Search results for: border security
2016 Court-Annexed Mediation for International Commercial Disputes in Asia: Strengths and Weaknesses
Authors: Thu Thuy Nguyen
Abstract:
In recent years, mediation has gained a great attention from many jurisdictions thanks to its advantages. With respect to Asia, mediation has a long history of development in this region with various types to amicably settle disputes in civil and commercial issues. The modern mediation system in several Asian countries and territories comprises three main categories, namely court-annexed mediation, mediation within arbitral proceedings and institutional mediation. Court-annexed mediation (or in-court mediation) is mediation conducted by the court in the course of judicial procedures. In dealing with cross-border business disputes, in-court mediation exposes a number of advantages in comparison with two other types of mediation, especially in terms of enforcement of final result. However, the confidentiality of mediation process in subsequent judicial proceedings, qualifications of court judges and the issue of recognition and enforcement of foreign judgment are normally seen as drawbacks of court-annexed mediation as in court-annexed mediation judges will be casts as dual roles as both mediator and ultimate adjudicator in the same dispute. This paper will examine the strengths and weaknesses of in-court mediation in settling transnational business disputes in selected Asian countries, including China, Hong Kong, Japan, Singapore and Vietnam.Keywords: court-annexed mediation, international commercial disputes, Asia, strengths and weaknesses
Procedia PDF Downloads 3082015 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria
Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi
Abstract:
Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization
Procedia PDF Downloads 2912014 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes
Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay
Abstract:
Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe
Procedia PDF Downloads 1502013 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 2672012 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook
Authors: Soorya Vennila
Abstract:
The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.Keywords: health, watersecurity, water quality, climate change
Procedia PDF Downloads 792011 Household Earthquake Absorptive Capacity Impact on Food Security: A Case Study in Rural Costa Rica
Authors: Laura Rodríguez Amaya
Abstract:
The impact of natural disasters on food security can be devastating, especially in rural settings where livelihoods are closely tied to their productive assets. In hazards studies, absorptive capacity is seen as a threshold that impacts the degree of people’s recovery after a natural disaster. Increasing our understanding of households’ capacity to absorb natural disaster shocks can provide the international community with viable measurements for assessing at-risk communities’ resilience to food insecurities. The purpose of this study is to identify the most important factors in determining a household’s capacity to absorb the impact of a natural disaster. This is an empirical study conducted in six communities in Costa Rica affected by earthquakes. The Earthquake Impact Index was developed for the selection of the communities in this study. The households coded as total loss in the selected communities constituted the sampling frame from which the sample population was drawn. Because of the study area geographically dispersion over a large surface, the stratified clustered sampling hybrid technique was selected. Of the 302 households identified as total loss in the six communities, a total of 126 households were surveyed, constituting 42 percent of the sampling frame. A list of indicators compiled based on theoretical and exploratory grounds for the absorptive capacity construct served to guide the survey development. These indicators were included in the following variables: (1) use of informal safety nets, (2) Coping Strategy, (3) Physical Connectivity, and (4) Infrastructure Damage. A multivariate data analysis was conducted using Statistical Package for Social Sciences (SPSS). The results show that informal safety nets such as family and friends assistance exerted the greatest influence on the ability of households to absorb the impact of earthquakes. In conclusion, communities that experienced the highest environmental impact and human loss got disconnected from the social networks needed to absorb the shock’s impact. This resulted in higher levels of household food insecurity.Keywords: absorptive capacity, earthquake, food security, rural
Procedia PDF Downloads 2562010 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 4042009 Quantifying Spatiotemporal Patterns of Past and Future Urbanization Trends in El Paso, Texas and Their Impact on Electricity Consumption
Authors: Joanne Moyer
Abstract:
