course of long-term relationships, relative to men’s, has been frequently noted. Yet, while there is ample evidence that this change in women is quite common, it is still generally pathologized. Moreover, little is known regarding its true meaning for women and the effect it has on their wellbeing. In light of that, our primary goal was to investigate women's subjective experiences of this reality. Do they connect it to dysfunction in self or marriage, or rather they don't equate love and sex, which for them simply become less connected with time, even as the relationship remains entirely fulfilling? A second goal was to explore how such gender-based differences in sexual desire impact women, and indirectly the couple and partner, in terms of wellbeing and satisfaction from the relationship. In-depth semi-structured interviews were conducted with 15 women in committed long-term relations, aged 25 and over. The findings indicate that for women, there is no contradiction between a loving relation and a decline in spontaneous sexual desire. At the same time, while not rooted in a problem, it does create some. Tension, frustration, conflict, and pressure are some of the negative sequelae that carry adverse effects for women’s wellbeing, the solution to which requires, in their opinion, honest dialogue, mutual respect, and reasonable compromise.Keywords: gender, sexuality, sexual desire, well being
Procedia PDF Downloads 136658 Basics of SCADA Security: A Technical Approach
Authors: Michał Witas
Abstract:
This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.Keywords: denial of service, SCADA, security policy, distributed network
Procedia PDF Downloads 373657 The Triple Nexus: Key Challenges in Shifting from Conceptualization to Operationalization of the Humanitarian-Development-Peacebuilding Nexus
Authors: Sarah M. Bolger
Abstract:
There is a clear recognition that humanitarian and development workers are operating more and more frequently in situations of protracted crises, with conflict and violence undermining long-term development efforts. First coined at the World Humanitarian Summit in 2016, the humanitarian-development-peacebuilding nexus – or 'Triple Nexus' - seeks to promote greater cooperation and policy and program coherence amongst organizations working within and across the nexus. However, despite the clear need for such an approach, the Triple Nexus has failed to gain much traction. This is largely due to the lack of conceptual clarity for actors on the ground and the disconnect between the theory of the Triple Nexus and what that means in practice. This paper seeks to identify the key challenges in shifting from the conceptual definition of the Triple Nexus and what that can look like, particularly for multi-mandated organizations, to the operationalization of the Triple Nexus approach. It adopts a case study approach, examining a selection of organizations and programs and their approaches to the Triple Nexus in order to extract key challenges and lessons learned. Finally, key recommendations are provided on how these challenges can be overcome, allowing for the operationalization of the Triple Nexus and ultimately for a more integrated and sustainable approach to humanitarian, development, and peacebuilding work.Keywords: development, humanitarian, peacebuilding, triple nexus
Procedia PDF Downloads 144656 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees
Authors: Afsana Afsar Tuly
Abstract:
The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar
Procedia PDF Downloads 144655 Absence of Arbitrator Duty of Disclosure under the English Arbitration Act 1996
Authors: Qusai Alshahwan
Abstract:
The arbitrator’s duties of independence and impartiality play a significant role in delivering arbitral awards which legitimate the fundamental of arbitration concepts. For this reason, the international and national arbitration rules require arbitrators to be independent and impartial to solve the arbitration disputes fairly between the parties. However, solving the disputes fairly also requires arbitrators to disclose any existing conflicts of interest with the parties to avoid misunderstanding and late challenges. In contrary with the international and national arbitration rules, the English Arbitration Act 1996 does not include independence as a separate ground for arbitrator’s removal, and importantly the English Arbitration Act 1996 is deliberately silent to the arbitrator duty of disclosure. The absence of arbitrator duty of disclosure is an issue had generated uncertainty and concerns for the arbitration community under the English jurisdiction, particularly when the English courts rejected the IBA guidelines of arbitrator conflict of interest such as in case of Halliburton v Chubb for example. This article is highlighting on the legal consequences of the absence of arbitrator duty of disclosure under the English Arbitration Act 1996 and the arbitrator's contractual obligations.Keywords: arbitration, impartiality, independence, duty of disclosure, English Arbitration Act 1996
Procedia PDF Downloads 131654 Afghan Refugees as Perpetui Inimici: Revisiting an Early Modern Debate on Enemy Aliens
Authors: Brian Smith
Abstract:
This paper seeks to contrast the contemporary anti-immigration rhetoric since the US pullout of Afghanistan with the debate about enemy aliens in the early modern period. In the seventeenth century, Sir Edward Coke declared that “infidels” should be seen as perpetui inimici (perpetual enemies) since their values were inimical to those of Christian states. As such, they could be perpetually excluded and denied legal standing. Even at that time, these anti-“infidel” arguments clashed with the natural law tradition of hospitality, which assumed that states had a moral responsibility to admit and care for strangers. In particular, this paper looks at the conflict between Hugo Grotius, Samuel Pufendorf, and John Locke. Grotius argues that states have a duty to admit foreigners. He goes out of his way to plan for the admittance of Jewish immigrants. In contrast, Pufendorf claimed that sovereigns had a duty exclude foreigners who would alter the constitutional character of the state. Much like Grotius, Locke argued that non-Christian peoples should be treated as friends and admitted without reservation.Keywords: enemy aliens, perpetual enemies, hospitality, refugees
Procedia PDF Downloads 107653 Optimality Theoretic Account of Indian Loanwords in Hadhrami Arabic
Authors: Mohammed Saleh Lahmdi, Hassan Obeid Alfadly
Abstract:
This study explores an optimality-theoretic account of Indian loanwords in Hadhrami Arabic (henceforth HA), a variety of Arabic spoken in Hadhramout Province in the coastal areas and Hadhramout Valley. The purpose of this paper is to find out how the phonological forms of Indian loanwords can be accounted for from an OT standpoint. To achieve this purpose, two main instruments were implemented: participant observation and interview. The sample of this study was selected carefully with certain characteristics by judgment sampling consisting of eleven informants. An ethnographic qualitative approach was employed to find out the phonological articulations that the researcher encountered during the implementation. Many phonological processes are used and several markedness and faithfulness constraints have been interacted in conflict in order to choose the optimal form of Hadhrami realisations. The findings of the study confirm that the Hadhrami syllable structure prevails over the donor language, i.e., the Indian (mainly Urdu) language. Specifically, markedness constraints dominate faithfulness ones when most of the Indian loanwords are incorporated into HA.Keywords: linguistic borrowing, optimality theory, Hadhrami Arabic, loanword, phonological processes
Procedia PDF Downloads 45652 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 153651 A Longitudinal Study of Academic Achievement: Parental Warm Support and Moderating Role of Teacher’s Emotional Support and Mediating Role of Self Control on Academic Achievement
Authors: Maaza Saeed, Caina Li
Abstract:
The current 2-wave longitudinal study attempts to illuminate the well-established association between parental warm support and academic achievement through the mediating role of self-control while taking into account the moderating role of teacher emotional support. The present research has assessed 2569 Chinese students (aged 10-18 years, M = 13.27, SD = 0.67). They were recruited from the three public middle schools in Xi’an, a middle-sized city in the central part of China. Meditation analysis revealed that self-control mediated the relationship between parental warm support and academic achievement. Additionally, it was found the direct effect of parental warm support was not significant after controlling for the age and gender. Furthermore, moderation analysis revealed high parental warm support and higher teacher emotional support was related to increased self-control compared to lower teacher emotion support. The findings highlighted the importance of parental warm support, teacher emotional support, and self-control on academic achievement.Keywords: self control, academic achievement, teacher emotional support/conflict, adolescent
Procedia PDF Downloads 273650 The Conflict between Empowerment and Exploitation: The Hypersexualization of Women in the Media
Authors: Seung Won Park
Abstract:
Pornographic images are becoming increasingly normalized as innovations in media technology arise, the porn industry explosively grows, and transnational capitalism spreads due to government deregulation and privatization of media. As the media evolves, pornography has become more and more violent and non-consensual; this growth of ‘raunch culture’ reifies the traditional power balance between men and women in which men are dominant, and women are submissive. This male domination objectifies and commodifies women, reducing them to merely sexual objects for the gratification of men. Women are exposed to pornographic images at younger and younger ages, providing unhealthy sexual role models and teaching them lessons on sexual behavior before the onset of puberty. The increasingly sexualized depiction of women in particular positions them as appropriately desirable and available to men. As a result, women are not only viewed as sexual prey but also end up treating themselves primarily as sexual objects, basing their worth off of their sexuality alone. Although many scholars are aware of and have written on the great lack of agency exercised by women in these representations, the general public tends to view some of these women as being empowered, rather than exploited. Scholarly discourse is constrained by the popular misconception that the construction of women’s sexuality in the media is controlled by women themselves.Keywords: construction of gender, hypersexualization, media, objectification
Procedia PDF Downloads 296649 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks
Authors: Michael Josef Schwerer
Abstract:
Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy
Procedia PDF Downloads 51648 Pain Control by Ketamine in Combat Situation; Consideration and Outcomes
Authors: Mohammad Javad Behzadnia, Hamidreza Javadzadeh
Abstract:
Background: Pain management is essential to surmounting multi-injured people in an overcrowded emergency setting. Its role would be more apparent when the physician encounters a mass casualty in a war zone or even a military prehospital. Having sedative and analgesic properties, rapid onset and offset effects, and maintaining the cardiovascular and respiratory contain are the main reason for selecting Ketamine as a good choice in the war zone. Methods: In a prospective interventional study in a war zone, we have selected and followed two groups of casualties for pain management. All were men with an average age of 26.6±8 y/o and 27.5 ±7 y/o in A and B groups, respectively. Group A received only Ketamine and Group B received Ketamine and diazepam. Results: This study showed that all of the injured patients who received Ketamine had experienced some agitation, and they may finally need benzodiazepines for sedation, but in group B that received benzodiazepine before or simultaneous with Ketamine, the agitation was significantly reduced. (P Value ≤0.05) Conclusion: Various factors may affect pain score and perception; patients' culture, mental health, previous drug usage, and addiction could alter the pain score in similar situations. It seems that the significant agitation is due to catecholamine release in stressful Moments of the battlefield. Accordingly, this situation could be exacerbated due to ketamine properties. Nonetheless, as a good choice in the war zone, Ketamine is now recommended to combine with benzodiazepines for procedural sedation and analgesia (PSA).Keywords: battlefield, ketamine, benzodiazepine, pain control
Procedia PDF Downloads 102647 Climate Change and Variability-Induced Resource Based Conflicts: The Case of the Issa, Ittu and Afar (Agro) Pastoralists of Eastern Ethiopia
Authors: Bamlaku Tadesse Mengistu
Abstract:
This article explores the link between climate change/variability and its adaptation/coping strategies with resource-based ethnic conflicts among the Afar, Issa-Somali, and Ittu-Oromo ethnic groups. The qualitative data were collected from community leaders, ordinary members of the communities, and administrative and political bodies at various levels through one-on-one interviews, focus group discussions and field observations. The quantitative data were also collected through a household survey from the randomly selected 128 households drawn from the three districts of Mieso-Mullu, Mieso, and Amibara districts. The study shows that there is a causal relationship between resource scarcity impacted by climate change/variability and ethnic conflicts. The study reveals that the increasing nature of resource scarcity and environmental problems, and also the changing nature of ethnic diversity will aggravate the resource-based inter-ethnic conflicts.Keywords: Eastern Ethiopia, ethnic conflict, climate change, Afar, Issa, Ittu
Procedia PDF Downloads 196646 Using Q-Learning to Auto-Tune PID Controller Gains for Online Quadcopter Altitude Stabilization
Authors: Y. Alrubyli
Abstract:
Unmanned Arial Vehicles (UAVs), and more specifically, quadcopters need to be stable during their flights. Altitude stability is usually achieved by using a PID controller that is built into the flight controller software. Furthermore, the PID controller has gains that need to be tuned to reach optimal altitude stabilization during the quadcopter’s flight. For that, control system engineers need to tune those gains by using extensive modeling of the environment, which might change from one environment and condition to another. As quadcopters penetrate more sectors, from the military to the consumer sectors, they have been put into complex and challenging environments more than ever before. Hence, intelligent self-stabilizing quadcopters are needed to maneuver through those complex environments and situations. Here we show that by using online reinforcement learning with minimal background knowledge, the altitude stability of the quadcopter can be achieved using a model-free approach. We found that by using background knowledge instead of letting the online reinforcement learning algorithm wander for a while to tune the PID gains, altitude stabilization can be achieved faster. In addition, using this approach will accelerate development by avoiding extensive simulations before applying the PID gains to the real-world quadcopter. Our results demonstrate the possibility of using the trial and error approach of reinforcement learning combined with background knowledge to achieve faster quadcopter altitude stabilization in different environments and conditions.Keywords: reinforcement learning, Q-leanring, online learning, PID tuning, unmanned aerial vehicle, quadcopter
Procedia PDF Downloads 174645 An Approach of Node Model TCnNet: Trellis Coded Nanonetworks on Graphene Composite Substrate
Authors: Diogo Ferreira Lima Filho, José Roberto Amazonas
Abstract:
Nanotechnology opens the door to new paradigms that introduces a variety of novel tools enabling a plethora of potential applications in the biomedical, industrial, environmental, and military fields. This work proposes an integrated node model by applying the same concepts of TCNet to networks of nanodevices where the nodes are cooperatively interconnected with a low-complexity Mealy Machine (MM) topology integrating in the same electronic system the modules necessary for independent operation in wireless sensor networks (WSNs), consisting of Rectennas (RF to DC power converters), Code Generators based on Finite State Machine (FSM) & Trellis Decoder and On-chip Transmit/Receive with autonomy in terms of energy sources applying the Energy Harvesting technique. This approach considers the use of a Graphene Composite Substrate (GCS) for the integrated electronic circuits meeting the following characteristics: mechanical flexibility, miniaturization, and optical transparency, besides being ecological. In addition, graphene consists of a layer of carbon atoms with the configuration of a honeycomb crystal lattice, which has attracted the attention of the scientific community due to its unique Electrical Characteristics.Keywords: composite substrate, energy harvesting, finite state machine, graphene, nanotechnology, rectennas, wireless sensor networks