El Paso, Texas is a southwest border city that has experienced continuous growth within the last 15-years. Understanding the urban growth trends and patterns using data from the National Land Cover Database (NLCD) and landscape metrics, provides a quantitative description of growth. Past urban growth provided a basis to predict 2031 future land-use for El Paso using the CA-Markov model. As a consequence of growth, an increase in demand of resources follows. Using panel data analysis, an understanding of the relation between landscape metrics and electricity consumption is further analyzed. The studies’ findings indicate that past growth focused within three districts within the City of El Paso. The landscape metrics suggest as the city has grown, fragmentation has decreased. Alternatively, the landscape metrics for the projected 2031 land-use indicates possible fragmentation within one of these districts. Panel data suggests electricity consumption and mean patch area landscape metric are positively correlated. The study provides local decision makers to make informed decisions for policies and urban planning to ensure a future sustainable community.Keywords: landscape metrics, CA-Markov, El Paso, Texas, panel data
Procedia PDF Downloads 1442008 The Evolution of National Technological Capability Roles From the Perspective of Researcher’s Transfer: A Case Study of Artificial Intelligence
Authors: Yating Yang, Xue Zhang, Chengli Zhao
Abstract:
Technology capability refers to the comprehensive ability that influences all factors of technological development. Among them, researchers’ resources serve as the foundation and driving force for technology capability, representing a significant manifestation of a country/region's technological capability. Therefore, the cross-border transfer behavior of researchers to some extent reflects changes in technological capability between countries/regions, providing a unique research perspective for technological capability assessment. This paper proposes a technological capability assessment model based on personnel transfer networks, which consists of a researchers' transfer network model and a country/region role evolution model. It evaluates the changes in a country/region's technological capability roles from the perspective of researcher transfers and conducts an analysis using artificial intelligence as a case study based on literature data. The study reveals that the United States, China, and the European Union are core nodes, and identifies the role evolution characteristics of several major countries/regions.Keywords: transfer network, technological capability assessment, central-peripheral structure, role evolution
Procedia PDF Downloads 942007 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks
Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla
Abstract:
A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional
Procedia PDF Downloads 4122006 'Refugee Crisis' and Global Labour Relations: Syrian Labour in Turkish Textile Factories
Authors: Katarzyna Czarnota, Inga Hajdarowicz
Abstract:
Political mechanisms of legal, social and economic segregation of refugees and migrants have reproduced and deepened existing hierarchies and inequalities in global labour relations. The consequences of these processes strengthened by current, so called, ‘refugee crisis’, tightening of border regimes, militarisation and closing of Balkan Route, will have a significant impact on future integration policies. One of the fields that require further research is limited access to labour rights of migrants and refugees. Although this phenomenon is experienced by a significant proportion of migrant population, these are the poorest who are also exposed to economic racism. The presentation will tackle the influence of current migration policies on increasing social and class inequalities between migrants, refugees, on the example of Syrian labours in Turkish textile factories. The authors will critically analyse examples of integration policies, especially planned changes in labour law as well as examples of violation of labour rights and exploitation of refugees and migrants in textile factories and industry. The presentation will be based on interviews with Syrian workers, conducted in Turkey and Greece in 2016.Keywords: refugee crisis, economic racism, global labour relations, exploatation
Procedia PDF Downloads 3242005 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 2652004 Rescaling Global Health and International Relations: Globalization of Health in a Low Security Environment
Authors: F. Argurio, F. G. Vaccaro
Abstract:
In a global environment defined by ever-increasing health issues, in spite of the progress made by modern medicine, this paper seeks to readdress the question of global health in an international relations perspective. The research hypothesis is: the lower the security environment, the higher the spread of communicable diseases. This question will be channeled by re-scaling the connotation of 'global' and 'international' dimension through the theoretical lens of glocalization, a theory by Bauman that starts its analysis from simple systems to get to the most complex ones. Glocalization theory will be operationalized by analyzing health in an armed-conflict context. In this respect, the independent variable 'low security environment' translates into the cases of Syria and Yemen, which provide a clear example of the all-encompassing nature of conflict on national health and the effects on regional development. In fact, Syria and Yemen have been affected by poliomyelitis and cholera outbreaks respectively. The dependent variable will be constructed on said communicable diseases which belong to the families of sanitation-related and vaccine-preventable diseases. The research will be both qualitative and quantitative, based on primary (interviews) and secondary (WHO and other NGO’s reports) sources. The methodology is based on the assessment of the vaccine coverage and case-analysis in time and space using epidemiological data. Moreover, local health facilities’ functioning and efficiency will be studied. The article posits that the intervention and cooperation of international organizations with the local authorities becomes crucial to provide the local populations with their primary health needs. In Yemen, the majority of fatal cholera cases were in the regions controlled by the Houthi rebels, not officially accredited by the International Community. Similarly, the polio outbreak in Syria primarily affected the areas not controlled by the Syrian Arab Republic forces, recognized as the leading interlocutor by the WHO. The jeopardized possibilities to access these countries have been pivotal to the determining the problem in controlling sanitation-related and vaccine preventable diseases. This represents a potential threat to global health.Keywords: health in conflict-affected areas, cholera, polio, Yemen, Syria, glocalization
Procedia PDF Downloads 1342003 Passengers’ Willingness to Use Soft Biometric at Airports
Authors: Jin-Ru Yen, Chi-Che Hsieh
Abstract:
Up to date, the automated border control system has been used at many airports, which features biometric technology to identify passengers. In spite of its efficiency, failures or extra time could occur sometimes. To improve recognition performance, some scholars proposed the idea of using soft biometrics to support facial recognition systems at checkpoints in airports. The result showed that the efficiency and accuracy are improved. This study aims to explore passengers’ acceptance of soft biometric technology (SBT). We developed a survey to discover factors that affect passengers’ acceptance. An online survey was conducted, and an ANOVA (Analysis of variances) was performed. Our results found that passengers of different genders, ages, education levels, and average monthly incomes do not have significant differences in usage attitude. However, in terms of preferred top style on board and average flying frequency per year, passengers with preferences for wearing T-shirts and less flying frequency tend to have better attitudes toward the SBT. On the other hand, factors such as performance expectancy, social influence, facilitating condition, and hedonic motivation have positive influences on either usage attitude or behavioral intention. Behavioral intention is driven by usage attitude as well.Keywords: smart airport, biometrics, soft biometric technology, willingness to use
Procedia PDF Downloads 62002 Sociocultural Barriers to the Development of Autonomous Foreign Language Learning: Some Teaching Strategies to Overcome Such Challenges in a Mexican Context
Authors: Zaideth Zobeida Ponce Alonso, Laura Emilia Fierro Lopez, Maria del Rocio Dominguez Gaona
Abstract:
The present study is part of the Master in Modern Languages at the Universidad Autónoma de Baja California, and it aims to analyze how the sociocultural background might influence the development of learner autonomy in foreign language education in order to propose some strategies to overcome such challenges. Given the lack of research on the sociocultural barriers in learner autonomy in a Mexican context and the need to hear teachers’ voices about this issue, qualitative data was obtained from semi-structured interviews with six language teachers on their perspectives on learner autonomy, its application to the language classroom, and their experiences with Mexican and foreign learners/contexts in order to find out differences regarding learner autonomy. The results suggest three main sociocultural characteristics: preference for an authority figure, tendency towards collectivism, and low tolerance of ambiguity. Finally, nine strategies were proposed in order to help language teachers to deal with such sociocultural characteristics when fostering learner autonomy in the border city of Mexicali, where this study was carried out.Keywords: learner autonomy, Mexican context, sociocultural influence, teachers' perspectives, teaching strategies