Procedia PDF Downloads 105644 US Foreign Aids and Its Institutional and Non-Institutional Impacts in the Middle East, Africa, Southeast Asia, and Latin America (2000 - 2020)
Authors: Mahdi Fakheri, Mohammad Mohsen Mahdizadeh Naeini
Abstract:
This paper addresses an understudied aspect of U.S. foreign aids between the years 2000 and 2020. Despite a growing body of literature on the impacts of U.S. aids, the question about how the United States uses its foreign aids to change developing countries has remained unanswered. As foreign aid is a tool of the United States' foreign policy, answering this very question can reveal the future that the U.S. prefers for developing countries and that secures its national interest. This paper will explore USAID's official dataset, which includes the data of foreign aids to the Middle East, Africa, Latin America, and Southeast Asia from 2000 to 2020. Through an empirical analysis, this paper argues that the focus of U.S. foreign aid is evenly divided between institutional and non-institutional (i.e., slight enhancement of status quo) changes. The former is induced by training and education, funding the initiatives and projects, making capacity and increasing the efficiency of human, operational, and management sectors, and enhancing the living condition of the people. Moreover, it will be demonstrated that the political, military, cultural, economic, and judicial are some of the institutions that the U.S. has planned to change in the aforementioned period and regions.Keywords: USAID, foreign aid, development, developing countries, Middle East, Africa, Southeast Asia, Latin America
Procedia PDF Downloads 189643 A 1.57ghz Mixer Design for GPS Receiver
Authors: Hamd Ahmed
Abstract:
During the Persian Gulf War in 1991s, The confederation forces were surprised when they were being shot at by friendly forces in Iraqi desert. As obvious was the fact that they were mislead due to the lack of proper guidance and technology resulting in unnecessary loss of life and bloodshed. This unforeseen incident along with many others led the US department of defense to open the doors of GPS. In the very beginning, this technology was for military use, but now it is being widely used and increasingly popular among the public due to its high accuracy and immeasurable significance. The GPS system simply consists of three segments, the space segment (the satellite), the control segment (ground control) and the user segment (receiver). This project work is about designing a 1.57GHZ mixer for triple conversion GPS receiver .The GPS Front-End receiver based on super heterodyne receiver which improves selectivity and image frequency. However the main principle of the super heterodyne receiver depends on the mixer. Many different types of mixers (single balanced mixer, Single Ended mixer, Double balanced mixer) can be used with GPS receiver, it depends on the required specifications. This research project will provide an overview of the GPS system and details about the basic architecture of the GPS receiver. The basic emphasis of this report in on investigating general concept of the mixer circuit some terms related to the mixer along with their definitions and present the types of mixer, then gives some advantages of using singly balanced mixer and its application. The focus of this report is on how to design mixer for GPS receiver and discussing the simulation results.Keywords: GPS , RF filter, heterodyne, mixer
Procedia PDF Downloads 323642 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria
Authors: Egboja Simon, Agi Sunday
Abstract:
One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.Keywords: governance, security, food, development, conflict, hunger, society, sustainability
Procedia PDF Downloads 330641 Settlements of Disputes in the Context of Islamic (Sharia) Economics in Indonesia and Egypt: A Comparative Analysis
Authors: Gemala Dewi, Wirdyaningsih, Farida Prihatini
Abstract:
The development of sharia business activities at present has solidified its societal mark and has crossed influence between several nations. In the practice, there may be disputes, breaches and other forms of conflict that occurred along the way. In the meantime, alternative settlements of disputes are utilized differently between nations in the context of their political, social, economic, legal and infrastructural (technology and transportation) scope. Besides the various conditions, there is a common driving factor, which is a consequence of the need for businesses to settle conflicts in an efficient and cost-efficient manner. This factor is paired symbiotically with the limitations of the court and legal processes. Knowing this, Indonesia and Egypt represent countries that have similar social, political, economic and legal conditions. This academic research establishes a normative analysis that looks and compares the rules that regulate the prospects and challenges in the regards of dispute settlements in reference to sharia economics in Indonesia and Egypt. This work recommends that sharia economics dispute settlement is significant to be incorporated in both Indonesian and Egyptian legal systems.Keywords: sharia economics, dispute resolution, Indonesia, Egypt
Procedia PDF Downloads 337