Procedia PDF Downloads 1582001 Trend and Cuses of Decline in Trifoliate Yam (Dioscorea dumentorum) Production in Enugu State, Nigeria: Implication for Food Security and Biodiversity Conservation
Authors: J. C. Iwuchukwu, K. C. Okwor
Abstract:
In recent time and in the study area, yam farmers are moving into less laborious and more economical crops and very few yam farmers are growing trifoliate yam. In yam markets, little or no bitter yam is displayed or sold. The work was therefore designed to ascertain trend and causes of decline in trifoliate yam production in Enugu state. Three agricultural zones, six blocks, eighteen circles and one hundred and eight trifoliate yam farmers that were purposively selected constituted sample for the study. An interview schedule was used to collect data while percentage, mean score and standard deviation were used for data analysis. Findings of the study revealed that the respondents had no extension contact, Majority (90.7%) sourced information on trifoliate yam from neighbours/friends/relatives and produced mainly for consumption (67.6%) during rainy season (70.4%). Trifoliate yam was produced manually(71.3%) and organically (58.3%) in a mixture of other crops (87%) using indigenous/local varieties (73.1%). Mean size of land allocated to trifoliate yam production was relatively steady, mean cost of input and income were increasing while output was decreasing within the years under consideration (before 2001 to 2014). Poor/lack of finance(M=1.8) and drudgery associated with trifoliate yam product(M=1.72) were some of the causes of decline in trifoliate yam production in the area. The study recommended that more research and public enlightenment campaigns on the importance of trifoliate yam should be carried out to encourage and consolidate farmers and the masses effort in production and consumption of the crop so that it will not go extinct and then contribute to food security.Keywords: causes, decline, trend, trifoliate yam
Procedia PDF Downloads 4042000 Estimation of Carbon Losses in Rice: Wheat Cropping System of Punjab, Pakistan
Authors: Saeed Qaisrani
Abstract:
The study was conducted to observe carbon and nutrient loss by burning of rice residues on rice-wheat cropping system The rice crop was harvested to conduct the experiment in a randomized complete block design (RCBD) with factors and 4 replications with a net plot size of 10 m x 20 m. Rice stubbles were managed by two methods i.e. Incorporation & burning of rice residues. Soil samples were taken to a depth of 30 cm before sowing & after harvesting of wheat. Wheat was sown after harvesting of rice by three practices i.e. Conventional tillage, Minimum tillage and Zero tillage to observe best tillage practices. Laboratory and field experiments were conducted on wheat to assess best tillage practice and residues management method with estimation of carbon losses. Data on the following parameters; establishment count, plant height, spike length, number of grains per spike, biological yield, fat content, carbohydrate content, protein content, and harvest index were recorded to check wheat quality & ensuring food security in the region. Soil physico-chemical analysis i.e. pH, electrical conductivity, organic matter, nitrogen, phosphorus, potassium, and carbon were done in soil fertility laboratory. Substantial results were found on growth, yield and related parameters of wheat crop. The collected data were examined statistically with economic analysis to estimate the cost-benefit ratio of using different tillage techniques and residue management practices. Obtained results depicted that Zero tillage method have positive impacts on growth, yield and quality of wheat, Moreover, it is cost effective methodology. Similarly, Incorporation is suitable and beneficial method for soil due to more nutrients provision and reduce the need of fertilizers. Burning of rice stubbles has negative impact including air pollution, nutrient loss, microbes died and carbon loss. Recommended the zero tillage technology to reduce carbon losses along with food security in Pakistan.Keywords: agricultural agronomy, food security, carbon sequestration, rice-wheat cropping system
Procedia PDF Downloads 2771999 Foresight in Food Supply System in Bogota
Authors: Suarez-Puello Alejandro, Baquero-Ruiz Andrés F, Suarez-Puello Rodrigo
Abstract:
This paper discusses the results of a foresight exercise which analyzes Bogota’s fruit, vegetable and tuber supply chain strategy- described at the Food Supply and Security Master Plan (FSSMP)-to provide the inhabitants of Bogotá, Colombia, with basic food products at a fair price. The methodology consisted of using quantitative and qualitative foresight tools such as system dynamics and variable selection methods to better represent interactions among stakeholders and obtain more integral results that could shed light on this complex situation. At first, the Master Plan is an input to establish the objectives and scope of the exercise. Then, stakeholders and their relationships are identified. Later, system dynamics is used to model product, information and money flow along the fruit, vegetable and tuber supply chain. Two scenarios are presented, discussing actions by the public sector and the reactions that could be expected from the whole food supply system. Finally, these impacts are compared to the Food Supply and Security Master Plan’s objectives suggesting recommendations that could improve its execution. This foresight exercise performed at a governmental level is intended to promote the widen the use of foresight as an anticipatory, decision-making tool that offers solutions to complex problems.Keywords: decision making, foresight, public policies, supply chain, system dynamics
Procedia PDF Downloads 4421998 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction
Authors: Didem Aslantaş
Abstract:
In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria
Procedia PDF Downloads 841997 Federal Bureau of Investigation Opposition to German Nationalist Organizations in the United States (1941-45)
Authors: Yaroslav Alexandrovich Levin
Abstract:
In modern research on the history of the United States in World War II, it is quite popular to study the opposition of the American special services and, in particular, the Federal Bureau of Investigation (FBI) to various organizations of the German diasporas in new historical conditions. The appeal to traditional methods of historical research, comparative studies, and the principles of historicism will make it possible to more accurately trace the process of tightening the counterintelligence work of the Bureau and the close connection of concerns about the involvement of public organizations in the intelligence activities of the enemy. The broadcast of nationalist ideas by various communities of Germans under the auspices of their governments quickly attracted the attention of the FBI, which is in the process of consolidating its powers as the main US counterintelligence service. At the same time, the investigations and trials conducted by the John Edgar Hoover Department following these investigations often had an openly political color and increasingly consolidated the beginning of a political investigation in this service. This practice and its implementation ran into a tough contradiction between the legal norms of America, which proclaimed "democratic values," the right to freedom of speech, and the need to strengthen the internal security of the state and society in wartime. All these processes and the associated nuances and complexities are considered in specific examples of the work of federal agents against various pro-German organizations in the period 1941-45.Keywords: World War II, internal security, countering extremism, counterintelligence, political investigation, FBI
Procedia PDF Downloads 861996 Performance Effects of Demergers in India
Authors: Pavak Vyas, Hiral Vyas
Abstract:
Spin-offs commonly known as demergers in India, represents dismantling of conglomerates which is a common phenomenon in financial markets across the world. Demergers are carried out with different motives. A demerger generally refers to a corporate restructuring where, a large company divests its stake in in its subsidiary and distributes the shares of the subsidiary - demerged entity to the existing shareholders without any consideration. Demergers in Indian companies are over a decade old phenomena, with many companies opting for the same. This study examines the demerger regulations in Indian capital markets and the announcement period price reaction of demergers during year 2010-2015. We study total 97 demerger announcements by companies listed in India and try to establish that demergers results into abnormal returns for the shareholders of the parent company. Using event study methodology we have analyzed the security price performance of the announcement day effect 10 days prior to announcement to 10 days post demerger announcement. We find significant out-performance of the security over the benchmark index post demerger announcements. The cumulative average abnormal returns range from 3.71% on the day of announcement of a private demerger to 2.08% following 10 days surrounding the announcement, and cumulative average abnormal returns range from 5.67% on the day of announcement of a public demerger to 4.15% following10 days surrounding the announcement.Keywords: demergers, event study, spin offs, stock returns
Procedia PDF Downloads 3011995 The Effect of Smartphones on Human Health Relative to User’s Addiction: A Study on a Wide Range of Audiences in Jordan
Authors: T. Qasim, M. Obeidat, S. Al-Sharairi
Abstract:
The objective of this study is to investigate the effect of the excessive use of smartphones. Smartphones have enormous effects on the human body in that some musculoskeletal disorders (MSDs) and health problems might evolve. These days, there is a wide use of the smartphones among all age groups of society, thus, the focus on smartphone effects on human behavior and health, especially on the young and elderly people, becomes a crucial issue. This study was conducted in Jordan on smartphone users for different genders and ages, by conducting a survey to collect data related to the symptoms and MSDs that are resulted from the excessive use of smartphones. A total of 357 responses were used in the analysis. The main related symptoms were numbness, fingers pain, and pain in arm, all linked to age and gender for comparative reasons. A statistical analysis was performed to find the effects of extensive usage of a smartphone for long periods of time on the human body. Results show that the significant variables were the vision problems and the time spent when using the smartphone that cause vision problems. Other variables including age of user and ear problems due to the use of the headsets were found to be a border line significant.Keywords: smart phone, age group, musculoskeletal disorders (MSDs), health problems
Procedia PDF Downloads 2531994 Assessment of the Economic Factors and Motivations towards De-Dollarization since the Early 2000s and Their Implications
Authors: Laila Algalal, Chen Xi
Abstract:
The US dollar has long served as the world's primary reserve currency. However, this dominance faces growing challenges from internal US economic pressures and the rise of alternative currencies. Internally, issues like high debt, inflation, reduced competitiveness, and economic instability due to inequality in economic policies threaten the dollar's position. Externally, more countries are establishing alternative currencies, payment systems, and regional financial institutions to reduce dollar dependence. These drivers have contributed to a decline in the dollar's share of global foreign exchange reserves from 71% in 2001 to an estimated 58% in 2022. While this 13-percentage point drop took two decades, recent initiatives suggest de-dollarization could accelerate in the coming few decades. Efforts to establish non-dollar trade deals and alternative financial systems show more substantial progress compared to initiatives in the early 2000s. As the nature of the world system is anarchic, states make either individual or group efforts to guarantee their economic security and achieve their interests. Based on neoclassical realism, this paper analyzes both internal and external US economic factors driving current and future de-dollarization and the implications on the international monetary system, in addition to examining the motivation for such moves.Keywords: de-dollarization, US dollar, monetary system, economic security, economic policies.
Procedia PDF Downloads 931993 Bodies in Transit: The African Woman and Migration Ordeals
Authors: Okikiola Olusanu
Abstract:
The us/other relationship between the colonizer and the colonized, which continues to inform the oppression of Africans and highlights the intersectional oppression of postcolonial African women because of the colonialization of the identity of African women, inspired this poem. It reflects 'the body' and the 'embodied' as it journeys through the constructed distance between the white feminine body and colonized bodies in the context of travel. Through vivid imagery, repetition, and powerful language, this poem analyzes the effect of otherness on African women as they struggle with their internalized otherness and a poor sense of belonging, which hinges on the politics of difference which makes it impossible to complement the sameness of another within the liminal space of transition. This poem examines the discourse on the complexities of migration for the African woman by critically examining bodies, space, mobility, and how they interact. Our focus is on their relationship and how it affects African women's place and pace when moving to and through the First World. Through literary and feminist perspectives, this study aims to represent the portrait of the African woman and to decolonize the concept of border. It seeks to address the uniqueness of the African woman’s body, not as the same or different, but as distinct and wholesome to foster fairness, friendship, belonging, and equity in travel. To develop our argument and to establish our findings, we look at the dynamics of the oppression of the postcolonial African woman's body and her resistance.Keywords: body, identity, African woman, decolonization
Procedia PDF Downloads 171992 Improved of Elliptic Curves Cryptography over a Ring
Authors: Abdelhakim Chillali, Abdelhamid Tadmori, Muhammed Ziane
Abstract:
In this article we will study the elliptic curve defined over the ring An and we define the mathematical operations of ECC, which provides a high security and advantage for wireless applications compared to other asymmetric key cryptosystem.Keywords: elliptic curves, finite ring, cryptography, study
Procedia PDF Downloads 3731991 Gender Perspective in Peace Operations: An Analysis of 14 UN Peace Operations
Authors: Maressa Aires de Proenca
Abstract:
The inclusion of a gender perspective in peace operations is based on a series of conventions, treaties, and resolutions designed to protect and include women addressing gender mainstreaming. The UN Security Council recognizes that women's participation and gender equality within peace operations are indispensable for achieving sustainable development and peace. However, the participation of women in the field of peace and security is still embryonic. There are gaps when we think about female participation in conflict resolution and peace promotion spaces, and it does not seem clear how women are present in these spaces. This absence may correspond to silence about representation and the guarantee of the female perspective within the context of peace promotion. Thus, the present research aimed to describe the panorama of the participation of women who are currently active in the 14 active UN peace operations, which are: 1) MINUJUSTH, Haiti, 2) MINURSO, Western Sahara, 3) MINUSCA, Central African Republic, 4) MINUSMA, Mali, 5) MONUSCO, the Democratic Republic of the Congo, 6) UNAMID, Darfur, 7) UNDOF, Golan, 8) UNFICYP, Cyprus, 9) UNIFIL, Lebanon, 10) UNISFA, Abyei, 11) UNMIK, Kosovo, 12) UNMISS, South Sudan, 13) UNMOGIP, India, and Pakistan, and 14) UNTSO, Middle East. A database was constructed that reported: (1) position held by the woman in the peace operation, (2) her profession, (3) educational level, (4) marital status, (5) religion, (6) nationality, (8) number of years working with peace operations, (9) whether the operation in which it operates has provided training on gender issues. For the construction of this database, official reports and statistics accessed through the UN Peacekeeping Resource Hub were used; The United Nations Statistical Commission, Peacekeeping Master Open Datasets, The Armed Conflict Database (ACD), The International Institute for Strategic Studies (IISS) database; Armed Conflict Location & Event Data Project (ACLED) database; from the Evidence and Data for Gender Equality (EDGE) database. In addition to access to databases, peacekeeping operations will be contacted directly, and data requested individually. The database showed that the presence of women in these peace operations is still incipient, but growing. There are few women in command positions, and most of them occupy administrative or human-care positions.Keywords: women, peace and security, peacekeeping operations, peace studies
Procedia PDF Downloads 1361990 Indonesia's War on Terror and the Consequences on Indonesian Political System
Authors: Salieg L. Munestri
Abstract:
War on Terror became a principal war after the 9/11 attacks on U.S. homeland. Instead of helping to build up worldwide efforts to condemn terror and suicide bombings, the U.S.-led war on terror has given opportunities for the vast spread of terror. In much of Muslim world recently, the Bush’s Doctrine pushing all nations to choose sides in a war that is not truly a war has resulted worse effects. In the world’s most populous Muslim nation, Indonesia, more terror occurred since then. Instead of reinforcing the well-trained anti-terror military forces, Indonesian government established US-funded Special Detachment 88 to guarantee the accomplishment of war on terror in Indonesia and significantly to bring impact on regional security atmosphere. Indonesia is a potential power in Asia but it lacked off sophisticated military equipments. Consequently, Indonesia agrees to become a U.S. mutual partner in combating terrorism managed by Defense Security Cooperation Agency. The formation of elite anti-terror forces and U.S. partnerships perform Indonesia’s commitment to take a position beside the U.S. in coping with terrorism issue. However, this undeniably brings consequences on Indonesian political athmosphere, which encourages the writer to dig deep the consequences on the domestic environment of Indonesian political system. The establishment of the elite forces has aroused fluctuations within government, chiefly Indonesian House, concerning the establishment urgency, the large amount of funding, and the unpleasant performances, particularly the treatment toward suspected terrorists. Hence, evaluation process upon the Detachment 88 is highly demanding.Keywords: anti-terror forces, Indonesia, political system, war on terror
Procedia PDF Downloads 3471989 Viability of Sub-Surface Drip Irrigation in Agronomic and Vegetable Crops Production
Authors: Ali Montazar
Abstract:
This study aims to assess the viability of sub-surface drip irrigation (SDI) using several ongoing and conducted researches in the low desert region of California. The experiments were carried out in the University of California Desert Research and Extension Center (UC DREC) and ten commercial fields at alfalfa, sugar beets, dehydrated onions, and spinach crops. The results demonstrated greater yields, actual crop water consumption, and water productivity of SDI as compared with conventional irrigation practices (border, furrow, and sprinkler irrigation) with an average increase of 21%, 7%, and 15%, respectively. The severity of plant disease, particularly root rot in sugar beet, and downy mildew in onions and spinach, were significantly lower in SDI than furrow and sprinkler irrigation (an average of 3-5 times). While utilizing this irrigation technology may have ability to achieve higher yields, conserve water, improve the efficiency of water and nutrient use, and manage food safety risks and plant disease, further work is required to better understand the impact of management practices and strategies on the viability of SDI application, and maintain its profitability in various agricultural production systems as water, labor costs, and environmental concerns increase.Keywords: alfalfa, onions, spinach, sugar beets, subsurface drip irrigation
Procedia PDF Downloads 1281988 Assessing the Impact of Adopting Climate Smart Agriculture on Food Security and Multidimensional Poverty: Case of Rural Farm Households in the Central Rift Valley of Ethiopia
Authors: Hussien Ali, Mesfin Menza, Fitsum Hagos, Amare Haileslassie
Abstract:
Climate change has perverse effects on agricultural productivity and natural resource base, negatively affecting the well-being of the households and communities. The government and NGOs promote climate smart agricultural (CSA) practices to help farmers adapt to and mitigate the negative effects of climate change. This study aims to identify widely available CSA practices and examine their impacts on food security and multi-dimensional poverty of rural farm households in the Central Rift Valley, Ethiopia. Using three-stage proportional to size sampling procedure, the study randomly selected 278 households from two kebeles from four districts each. A cross-sectional data of 2020/21 cropping season was collected using structured and pretested survey questionnaire. Food consumption score, dietary diversity score, food insecurity experience scale, and multidimensional poverty index were calculated to measure households’ welfare indicators. Multinomial endogenous switching regression model was used to assess average treatment effects of CSA on these outcome indicators on adopter and non-adopter households. The results indicate that the widely adopted CSA practices in the area are conservation agriculture, soil fertility management, crop diversification, and small-scale irrigation. Adopter households have, on average, statistically higher food consumption score, dietary diversity score and lower food insecurity access scale than non-adopters. Moreover, adopter households, on average, have lower deprivation score in multidimensional poverty compared to non-adopter households. Up scaling the adoption of CSA practices through the improvement of households’ implementation capacity and better information, technical advice, and innovative financing mechanisms is advised. Up scaling CSA practices can further promote achieving global goals such as SDG 1, SDG 2, and SDG 13 targets, aimed to end poverty and hunger and mitigate the adverse impacts of climate change, respectively.Keywords: climate-smart agriculture, food security, multidimensional poverty, upscaling CSA, Ethiopia
Procedia PDF Downloads 931987 Spatial Occupation of the Wild Boar 'Sus Scrofa Algirus' in the Oasis of Southern Tunisia: The Continental Oasis of Kebili and the Coastal Oasis of Gabes
Authors: Ghandri Aida
Abstract:
The wild boar ‘Sus scrofa algirus’ is an invasive species that has a significant invasive potential allowing it to colonize the agroecosystems of southern Tunisia. In fact, these agroecosystems contain sites with high tranquility-refuge value (refuge zones) which are very attractive for this Suidae thanks to the very dense vegetation (reed beds on the outskirts of the oases and the border areas of the wadis and chotts) and the almost impenetrability for man. When this species is present in abundance, it could cause severe ecological and socio-economic damage. The present work aims to analyze the spatial distribution of this species in the oases of southern Tunisia, namely the coastal oases of Gabès and the continental oases of Kébili, using GLMMs (generalized linear mixed models). In particular, it aims to evaluate the influence of certain landscape factors and vegetation on the occurrence of this harmful species. Our results suggest that the spatial occupancy of wild boar in Tunisian oases essentially depends on proximity to the nearest roads as a repelling factor as well as irrigation, the proportion of cereal cultivation and proximity to areas of refuge as attractive factors.Keywords: sus scrofa algirus, occurence, GLMM, oasis of southern tunisia
Procedia PDF Downloads 13